Now showing items 76-95 of 109

    • RAIN: Refinable Attack Investigation with On-demand Inter-process Information Flow Tracking 

      Ji, Yang (Georgia Institute of Technology, 2018-04-18)
      As modern attacks become more stealthy and persistent, detecting or preventing them at their early stages becomes virtually impossible. Instead, an attack investigation or provenance system aims to continuously monitor and ...
    • Reflections on Internet Surveillance 

      Weaver, Nicholas (Georgia Institute of Technology, 2020-03-27)
      Six years ago Edward Snowden leaked a massive trove of internal NSA documents detailing the operation of the US government’s electronic surveillance system. The overall systems described a wide-ranging approach of remarkably ...
    • Revocations Are Dead, Long Live Revocations 

      Levin, David (Georgia Institute of Technology, 2018-01-12)
      The importance of the web’s public key infrastructure (PKI) cannot be overstated: it is what allows users to know with whom they are communicating online. Central to its correct operation is the ability to “revoke” ...
    • RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid 

      Shekari, Tohid (Georgia Institute of Technology, 2019-04-19)
      Recently, the number of cyber threats to power systems has increased at an unprecedented rate. For instance, the widespread blackout in Ukrainian power grid on December 2015 was a wakeup call that modern power systems have ...
    • rtCaptcha 

      Uzun, Erkam (Georgia Institute of Technology, 2018-04-12)
      More organizations are turning to facial and voice recognition, or other biometric identifiers, to authenticate users and grant access to their systems. In particular, some services (e.g. Mastercard Identity Check) allow ...
    • rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System 

      Uzun, Erkam (Georgia Institute of Technology, 2018-03-02)
      Facial/voice-based authentication is becoming increasingly popular (e.g., already adopted by MasterCard and AliPay), because it is easy to use. In particular, users can now authenticate themselves to online services by ...
    • The Scalability of Vulnerability Analysis 

      Bittick, Kennon (Georgia Institute of Technology, 2018-01-26)
      Analyzing software for vulnerabilities is an important capability in ensuring the security of a computing system. As software has become more complex and ubiquitous, however, traditional vulnerability analysis techniques ...
    • Secure Communication Channel Establishment: TLS 1.3 (Over TCP Fast Open) vs. QUIC 

      Boldyreva, Alexandra (Georgia Institute of Technology, 2019-11-01)
      Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of interactions between parties) in ...
    • Secure Data Outsourcing: Access Pattern Confidentiality in Outsourced Databases 

      Degitz, Alexander (Georgia Institute of Technology, 2017-01-13)
      When sensitive data is outsourced to an untrustworthy cloud storage provider, encryption techniques can be used to enforce data confidentiality. Ideally, such encryption techniques should not only enforce the confidentiality ...
    • Securing Network Function Virtualization 

      Yu, Minlan (Georgia Institute of Technology, 2019-11-22)
    • Security along SoC Design Lifecycle: Current Practices and Challenges Ahead 

      Tehranipoor, Mark (Georgia Institute of Technology, 2018-09-07)
      System-on-chip (SoC) security has received significant attention in the past several years due mainly to its prevalence in the internet of things (IoT) devices, cyber-physical systems, and embedded computing systems. ...
    • Security Analytics: Bridging large-scale data collection and analysis with human factors to design better defenses 

      Christin, Nicolas (Georgia Institute of Technology, 2016-08-26)
      In this talk, I will argue that understanding incentives of both attackers and targets has become critical to strengthening online security. I will advocate the need for an interdisciplinary research agenda, ranging from ...
    • Security and Privacy Issues of Modern Web Browsers 

      Nikiforakis, Nick (Georgia Institute of Technology, 2017-09-22)
      The modern web, as users experience it, bears little resemblance to the original world wide web invented by Tim Berners-Lee. Static, stateless, HTML pages with text and the occasional pixelated images gave way to dynamic, ...
    • Security Applications of Bitcoin 

      Pair, Stephen (Georgia Institute of Technology, 2016-02-26)
    • Security Evaluation of Home-Based IoT Deployments 

      Alrawi, Omar (Georgia Institute of Technology, 2019-11-15)
      Home-based IoT devices have a bleak reputation regarding their security practices. On the surface, the insecurities of IoT devices seem to be caused by integration problems that may be addressed by simple measures, but ...
    • SEIVE: Cryptographically Enforced Access Control for User Data in Untrusted Clouds 

      Wang, Frank (Georgia Institute of Technology, 2016-09-30)
      Modern web services rob users of low-level control over cloud storage—a user’s single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. The consequence ...
    • Simulation-Based Cyber Wargaming 

      Kam, Ambrose (Georgia Institute of Technology, 2019-09-27)
      Cyber threats are rampant and their potential damages to enterprises continue to soar over time. Hence, cyber resilience techniques need to be examined and assessed for their effectiveness before deployment. Red Teaming ...
    • Social Cybersecurity 

      Das, Sauvik (Georgia Institute of Technology, 2018-08-31)
      Entering an era of pervasive, connected smart things, our cybersecurity decisions increasingly interfere with our social lives. Yet, little is known of the complex social consequences of our security behaviors, and vice ...
    • Solving the Biggest Problems 

      Sorenson, Joshua C. (Georgia Institute of Technology, 2018-03-30)
      In his lecture, titled "Solving the Biggest Problems", Sorenson will describe kinetic threats and how they are shifting the nature of information security -- both assurance and deterrence -- into a complex new territory.
    • Space Wars: Exploiting Program (in)Variants for Software Security 

      Hu, Hong (Georgia Institute of Technology, 2020-01-31)
      The ever-increasing code base of modern software inevitably introduces vulnerabilities which enable attackers to construct sophisticated exploits and compromise our computer systems. Control-flow hijacking is the ...