Now showing items 1-4 of 4
SEIVE: Cryptographically Enforced Access Control for User Data in Untrusted Clouds
(Georgia Institute of Technology, 2016-09-30)
Modern web services rob users of low-level control over cloud storage—a user’s single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. The consequence ...
Open Source Intelligence Applications in Cybersecurity
(Georgia Institute of Technology, 2018-09-28)
Open Source Intelligence (OSINT) has rapidly evolved as a prominent yet peculiar member of the intelligence disciplines (INTs). OSINT is valuable in both offensive and defensive cybersecurity applications such as malware ...
The Implications of Privacy-Aware Choice
(Georgia Institute of Technology, 2018-10-19)
Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can ...
Adversarial Attack on Graph-Structured Data
(Georgia Institute of Technology, 2019-03-15)
Deep learning on graph structures has shown exciting results in cybersecurity applications, such as risk management, binary code similarity detection, etc. However, few attentions have been paid to the robustness of such ...