Now showing items 16-35 of 130

    • Cloak & Dagger: From Two Android Permissions to Complete Control of the UI Feedback Loop 

      Fratantonio, Yanick (Georgia Institute of Technology, 2017-04-07)
      Although the two Android permissions -- SYSTEM_ALERT_WINDOW and BIND_ACCESSIBILITY_SERVICE -- have been separately abused to create redressing attacks and accessibility attacks, these previous cyberattacks never could ...
    • Convicted by Memory: Recovering Spatial-Temporal Digital Evidence from Memory Images 

      Saltaformaggio, Brendan (Georgia Institute of Technology, 2018-01-19)
      Memory forensics is becoming a crucial capability in modern cyber forensic investigations. In particular, memory forensics can reveal "up to the minute" evidence of a device's usage, often without requiring a suspect's ...
    • Creating, Weaponizing, and Detecting Deep Fakes 

      Farid, Hany (Georgia Institute of Technology, 2021-03-12)
      Forensic DNA analysis has been critical in prosecuting crimes and overturning wrongful convictions. At the same time, other physical and digital forensic identification techniques, used to link a suspect to a crime scene, ...
    • Cyber MayDay: Who Is in Command When Your Business is in the Crosshairs and How Do You Respond? 

      Cross, Stephen; Graves, John Thomas; Lens, John; Mueller, Milton; Pair, Stephen; Sinema, Krysten; Swire, Peter; Worley, Candace (Georgia Institute of Technology, 2017-05-01)
      Rep. Tom Graves (R-Ga. 14), in cooperation with the Georgia Institute of Technology, hosts a conversation for executives and thought leaders in Atlanta about cybersecurity policy and technical challenges that are stifling ...
    • Cyber Science: The Third Frontier 

      Johnson-Bey, Charles (Georgia Institute of Technology, 2019-10-11)
      Over the last several decades Data Security became Information Security which then rolled into Cyber Security. All along this journey cyber has become defined as “Us versus Them”; electronic cyber-attack and cyber-defense ...
    • Cyber Security Analytics 

      Wenchel, Adam (Georgia Institute of Technology, 2016-04-01)
      Adam Wenchel from Capital One leads a discussion about information security in the financial sector -- specifically "cyber data lakes" and the use of machine learning to advance cybersecurity analytics capabilities.
    • Cyber Simulation and Threat Assessment 

      Kam, Ambrose (Georgia Institute of Technology, 2018-10-05)
      Modeling and simulation (M&S) have long been considered a critical element within systems engineering. Up until recently, M&S has not been applied to the cybersecurity domain area. Part of the reason is the maturity of ...
    • Cybersecurity and You - Ready or Not, Here It Is! 

      Corliss, John (Georgia Institute of Technology, 2016-04-15)
      John Corliss from the U.S. Department of Homeland Security leads a discussion about strengthening the security and resilience of cyberspace and federal networks as an important part of the homeland security mission.
    • Cybersecurity Demo Day 2018 Awards 

      Klaus, Christopher; Patton, Blake; Skapentiz, Kevin (Georgia Institute of Technology, 2018-04-12)
      Congratulations to the 2017-2018 Winners! Grand Prize - Create-X Startup LAUNCH incubator seat: "OSS Police", Ashish Bijlani & Ruian Duan, School of Computer Science. 1st Place - Commercialization Track: ...
    • Cybersecurity Demo Day 2018 Introduction 

      Lee, Wenke (Georgia Institute of Technology, 2018-04-12)
      Vetted and coached to enter the marketplace, students presented ideas for commercialization before venture capitalists, industry leaders, and the public at the Institute for Information Security & Privacy's Cybersecurity ...
    • Cybersecurity Demo Day 2019: Awards 

      Farrell, Michael (Georgia Institute of Technology, 2019-04-16)
      A School of Computer Science team won the Institute for Information Security and Privacy’s (IISP) Demo Day Finale for their work on making machine learning (ML) models more secure. The winning project, MLsploit, is a ...
    • Cybersecurity Demo Day 2019: Welcome and Meet the Judges 

      Farrell, Michael; Patton, Blake; Schanz, John; Telljohann, Rich (Georgia Institute of Technology, 2019-04-16)
      The Cybersecurity Demo Day Finale concludes a six-month program that began with 18 student teams who presented their research during the annual IISP Cybersecurity Summit.
    • Cybersecurity Factory 

      Wang, Frank (Georgia Institute of Technology, 2016-03-04)
      Security has become a hot topic given recent hacks of major corporations, like Sony, Home Depot, and Anthem. However, those hacks were easily preventable with the correct technology. The problem is that many times, security ...
    • Data Portability and Cross-Border Data Flows 

      Swire, Peter (Georgia Institute of Technology, 2020-10-09)
    • Defending against Advanced Return-Oriented Programming Attacks 

      Polychronakis, Michalis (Georgia Institute of Technology, 2016-10-21)
    • Defending Organizations in a Fast-Moving Cyber Arms Race 

      Krug, Rob (Georgia Institute of Technology, 2019-02-08)
      This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than just breach detection, ...
    • Developing Secure Products 

      Man, Emil; Rajasekharan, Karun (Georgia Institute of Technology, 2019-02-01)
      [Emil Man] As part of Honeywell’s digitization of our business, we have been working on moving towards distributed computing through microservice architecture deployments. As we also work on moving our software products ...
    • Device Enhanced Authentication: Passwords and Second Factors 

      Shirvanian, Maliheh (Georgia Institute of Technology, 2019-01-11)
      Despite all the advancement in authentication schemes, text-based authentication is perhaps still the most common way of user authentication (e.g., textual passwords or personal identification numbers - PINs). However, ...
    • Differentially private change-point detection 

      Zhang, Wanrong (Georgia Institute of Technology, 2020-03-06)
      The change-point detection problem seeks to identify distributional changes in streams of data. Increasingly, tools for change-point detection are applied in settings where data may be highly sensitive and formal privacy ...
    • The Domestic Benefits of Subversive Foreign Propaganda: The RT (Russia Today) News Network and Geopolitical Muckraking 

      Klein, Hans (Georgia Institute of Technology, 2017-10-20)
      2017’s biggest news story has been Russia’s alleged use of social media to try to influence Western elections. Much criticism is directed towards, the “Russia Today” news network created in 2005 by the Russian ...