Now showing items 105-109 of 109

    • Understanding, Alleviating and Exploiting Electro-Magnetic Side-Channel Signals 

      Prvulovic, Milos (Georgia Institute of Technology, 2016-09-16)
      A side-channel attack is an attack that exploits the low-power electronic signals a device emits even when it’s not connected to the Internet or a network. Such signals can leak sensitive data used in a computational task. ...
    • What Can Social Science Contribute to Cybersecurity Attribution Research? 

      Mueller, Milton (Georgia Institute of Technology, 2017-09-15)
      How can we develop an institutional framework that can facilitate the provision of authoritative public attributions on a global scale? In cybersecurity cases, we want to know not only who did it (i.e., which individuals ...
    • What Constitutes an Act of War in Cyberspace? 

      Dragoo, Holly M. (Georgia Institute of Technology, 2017-11-17)
      Is cyberspace merely another domain for 21st Century kinetic battles to operate in, or does it merit special consideration and unique rules of engagement? In this talk, Holly Dragoo will explore the challenges of why it’s ...
    • What do CISOS Do All Day? 

      Perullo, Jerry (Georgia Institute of Technology, 2018-02-02)
    • Why Memory Corruption is Hard 

      Payer, Mathias (Georgia Institute of Technology, 2017-09-08)
      Memory corruption has plagued systems since the dawn of computing. With the rise of defense techniques (such as stack cookies, ASLR, and DEP), attacks have become much more complicated, yet control-flow hijack attacks are ...