Browsing Institute for Information Security & Privacy (IISP) by Subject "Security"
Now showing items 1-18 of 18
-
Automatic Feature Engineering: Learning to Detect Malware by Mining the Scientific Literature
(Georgia Institute of Technology, 2017-09-29)The detection of malware and network attacks increasingly relies on machine learning techniques, which utilize multiple features to separate the malicious and benign behaviors. The effectiveness of these techniques primarily ... -
Building a Strategic Privacy Program
(Georgia Institute of Technology, 2020-11-20)Privacy is a multi-faceted challenge for organizations – to be successful, they must take a holistic approach to protecting the personal data and information of all stakeholders. Privacy professionals must collaborate ... -
Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud
(Georgia Institute of Technology, 2017-09-01)Robocalling, voice phishing and caller ID spoofing are common cybercrime techniques used to launch scam campaigns through the telephony channel that many people have long trusted. More than 660,000 online complaints regarding ... -
Caller Authentication Using Mobile Devices
(Georgia Institute of Technology, 2019-04-12)Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the caller’s phone number is easily ... -
Defending Organizations in a Fast-Moving Cyber Arms Race
(Georgia Institute of Technology, 2019-02-08)This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than just breach detection, ... -
Developing Secure Products
(Georgia Institute of Technology, 2019-02-01)[Emil Man] As part of Honeywell’s digitization of our business, we have been working on moving towards distributed computing through microservice architecture deployments. As we also work on moving our software products ... -
The Impact of Compiler-Based Performance Optimizations on Security
(Georgia Institute of Technology, 2020-02-07)The security impacts of compiler-based software optimizations are typically not considered during their design and implementation. As a result, a number of well-intentioned compiler optimizations have been shown to introduce ... -
Improving Security Through Software Debloating
(Georgia Institute of Technology, 2019-03-01)As software security breaches continue to increase in frequency and sophistication, there has been an increase in the research and development of new methods for improving software security. One such method that has seen ... -
Mobilizing mmWave to Realize the Full 5G Potential
(Georgia Institute of Technology, 2020-10-23)5G NR mmWave opens doors to vast amounts of network capacity, fiber-like speeds and ultra-low latencies that promise to bring new and enhanced experiences to the masses, as well as inherent security and privacy benefits. ... -
The Price of Free: Privacy Leakage in Personalized Mobile In‐App Ads
(Georgia Institute of Technology, 2016-02-05)ln-app advertising is an essential part of the ecosystem of free mobile applications. On the surface, this creates a win-win situation where app developers can profit from their work without charging the users. Meanwhile, ... -
Protect Your Unicorn From Hunters
(Georgia Institute of Technology, 2019-01-18)Information security certifications, frameworks, and regulatory requirements provide a good foundation for startups to build an information security program. Since a security breach could put a startup out of business, ... -
Security along SoC Design Lifecycle: Current Practices and Challenges Ahead
(Georgia Institute of Technology, 2018-09-07)System-on-chip (SoC) security has received significant attention in the past several years due mainly to its prevalence in the internet of things (IoT) devices, cyber-physical systems, and embedded computing systems. ... -
Security Analytics: Bridging large-scale data collection and analysis with human factors to design better defenses
(Georgia Institute of Technology, 2016-08-26)In this talk, I will argue that understanding incentives of both attackers and targets has become critical to strengthening online security. I will advocate the need for an interdisciplinary research agenda, ranging from ... -
Security and Privacy Issues of Modern Web Browsers
(Georgia Institute of Technology, 2017-09-22)The modern web, as users experience it, bears little resemblance to the original world wide web invented by Tim Berners-Lee. Static, stateless, HTML pages with text and the occasional pixelated images gave way to dynamic, ... -
Security Applications of Bitcoin
(Georgia Institute of Technology, 2016-02-26) -
Stopping Fraudsters by Changing Products
(2019-01-25)Lyft’s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but presents an ever-present ... -
Tracing the Arc of Smartphone Application Security
(Georgia Institute of Technology, 2017-12-01)The introduction of smart phones in the mid-2000s forever changed the way users interact with data and computation--and through it prompted a renaissance of digital innovation. Yet, at the same time, the architectures, ... -
Watching IoTs that Watch Us
(Georgia Institute of Technology, 2020-09-25)Many consumers today are increasingly concerned about IoT security and privacy. There is much media hype about home cameras being hacked or voice assistants eavesdropping on conversations. However, it is unclear exactly ...