Now showing items 1-10 of 13
Security Applications of Bitcoin
(Georgia Institute of Technology, 2016-02-26)
The Price of Free: Privacy Leakage in Personalized Mobile In‐App Ads
(Georgia Institute of Technology, 2016-02-05)
ln-app advertising is an essential part of the ecosystem of free mobile applications. On the surface, this creates a win-win situation where app developers can profit from their work without charging the users. Meanwhile, ...
Security Analytics: Bridging large-scale data collection and analysis with human factors to design better defenses
(Georgia Institute of Technology, 2016-08-26)
In this talk, I will argue that understanding incentives of both attackers and targets has become critical to strengthening online security. I will advocate the need for an interdisciplinary research agenda, ranging from ...
Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud
(Georgia Institute of Technology, 2017-09-01)
Robocalling, voice phishing and caller ID spoofing are common cybercrime techniques used to launch scam campaigns through the telephony channel that many people have long trusted. More than 660,000 online complaints regarding ...
Security and Privacy Issues of Modern Web Browsers
(Georgia Institute of Technology, 2017-09-22)
The modern web, as users experience it, bears little resemblance to the original world wide web invented by Tim Berners-Lee. Static, stateless, HTML pages with text and the occasional pixelated images gave way to dynamic, ...
Automatic Feature Engineering: Learning to Detect Malware by Mining the Scientific Literature
(Georgia Institute of Technology, 2017-09-29)
The detection of malware and network attacks increasingly relies on machine learning techniques, which utilize multiple features to separate the malicious and benign behaviors. The effectiveness of these techniques primarily ...
Tracing the Arc of Smartphone Application Security
(Georgia Institute of Technology, 2017-12-01)
The introduction of smart phones in the mid-2000s forever changed the way users interact with data and computation--and through it prompted a renaissance of digital innovation. Yet, at the same time, the architectures, ...
Security along SoC Design Lifecycle: Current Practices and Challenges Ahead
(Georgia Institute of Technology, 2018-09-07)
System-on-chip (SoC) security has received significant attention in the past several years due mainly to its prevalence in the internet of things (IoT) devices, cyber-physical systems, and embedded computing systems. ...
Protect Your Unicorn From Hunters
(Georgia Institute of Technology, 2019-01-18)
Information security certifications, frameworks, and regulatory requirements provide a good foundation for startups to build an information security program. Since a security breach could put a startup out of business, ...
Stopping Fraudsters by Changing Products
Lyft’s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but presents an ever-present ...