Now showing items 1-20 of 81

    • AI-infused Security: Robust Defense by Bridging Theory and Practice 

      Chen, Shang-Tse (Georgia Institute of Technology, 2019-04-05)
      While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersecurity threats, understanding the capabilities and robustness of AI remains a fundamental challenge, especially in adversarial ...
    • Grand Cyber Questions and How They Impact Cyber Start-ups 

      Gula, Ron (Georgia Institute of Technology, 2019-03-29)
      Ron will discuss some of the harder questions in cyber we've not come to terms with such as quantifying cyber risk and the government's responsibility for keeping us "cyber safe" and how these grand cyber issues impact ...
    • Adversarial Attack on Graph-Structured Data 

      Dai, Hanjun (Georgia Institute of Technology, 2019-03-15)
      Deep learning on graph structures has shown exciting results in cybersecurity applications, such as risk management, binary code similarity detection, etc. However, few attentions have been paid to the robustness of such ...
    • A Tale of Two Tasks: Designing and Validating Secure Software 

      Allen, Shelby (Georgia Institute of Technology, 2019-03-08)
      Secure software development can be categorized into two major tasks: designing secure software and validating secure software. In this talk, we will review both categories as well as some resources helpful for continuous ...
    • Improving Security Through Software Debloating 

      Brown, Michael (Georgia Institute of Technology, 2019-03-01)
      As software security breaches continue to increase in frequency and sophistication, there has been an increase in the research and development of new methods for improving software security. One such method that has seen ...
    • From the cockpit to cybersecurity: A cyber perspective from the nations first African-American Female Naval Flight Officer 

      Wright, Matice (Georgia Institute of Technology, 2019-02-22)
      Cybersecurity is essential for national security. Ms. Wright is a national security executive at ManTech International Corporation. ManTech is a trusted partner and leading systems integrator for the Department of Defense, ...
    • Defending Organizations in a Fast-Moving Cyber Arms Race 

      Krug, Rob (Georgia Institute of Technology, 2019-02-08)
      This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than just breach detection, ...
    • Developing Secure Products 

      Man, Emil; Rajasekharan, Karun (Georgia Institute of Technology, 2019-02-01)
      [Emil Man] As part of Honeywell’s digitization of our business, we have been working on moving towards distributed computing through microservice architecture deployments. As we also work on moving our software products ...
    • Stopping Fraudsters by Changing Products 

      King, Sam (2019-01-25)
      Lyft’s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but presents an ever-present ...
    • Protect Your Unicorn From Hunters 

      Valtman, Nir (Georgia Institute of Technology, 2019-01-18)
      Information security certifications, frameworks, and regulatory requirements provide a good foundation for startups to build an information security program. Since a security breach could put a startup out of business, ...
    • Device Enhanced Authentication: Passwords and Second Factors 

      Shirvanian, Maliheh (Georgia Institute of Technology, 2019-01-11)
      Despite all the advancement in authentication schemes, text-based authentication is perhaps still the most common way of user authentication (e.g., textual passwords or personal identification numbers - PINs). However, ...
    • Forward Leaning - Reshaping and Rethinking Cyber R&D 

      Greene, Kevin (Georgia Institute of Technology, 2018-11-30)
      The state of art and the state of practice is not keeping up with today’s cyber challenges, and as a result, adversarial activities are becoming increasingly effective in disrupting mission capabilities. To close the gap ...
    • Practical Software Hardening Against Code Reuse Attacks 

      Koo, Hyungjoon (Georgia Institute of Technology, 2018-11-16)
    • The Insider's View of a Data Breach - how policy, forensics, and attribution apply in the real world 

      McClelland, Todd (Georgia Institute of Technology, 2018-11-02)
      Ever wondered what happens behind the scenes when a large company experiences a data breach? How, for example, do forensics and policy teams integrate and collaborate with all the other business roles (e.g., PR, HR, Senior ...
    • Triaging and Debugging Failures in Deployed Software by Reverse Execution 

      Cui, Weidong (Georgia Institute of Technology, 2018-10-26)
    • The Implications of Privacy-Aware Choice 

      Cummings, Rachel (Georgia Institute of Technology, 2018-10-19)
      Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can ...
    • Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA 

      Edgar, Timothy (Georgia Institute of Technology, 2018-10-12)
      Snowden’s leaks of top secret documents prompted companies and individuals to take long overdue steps to make their communications and data more secure. The episode also led to reforms that made government surveillance ...
    • Cyber Simulation and Threat Assessment 

      Kam, Ambrose (Georgia Institute of Technology, 2018-10-05)
      Modeling and simulation (M&S) have long been considered a critical element within systems engineering. Up until recently, M&S has not been applied to the cybersecurity domain area. Part of the reason is the maturity of ...
    • Open Source Intelligence Applications in Cybersecurity 

      Shields, Thomas (Georgia Institute of Technology, 2018-09-28)
      Open Source Intelligence (OSINT) has rapidly evolved as a prominent yet peculiar member of the intelligence disciplines (INTs). OSINT is valuable in both offensive and defensive cybersecurity applications such as malware ...
    • New Perspectives on Control-Flow Hijacking Mitigation 

      Burow, Nathan (Georgia Institute of Technology, 2018-09-21)
      Despite over 20 years of research, control-flow hijacking attacks remain the most significant threat to software security. Attackers exploit C/C++ lack of memory and type safety to corrupt code-pointers, thereby hijacking ...