Now showing items 4-23 of 122

    • Attacking and Protecting Public Data with Differential Privacy 

      Garfinkel, Simson L. (Georgia Institute of Technology, 2019-04-26)
      Publishing exact statistical data creates mathematical risks and vulnerabilities that have only recently been appreciated. In 2010, the U.S. Census Bureau collected information on more than 308 million residents and published ...
    • Automated In-memory Malware/rootkit Detection via Binary Analysis and Machine Learning 

      Jones, Malachi (Georgia Institute of Technology, 2018-02-16)
      A prominent technique for detecting sophisticated malware consists of monitoring the execution behavior of each binary to identify anomalies and/or malicious intent. Hooking and emulation are two primary mechanisms that ...
    • Automatic Feature Engineering: Learning to Detect Malware by Mining the Scientific Literature 

      Dumitras, Tudor (Georgia Institute of Technology, 2017-09-29)
      The detection of malware and network attacks increasingly relies on machine learning techniques, which utilize multiple features to separate the malicious and benign behaviors. The effectiveness of these techniques primarily ...
    • Automating the Discovery of Censorship Evasion Strategies 

      Bock, Kevin (Georgia Institute of Technology, 2020-09-11)
      Researchers and censoring regimes have long engaged in a cat-and-mouse game, leading to increasingly sophisticated censorship techniques and methods to evade them. Unfortunately, censors have long had an inherent advantage ...
    • Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA 

      Edgar, Timothy (Georgia Institute of Technology, 2018-10-12)
      Snowden’s leaks of top secret documents prompted companies and individuals to take long overdue steps to make their communications and data more secure. The episode also led to reforms that made government surveillance ...
    • Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX 

      Jang, Yeongjin (Georgia Institute of Technology, 2016-09-23)
      Kernel hardening has been an important topic, as many applications and security mechanisms often consider the kernel their Trusted Computing Base (TCB). Among various hardening techniques, kernel address space layout ...
    • Building a Strategic Privacy Program 

      Glover, Evan W. (Georgia Institute of Technology, 2020-11-20)
      Privacy is a multi-faceted challenge for organizations – to be successful, they must take a holistic approach to protecting the personal data and information of all stakeholders. Privacy professionals must collaborate ...
    • Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud 

      Nelms, Terry (Georgia Institute of Technology, 2017-09-01)
      Robocalling, voice phishing and caller ID spoofing are common cybercrime techniques used to launch scam campaigns through the telephony channel that many people have long trusted. More than 660,000 online complaints regarding ...
    • Caller Authentication Using Mobile Devices 

      Nelms, Terry L. (Georgia Institute of Technology, 2019-04-12)
      Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the caller’s phone number is easily ...
    • Can Data Provenance Put an End to the Data Breach? 

      Bates, Adam (Georgia Institute of Technology, 2019-09-13)
      In a provenance-aware system, mechanisms gather and report metadata that describes the history of each data object being processed, allowing us to understand how objects came to exist in their present state. Excitingly, ...
    • Clash of Cultures: Privacy and the Internet 

      Claypoole, Theodore F. (Georgia Institute of Technology, 2018-03-16)
      U.S./EU fights over new customer privacy regulations (General Data Protection Regulation, or “GDPR”) will headline a multi-front culture war between openness and control, individual rights and state power, and individual ...
    • Cloak & Dagger: From Two Android Permissions to Complete Control of the UI Feedback Loop 

      Fratantonio, Yanick (Georgia Institute of Technology, 2017-04-07)
      Although the two Android permissions -- SYSTEM_ALERT_WINDOW and BIND_ACCESSIBILITY_SERVICE -- have been separately abused to create redressing attacks and accessibility attacks, these previous cyberattacks never could ...
    • Convicted by Memory: Recovering Spatial-Temporal Digital Evidence from Memory Images 

      Saltaformaggio, Brendan (Georgia Institute of Technology, 2018-01-19)
      Memory forensics is becoming a crucial capability in modern cyber forensic investigations. In particular, memory forensics can reveal "up to the minute" evidence of a device's usage, often without requiring a suspect's ...
    • Cyber MayDay: Who Is in Command When Your Business is in the Crosshairs and How Do You Respond? 

      Cross, Stephen; Graves, John Thomas; Lens, John; Mueller, Milton; Pair, Stephen; Sinema, Krysten; Swire, Peter; Worley, Candace (Georgia Institute of Technology, 2017-05-01)
      Rep. Tom Graves (R-Ga. 14), in cooperation with the Georgia Institute of Technology, hosts a conversation for executives and thought leaders in Atlanta about cybersecurity policy and technical challenges that are stifling ...
    • Cyber Science: The Third Frontier 

      Johnson-Bey, Charles (Georgia Institute of Technology, 2019-10-11)
      Over the last several decades Data Security became Information Security which then rolled into Cyber Security. All along this journey cyber has become defined as “Us versus Them”; electronic cyber-attack and cyber-defense ...
    • Cyber Security Analytics 

      Wenchel, Adam (Georgia Institute of Technology, 2016-04-01)
      Adam Wenchel from Capital One leads a discussion about information security in the financial sector -- specifically "cyber data lakes" and the use of machine learning to advance cybersecurity analytics capabilities.
    • Cyber Simulation and Threat Assessment 

      Kam, Ambrose (Georgia Institute of Technology, 2018-10-05)
      Modeling and simulation (M&S) have long been considered a critical element within systems engineering. Up until recently, M&S has not been applied to the cybersecurity domain area. Part of the reason is the maturity of ...
    • Cybersecurity and You - Ready or Not, Here It Is! 

      Corliss, John (Georgia Institute of Technology, 2016-04-15)
      John Corliss from the U.S. Department of Homeland Security leads a discussion about strengthening the security and resilience of cyberspace and federal networks as an important part of the homeland security mission.
    • Cybersecurity Demo Day 2018 Awards 

      Klaus, Christopher; Patton, Blake; Skapentiz, Kevin (Georgia Institute of Technology, 2018-04-12)
      Congratulations to the 2017-2018 Winners! Grand Prize - Create-X Startup LAUNCH incubator seat: "OSS Police", Ashish Bijlani & Ruian Duan, School of Computer Science. 1st Place - Commercialization Track: ...
    • Cybersecurity Demo Day 2018 Introduction 

      Lee, Wenke (Georgia Institute of Technology, 2018-04-12)
      Vetted and coached to enter the marketplace, students presented ideas for commercialization before venture capitalists, industry leaders, and the public at the Institute for Information Security & Privacy's Cybersecurity ...