Now showing items 115-118 of 118

    • What Constitutes an Act of War in Cyberspace? 

      Dragoo, Holly M. (Georgia Institute of Technology, 2017-11-17)
      Is cyberspace merely another domain for 21st Century kinetic battles to operate in, or does it merit special consideration and unique rules of engagement? In this talk, Holly Dragoo will explore the challenges of why it’s ...
    • What do CISOS Do All Day? 

      Perullo, Jerry (Georgia Institute of Technology, 2018-02-02)
    • When Push comes to Ads: Measuring the Rise of (Malicious) Push Advertising 

      Subramani, Karthika (Georgia Institute of Technology, 2020-10-30)
      The rapid growth of online advertising has fueled the growth of ad-blocking software, such as new ad-blocking and privacy-oriented browsers or browser extensions. In response, both ad publishers and ad networks are constantly ...
    • Why Memory Corruption is Hard 

      Payer, Mathias (Georgia Institute of Technology, 2017-09-08)
      Memory corruption has plagued systems since the dawn of computing. With the rise of defense techniques (such as stack cookies, ASLR, and DEP), attacks have become much more complicated, yet control-flow hijack attacks are ...