The Institute for Information Security & Privacy connects government, industry, and academia to solve the grand challenges of cybersecurity. By leveraging the intellectual capital from Georgia Tech's colleges and research labs, along with help from external partners, we address vital solutions to national security, economic continuity, and individual safety. The Institute for Information Security & Privacy provides a gateway to faculty, students, and scientists and a central location for national and international collaboration.

Collections in this community

Recent Submissions

  • A Tale of Two Tasks: Designing and Validating Secure Software 

    Allen, Shelby (Georgia Institute of Technology, 2019-03-08)
    Secure software development can be categorized into two major tasks: designing secure software and validating secure software. In this talk, we will review both categories as well as some resources helpful for continuous ...
  • Improving Security Through Software Debloating 

    Brown, Michael (Georgia Institute of Technology, 2019-03-01)
    As software security breaches continue to increase in frequency and sophistication, there has been an increase in the research and development of new methods for improving software security. One such method that has seen ...
  • From the cockpit to cybersecurity: A cyber perspective from the nations first African-American Female Naval Flight Officer 

    Wright, Matice (Georgia Institute of Technology, 2019-02-22)
    Cybersecurity is essential for national security. Ms. Wright is a national security executive at ManTech International Corporation. ManTech is a trusted partner and leading systems integrator for the Department of Defense, ...
  • Defending Organizations in a Fast-Moving Cyber Arms Race 

    Krug, Rob (Georgia Institute of Technology, 2019-02-08)
    This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than just breach detection, ...
  • Developing Secure Products 

    Man, Emil; Rajasekharan, Karun (Georgia Institute of Technology, 2019-02-01)
    [Emil Man] As part of Honeywell’s digitization of our business, we have been working on moving towards distributed computing through microservice architecture deployments. As we also work on moving our software products ...
  • Stopping Fraudsters by Changing Products 

    King, Sam (2019-01-25)
    Lyft’s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but presents an ever-present ...
  • Protect Your Unicorn From Hunters 

    Valtman, Nir (Georgia Institute of Technology, 2019-01-18)
    Information security certifications, frameworks, and regulatory requirements provide a good foundation for startups to build an information security program. Since a security breach could put a startup out of business, ...
  • Device Enhanced Authentication: Passwords and Second Factors 

    Shirvanian, Maliheh (Georgia Institute of Technology, 2019-01-11)
    Despite all the advancement in authentication schemes, text-based authentication is perhaps still the most common way of user authentication (e.g., textual passwords or personal identification numbers - PINs). However, ...
  • Forward Leaning - Reshaping and Rethinking Cyber R&D 

    Greene, Kevin (Georgia Institute of Technology, 2018-11-30)
    The state of art and the state of practice is not keeping up with today’s cyber challenges, and as a result, adversarial activities are becoming increasingly effective in disrupting mission capabilities. To close the gap ...
  • Practical Software Hardening Against Code Reuse Attacks 

    Koo, Hyungjoon (Georgia Institute of Technology, 2018-11-16)
  • The Insider's View of a Data Breach - how policy, forensics, and attribution apply in the real world 

    McClelland, Todd (Georgia Institute of Technology, 2018-11-02)
    Ever wondered what happens behind the scenes when a large company experiences a data breach? How, for example, do forensics and policy teams integrate and collaborate with all the other business roles (e.g., PR, HR, Senior ...
  • Triaging and Debugging Failures in Deployed Software by Reverse Execution 

    Cui, Weidong (Georgia Institute of Technology, 2018-10-26)
  • The Implications of Privacy-Aware Choice 

    Cummings, Rachel (Georgia Institute of Technology, 2018-10-19)
    Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can ...
  • Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA 

    Edgar, Timothy (Georgia Institute of Technology, 2018-10-12)
    Snowden’s leaks of top secret documents prompted companies and individuals to take long overdue steps to make their communications and data more secure. The episode also led to reforms that made government surveillance ...
  • Cyber Simulation and Threat Assessment 

    Kam, Ambrose (Georgia Institute of Technology, 2018-10-05)
    Modeling and simulation (M&S) have long been considered a critical element within systems engineering. Up until recently, M&S has not been applied to the cybersecurity domain area. Part of the reason is the maturity of ...
  • Open Source Intelligence Applications in Cybersecurity 

    Shields, Thomas (Georgia Institute of Technology, 2018-09-28)
    Open Source Intelligence (OSINT) has rapidly evolved as a prominent yet peculiar member of the intelligence disciplines (INTs). OSINT is valuable in both offensive and defensive cybersecurity applications such as malware ...
  • New Perspectives on Control-Flow Hijacking Mitigation 

    Burow, Nathan (Georgia Institute of Technology, 2018-09-21)
    Despite over 20 years of research, control-flow hijacking attacks remain the most significant threat to software security. Attackers exploit C/C++ lack of memory and type safety to corrupt code-pointers, thereby hijacking ...
  • Emulytics at Sandia: Emulation-based Modeling and Analysis of Computer Systems 

    Gabert, Kasimir (Georgia Institute of Technology, 2018-09-14)
    Emulation-based models of distributed computing systems are collections of virtual machines, virtual networks, and other emulation components configured to stand in for operational systems when performing experimental ...
  • Security along SoC Design Lifecycle: Current Practices and Challenges Ahead 

    Tehranipoor, Mark (Georgia Institute of Technology, 2018-09-07)
    System-on-chip (SoC) security has received significant attention in the past several years due mainly to its prevalence in the internet of things (IoT) devices, cyber-physical systems, and embedded computing systems. ...
  • Social Cybersecurity 

    Das, Sauvik (Georgia Institute of Technology, 2018-08-31)
    Entering an era of pervasive, connected smart things, our cybersecurity decisions increasingly interfere with our social lives. Yet, little is known of the complex social consequences of our security behaviors, and vice ...

View more