InterDigital logo which acts as a link to the home page
  • Research & Innovation  
    • Overview
    • WIRELESS LAB
    • Video Lab
    • Emerging Technologies Lab
    • Talent
  • Thought Leadership  
    • Vault
    • Sustainability
    • Blog
    • Creators
  • About Us  
    • Overview
      • Leadership
      • History
      • Licensing
      • Contact
    • Government Solutions
    • Careers
    • Media
  • Investors  
    • Investor Relations
    • ESG / SUSTAINABILITY
  • Search

Results for security




Results for security

Hibernated Backdoor: A Mutual Information Empowered Backdoor Attack to Deep Neural Networks
RESEARCH PAPER / Mar 2022 / Security, Machine Learning/Deep Learning/Artificial Intelligence
We report a new neural backdoor attack, named Hibernated Backdoor, which is stealthy, aggressive and devastating. The backdoor is planted in a hibernated mode to avoid being detected. Once deployed and fine-tuned on end devices, the hibernated backdoor turns into the active state that can be exploited by the attacker....
5G-CLARITY: 5G-Advanced Private Networks Integrating 5GNR, Wi-Fi and LiFi
RESEARCH PAPER / Feb 2022 / Security, 5G, Wireless communication
The future of manufacturing industry highly depends on digital systems that convert existing production and monitoring systems to autonomous systems with stringent requirements in terms of availability, reliability, security, low latency, positioning with high-accuracy and so on. In order to provide such requirements, a private 5G network deployment is considered...
Generative adversarial attacks on motion-based continuous authentication schemes
RESEARCH PAPER / Dec 2021 / Security
Traditional authentication mechanisms use passwords, PINs and biometrics, but these only authenticate at the point of entry. Continuous authentication schemes instead allow systems to verify identity and mitigate unauthorised access continuously. However, recent developments in generative modelling can significantly threaten continuous authentication systems, allowing attackers to craft adversarial examples to...
On the privacy impacts of publicly leaked password databases
RESEARCH PAPER / Jul 2017 / Security
Regularly, hackers steal data sets containing user identifiers and passwords. Often these data sets become publicly available. The most prominent and important leaks use bad password protection mechanisms, e.g. rely on unsalted password hashes, despite longtime known recommendations. The accumulation of leaked password data sets allows the research community to...
Flicker Forensics for Camcorder Piracy
RESEARCH PAPER / Aug 2016 / Security, Content Protection
Camcorder piracy refers to the process of using a camcorder to record a screen that displays copyrighted content. In contrast to the previous works that aimed at detecting the occurrence of camcorder piracy, this paper conducts an in-depth study of the luminance flicker that is naturally present in camcorded videos...
Impact of Screencasting on Video Temporal Synchronization
RESEARCH PAPER / Aug 2016 / Security, Content Protection
Spatio-temporal desynchronization remains a major challenge for watermarking system as it could impair the detection of the hidden payload. Over the years, several (non-blind) registration techniques have been proposed to realign the analyzed content prior to watermark detection and thereby achieve robustness against severe attacks such as display-and-camcord. Such techniques...
InterDigital Engineer Addressed M2M Security Concerns in CommNexus Panel
BLOG / Jul 2014 / Internet of Things, IoT, M2M, M2M security, security / Posted By: Stephanie Stocker
On June 26, CommNexus hosted a panel discussion, Making M2M: Secure and Economically Viable, in San Diego, CA. InterDigital’s Phillip Brown joined the panel, which included industry experts from Tagnos, ViaSat and Verizon Wireless and was moderated by a product manager from Qualcomm. The panel argued that one of the...
ETSI and TCG Agree To Collaborate For Telecommunications Standards
BLOG / May 2015 / NFV, Security / Posted By: Kelly Capizzi
The European Telecommunications Standards Institute (ETSI) recently signed an agreement with the Trusted Computing Group (TCG) to collaborate on the development of international standards for a secure global telecommunications infrastructure. TCG develops, defines and promotes open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing...
oneM2M™ – Security Solutions and Services for the IoT
BLOG / May 2016 / IoT, oneM2M, security, standards / Posted By: Kelly Capizzi
The Internet of Things (IoT) market continues to grow, but there is a major industry concern that could cause growth to the hit the breaks a little – security. IoT security is a multi-layered problem that includes added complexity from supplier diversity and legacy systems. In a recent Internet of...

ready to
learn more?

CONTACT INVESTORS
RESEARCH & INNOVATION
  • Overview
  • Wireless Lab
  • Video Lab
  • Emerging Technologies Lab
  • Talent
THOUGHT LEADERSHIP
  • Vault
  • Blog
  • Creators
ABOUT US
  • Overview
  • Leadership
  • History
  • Licensing
  • Contact
  • Government Solutions
  • Careers
  • Media
  • LinkedIn
  • Twitter
InterDigital logo in white

   © COPYRIGHT 2023 INTERDIGITAL, INC. ALL RIGHTS RESERVED.

  • Privacy Policy
  • Forward Looking Statements
  • Legal Notices
  • Research & Innovation
    • Overview
    • Wireless Lab
    • Video Lab
    • Emerging Technologies Lab
    • Talent
  • Thought Leadership
    • Vault
    • Sustainability
    • Blog
    • Creators
  • About Us
    • Overview
    • Leadership
    • History
    • Licensing
    • Contact
    • Government Solutions
    • Careers
    • Media
  • Investors
    • Investor Relations
    • ESG / SUSTAINABILITY
  • Search