Guevara Noubir Professor of Computer and Information Science noubir@ccs.neu.edu 617.373.5205 Expertise cybersecurity, design, theory and prototyping of scalable and secure heterogeneous wireless communication systems Guevara Noubir in the Press Ars Technica The radio navigation planes use to land safely is insecure and can be hacked The researchers, from Northeastern University in Boston, consulted a pilot and security expert during their work, and all are careful to note that this kind of spoofing isn’t likely to cause a plane to crash in most cases. ILS malfunctions are a known threat to aviation safety, and experienced pilots receive extensive training in how […] The Conversation Your mobile phone can give away your location, even if you tell it not to Most people expect that turning their phone’s location services off disables this sort of mobile surveillance. But the research conducted by Northeastern University researchers Guevara Noubir, Sashank Narain, Triet Vo-Huu, Ken Block and Amirali Sanatinia, in a field called “side-channel attacks,” uncovers ways that apps can avoid or escape those restrictions. Why Tor and privacy may no longer be synonymous However, these same pundits (including me) are now warning that government agencies, including the FBI, are finding ways to circumvent the technology behind Tor. Knowing that might, and should, give pause to those who use and rely on Tor. Adding more fuel to the fire are two researchers at Northeastern University: Guevara Noubir, professor of […] Android apps can infer your location through sensors – no permissions needed Android users beware: You might have apps tapping into your whereabouts without your knowledge. Recent research from Northeastern has shown Android apps requiring zero permissions can actually access certain sensors in your phone that enables them to infer your location, past and present. Guevara Noubir, professor at Northeastern’s College of Computer and Information Science, was […] Extreme Tech Researchers find more than 100 Tor nodes that are snooping on users Security researchers (and indeed, law enforcement) have worked out a number of theoretical ways to attack Tor. This might involve taking over a significant number of nodes, which are just computers and servers around the world, to crack anonymity. Or it may involve simply monitoring the time that connections enter and exit Tor as a […] Security Affairs Two security experts have conducted a study that allowed them to spot over 100 snooping Tor HSDir Nodes spying on Dark Web Sites. The attempts of snooping traffic from Tor nodes are not a novelty, in the past, we have reported the activity of threat actors that set up malicious exit nodes to de-anonymize users. Now researchers have spotted more than 100 malicious hidden service directories (HSDirs) which are the relays of the network that allow people to visit hidden […] Boing Boing Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the traffic is coming from or going to, the final hop in the network (known as an exit node) gets to know what webserver you are connecting […] MIT Technology Review How the next generation of botnets will exploit anonymous networks, and how to beat them More recently, botnets have begun to exploit the Tor network which is designed to allow people to communicate across the Internet anonymously. This, combined with the advent of untraceable electronic currencies such as Bitcoin, has led to the rise of blackmail and ransomware that cannot be traced even after a payment has been made. Today, […] Guevara Noubir for Northeastern Global News AirDrop is making your iPhone vulnerable to attackers AirDrop is making your iPhone vulnerable to attackers A team of researchers have uncovered a series of flaws that make Apple’s AirDrop and similar services vulnerable to attack. Northeastern University researchers show that hacking an airplane’s landing instruments isn’t as hard as it should be Northeastern University researchers show that hacking an airplane’s landing instruments isn’t as hard as it should be Using a relatively inexpensive setup, researchers demonstrated they could hack radio signals and direct a plane to land off target. With nearly $1 million on the line, this Northeastern team had to think fast With nearly $1 million on the line, this Northeastern team had to think fast Quick thinking helped a computer science team stave off a last-minute disqualification and win a competition held by the U.S. military. A visionary in cybersecurity education takes a bow A visionary in cybersecurity education takes a bow When Agnes Chan retires this summer after 41 years at Northeastern, she will leave behind a legacy of building the university’s reputation as a leader in one of the world’s most important and rapidly changing fields. Hacking cybersecurity to anticipate attacks Hacking cybersecurity to anticipate attacks To tackle the challenge of online hacks, leaders in the field of mobile security convened for the Conference on Security and Privacy. Researchers find that Android apps can secretly track users’ whereabouts Researchers find that Android apps can secretly track users’ whereabouts New research led by Northeastern professor Guevara Noubir reveals that some Android apps may automatically transmit sensitive information. Researchers push the radio rainbow’s limits Researchers push the radio rainbow’s limits In DARPA’s first ever Spectrum Challenge, computer science professor Guevara Noubir’s team dominated the competition in its attempt to transmit data from one point to another given the limited frequency spectrum available. Roving robot to the rescue Roving robot to the rescue Student-researchers have created a roving robot named WiLU that may be able to locate and rescue victims of natural disasters. 3Qs: Smart phones; smart users? 3Qs: Smart phones; smart users? Reacting to survey that shows consumer complacency about smart phone security, computer science professor and wireless security expert assesses the risks A networking opportunity A networking opportunity Researcher leads interdisciplinary team to develop new generation of wireless sensor networks
Ars Technica The radio navigation planes use to land safely is insecure and can be hacked The researchers, from Northeastern University in Boston, consulted a pilot and security expert during their work, and all are careful to note that this kind of spoofing isn’t likely to cause a plane to crash in most cases. ILS malfunctions are a known threat to aviation safety, and experienced pilots receive extensive training in how […]
The Conversation Your mobile phone can give away your location, even if you tell it not to Most people expect that turning their phone’s location services off disables this sort of mobile surveillance. But the research conducted by Northeastern University researchers Guevara Noubir, Sashank Narain, Triet Vo-Huu, Ken Block and Amirali Sanatinia, in a field called “side-channel attacks,” uncovers ways that apps can avoid or escape those restrictions.
Why Tor and privacy may no longer be synonymous However, these same pundits (including me) are now warning that government agencies, including the FBI, are finding ways to circumvent the technology behind Tor. Knowing that might, and should, give pause to those who use and rely on Tor. Adding more fuel to the fire are two researchers at Northeastern University: Guevara Noubir, professor of […]
Android apps can infer your location through sensors – no permissions needed Android users beware: You might have apps tapping into your whereabouts without your knowledge. Recent research from Northeastern has shown Android apps requiring zero permissions can actually access certain sensors in your phone that enables them to infer your location, past and present. Guevara Noubir, professor at Northeastern’s College of Computer and Information Science, was […]
Extreme Tech Researchers find more than 100 Tor nodes that are snooping on users Security researchers (and indeed, law enforcement) have worked out a number of theoretical ways to attack Tor. This might involve taking over a significant number of nodes, which are just computers and servers around the world, to crack anonymity. Or it may involve simply monitoring the time that connections enter and exit Tor as a […]
Security Affairs Two security experts have conducted a study that allowed them to spot over 100 snooping Tor HSDir Nodes spying on Dark Web Sites. The attempts of snooping traffic from Tor nodes are not a novelty, in the past, we have reported the activity of threat actors that set up malicious exit nodes to de-anonymize users. Now researchers have spotted more than 100 malicious hidden service directories (HSDirs) which are the relays of the network that allow people to visit hidden […]
Boing Boing Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the traffic is coming from or going to, the final hop in the network (known as an exit node) gets to know what webserver you are connecting […]
MIT Technology Review How the next generation of botnets will exploit anonymous networks, and how to beat them More recently, botnets have begun to exploit the Tor network which is designed to allow people to communicate across the Internet anonymously. This, combined with the advent of untraceable electronic currencies such as Bitcoin, has led to the rise of blackmail and ransomware that cannot be traced even after a payment has been made. Today, […]