Now showing items 41-60 of 128

    • Enterprise Security at Georgia Tech 

      Koza, Kyle (Georgia Institute of Technology, 2018-03-09)
      This discussion will explore the operational security employed for students, faculty, staff and researchers at Georgia Tech as well as strategies and challenges faced by operational security teams inside large enterprises.
    • The Evolution of Modern Malware: Technology Trends and Motivations 

      Smoak, Christopher (Georgia Institute of Technology, 2016-11-04)
      Over the past decade, malware has continued to evolve to adapt to increasing pressure from prevention and detection technologies. Techniques that were relied upon previously are no longer effective, while some persist ...
    • Exposing Cross-Channel Abuse in Converged Communications Infrastructure with Text-Messaging Scams 

      Srinivasan, Bharat (Georgia Institute of Technology, 2017-03-31)
      Recent convergence of the Internet with the telecommunications infrastructure offers malicious actors the ability to craft cross-channel attacks that leverage both telephony and Internet resources. In this talk, we first ...
    • Fault injection as an attack vector against trustworthy embedded systems 

      Schaumont, Patrick (Georgia Institute of Technology, 2016-10-28)
      In the Internet of Things, the cyber-world will use a huge number of small embedded computing elements to control and sense the real world. The integrity and trustworthiness of these embedded systems is crucial; their ...
    • Fighting Voice Spam with a Virtual Assistant 

      Pandit, Sharbani (Georgia Institute of Technology, 2020-02-21)
      Telephony has been a trusted channel in the past but technological advances have exposed it to abuse that is perpetrated by fraudsters and criminals. Mass robocalls, call source spoofing and voice phishing are some of the ...
    • Forward Leaning - Reshaping and Rethinking Cyber R&D 

      Greene, Kevin (Georgia Institute of Technology, 2018-11-30)
      The state of art and the state of practice is not keeping up with today’s cyber challenges, and as a result, adversarial activities are becoming increasingly effective in disrupting mission capabilities. To close the gap ...
    • From the cockpit to cybersecurity: A cyber perspective from the nations first African-American Female Naval Flight Officer 

      Wright, Matice (Georgia Institute of Technology, 2019-02-22)
      Cybersecurity is essential for national security. Ms. Wright is a national security executive at ManTech International Corporation. ManTech is a trusted partner and leading systems integrator for the Department of Defense, ...
    • Grand Cyber Questions and How They Impact Cyber Start-ups 

      Gula, Ron (Georgia Institute of Technology, 2019-03-29)
      Ron will discuss some of the harder questions in cyber we've not come to terms with such as quantifying cyber risk and the government's responsibility for keeping us "cyber safe" and how these grand cyber issues impact ...
    • The Growing Importance of the Non-Code Aspects of Cybersecurity 

      Swire, Peter (Georgia Institute of Technology, 2019-10-04)
      According to the National Initiative for Cybersecurity Education, half of the cybersecurity specialties now involve primarily non-code work. This lecture draws on the "Pedagogic Cybersecurity Framework" published in 2018 ...
    • Hacking Data-Flow for Turing-Complete Attacks 

      Hu, Hong (Georgia Institute of Technology, 2018-02-23)
      Control-flow hijacking attacks from memory errors become more and more difficult as targeted defense mechanisms gain wide deployment. As an alternative, non-control data attacks do not require diverting the application’s ...
    • Hardware Trojan detection using the backscattering side channel 

      Nguyen, Luong N. (Georgia Institute of Technology, 2020-01-24)
      Integrated circuits (IC) have become an integral aspect of our lives. Thus, the problem of ensuring authenticity and trust for ICs is critically important, especially for sensitive fields such as military, finance, and ...
    • Hardware-Based Security and Trust For IoT and Supply Chain Authentication 

      Plusquellic, James F. (Georgia Institute of Technology, 2017-04-21)
      New hardware architectures for Internet-of-Things (IoT) are emerging rapidly in response to con- sumer demands for improved situational awareness, instant access to widely distributed sources of news and information and ...
    • How to Make ASLR Win the Clone Wars: Runtime Re‐Randomization 

      Lu, Kangjie (Georgia Institute of Technology, 2016-02-12)
      Existing techniques for memory randomization such as the widely explored Address Space Layout Randomization (ASLR) perform a single, per‐process randomization that is applied before or at the process’ load‐time. The ...
    • Human Computing for Handling Strong Corruptions in Authenticated Key Exchange 

      Chen, Shan (Georgia Institute of Technology, 2017-03-10)
      Ph.D. Student Shan Chen presents user authentication and key exchange protocols that can tolerate strong corruptions on the client-side. He will define the security model for Human Authenticated Key Exchange (HAKE) protocols ...
    • The Impact of Compiler-Based Performance Optimizations on Security 

      Brown, Michael D. (Georgia Institute of Technology, 2020-02-07)
      The security impacts of compiler-based software optimizations are typically not considered during their design and implementation. As a result, a number of well-intentioned compiler optimizations have been shown to introduce ...
    • The Implications of Privacy-Aware Choice 

      Cummings, Rachel (Georgia Institute of Technology, 2018-10-19)
      Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding privacy can ...
    • Improving End-User Security and Privacy via Physicalized Computing Interfaces 

      Do, Youngwook (Georgia Institute of Technology, 2020-11-06)
    • Improving Security Through Software Debloating 

      Brown, Michael (Georgia Institute of Technology, 2019-03-01)
      As software security breaches continue to increase in frequency and sophistication, there has been an increase in the research and development of new methods for improving software security. One such method that has seen ...
    • The Insider's View of a Data Breach - how policy, forensics, and attribution apply in the real world 

      McClelland, Todd (Georgia Institute of Technology, 2018-11-02)
      Ever wondered what happens behind the scenes when a large company experiences a data breach? How, for example, do forensics and policy teams integrate and collaborate with all the other business roles (e.g., PR, HR, Senior ...
    • Justitia 

      Yagemann, Carter (Georgia Institute of Technology, 2019-04-16)
      Biometric authentication promises user convenience by measuring what makes each of us unique using just a smartphone. The downside includes risks such as criminals impersonating us with stolen data and the pain of having ...