The Institute for Information Security & Privacy connects government, industry, and academia to solve the grand challenges of cybersecurity. By leveraging the intellectual capital from Georgia Tech's colleges and research labs, along with help from external partners, we address vital solutions to national security, economic continuity, and individual safety. The Institute for Information Security & Privacy provides a gateway to faculty, students, and scientists and a central location for national and international collaboration.

Collections in this community

Recent Submissions

  • Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers 

    Kondracki, Brian (Georgia Institute of Technology, 2020-09-18)
    Mobile browsers have become one of the main mediators of our online activities. However, as web pages continue to increase in size and streaming media on-the-go has become commonplace, mobile data plan constraints remain ...
  • Automating the Discovery of Censorship Evasion Strategies 

    Bock, Kevin (Georgia Institute of Technology, 2020-09-11)
    Researchers and censoring regimes have long engaged in a cat-and-mouse game, leading to increasingly sophisticated censorship techniques and methods to evade them. Unfortunately, censors have long had an inherent advantage ...
  • Reflections on Internet Surveillance 

    Weaver, Nicholas (Georgia Institute of Technology, 2020-03-27)
    Six years ago Edward Snowden leaked a massive trove of internal NSA documents detailing the operation of the US government’s electronic surveillance system. The overall systems described a wide-ranging approach of remarkably ...
  • Differentially private change-point detection 

    Zhang, Wanrong (Georgia Institute of Technology, 2020-03-06)
    The change-point detection problem seeks to identify distributional changes in streams of data. Increasingly, tools for change-point detection are applied in settings where data may be highly sensitive and formal privacy ...
  • Fighting Voice Spam with a Virtual Assistant 

    Pandit, Sharbani (Georgia Institute of Technology, 2020-02-21)
    Telephony has been a trusted channel in the past but technological advances have exposed it to abuse that is perpetrated by fraudsters and criminals. Mass robocalls, call source spoofing and voice phishing are some of the ...
  • The Impact of Compiler-Based Performance Optimizations on Security 

    Brown, Michael D. (Georgia Institute of Technology, 2020-02-07)
    The security impacts of compiler-based software optimizations are typically not considered during their design and implementation. As a result, a number of well-intentioned compiler optimizations have been shown to introduce ...
  • Space Wars: Exploiting Program (in)Variants for Software Security 

    Hu, Hong (Georgia Institute of Technology, 2020-01-31)
    The ever-increasing code base of modern software inevitably introduces vulnerabilities which enable attackers to construct sophisticated exploits and compromise our computer systems. Control-flow hijacking is the ...
  • Hardware Trojan detection using the backscattering side channel 

    Nguyen, Luong N. (Georgia Institute of Technology, 2020-01-24)
    Integrated circuits (IC) have become an integral aspect of our lives. Thus, the problem of ensuring authenticity and trust for ICs is critically important, especially for sensitive fields such as military, finance, and ...
  • Securing Network Function Virtualization 

    Yu, Minlan (Georgia Institute of Technology, 2019-11-22)
  • Security Evaluation of Home-Based IoT Deployments 

    Alrawi, Omar (Georgia Institute of Technology, 2019-11-15)
    Home-based IoT devices have a bleak reputation regarding their security practices. On the surface, the insecurities of IoT devices seem to be caused by integration problems that may be addressed by simple measures, but ...
  • Leveraging Side-Channel Signals for Security and Trust 

    Sehatbakhsh, Nader (Georgia Institute of Technology, 2019-11-08)
    With the proliferation of computing systems in our world, from servers to internet-of-things devices, side-channel signals have become significantly more available and accessible to measure and leverage. This availability ...
  • Secure Communication Channel Establishment: TLS 1.3 (Over TCP Fast Open) vs. QUIC 

    Boldyreva, Alexandra (Georgia Institute of Technology, 2019-11-01)
    Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of interactions between parties) in ...
  • Machine Learning in Profiled Side-Channel Attacks and Low-Overhead Countermeasures 

    Raychowdhury, Arijit (Georgia Institute of Technology, 2019-10-18)
    Computationally secure Cryptographic algorithms, when implemented on physical hardware leak correlated physical signatures (e.g. power supply current, electromagnetic radiation, acoustic, thermal) which could be utilized ...
  • Cyber Science: The Third Frontier 

    Johnson-Bey, Charles (Georgia Institute of Technology, 2019-10-11)
    Over the last several decades Data Security became Information Security which then rolled into Cyber Security. All along this journey cyber has become defined as “Us versus Them”; electronic cyber-attack and cyber-defense ...
  • The Growing Importance of the Non-Code Aspects of Cybersecurity 

    Swire, Peter (Georgia Institute of Technology, 2019-10-04)
    According to the National Initiative for Cybersecurity Education, half of the cybersecurity specialties now involve primarily non-code work. This lecture draws on the "Pedagogic Cybersecurity Framework" published in 2018 ...
  • Simulation-Based Cyber Wargaming 

    Kam, Ambrose (Georgia Institute of Technology, 2019-09-27)
    Cyber threats are rampant and their potential damages to enterprises continue to soar over time. Hence, cyber resilience techniques need to be examined and assessed for their effectiveness before deployment. Red Teaming ...
  • Can Data Provenance Put an End to the Data Breach? 

    Bates, Adam (Georgia Institute of Technology, 2019-09-13)
    In a provenance-aware system, mechanisms gather and report metadata that describes the history of each data object being processed, allowing us to understand how objects came to exist in their present state. Excitingly, ...
  • Trusting Smart Cities: Risk Factors and Implications 

    Loper, Margaret (Georgia Institute of Technology, 2019-09-06)
    In the coming decades, we will live in a world surrounded by tens of billions of devices that will interoperate and collaborate in an effort to deliver personalized and autonomic services. This paradigm of objects and ...
  • Efficiently Computing with Private Data 

    Heath, David (Georgia Institute of Technology, 2019-08-30)
    Today, individual users and organizations often wish to contribute their private data to compute functions of interest. Unfortunately, when data is deemed too valuable or is legally protected, such computation cannot be ...
  • Energy System Cyber Security: An Overview 

    Meliopoulos, A.P. "Sakis" (Georgia Institute of Technology, 2019-08-23)
    The electric energy grid is a recognized critical infrastructure. It is vulnerable to self-disturbances as well as cyber-attacks. In particular cyber-attacks can cause from mild disruptions to serious damage that may take ...

View more