Now showing items 99-118 of 128

    • Security and Privacy Issues of Modern Web Browsers 

      Nikiforakis, Nick (Georgia Institute of Technology, 2017-09-22)
      The modern web, as users experience it, bears little resemblance to the original world wide web invented by Tim Berners-Lee. Static, stateless, HTML pages with text and the occasional pixelated images gave way to dynamic, ...
    • Security Applications of Bitcoin 

      Pair, Stephen (Georgia Institute of Technology, 2016-02-26)
    • Security Evaluation of Home-Based IoT Deployments 

      Alrawi, Omar (Georgia Institute of Technology, 2019-11-15)
      Home-based IoT devices have a bleak reputation regarding their security practices. On the surface, the insecurities of IoT devices seem to be caused by integration problems that may be addressed by simple measures, but ...
    • SEIVE: Cryptographically Enforced Access Control for User Data in Untrusted Clouds 

      Wang, Frank (Georgia Institute of Technology, 2016-09-30)
      Modern web services rob users of low-level control over cloud storage—a user’s single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. The consequence ...
    • Simulation-Based Cyber Wargaming 

      Kam, Ambrose (Georgia Institute of Technology, 2019-09-27)
      Cyber threats are rampant and their potential damages to enterprises continue to soar over time. Hence, cyber resilience techniques need to be examined and assessed for their effectiveness before deployment. Red Teaming ...
    • Social Cybersecurity 

      Das, Sauvik (Georgia Institute of Technology, 2018-08-31)
      Entering an era of pervasive, connected smart things, our cybersecurity decisions increasingly interfere with our social lives. Yet, little is known of the complex social consequences of our security behaviors, and vice ...
    • Solving the Biggest Problems 

      Sorenson, Joshua C. (Georgia Institute of Technology, 2018-03-30)
      In his lecture, titled "Solving the Biggest Problems", Sorenson will describe kinetic threats and how they are shifting the nature of information security -- both assurance and deterrence -- into a complex new territory.
    • Space Wars: Exploiting Program (in)Variants for Software Security 

      Hu, Hong (Georgia Institute of Technology, 2020-01-31)
      The ever-increasing code base of modern software inevitably introduces vulnerabilities which enable attackers to construct sophisticated exploits and compromise our computer systems. Control-flow hijacking is the ...
    • Stopping Fraudsters by Changing Products 

      King, Sam (2019-01-25)
      Lyft’s whole app experience is geared towards getting new users from the App Store or the Play Store to their first ride as quickly as possible. This streamlined process is great for users, but presents an ever-present ...
    • Tackling Cybersecurity Threats in Smart Grids 

      Ahmadi, Majid (Georgia Institute of Technology, 2018-04-12)
      Smart Grid is the next generation of electricity grids that provide a framework for using advanced technologies including telecommunications, distributed energy resources, and energy efficiency solutions. While Smart Grids ...
    • Tagging and Tracking of Multi-level Host Events for Transparent Computing 

      Fazzini, Mattia (Georgia Institute of Technology, 2017-02-24)
      Advanced persistent threats (APTs) are characterized by their abilities to render existing security mechanisms ineffective; for example, APT activities can blend in with normal user and program activities to blindside ...
    • A Tale of Two Tasks: Designing and Validating Secure Software 

      Allen, Shelby (Georgia Institute of Technology, 2019-03-08)
      Secure software development can be categorized into two major tasks: designing secure software and validating secure software. In this talk, we will review both categories as well as some resources helpful for continuous ...
    • Temporal System Call Specialization for Attack Surface Reduction 

      Ghavamnia, Seyedhamed (Georgia Institute of Technology, 2020-10-16)
      Attack surface reduction through the removal of unnecessary application features and code is a promising technique for improving security without incurring any additional overhead. Recent software debloating techniques ...
    • To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media 

      Kaleli, Beliz (Georgia Institute of Technology, 2021-02-12)
      To make their services more user friendly, online so- cial media platforms automatically identify text that corresponds to URLs and render it as clickable links. In this paper, we show that the techniques used by such ...
    • Towards Measuring and Mitigating Social Engineering Software Download Attacks 

      Nelms, Terry L. (Georgia Institute of Technology, 2016-09-02)
      Most modern malware infections happen through the browser, typically as the result of a drive-by or social engineering attack. While there have been numerous studies on measuring and defending against drive-by downloads, ...
    • Towards Measuring the Effectiveness of Telephony Blacklists 

      Pandit, Sharbani (Georgia Institute of Technology, 2018-02-09)
      The convergence of telephony with the Internet has led to numerous new attacks that make use of phone calls to defraud victims. In response to the increasing number of unwanted or fraudulent phone calls, a number of call ...
    • Tracing the Arc of Smartphone Application Security 

      McDaniel, Patrick (Georgia Institute of Technology, 2017-12-01)
      The introduction of smart phones in the mid-2000s forever changed the way users interact with data and computation--and through it prompted a renaissance of digital innovation. Yet, at the same time, the architectures, ...
    • Triaging and Debugging Failures in Deployed Software by Reverse Execution 

      Cui, Weidong (Georgia Institute of Technology, 2018-10-26)
    • Trusting Smart Cities: Risk Factors and Implications 

      Loper, Margaret (Georgia Institute of Technology, 2019-09-06)
      In the coming decades, we will live in a world surrounded by tens of billions of devices that will interoperate and collaborate in an effort to deliver personalized and autonomic services. This paradigm of objects and ...
    • Understanding, Alleviating and Exploiting Electro-Magnetic Side-Channel Signals 

      Prvulovic, Milos (Georgia Institute of Technology, 2016-09-16)
      A side-channel attack is an attack that exploits the low-power electronic signals a device emits even when it’s not connected to the Internet or a network. Such signals can leak sensitive data used in a computational task. ...