Now showing items 110-129 of 130

    • Tackling Cybersecurity Threats in Smart Grids 

      Ahmadi, Majid (Georgia Institute of Technology, 2018-04-12)
      Smart Grid is the next generation of electricity grids that provide a framework for using advanced technologies including telecommunications, distributed energy resources, and energy efficiency solutions. While Smart Grids ...
    • Tagging and Tracking of Multi-level Host Events for Transparent Computing 

      Fazzini, Mattia (Georgia Institute of Technology, 2017-02-24)
      Advanced persistent threats (APTs) are characterized by their abilities to render existing security mechanisms ineffective; for example, APT activities can blend in with normal user and program activities to blindside ...
    • A Tale of Two Tasks: Designing and Validating Secure Software 

      Allen, Shelby (Georgia Institute of Technology, 2019-03-08)
      Secure software development can be categorized into two major tasks: designing secure software and validating secure software. In this talk, we will review both categories as well as some resources helpful for continuous ...
    • Temporal System Call Specialization for Attack Surface Reduction 

      Ghavamnia, Seyedhamed (Georgia Institute of Technology, 2020-10-16)
      Attack surface reduction through the removal of unnecessary application features and code is a promising technique for improving security without incurring any additional overhead. Recent software debloating techniques ...
    • To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media 

      Kaleli, Beliz (Georgia Institute of Technology, 2021-02-12)
      To make their services more user friendly, online so- cial media platforms automatically identify text that corresponds to URLs and render it as clickable links. In this paper, we show that the techniques used by such ...
    • Towards Measuring and Mitigating Social Engineering Software Download Attacks 

      Nelms, Terry L. (Georgia Institute of Technology, 2016-09-02)
      Most modern malware infections happen through the browser, typically as the result of a drive-by or social engineering attack. While there have been numerous studies on measuring and defending against drive-by downloads, ...
    • Towards Measuring the Effectiveness of Telephony Blacklists 

      Pandit, Sharbani (Georgia Institute of Technology, 2018-02-09)
      The convergence of telephony with the Internet has led to numerous new attacks that make use of phone calls to defraud victims. In response to the increasing number of unwanted or fraudulent phone calls, a number of call ...
    • Tracing the Arc of Smartphone Application Security 

      McDaniel, Patrick (Georgia Institute of Technology, 2017-12-01)
      The introduction of smart phones in the mid-2000s forever changed the way users interact with data and computation--and through it prompted a renaissance of digital innovation. Yet, at the same time, the architectures, ...
    • Triaging and Debugging Failures in Deployed Software by Reverse Execution 

      Cui, Weidong (Georgia Institute of Technology, 2018-10-26)
    • Trusting Smart Cities: Risk Factors and Implications 

      Loper, Margaret (Georgia Institute of Technology, 2019-09-06)
      In the coming decades, we will live in a world surrounded by tens of billions of devices that will interoperate and collaborate in an effort to deliver personalized and autonomic services. This paradigm of objects and ...
    • Understanding, Alleviating and Exploiting Electro-Magnetic Side-Channel Signals 

      Prvulovic, Milos (Georgia Institute of Technology, 2016-09-16)
      A side-channel attack is an attack that exploits the low-power electronic signals a device emits even when it’s not connected to the Internet or a network. Such signals can leak sensitive data used in a computational task. ...
    • Voice Biometrics and Emerging Security Threats in the Voice Channel 

      Khoury, Elie (Georgia Institute of Technology, 2021-04-02)
      Voice Biometrics is the automated recognition of individuals based on their voice characteristics that are both biological and behavioral. Voice Biometrics is currently deployed in many real world applications for ...
    • War by Other Means 

      Hursti, Harry (Georgia Institute of Technology, 2021-03-05)
    • Watching IoTs that Watch Us 

      Huang, Danny Y. (Georgia Institute of Technology, 2020-09-25)
      Many consumers today are increasingly concerned about IoT security and privacy. There is much media hype about home cameras being hacked or voice assistants eavesdropping on conversations. However, it is unclear exactly ...
    • What Can Social Science Contribute to Cybersecurity Attribution Research? 

      Mueller, Milton (Georgia Institute of Technology, 2017-09-15)
      How can we develop an institutional framework that can facilitate the provision of authoritative public attributions on a global scale? In cybersecurity cases, we want to know not only who did it (i.e., which individuals ...
    • What Constitutes an Act of War in Cyberspace? 

      Dragoo, Holly M. (Georgia Institute of Technology, 2017-11-17)
      Is cyberspace merely another domain for 21st Century kinetic battles to operate in, or does it merit special consideration and unique rules of engagement? In this talk, Holly Dragoo will explore the challenges of why it’s ...
    • What do CISOS Do All Day? 

      Perullo, Jerry (Georgia Institute of Technology, 2018-02-02)
    • When Push comes to Ads: Measuring the Rise of (Malicious) Push Advertising 

      Subramani, Karthika (Georgia Institute of Technology, 2020-10-30)
      The rapid growth of online advertising has fueled the growth of ad-blocking software, such as new ad-blocking and privacy-oriented browsers or browser extensions. In response, both ad publishers and ad networks are constantly ...
    • Why Memory Corruption is Hard 

      Payer, Mathias (Georgia Institute of Technology, 2017-09-08)
      Memory corruption has plagued systems since the dawn of computing. With the rise of defense techniques (such as stack cookies, ASLR, and DEP), attacks have become much more complicated, yet control-flow hijack attacks are ...