Now showing items 1-10 of 30
Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX
(Georgia Institute of Technology, 2016-09-23)
Kernel hardening has been an important topic, as many applications and security mechanisms often consider the kernel their Trusted Computing Base (TCB). Among various hardening techniques, kernel address space layout ...
Managing Product Security and Integrity in a Global Supply Chain
(Georgia Institute of Technology, 2016-10-07)
Cisco is a multi-national corporation that manufactures and sells networking and data center equipment that powers the world’s largest corporations, telecommunications providers, and national infrastructures. A majority ...
The Evolution of Modern Malware: Technology Trends and Motivations
(Georgia Institute of Technology, 2016-11-04)
Over the past decade, malware has continued to evolve to adapt to increasing pressure from prevention and detection technologies. Techniques that were relied upon previously are no longer effective, while some persist ...
Cyber MayDay: Who Is in Command When Your Business is in the Crosshairs and How Do You Respond?
(Georgia Institute of Technology, 2017-05-01)
Rep. Tom Graves (R-Ga. 14), in cooperation with the Georgia Institute of Technology, hosts a conversation for executives and thought leaders in Atlanta about cybersecurity policy and technical challenges that are stifling ...
(Georgia Institute of Technology, 2016-03-04)
Security has become a hot topic given recent hacks of major corporations, like Sony, Home Depot, and Anthem. However, those hacks were easily preventable with the correct technology. The problem is that many times, security ...
Cybersecurity and You - Ready or Not, Here It Is!
(Georgia Institute of Technology, 2016-04-15)
John Corliss from the U.S. Department of Homeland Security leads a discussion about strengthening the security and resilience of cyberspace and federal networks as an important part of the homeland security mission.
Cyber Security Analytics
(Georgia Institute of Technology, 2016-04-01)
Adam Wenchel from Capital One leads a discussion about information security in the financial sector -- specifically "cyber data lakes" and the use of machine learning to advance cybersecurity analytics capabilities.
What Can Social Science Contribute to Cybersecurity Attribution Research?
(Georgia Institute of Technology, 2017-09-15)
How can we develop an institutional framework that can facilitate the provision of authoritative public attributions on a global scale? In cybersecurity cases, we want to know not only who did it (i.e., which individuals ...
The Non-Code Aspects of Cybersecurity and the Globalization of Criminal Evidence
(Georgia Institute of Technology, 2017-10-13)
In this session, Professor Peter Swire will present two current research topics in cybersecurity. The first addresses the non-code aspects of cybersecurity. Computer scientists are familiar with the seven layers of the ...
The Domestic Benefits of Subversive Foreign Propaganda: The RT (Russia Today) News Network and Geopolitical Muckraking
(Georgia Institute of Technology, 2017-10-20)
2017’s biggest news story has been Russia’s alleged use of social media to try to influence Western elections. Much criticism is directed towards RT.com, the “Russia Today” news network created in 2005 by the Russian ...