• Can Data Provenance Put an End to the Data Breach? 

      Bates, Adam (Georgia Institute of Technology, 2019-09-13)
      In a provenance-aware system, mechanisms gather and report metadata that describes the history of each data object being processed, allowing us to understand how objects came to exist in their present state. Excitingly, ...
    • Protecting Computer Systems through Eliminating Vulnerabilities 

      Lee, Byoungyoung (Georgia Institute of Technology, 2016-01-29)
      Many system components and network applications are written in unsafe programming languages that are prone to memory corruption vulnerabilities. To combat countless catastrophes from these vulnerabilities, there have ...
    • Securing FPGA-Accelerated Cloud Infrastructures 

      Szefer, Jakub (Georgia Institute of Technology, 2020-11-13)
      Cloud FPGAs have been gaining popularity in recent years due to the ability of users to request FPGA resources quickly, flexibly, and on-demand. However, as public cloud providers make FPGAs available to many, potentially ...
    • Understanding, Alleviating and Exploiting Electro-Magnetic Side-Channel Signals 

      Prvulovic, Milos (Georgia Institute of Technology, 2016-09-16)
      A side-channel attack is an attack that exploits the low-power electronic signals a device emits even when it’s not connected to the Internet or a network. Such signals can leak sensitive data used in a computational task. ...