Now showing items 8-27 of 109

    • Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA 

      Edgar, Timothy (Georgia Institute of Technology, 2018-10-12)
      Snowden’s leaks of top secret documents prompted companies and individuals to take long overdue steps to make their communications and data more secure. The episode also led to reforms that made government surveillance ...
    • Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX 

      Jang, Yeongjin (Georgia Institute of Technology, 2016-09-23)
      Kernel hardening has been an important topic, as many applications and security mechanisms often consider the kernel their Trusted Computing Base (TCB). Among various hardening techniques, kernel address space layout ...
    • Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud 

      Nelms, Terry (Georgia Institute of Technology, 2017-09-01)
      Robocalling, voice phishing and caller ID spoofing are common cybercrime techniques used to launch scam campaigns through the telephony channel that many people have long trusted. More than 660,000 online complaints regarding ...
    • Caller Authentication Using Mobile Devices 

      Nelms, Terry L. (Georgia Institute of Technology, 2019-04-12)
      Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the caller’s phone number is easily ...
    • Can Data Provenance Put an End to the Data Breach? 

      Bates, Adam (Georgia Institute of Technology, 2019-09-13)
      In a provenance-aware system, mechanisms gather and report metadata that describes the history of each data object being processed, allowing us to understand how objects came to exist in their present state. Excitingly, ...
    • Clash of Cultures: Privacy and the Internet 

      Claypoole, Theodore F. (Georgia Institute of Technology, 2018-03-16)
      U.S./EU fights over new customer privacy regulations (General Data Protection Regulation, or “GDPR”) will headline a multi-front culture war between openness and control, individual rights and state power, and individual ...
    • Cloak & Dagger: From Two Android Permissions to Complete Control of the UI Feedback Loop 

      Fratantonio, Yanick (Georgia Institute of Technology, 2017-04-07)
      Although the two Android permissions -- SYSTEM_ALERT_WINDOW and BIND_ACCESSIBILITY_SERVICE -- have been separately abused to create redressing attacks and accessibility attacks, these previous cyberattacks never could ...
    • Convicted by Memory: Recovering Spatial-Temporal Digital Evidence from Memory Images 

      Saltaformaggio, Brendan (Georgia Institute of Technology, 2018-01-19)
      Memory forensics is becoming a crucial capability in modern cyber forensic investigations. In particular, memory forensics can reveal "up to the minute" evidence of a device's usage, often without requiring a suspect's ...
    • Cyber MayDay: Who Is in Command When Your Business is in the Crosshairs and How Do You Respond? 

      Cross, Stephen; Graves, John Thomas; Lens, John; Mueller, Milton; Pair, Stephen; Sinema, Krysten; Swire, Peter; Worley, Candace (Georgia Institute of Technology, 2017-05-01)
      Rep. Tom Graves (R-Ga. 14), in cooperation with the Georgia Institute of Technology, hosts a conversation for executives and thought leaders in Atlanta about cybersecurity policy and technical challenges that are stifling ...
    • Cyber Science: The Third Frontier 

      Johnson-Bey, Charles (Georgia Institute of Technology, 2019-10-11)
      Over the last several decades Data Security became Information Security which then rolled into Cyber Security. All along this journey cyber has become defined as “Us versus Them”; electronic cyber-attack and cyber-defense ...
    • Cyber Security Analytics 

      Wenchel, Adam (Georgia Institute of Technology, 2016-04-01)
      Adam Wenchel from Capital One leads a discussion about information security in the financial sector -- specifically "cyber data lakes" and the use of machine learning to advance cybersecurity analytics capabilities.
    • Cyber Simulation and Threat Assessment 

      Kam, Ambrose (Georgia Institute of Technology, 2018-10-05)
      Modeling and simulation (M&S) have long been considered a critical element within systems engineering. Up until recently, M&S has not been applied to the cybersecurity domain area. Part of the reason is the maturity of ...
    • Cybersecurity and You - Ready or Not, Here It Is! 

      Corliss, John (Georgia Institute of Technology, 2016-04-15)
      John Corliss from the U.S. Department of Homeland Security leads a discussion about strengthening the security and resilience of cyberspace and federal networks as an important part of the homeland security mission.
    • Cybersecurity Demo Day 2018 Awards 

      Klaus, Christopher; Patton, Blake; Skapentiz, Kevin (Georgia Institute of Technology, 2018-04-12)
      Congratulations to the 2017-2018 Winners! Grand Prize - Create-X Startup LAUNCH incubator seat: "OSS Police", Ashish Bijlani & Ruian Duan, School of Computer Science. 1st Place - Commercialization Track: ...
    • Cybersecurity Demo Day 2018 Introduction 

      Lee, Wenke (Georgia Institute of Technology, 2018-04-12)
      Vetted and coached to enter the marketplace, students presented ideas for commercialization before venture capitalists, industry leaders, and the public at the Institute for Information Security & Privacy's Cybersecurity ...
    • Cybersecurity Demo Day 2019: Awards 

      Farrell, Michael (Georgia Institute of Technology, 2019-04-16)
      A School of Computer Science team won the Institute for Information Security and Privacy’s (IISP) Demo Day Finale for their work on making machine learning (ML) models more secure. The winning project, MLsploit, is a ...
    • Cybersecurity Demo Day 2019: Welcome and Meet the Judges 

      Farrell, Michael; Patton, Blake; Schanz, John; Telljohann, Rich (Georgia Institute of Technology, 2019-04-16)
      The Cybersecurity Demo Day Finale concludes a six-month program that began with 18 student teams who presented their research during the annual IISP Cybersecurity Summit.
    • Cybersecurity Factory 

      Wang, Frank (Georgia Institute of Technology, 2016-03-04)
      Security has become a hot topic given recent hacks of major corporations, like Sony, Home Depot, and Anthem. However, those hacks were easily preventable with the correct technology. The problem is that many times, security ...
    • Defending against Advanced Return-Oriented Programming Attacks 

      Polychronakis, Michalis (Georgia Institute of Technology, 2016-10-21)
    • Defending Organizations in a Fast-Moving Cyber Arms Race 

      Krug, Rob (Georgia Institute of Technology, 2019-02-08)
      This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security architect. Providing more than just breach detection, ...