Now showing items 1-10 of 31
Convicted by Memory: Recovering Spatial-Temporal Digital Evidence from Memory Images
(Georgia Institute of Technology, 2018-01-19)
Memory forensics is becoming a crucial capability in modern cyber forensic investigations. In particular, memory forensics can reveal "up to the minute" evidence of a device's usage, often without requiring a suspect's ...
Revocations Are Dead, Long Live Revocations
(Georgia Institute of Technology, 2018-01-12)
The importance of the web’s public key infrastructure (PKI) cannot be overstated: it is what allows users to know with whom they are communicating online. Central to its correct operation is the ability to “revoke” ...
The Scalability of Vulnerability Analysis
(Georgia Institute of Technology, 2018-01-26)
Analyzing software for vulnerabilities is an important capability in ensuring the security of a computing system. As software has become more complex and ubiquitous, however, traditional vulnerability analysis techniques ...
What do CISOS Do All Day?
(Georgia Institute of Technology, 2018-02-02)
Automated In-memory Malware/rootkit Detection via Binary Analysis and Machine Learning
(Georgia Institute of Technology, 2018-02-16)
A prominent technique for detecting sophisticated malware consists of monitoring the execution behavior of each binary to identify anomalies and/or malicious intent. Hooking and emulation are two primary mechanisms that ...
Towards Measuring the Effectiveness of Telephony Blacklists
(Georgia Institute of Technology, 2018-02-09)
The convergence of telephony with the Internet has led to numerous new attacks that make use of phone calls to defraud victims. In response to the increasing number of unwanted or fraudulent phone calls, a number of call ...
Hacking Data-Flow for Turing-Complete Attacks
(Georgia Institute of Technology, 2018-02-23)
Control-flow hijacking attacks from memory errors become more and more difficult as targeted defense mechanisms gain wide deployment. As an alternative, non-control data attacks do not require diverting the application’s ...
rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System
(Georgia Institute of Technology, 2018-03-02)
Facial/voice-based authentication is becoming increasingly popular (e.g., already adopted by MasterCard and AliPay), because it is easy to use. In particular, users can now authenticate themselves to online services by ...
Enterprise Security at Georgia Tech
(Georgia Institute of Technology, 2018-03-09)
This discussion will explore the operational security employed for students, faculty, staff and researchers at Georgia Tech as well as strategies and challenges faced by operational security teams inside large enterprises.
Clash of Cultures: Privacy and the Internet
(Georgia Institute of Technology, 2018-03-16)
U.S./EU fights over new customer privacy regulations (General Data Protection Regulation, or “GDPR”) will headline a multi-front culture war between openness and control, individual rights and state power, and individual ...