The Institute for Information Security & Privacy connects government, industry, and academia to solve the grand challenges of cybersecurity. By leveraging the intellectual capital from Georgia Tech's colleges and research labs, along with help from external partners, we address vital solutions to national security, economic continuity, and individual safety. The Institute for Information Security & Privacy provides a gateway to faculty, students, and scientists and a central location for national and international collaboration.

Collections in this community

Recent Submissions

  • Sensing with Random Encoding for Enhanced Security in Embedded Systems 

    Hutto, Kevin (Georgia Institute of Technology, 2021-04-23)
    Embedded systems in physically insecure environments are subject to additional security risk via capture by an adversary. A captured microchip device can be reverse engineered to recover internal buffer data that would ...
  • Function Equivalence with Symbolic Execution 

    Bittick, Kennon (Georgia Institute of Technology, 2021-04-16)
    Summarizing and comparing basic blocks or functions across different binaries or between binary and source code has many applications for program verification including verifying compilation, source or binary transformations, ...
  • Voice Biometrics and Emerging Security Threats in the Voice Channel 

    Khoury, Elie (Georgia Institute of Technology, 2021-04-02)
    Voice Biometrics is the automated recognition of individuals based on their voice characteristics that are both biological and behavioral. Voice Biometrics is currently deployed in many real world applications for ...
  • Provably-Secure Approximate k-NN Search Protocol 

    Tang, Tianxin (Georgia Institute of Technology, 2021-03-26)
    This talk examines the problem of privacy-preserving approximate kNN search in an outsourced environment — the client sends the encrypted data to an untrusted server and later can perform secure approximate kNN search and ...
  • Applying Deep Reinforcement Learning (DRL) in a Cyber Wargaming Engine 

    Kam, Ambrose (Georgia Institute of Technology, 2021-03-19)
    Cybersecurity is inherently complicated due to the dynamic nature of the threats and ever-expanding attack surfaces. Ironically, this challenge is exacerbated by the rapid advancement of many new technologies like Internet ...
  • Creating, Weaponizing, and Detecting Deep Fakes 

    Farid, Hany (Georgia Institute of Technology, 2021-03-12)
    Forensic DNA analysis has been critical in prosecuting crimes and overturning wrongful convictions. At the same time, other physical and digital forensic identification techniques, used to link a suspect to a crime scene, ...
  • War by Other Means 

    Hursti, Harry (Georgia Institute of Technology, 2021-03-05)
  • Recent Insights from Analysis of Users' Web Browsing Behavior 

    Lut, Yuliia (Georgia Institute of Technology, 2021-02-26)
    Accurately analyzing and modeling online browsing behavior plays a key role in understanding users and technology interactions. Specifically, understanding whether users have correct perceptions of their browsing behavior ...
  • To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media 

    Kaleli, Beliz (Georgia Institute of Technology, 2021-02-12)
    To make their services more user friendly, online so- cial media platforms automatically identify text that corresponds to URLs and render it as clickable links. In this paper, we show that the techniques used by such ...
  • Zero Knowledge for Everything and Everyone 

    Heath, David (Georgia Institute of Technology, 2021-02-05)
    Zero-Knowledge (ZK) Proofs are important cryptographic objects that allow an untrusted prover to demonstrate to an untrusted verifier the truth of some statement while revealing nothing additional. ZK can potentially be ...
  • Securing Democracy in the Fourth Industrial Revolution 

    Anastasopoulos, Lefteris J. (Georgia Institute of Technology, 2021-01-15)
    In this talk, I discuss research which focuses on designing systems needed to secure democracy and democratic political institutions, such as elections, in the interconnected digital world of the “fourth industrial revolution.”
  • Building a Strategic Privacy Program 

    Glover, Evan W. (Georgia Institute of Technology, 2020-11-20)
    Privacy is a multi-faceted challenge for organizations – to be successful, they must take a holistic approach to protecting the personal data and information of all stakeholders. Privacy professionals must collaborate ...
  • Mobilizing mmWave to Realize the Full 5G Potential 

    LaMont, Larry; Tong, Henry (Georgia Institute of Technology, 2020-10-23)
    5G NR mmWave opens doors to vast amounts of network capacity, fiber-like speeds and ultra-low latencies that promise to bring new and enhanced experiences to the masses, as well as inherent security and privacy benefits. ...
  • Securing FPGA-Accelerated Cloud Infrastructures 

    Szefer, Jakub (Georgia Institute of Technology, 2020-11-13)
    Cloud FPGAs have been gaining popularity in recent years due to the ability of users to request FPGA resources quickly, flexibly, and on-demand. However, as public cloud providers make FPGAs available to many, potentially ...
  • Improving End-User Security and Privacy via Physicalized Computing Interfaces 

    Do, Youngwook (Georgia Institute of Technology, 2020-11-06)
  • When Push comes to Ads: Measuring the Rise of (Malicious) Push Advertising 

    Subramani, Karthika (Georgia Institute of Technology, 2020-10-30)
    The rapid growth of online advertising has fueled the growth of ad-blocking software, such as new ad-blocking and privacy-oriented browsers or browser extensions. In response, both ad publishers and ad networks are constantly ...
  • Temporal System Call Specialization for Attack Surface Reduction 

    Ghavamnia, Seyedhamed (Georgia Institute of Technology, 2020-10-16)
    Attack surface reduction through the removal of unnecessary application features and code is a promising technique for improving security without incurring any additional overhead. Recent software debloating techniques ...
  • Data Portability and Cross-Border Data Flows 

    Swire, Peter (Georgia Institute of Technology, 2020-10-09)
  • Multi-layer API Specialization for Attack Surface Reduction 

    Mishra, Shachee (Georgia Institute of Technology, 2020-10-02)
    Code reuse attacks have been a threat to software security since the introduction of non-executable memory protections. Despite significant advances in various types of additional defenses, such as control flow integrity ...

View more