Now showing items 121-130 of 130

    • Voice Biometrics and Emerging Security Threats in the Voice Channel 

      Khoury, Elie (Georgia Institute of Technology, 2021-04-02)
      Voice Biometrics is the automated recognition of individuals based on their voice characteristics that are both biological and behavioral. Voice Biometrics is currently deployed in many real world applications for ...
    • War by Other Means 

      Hursti, Harry (Georgia Institute of Technology, 2021-03-05)
    • Watching IoTs that Watch Us 

      Huang, Danny Y. (Georgia Institute of Technology, 2020-09-25)
      Many consumers today are increasingly concerned about IoT security and privacy. There is much media hype about home cameras being hacked or voice assistants eavesdropping on conversations. However, it is unclear exactly ...
    • What Can Social Science Contribute to Cybersecurity Attribution Research? 

      Mueller, Milton (Georgia Institute of Technology, 2017-09-15)
      How can we develop an institutional framework that can facilitate the provision of authoritative public attributions on a global scale? In cybersecurity cases, we want to know not only who did it (i.e., which individuals ...
    • What Constitutes an Act of War in Cyberspace? 

      Dragoo, Holly M. (Georgia Institute of Technology, 2017-11-17)
      Is cyberspace merely another domain for 21st Century kinetic battles to operate in, or does it merit special consideration and unique rules of engagement? In this talk, Holly Dragoo will explore the challenges of why it’s ...
    • What do CISOS Do All Day? 

      Perullo, Jerry (Georgia Institute of Technology, 2018-02-02)
    • When Push comes to Ads: Measuring the Rise of (Malicious) Push Advertising 

      Subramani, Karthika (Georgia Institute of Technology, 2020-10-30)
      The rapid growth of online advertising has fueled the growth of ad-blocking software, such as new ad-blocking and privacy-oriented browsers or browser extensions. In response, both ad publishers and ad networks are constantly ...
    • Why Memory Corruption is Hard 

      Payer, Mathias (Georgia Institute of Technology, 2017-09-08)
      Memory corruption has plagued systems since the dawn of computing. With the rise of defense techniques (such as stack cookies, ASLR, and DEP), attacks have become much more complicated, yet control-flow hijack attacks are ...
    • Zero Knowledge for Everything and Everyone 

      Heath, David (Georgia Institute of Technology, 2021-02-05)
      Zero-Knowledge (ZK) Proofs are important cryptographic objects that allow an untrusted prover to demonstrate to an untrusted verifier the truth of some statement while revealing nothing additional. ZK can potentially be ...