Now showing items 46-65 of 112

    • The Growing Importance of the Non-Code Aspects of Cybersecurity 

      Swire, Peter (Georgia Institute of Technology, 2019-10-04)
      According to the National Initiative for Cybersecurity Education, half of the cybersecurity specialties now involve primarily non-code work. This lecture draws on the "Pedagogic Cybersecurity Framework" published in 2018 ...
    • Hacking Data-Flow for Turing-Complete Attacks 

      Hu, Hong (Georgia Institute of Technology, 2018-02-23)
      Control-flow hijacking attacks from memory errors become more and more difficult as targeted defense mechanisms gain wide deployment. As an alternative, non-control data attacks do not require diverting the application’s ...
    • Hardware Trojan detection using the backscattering side channel 

      Nguyen, Luong N. (Georgia Institute of Technology, 2020-01-24)
      Integrated circuits (IC) have become an integral aspect of our lives. Thus, the problem of ensuring authenticity and trust for ICs is critically important, especially for sensitive fields such as military, finance, and ...
    • Hardware-Based Security and Trust For IoT and Supply Chain Authentication 

      Plusquellic, James F. (Georgia Institute of Technology, 2017-04-21)
      New hardware architectures for Internet-of-Things (IoT) are emerging rapidly in response to con- sumer demands for improved situational awareness, instant access to widely distributed sources of news and information and ...
    • How to Make ASLR Win the Clone Wars: Runtime Re‐Randomization 

      Lu, Kangjie (Georgia Institute of Technology, 2016-02-12)
      Existing techniques for memory randomization such as the widely explored Address Space Layout Randomization (ASLR) perform a single, per‐process randomization that is applied before or at the process’ load‐time. The ...
    • Human Computing for Handling Strong Corruptions in Authenticated Key Exchange 

      Chen, Shan (Georgia Institute of Technology, 2017-03-10)
      Ph.D. Student Shan Chen presents user authentication and key exchange protocols that can tolerate strong corruptions on the client-side. He will define the security model for Human Authenticated Key Exchange (HAKE) protocols ...
    • The Impact of Compiler-Based Performance Optimizations on Security 

      Brown, Michael D. (Georgia Institute of Technology, 2020-02-07)
      The security impacts of compiler-based software optimizations are typically not considered during their design and implementation. As a result, a number of well-intentioned compiler optimizations have been shown to introduce ...
    • The Implications of Privacy-Aware Choice 

      Cummings, Rachel (Georgia Institute of Technology, 2018-10-19)
      Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can ...
    • Improving Security Through Software Debloating 

      Brown, Michael (Georgia Institute of Technology, 2019-03-01)
      As software security breaches continue to increase in frequency and sophistication, there has been an increase in the research and development of new methods for improving software security. One such method that has seen ...
    • The Insider's View of a Data Breach - how policy, forensics, and attribution apply in the real world 

      McClelland, Todd (Georgia Institute of Technology, 2018-11-02)
      Ever wondered what happens behind the scenes when a large company experiences a data breach? How, for example, do forensics and policy teams integrate and collaborate with all the other business roles (e.g., PR, HR, Senior ...
    • Justitia 

      Yagemann, Carter (Georgia Institute of Technology, 2019-04-16)
      Biometric authentication promises user convenience by measuring what makes each of us unique using just a smartphone. The downside includes risks such as criminals impersonating us with stolen data and the pain of having ...
    • LADIDS: Lightning-Authenticated Distributed Intrusion Detection System for the Power Grid 

      Shekari, Tohid (Georgia Institute of Technology, 2019-04-16)
      Recent events affecting power grids (such as the Ukrainian blackout in 2015) have highlighted the vulnerabilities in modern power systems, especially power substations which form the backbone of electricity networks. ...
    • Leveraging Side-Channel Signals for Security and Trust 

      Sehatbakhsh, Nader (Georgia Institute of Technology, 2019-11-08)
      With the proliferation of computing systems in our world, from servers to internet-of-things devices, side-channel signals have become significantly more available and accessible to measure and leverage. This availability ...
    • Machine Learning in Profiled Side-Channel Attacks and Low-Overhead Countermeasures 

      Raychowdhury, Arijit (Georgia Institute of Technology, 2019-10-18)
      Computationally secure Cryptographic algorithms, when implemented on physical hardware leak correlated physical signatures (e.g. power supply current, electromagnetic radiation, acoustic, thermal) which could be utilized ...
    • Managing Product Security and Integrity in a Global Supply Chain 

      Kuchynski, Dmitry; Iskander, Yousef (Georgia Institute of Technology, 2016-10-07)
      Cisco is a multi-national corporation that manufactures and sells networking and data center equipment that powers the world’s largest corporations, telecommunications providers, and national infrastructures. A majority ...
    • Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers 

      Kondracki, Brian (Georgia Institute of Technology, 2020-09-18)
      Mobile browsers have become one of the main mediators of our online activities. However, as web pages continue to increase in size and streaming media on-the-go has become commonplace, mobile data plan constraints remain ...
    • MLsploit [Judges Remarks] 

      Downing, Evan (Georgia Institute of Technology, 2019-04-16)
      Machine learning is at risk of being attacked. As companies continue to depend on machine learning to solve their problems, more sophisticated attacks are being created to undermine and take advantage of machine learning ...
    • Modern Malware and Secure Techniques for Better Software 

      Odom, Joel (Georgia Institute of Technology, 2017-08-25)
      Modern society depends on reliable computer systems, yet hardly a day passes without news of a new failure of computer security. Whether enticed by profit or by politics, professional hacking organizations rival mainstream ...
    • Multi-layer API Specialization for Attack Surface Reduction 

      Mishra, Shachee (Georgia Institute of Technology, 2020-10-02)
      Code reuse attacks have been a threat to software security since the introduction of non-executable memory protections. Despite significant advances in various types of additional defenses, such as control flow integrity ...
    • Multi-Stakeholder Network Infrastructure Security Concerns 

      Tauber, Tony (Georgia Institute of Technology, 2017-10-27)
      Security concerns with the Internet infrastructure involve a variety of stakeholders both in effect and potential remedies and countermeasures. This talk will discuss some examples.