Now showing items 21-40 of 89

    • Practical Software Hardening Against Code Reuse Attacks 

      Koo, Hyungjoon (Georgia Institute of Technology, 2018-11-16)
    • The Insider's View of a Data Breach - how policy, forensics, and attribution apply in the real world 

      McClelland, Todd (Georgia Institute of Technology, 2018-11-02)
      Ever wondered what happens behind the scenes when a large company experiences a data breach? How, for example, do forensics and policy teams integrate and collaborate with all the other business roles (e.g., PR, HR, Senior ...
    • Triaging and Debugging Failures in Deployed Software by Reverse Execution 

      Cui, Weidong (Georgia Institute of Technology, 2018-10-26)
    • The Implications of Privacy-Aware Choice 

      Cummings, Rachel (Georgia Institute of Technology, 2018-10-19)
      Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can ...
    • Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA 

      Edgar, Timothy (Georgia Institute of Technology, 2018-10-12)
      Snowden’s leaks of top secret documents prompted companies and individuals to take long overdue steps to make their communications and data more secure. The episode also led to reforms that made government surveillance ...
    • Cyber Simulation and Threat Assessment 

      Kam, Ambrose (Georgia Institute of Technology, 2018-10-05)
      Modeling and simulation (M&S) have long been considered a critical element within systems engineering. Up until recently, M&S has not been applied to the cybersecurity domain area. Part of the reason is the maturity of ...
    • Open Source Intelligence Applications in Cybersecurity 

      Shields, Thomas (Georgia Institute of Technology, 2018-09-28)
      Open Source Intelligence (OSINT) has rapidly evolved as a prominent yet peculiar member of the intelligence disciplines (INTs). OSINT is valuable in both offensive and defensive cybersecurity applications such as malware ...
    • New Perspectives on Control-Flow Hijacking Mitigation 

      Burow, Nathan (Georgia Institute of Technology, 2018-09-21)
      Despite over 20 years of research, control-flow hijacking attacks remain the most significant threat to software security. Attackers exploit C/C++ lack of memory and type safety to corrupt code-pointers, thereby hijacking ...
    • Emulytics at Sandia: Emulation-based Modeling and Analysis of Computer Systems 

      Gabert, Kasimir (Georgia Institute of Technology, 2018-09-14)
      Emulation-based models of distributed computing systems are collections of virtual machines, virtual networks, and other emulation components configured to stand in for operational systems when performing experimental ...
    • Security along SoC Design Lifecycle: Current Practices and Challenges Ahead 

      Tehranipoor, Mark (Georgia Institute of Technology, 2018-09-07)
      System-on-chip (SoC) security has received significant attention in the past several years due mainly to its prevalence in the internet of things (IoT) devices, cyber-physical systems, and embedded computing systems. ...
    • Social Cybersecurity 

      Das, Sauvik (Georgia Institute of Technology, 2018-08-31)
      Entering an era of pervasive, connected smart things, our cybersecurity decisions increasingly interfere with our social lives. Yet, little is known of the complex social consequences of our security behaviors, and vice ...
    • Proving Anything Quickly, Privately, and Elegantly with Secure Computation 

      Kolesnikov, Vladimir (Georgia Institute of Technology, 2018-08-24)
      Secure multi-party computation (MPC) is an area of cryptography which studies computing on encrypted data. In this talk, I will discuss a somewhat surprising MPC technique of proving statements in zero-knowledge (i.e., ...
    • Cybersecurity Demo Day 2018 Awards 

      Klaus, Christopher; Patton, Blake; Skapentiz, Kevin (Georgia Institute of Technology, 2018-04-12)
      Congratulations to the 2017-2018 Winners! Grand Prize - Create-X Startup LAUNCH incubator seat: "OSS Police", Ashish Bijlani & Ruian Duan, School of Computer Science. 1st Place - Commercialization Track: ...
    • Tackling Cybersecurity Threats in Smart Grids 

      Ahmadi, Majid (Georgia Institute of Technology, 2018-04-12)
      Smart Grid is the next generation of electricity grids that provide a framework for using advanced technologies including telecommunications, distributed energy resources, and energy efficiency solutions. While Smart Grids ...
    • rtCaptcha 

      Uzun, Erkam (Georgia Institute of Technology, 2018-04-12)
      More organizations are turning to facial and voice recognition, or other biometric identifiers, to authenticate users and grant access to their systems. In particular, some services (e.g. Mastercard Identity Check) allow ...
    • RAIN: Refinable Attack Investigation with On-demand Inter-process Information Flow Tracking 

      Ji, Yang (Georgia Institute of Technology, 2018-04-18)
      As modern attacks become more stealthy and persistent, detecting or preventing them at their early stages becomes virtually impossible. Instead, an attack investigation or provenance system aims to continuously monitor and ...
    • OSS Police 

      Bijlani, Ashish; Duan, Ruian (Georgia Institute of Technology, 2018-04-12)
      In order to reduce time to market, mobile app developers often focus their efforts on creating new, unique features or workflows, and rely on third-party Open Source Software (OSS) for common elements of app code. ...
    • Phish or Fish 

      Bandhari, Anisha; Tan, Tony Zhaocheng (Georgia Institute of Technology, 2018-04-12)
      Phishing, where an attacker sends an email under false pretenses to trick users into giving up their passwords, is the first step in many high-profile cyber attacks, such as the Democratic National Convention hack of 2016. ...
    • Cybersecurity Demo Day 2018 Introduction 

      Lee, Wenke (Georgia Institute of Technology, 2018-04-12)
      Vetted and coached to enter the marketplace, students presented ideas for commercialization before venture capitalists, industry leaders, and the public at the Institute for Information Security & Privacy's Cybersecurity ...
    • Solving the Biggest Problems 

      Sorenson, Joshua C. (Georgia Institute of Technology, 2018-03-30)
      In his lecture, titled "Solving the Biggest Problems", Sorenson will describe kinetic threats and how they are shifting the nature of information security -- both assurance and deterrence -- into a complex new territory.