Now showing items 1-6 of 6
Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX
(Georgia Institute of Technology, 2016-09-23)
Kernel hardening has been an important topic, as many applications and security mechanisms often consider the kernel their Trusted Computing Base (TCB). Among various hardening techniques, kernel address space layout ...
Managing Product Security and Integrity in a Global Supply Chain
(Georgia Institute of Technology, 2016-10-07)
Cisco is a multi-national corporation that manufactures and sells networking and data center equipment that powers the world’s largest corporations, telecommunications providers, and national infrastructures. A majority ...
The Evolution of Modern Malware: Technology Trends and Motivations
(Georgia Institute of Technology, 2016-11-04)
Over the past decade, malware has continued to evolve to adapt to increasing pressure from prevention and detection technologies. Techniques that were relied upon previously are no longer effective, while some persist ...
(Georgia Institute of Technology, 2016-03-04)
Security has become a hot topic given recent hacks of major corporations, like Sony, Home Depot, and Anthem. However, those hacks were easily preventable with the correct technology. The problem is that many times, security ...
Cybersecurity and You - Ready or Not, Here It Is!
(Georgia Institute of Technology, 2016-04-15)
John Corliss from the U.S. Department of Homeland Security leads a discussion about strengthening the security and resilience of cyberspace and federal networks as an important part of the homeland security mission.
Cyber Security Analytics
(Georgia Institute of Technology, 2016-04-01)
Adam Wenchel from Capital One leads a discussion about information security in the financial sector -- specifically "cyber data lakes" and the use of machine learning to advance cybersecurity analytics capabilities.