Khir Henderson featured in Diversity in Action Fall 2021 Magazine

Khir Henderson, doctoral student at Morgan State University whose work focuses on designing and developing sustainable and scalable architectures to help protect some of the major security vulnerabilities in our nation’s critical infrastructures, was recently featured in the Fall 2021 edition of Diversity in Action. Khir’s work on the SPLICE team includes investigating hardware and software… Read More Khir Henderson featured in Diversity in Action Fall 2021 Magazine

New SPLICE Position Paper: ‘Tussles in IoT Space: Crucial Considerations for Consumer Devices’

Executive Order 14028 issued in May of 2021 asked the National Institute of Standards and Technology (NIST) to “identify IoT cybersecurity criteria for a consumer labeling program,” as “the United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy.”… Read More New SPLICE Position Paper: ‘Tussles in IoT Space: Crucial Considerations for Consumer Devices’

New SPLICE paper on Security and Privacy Attitudes

Many studies of mobile security and privacy are, for simplicity, limited to either only Android users or only iOS users. However, it is not clear whether there are systematic differences in the privacy and security knowledge or preferences of users who select these two platforms. Understanding these differences could provide important context about the generalizability… Read More New SPLICE paper on Security and Privacy Attitudes

Finding and reporting a device vulnerability

*Posted on behalf of Adam Vandenbussche, Dartmouth ’22* My name is Adam and I’m a Dartmouth undergraduate researcher on the SPLICE project. I first became involved with SPLICE as a student in Professor Kotz’s COSC 89.26 SPLICE seminar course last fall. After spending the term reading and discussing papers considering a variety of security and privacy concerns in IoT, our… Read More Finding and reporting a device vulnerability