Now showing items 1-20 of 89

    • Adversarial Attack on Graph-Structured Data 

      Dai, Hanjun (Georgia Institute of Technology, 2019-03-15)
      Deep learning on graph structures has shown exciting results in cybersecurity applications, such as risk management, binary code similarity detection, etc. However, few attentions have been paid to the robustness of such ...
    • AI-infused Security: Robust Defense by Bridging Theory and Practice 

      Chen, Shang-Tse (Georgia Institute of Technology, 2019-04-05)
      While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersecurity threats, understanding the capabilities and robustness of AI remains a fundamental challenge, especially in adversarial ...
    • ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes 

      Konte, Maria (Georgia Institute of Technology, 2016-11-18)
      Bulletproof hosting Autonomous Systems (ASes)—malicious ASes fully dedicated to supporting cybercrime—provide freedom and resources for a cyber-criminal to operate. Their services include hosting a wide range of illegal ...
    • Attacking and Protecting Public Data with Differential Privacy 

      Garfinkel, Simson L. (Georgia Institute of Technology, 2019-04-26)
      Publishing exact statistical data creates mathematical risks and vulnerabilities that have only recently been appreciated. In 2010, the U.S. Census Bureau collected information on more than 308 million residents and published ...
    • Automated In-memory Malware/rootkit Detection via Binary Analysis and Machine Learning 

      Jones, Malachi (Georgia Institute of Technology, 2018-02-16)
      A prominent technique for detecting sophisticated malware consists of monitoring the execution behavior of each binary to identify anomalies and/or malicious intent. Hooking and emulation are two primary mechanisms that ...
    • Automatic Feature Engineering: Learning to Detect Malware by Mining the Scientific Literature 

      Dumitras, Tudor (Georgia Institute of Technology, 2017-09-29)
      The detection of malware and network attacks increasingly relies on machine learning techniques, which utilize multiple features to separate the malicious and benign behaviors. The effectiveness of these techniques primarily ...
    • Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA 

      Edgar, Timothy (Georgia Institute of Technology, 2018-10-12)
      Snowden’s leaks of top secret documents prompted companies and individuals to take long overdue steps to make their communications and data more secure. The episode also led to reforms that made government surveillance ...
    • Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX 

      Jang, Yeongjin (Georgia Institute of Technology, 2016-09-23)
      Kernel hardening has been an important topic, as many applications and security mechanisms often consider the kernel their Trusted Computing Base (TCB). Among various hardening techniques, kernel address space layout ...
    • Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud 

      Nelms, Terry (Georgia Institute of Technology, 2017-09-01)
      Robocalling, voice phishing and caller ID spoofing are common cybercrime techniques used to launch scam campaigns through the telephony channel that many people have long trusted. More than 660,000 online complaints regarding ...
    • Caller Authentication Using Mobile Devices 

      Nelms, Terry L. (Georgia Institute of Technology, 2019-04-12)
      Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the caller’s phone number is easily ...
    • Clash of Cultures: Privacy and the Internet 

      Claypoole, Theodore F. (Georgia Institute of Technology, 2018-03-16)
      U.S./EU fights over new customer privacy regulations (General Data Protection Regulation, or “GDPR”) will headline a multi-front culture war between openness and control, individual rights and state power, and individual ...
    • Cloak & Dagger: From Two Android Permissions to Complete Control of the UI Feedback Loop 

      Fratantonio, Yanick (Georgia Institute of Technology, 2017-04-07)
      Although the two Android permissions -- SYSTEM_ALERT_WINDOW and BIND_ACCESSIBILITY_SERVICE -- have been separately abused to create redressing attacks and accessibility attacks, these previous cyberattacks never could ...
    • Convicted by Memory: Recovering Spatial-Temporal Digital Evidence from Memory Images 

      Saltaformaggio, Brendan (Georgia Institute of Technology, 2018-01-19)
      Memory forensics is becoming a crucial capability in modern cyber forensic investigations. In particular, memory forensics can reveal "up to the minute" evidence of a device's usage, often without requiring a suspect's ...
    • Cyber MayDay: Who Is in Command When Your Business is in the Crosshairs and How Do You Respond? 

      Cross, Stephen; Graves, John Thomas; Lens, John; Mueller, Milton; Pair, Stephen; Sinema, Krysten; Swire, Peter; Worley, Candace (Georgia Institute of Technology, 2017-05-01)
      Rep. Tom Graves (R-Ga. 14), in cooperation with the Georgia Institute of Technology, hosts a conversation for executives and thought leaders in Atlanta about cybersecurity policy and technical challenges that are stifling ...
    • Cyber Security Analytics 

      Wenchel, Adam (Georgia Institute of Technology, 2016-04-01)
      Adam Wenchel from Capital One leads a discussion about information security in the financial sector -- specifically "cyber data lakes" and the use of machine learning to advance cybersecurity analytics capabilities.
    • Cyber Simulation and Threat Assessment 

      Kam, Ambrose (Georgia Institute of Technology, 2018-10-05)
      Modeling and simulation (M&S) have long been considered a critical element within systems engineering. Up until recently, M&S has not been applied to the cybersecurity domain area. Part of the reason is the maturity of ...
    • Cybersecurity and You - Ready or Not, Here It Is! 

      Corliss, John (Georgia Institute of Technology, 2016-04-15)
      John Corliss from the U.S. Department of Homeland Security leads a discussion about strengthening the security and resilience of cyberspace and federal networks as an important part of the homeland security mission.
    • Cybersecurity Demo Day 2018 Awards 

      Klaus, Christopher; Patton, Blake; Skapentiz, Kevin (Georgia Institute of Technology, 2018-04-12)
      Congratulations to the 2017-2018 Winners! Grand Prize - Create-X Startup LAUNCH incubator seat: "OSS Police", Ashish Bijlani & Ruian Duan, School of Computer Science. 1st Place - Commercialization Track: ...
    • Cybersecurity Demo Day 2018 Introduction 

      Lee, Wenke (Georgia Institute of Technology, 2018-04-12)
      Vetted and coached to enter the marketplace, students presented ideas for commercialization before venture capitalists, industry leaders, and the public at the Institute for Information Security & Privacy's Cybersecurity ...
    • Cybersecurity Demo Day 2019: Awards 

      Farrell, Michael (Georgia Institute of Technology, 2019-04-16)
      A School of Computer Science team won the Institute for Information Security and Privacy’s (IISP) Demo Day Finale for their work on making machine learning (ML) models more secure. The winning project, MLsploit, is a ...