Lab Blog

The Tech4Humanity Lab blog is comprised of research and general interests posts from lab students and faculty.

  • Addressing Bias in AI Healthcare: Protecting Vulnerable Patient Populations

    Addressing Bias in AI Healthcare: Protecting Vulnerable Patient Populations

    by Javaid Sofi Abstract AI’s integration into healthcare, while promising enhanced diagnostics and efficiency, carries a significant risk of amplifying health disparities affecting vulnerable populations. Bias arises from unrepresentative datasets (e.g., dermatology algorithms trained on lighter skin tones), cognitive biases in clinical labelling, and flawed proxies like zip codes conflating geography with health risk. Studies…

  • Signal Transmission Vulnerabilities in Neural Interfaces

    Signal Transmission Vulnerabilities in Neural Interfaces

    by Emma Szczesniak Neural interface systems such as myoelectric-computer interfaces (MCIs) and brain-computer interfaces (BCIs) assist patients with motor impairment due to injury or neurodegenerative conditions. Neural interface research has focused on device accuracy and usability while neglecting to comprehensively assess security risks. These devices store substantial personal data that can be exploited if compromised. Attacks…

  • Generative AI Will Fail to Attract Us Because It Ignores What Makes Us Human

    Generative AI Will Fail to Attract Us Because It Ignores What Makes Us Human

    By Selim Tlili Selim Tlili has taught high school biology, chemistry and math since 2004.  He began in the NYC public school system and moved to independent education in 2015.  He is working on his first book in science education and is finishing his first movie.  Read his work at selim.digital. I had an incredibly interesting lunchtime conversation…

  • Changing Trends in U.S. Digital Health Security

    Changing Trends in U.S. Digital Health Security

    By Dr. Nataliya D. Brantly U.S. healthcare has changed significantly since the early 2000s. This change was spurred by a number of studies that documented and exposed systemic failures, inefficiencies, poor coordination, and inadequate patient-centered care.[1]High levels of medical errors in a clinical setting, contributing to the thousands of deaths annually, emphasized the need to…

  • Visualizing Ransomware Data Available in Open Source Repositories

    Visualizing Ransomware Data Available in Open Source Repositories

    Ransomware poses a persistent threat in the cyber landscape. Over the past four years, there have been more than 19,000 recorded ransomware attacks and leaks, with the number of victims increasing daily. The massive number of attacks in such a short timespan highlights the importance of understanding the tactics employed by ransomware groups.

  • Ransomware and its Effect on Educational Institutions 

    Ransomware and its Effect on Educational Institutions 

    Haleigh Horan and Divine Tsasa Nzita Ransomware attacks have become more common over the past several years and there has been a prominent spike in ransomware attacks against the education sector. As schools and school districts increase their use of technology across their enterprise operations they are increasingly viewed as potential targets with critical…

  • An Exploratory Analysis of Chinese Malware

    An Exploratory Analysis of Chinese Malware

    By Ethan Dettman As cyber threats become more and more prevalent today, Chinese threat actor groups employ many malware packages to obtain information, both for personal gain and the benefit of the Chinese state. One of the most prevalent packages is Shadowpad, which has been used since 2017. Shadowpad is privately shared among Chinese-linked…

  • Developing a Spectrum of Gendered Surveillance-Facilitated Targeting

    Developing a Spectrum of Gendered Surveillance-Facilitated Targeting

    By Brooke Spens Abstract/Introduction In the modern era, surveillance practices have been used for various purposes from tracking a significant other to monitoring individuals’ data to generate profit. Through extensive research efforts, patterns surrounding the utilization of intrusive surveillance tools and instances of co-opting technology by those with malicious intent have emerged; the disproportionate…

  • VULNERABILITIES IN BLUETOOTH LOW ENERGY AND HOW THEY CAN BE LEVERAGED TO CAUSE HARM

    VULNERABILITIES IN BLUETOOTH LOW ENERGY AND HOW THEY CAN BE LEVERAGED TO CAUSE HARM

    By Christian Calvo Abstract Bluetooth Low Energy (BLE) is a wireless communication protocol designed for use in a variety of commercial devices. Devices that utilize BLE often have inferior security systems compared to alternative wireless devices, enabling malicious parties to more effectively execute adversarial attacks. To iterate the impact of adversarial attacks on BLE…

  • The Role of Honey Pots in Cyber Defense: An Introduction

    The Role of Honey Pots in Cyber Defense: An Introduction

    Deception technology in the cybersecurity and ransomware space has long been regarded as a method of threat actor data collection with strong potential. Some of this technology includes Honeypots, Honeyfiles, and Honeynets – faux systems, files, and networks meant to mimic an organization’s digital resources to further understand new attack vectors and threat actor…