Now showing items 85-104 of 113

    • Secure Communication Channel Establishment: TLS 1.3 (Over TCP Fast Open) vs. QUIC 

      Boldyreva, Alexandra (Georgia Institute of Technology, 2019-11-01)
      Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of interactions between parties) in ...
    • Secure Data Outsourcing: Access Pattern Confidentiality in Outsourced Databases 

      Degitz, Alexander (Georgia Institute of Technology, 2017-01-13)
      When sensitive data is outsourced to an untrustworthy cloud storage provider, encryption techniques can be used to enforce data confidentiality. Ideally, such encryption techniques should not only enforce the confidentiality ...
    • Securing Network Function Virtualization 

      Yu, Minlan (Georgia Institute of Technology, 2019-11-22)
    • Security along SoC Design Lifecycle: Current Practices and Challenges Ahead 

      Tehranipoor, Mark (Georgia Institute of Technology, 2018-09-07)
      System-on-chip (SoC) security has received significant attention in the past several years due mainly to its prevalence in the internet of things (IoT) devices, cyber-physical systems, and embedded computing systems. ...
    • Security Analytics: Bridging large-scale data collection and analysis with human factors to design better defenses 

      Christin, Nicolas (Georgia Institute of Technology, 2016-08-26)
      In this talk, I will argue that understanding incentives of both attackers and targets has become critical to strengthening online security. I will advocate the need for an interdisciplinary research agenda, ranging from ...
    • Security and Privacy Issues of Modern Web Browsers 

      Nikiforakis, Nick (Georgia Institute of Technology, 2017-09-22)
      The modern web, as users experience it, bears little resemblance to the original world wide web invented by Tim Berners-Lee. Static, stateless, HTML pages with text and the occasional pixelated images gave way to dynamic, ...
    • Security Applications of Bitcoin 

      Pair, Stephen (Georgia Institute of Technology, 2016-02-26)
    • Security Evaluation of Home-Based IoT Deployments 

      Alrawi, Omar (Georgia Institute of Technology, 2019-11-15)
      Home-based IoT devices have a bleak reputation regarding their security practices. On the surface, the insecurities of IoT devices seem to be caused by integration problems that may be addressed by simple measures, but ...
    • SEIVE: Cryptographically Enforced Access Control for User Data in Untrusted Clouds 

      Wang, Frank (Georgia Institute of Technology, 2016-09-30)
      Modern web services rob users of low-level control over cloud storage—a user’s single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. The consequence ...
    • Simulation-Based Cyber Wargaming 

      Kam, Ambrose (Georgia Institute of Technology, 2019-09-27)
      Cyber threats are rampant and their potential damages to enterprises continue to soar over time. Hence, cyber resilience techniques need to be examined and assessed for their effectiveness before deployment. Red Teaming ...
    • Social Cybersecurity 

      Das, Sauvik (Georgia Institute of Technology, 2018-08-31)
      Entering an era of pervasive, connected smart things, our cybersecurity decisions increasingly interfere with our social lives. Yet, little is known of the complex social consequences of our security behaviors, and vice ...
    • Solving the Biggest Problems 

      Sorenson, Joshua C. (Georgia Institute of Technology, 2018-03-30)
      In his lecture, titled "Solving the Biggest Problems", Sorenson will describe kinetic threats and how they are shifting the nature of information security -- both assurance and deterrence -- into a complex new territory.
    • Space Wars: Exploiting Program (in)Variants for Software Security 

      Hu, Hong (Georgia Institute of Technology, 2020-01-31)
      The ever-increasing code base of modern software inevitably introduces vulnerabilities which enable attackers to construct sophisticated exploits and compromise our computer systems. Control-flow hijacking is the ...
    • Stopping Fraudsters by Changing Products 

      King, Sam (2019-01-25)
      Lyft’s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but presents an ever-present ...
    • Tackling Cybersecurity Threats in Smart Grids 

      Ahmadi, Majid (Georgia Institute of Technology, 2018-04-12)
      Smart Grid is the next generation of electricity grids that provide a framework for using advanced technologies including telecommunications, distributed energy resources, and energy efficiency solutions. While Smart Grids ...
    • Tagging and Tracking of Multi-level Host Events for Transparent Computing 

      Fazzini, Mattia (Georgia Institute of Technology, 2017-02-24)
      Advanced persistent threats (APTs) are characterized by their abilities to render existing security mechanisms ineffective; for example, APT activities can blend in with normal user and program activities to blindside ...
    • A Tale of Two Tasks: Designing and Validating Secure Software 

      Allen, Shelby (Georgia Institute of Technology, 2019-03-08)
      Secure software development can be categorized into two major tasks: designing secure software and validating secure software. In this talk, we will review both categories as well as some resources helpful for continuous ...
    • Temporal System Call Specialization for Attack Surface Reduction 

      Ghavamnia, Seyedhamed (Georgia Institute of Technology, 2020-10-16)
      Attack surface reduction through the removal of unnecessary application features and code is a promising technique for improving security without incurring any additional overhead. Recent software debloating techniques ...
    • Towards Measuring and Mitigating Social Engineering Software Download Attacks 

      Nelms, Terry L. (Georgia Institute of Technology, 2016-09-02)
      Most modern malware infections happen through the browser, typically as the result of a drive-by or social engineering attack. While there have been numerous studies on measuring and defending against drive-by downloads, ...
    • Towards Measuring the Effectiveness of Telephony Blacklists 

      Pandit, Sharbani (Georgia Institute of Technology, 2018-02-09)
      The convergence of telephony with the Internet has led to numerous new attacks that make use of phone calls to defraud victims. In response to the increasing number of unwanted or fraudulent phone calls, a number of call ...