The Institute for Information Security & Privacy connects government, industry, and academia to solve the grand challenges of cybersecurity. By leveraging the intellectual capital from Georgia Tech's colleges and research labs, along with help from external partners, we address vital solutions to national security, economic continuity, and individual safety. The Institute for Information Security & Privacy provides a gateway to faculty, students, and scientists and a central location for national and international collaboration.

Collections in this community

Recent Submissions

  • Attacking and Protecting Public Data with Differential Privacy 

    Garfinkel, Simson L. (Georgia Institute of Technology, 2019-04-26)
    Publishing exact statistical data creates mathematical risks and vulnerabilities that have only recently been appreciated. In 2010, the U.S. Census Bureau collected information on more than 308 million residents and published ...
  • RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid 

    Shekari, Tohid (Georgia Institute of Technology, 2019-04-19)
    Recently, the number of cyber threats to power systems has increased at an unprecedented rate. For instance, the widespread blackout in Ukrainian power grid on December 2015 was a wakeup call that modern power systems have ...
  • Cybersecurity Demo Day 2019: Awards 

    Farrell, Michael (Georgia Institute of Technology, 2019-04-16)
    A School of Computer Science team won the Institute for Information Security and Privacy’s (IISP) Demo Day Finale for their work on making machine learning (ML) models more secure. The winning project, MLsploit, is a ...
  • Justitia 

    Yagemann, Carter (Georgia Institute of Technology, 2019-04-16)
    Biometric authentication promises user convenience by measuring what makes each of us unique using just a smartphone. The downside includes risks such as criminals impersonating us with stolen data and the pain of having ...
  • LADIDS: Lightning-Authenticated Distributed Intrusion Detection System for the Power Grid 

    Shekari, Tohid (Georgia Institute of Technology, 2019-04-16)
    Recent events affecting power grids (such as the Ukrainian blackout in 2015) have highlighted the vulnerabilities in modern power systems, especially power substations which form the backbone of electricity networks. ...
  • MLsploit [Judges Remarks] 

    Downing, Evan (Georgia Institute of Technology, 2019-04-16)
    Machine learning is at risk of being attacked. As companies continue to depend on machine learning to solve their problems, more sophisticated attacks are being created to undermine and take advantage of machine learning ...
  • Cybersecurity Demo Day 2019: Welcome and Meet the Judges 

    Farrell, Michael; Patton, Blake; Schanz, John; Telljohann, Rich (Georgia Institute of Technology, 2019-04-16)
    The Cybersecurity Demo Day Finale concludes a six-month program that began with 18 student teams who presented their research during the annual IISP Cybersecurity Summit.
  • Caller Authentication Using Mobile Devices 

    Nelms, Terry L. (Georgia Institute of Technology, 2019-04-12)
    Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the caller’s phone number is easily ...
  • AI-infused Security: Robust Defense by Bridging Theory and Practice 

    Chen, Shang-Tse (Georgia Institute of Technology, 2019-04-05)
    While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersecurity threats, understanding the capabilities and robustness of AI remains a fundamental challenge, especially in adversarial ...
  • Grand Cyber Questions and How They Impact Cyber Start-ups 

    Gula, Ron (Georgia Institute of Technology, 2019-03-29)
    Ron will discuss some of the harder questions in cyber we've not come to terms with such as quantifying cyber risk and the government's responsibility for keeping us "cyber safe" and how these grand cyber issues impact ...
  • Adversarial Attack on Graph-Structured Data 

    Dai, Hanjun (Georgia Institute of Technology, 2019-03-15)
    Deep learning on graph structures has shown exciting results in cybersecurity applications, such as risk management, binary code similarity detection, etc. However, few attentions have been paid to the robustness of such ...
  • A Tale of Two Tasks: Designing and Validating Secure Software 

    Allen, Shelby (Georgia Institute of Technology, 2019-03-08)
    Secure software development can be categorized into two major tasks: designing secure software and validating secure software. In this talk, we will review both categories as well as some resources helpful for continuous ...
  • Improving Security Through Software Debloating 

    Brown, Michael (Georgia Institute of Technology, 2019-03-01)
    As software security breaches continue to increase in frequency and sophistication, there has been an increase in the research and development of new methods for improving software security. One such method that has seen ...
  • From the cockpit to cybersecurity: A cyber perspective from the nations first African-American Female Naval Flight Officer 

    Wright, Matice (Georgia Institute of Technology, 2019-02-22)
    Cybersecurity is essential for national security. Ms. Wright is a national security executive at ManTech International Corporation. ManTech is a trusted partner and leading systems integrator for the Department of Defense, ...
  • Defending Organizations in a Fast-Moving Cyber Arms Race 

    Krug, Rob (Georgia Institute of Technology, 2019-02-08)
    This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than just breach detection, ...
  • Developing Secure Products 

    Man, Emil; Rajasekharan, Karun (Georgia Institute of Technology, 2019-02-01)
    [Emil Man] As part of Honeywell’s digitization of our business, we have been working on moving towards distributed computing through microservice architecture deployments. As we also work on moving our software products ...
  • Stopping Fraudsters by Changing Products 

    King, Sam (2019-01-25)
    Lyft’s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but presents an ever-present ...
  • Protect Your Unicorn From Hunters 

    Valtman, Nir (Georgia Institute of Technology, 2019-01-18)
    Information security certifications, frameworks, and regulatory requirements provide a good foundation for startups to build an information security program. Since a security breach could put a startup out of business, ...
  • Device Enhanced Authentication: Passwords and Second Factors 

    Shirvanian, Maliheh (Georgia Institute of Technology, 2019-01-11)
    Despite all the advancement in authentication schemes, text-based authentication is perhaps still the most common way of user authentication (e.g., textual passwords or personal identification numbers - PINs). However, ...
  • Forward Leaning - Reshaping and Rethinking Cyber R&D 

    Greene, Kevin (Georgia Institute of Technology, 2018-11-30)
    The state of art and the state of practice is not keeping up with today’s cyber challenges, and as a result, adversarial activities are becoming increasingly effective in disrupting mission capabilities. To close the gap ...

View more