Now showing items 21-30 of 31
Security along SoC Design Lifecycle: Current Practices and Challenges Ahead
(Georgia Institute of Technology, 2018-09-07)
System-on-chip (SoC) security has received significant attention in the past several years due mainly to its prevalence in the internet of things (IoT) devices, cyber-physical systems, and embedded computing systems. ...
Emulytics at Sandia: Emulation-based Modeling and Analysis of Computer Systems
(Georgia Institute of Technology, 2018-09-14)
Emulation-based models of distributed computing systems are collections of virtual machines, virtual networks, and other emulation components configured to stand in for operational systems when performing experimental ...
New Perspectives on Control-Flow Hijacking Mitigation
(Georgia Institute of Technology, 2018-09-21)
Despite over 20 years of research, control-flow hijacking attacks remain the most significant threat to software security. Attackers exploit C/C++ lack of memory and type safety to corrupt code-pointers, thereby hijacking ...
Open Source Intelligence Applications in Cybersecurity
(Georgia Institute of Technology, 2018-09-28)
Open Source Intelligence (OSINT) has rapidly evolved as a prominent yet peculiar member of the intelligence disciplines (INTs). OSINT is valuable in both offensive and defensive cybersecurity applications such as malware ...
Cyber Simulation and Threat Assessment
(Georgia Institute of Technology, 2018-10-05)
Modeling and simulation (M&S) have long been considered a critical element within systems engineering. Up until recently, M&S has not been applied to the cybersecurity domain area. Part of the reason is the maturity of ...
Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA
(Georgia Institute of Technology, 2018-10-12)
Snowden’s leaks of top secret documents prompted companies and individuals to take long overdue steps to make their communications and data more secure. The episode also led to reforms that made government surveillance ...
The Implications of Privacy-Aware Choice
(Georgia Institute of Technology, 2018-10-19)
Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can ...
Triaging and Debugging Failures in Deployed Software by Reverse Execution
(Georgia Institute of Technology, 2018-10-26)
The Insider's View of a Data Breach - how policy, forensics, and attribution apply in the real world
(Georgia Institute of Technology, 2018-11-02)
Ever wondered what happens behind the scenes when a large company experiences a data breach? How, for example, do forensics and policy teams integrate and collaborate with all the other business roles (e.g., PR, HR, Senior ...
Practical Software Hardening Against Code Reuse Attacks
(Georgia Institute of Technology, 2018-11-16)