Now showing items 21-40 of 89

    • Tagging and Tracking of Multi-level Host Events for Transparent Computing 

      Fazzini, Mattia (Georgia Institute of Technology, 2017-02-24)
      Advanced persistent threats (APTs) are characterized by their abilities to render existing security mechanisms ineffective; for example, APT activities can blend in with normal user and program activities to blindside ...
    • Human Computing for Handling Strong Corruptions in Authenticated Key Exchange 

      Chen, Shan (Georgia Institute of Technology, 2017-03-10)
      Ph.D. Student Shan Chen presents user authentication and key exchange protocols that can tolerate strong corruptions on the client-side. He will define the security model for Human Authenticated Key Exchange (HAKE) protocols ...
    • Exposing Cross-Channel Abuse in Converged Communications Infrastructure with Text-Messaging Scams 

      Srinivasan, Bharat (Georgia Institute of Technology, 2017-03-31)
      Recent convergence of the Internet with the telecommunications infrastructure offers malicious actors the ability to craft cross-channel attacks that leverage both telephony and Internet resources. In this talk, we first ...
    • Cloak & Dagger: From Two Android Permissions to Complete Control of the UI Feedback Loop 

      Fratantonio, Yanick (Georgia Institute of Technology, 2017-04-07)
      Although the two Android permissions -- SYSTEM_ALERT_WINDOW and BIND_ACCESSIBILITY_SERVICE -- have been separately abused to create redressing attacks and accessibility attacks, these previous cyberattacks never could ...
    • Hardware-Based Security and Trust For IoT and Supply Chain Authentication 

      Plusquellic, James F. (Georgia Institute of Technology, 2017-04-21)
      New hardware architectures for Internet-of-Things (IoT) are emerging rapidly in response to con- sumer demands for improved situational awareness, instant access to widely distributed sources of news and information and ...
    • Cyber MayDay: Who Is in Command When Your Business is in the Crosshairs and How Do You Respond? 

      Cross, Stephen; Graves, John Thomas; Lens, John; Mueller, Milton; Pair, Stephen; Sinema, Krysten; Swire, Peter; Worley, Candace (Georgia Institute of Technology, 2017-05-01)
      Rep. Tom Graves (R-Ga. 14), in cooperation with the Georgia Institute of Technology, hosts a conversation for executives and thought leaders in Atlanta about cybersecurity policy and technical challenges that are stifling ...
    • Modern Malware and Secure Techniques for Better Software 

      Odom, Joel (Georgia Institute of Technology, 2017-08-25)
      Modern society depends on reliable computer systems, yet hardly a day passes without news of a new failure of computer security. Whether enticed by profit or by politics, professional hacking organizations rival mainstream ...
    • Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud 

      Nelms, Terry (Georgia Institute of Technology, 2017-09-01)
      Robocalling, voice phishing and caller ID spoofing are common cybercrime techniques used to launch scam campaigns through the telephony channel that many people have long trusted. More than 660,000 online complaints regarding ...
    • Why Memory Corruption is Hard 

      Payer, Mathias (Georgia Institute of Technology, 2017-09-08)
      Memory corruption has plagued systems since the dawn of computing. With the rise of defense techniques (such as stack cookies, ASLR, and DEP), attacks have become much more complicated, yet control-flow hijack attacks are ...
    • What Can Social Science Contribute to Cybersecurity Attribution Research? 

      Mueller, Milton (Georgia Institute of Technology, 2017-09-15)
      How can we develop an institutional framework that can facilitate the provision of authoritative public attributions on a global scale? In cybersecurity cases, we want to know not only who did it (i.e., which individuals ...
    • Security and Privacy Issues of Modern Web Browsers 

      Nikiforakis, Nick (Georgia Institute of Technology, 2017-09-22)
      The modern web, as users experience it, bears little resemblance to the original world wide web invented by Tim Berners-Lee. Static, stateless, HTML pages with text and the occasional pixelated images gave way to dynamic, ...
    • Automatic Feature Engineering: Learning to Detect Malware by Mining the Scientific Literature 

      Dumitras, Tudor (Georgia Institute of Technology, 2017-09-29)
      The detection of malware and network attacks increasingly relies on machine learning techniques, which utilize multiple features to separate the malicious and benign behaviors. The effectiveness of these techniques primarily ...
    • Out of Control: the expanded attack surface of control systems 

      Beyah, Raheem (Georgia Institute of Technology, 2017-10-06)
      Industrial control system networks used in critical infrastructures, such as the power grid, present a unique set of security challenges. The distributed networks are difficult to physically secure, legacy equipment can ...
    • The Non-Code Aspects of Cybersecurity and the Globalization of Criminal Evidence 

      Swire, Peter (Georgia Institute of Technology, 2017-10-13)
      In this session, Professor Peter Swire will present two current research topics in cybersecurity. The first addresses the non-code aspects of cybersecurity. Computer scientists are familiar with the seven layers of the ...
    • The Domestic Benefits of Subversive Foreign Propaganda: The RT (Russia Today) News Network and Geopolitical Muckraking 

      Klein, Hans (Georgia Institute of Technology, 2017-10-20)
      2017’s biggest news story has been Russia’s alleged use of social media to try to influence Western elections. Much criticism is directed towards RT.com, the “Russia Today” news network created in 2005 by the Russian ...
    • Multi-Stakeholder Network Infrastructure Security Concerns 

      Tauber, Tony (Georgia Institute of Technology, 2017-10-27)
      Security concerns with the Internet infrastructure involve a variety of stakeholders both in effect and potential remedies and countermeasures. This talk will discuss some examples.
    • Energy System Cybersecurity and Operational Reliability 

      Meliopoulos, A.P. "Sakis" (Georgia Institute of Technology, 2017-11-03)
      The electric energy grid is a recognized critical infrastructure. It is vulnerable to self-disturbances as well as cyber-attacks. In particular cyber-attacks can cause from mild disruptions to serious damage that may take ...
    • What Constitutes an Act of War in Cyberspace? 

      Dragoo, Holly M. (Georgia Institute of Technology, 2017-11-17)
      Is cyberspace merely another domain for 21st Century kinetic battles to operate in, or does it merit special consideration and unique rules of engagement? In this talk, Holly Dragoo will explore the challenges of why it’s ...
    • Tracing the Arc of Smartphone Application Security 

      McDaniel, Patrick (Georgia Institute of Technology, 2017-12-01)
      The introduction of smart phones in the mid-2000s forever changed the way users interact with data and computation--and through it prompted a renaissance of digital innovation. Yet, at the same time, the architectures, ...
    • Revocations Are Dead, Long Live Revocations 

      Levin, David (Georgia Institute of Technology, 2018-01-12)
      The importance of the web’s public key infrastructure (PKI) cannot be overstated: it is what allows users to know with whom they are communicating online. Central to its correct operation is the ability to “revoke” ...