Search for tag: "cybersecurity"

Henry Tong, Larry LaMont - Mobilizing mmWave to Realize the Full 5G Potential

5G NR mmWave opens doors to vast amounts of network capacity, fiber-like speeds and ultra-low latencies that promise to bring new and enhanced experiences to the masses, as well as inherent security…

From  Kathryn Gentilello on November 23rd, 2020 4 plays 0  

Jakub Szefer - Securing FPGA-Accelerated Cloud Infrastructures

Cloud FPGAs have been gaining popularity in recent years due to the ability of users to request FPGA resources quickly, flexibly, and on-demand. However, as public cloud providers make FPGAs…

From  Kathryn Gentilello on November 18th, 2020 4 plays 0  

Karthika Subramani - When Push comes to Ads: Measuring the Rise of (Malicious) Push Advertising

The rapid growth of online advertising has fueled the growth of ad-blocking software, such as new ad-blocking and privacy-oriented browsers or browser extensions. In response, both ad publishers and…

From  Kathryn Gentilello on November 5th, 2020 8 plays 0  

Seyedhamed Ghavamnia - Temporal System Call Specialization for Attack Surface Reduction

Attack surface reduction through the removal of unnecessary application features and code is a promising technique for improving security without incurring any additional overhead. Recent software…

From  Kathryn Gentilello on October 21st, 2020 7 plays 0  

Shachee Mishra - Multi-layer API Specialization for Attack Surface Reduction

Code reuse attacks have been a threat to software security since the introduction of non-executable memory protections. Despite significant advances in various types of additional defenses, such as…

From  Kathryn Gentilello on October 7th, 2020 10 plays 0  

Danny Y. Huang - Watching IoTs that Watch Us

Many consumers today are increasingly concerned about IoT security and privacy. There is much media hype about home cameras being hacked or voice assistants eavesdropping on conversations. However,…

From  Kathryn Gentilello on October 3rd, 2020 8 plays 0  

Brian Kondracki - Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers

Mobile browsers have become one of the main mediators of our online activities. However, as web pages continue to increase in size and streaming media on-the-go has become commonplace, mobile data…

From  Kathryn Gentilello on September 22nd, 2020 14 plays 0  

Kevin Bock - Automating the Discovery of Censorship Evasion Strategies

Researchers and censoring regimes have long engaged in a cat-and-mouse game, leading to increasingly sophisticated censorship techniques and methods to evade them. Unfortunately, censors have long…

From  Kathryn Gentilello on September 18th, 2020 8 plays 0  

Nicholas Weaver - Reflections on Internet Surveillance

Six years ago Edward Snowden leaked a massive trove of internal NSA documents detailing the operation of the US government’s electronic surveillance system. The overall systems described a…

From  Timothy Hynes on April 27th, 2020 81 plays 0  

Wanrong Zhang - Differentially Private Change-point Detection

The change-point detection problem seeks to identify distributional changes in streams of data. Increasingly, tools for change-point detection are applied in settings where data may be highly…

From  Kathryn Gentilello on March 12th, 2020 35 plays 0  

Sharbani Pandit - Fighting Voice Spam with a Virtual Assistant

Telephony has been a trusted channel in the past but technological advances have exposed it to abuse that is perpetrated by fraudsters and criminals. Mass robocalls, call source spoofing and voice…

From  Kathryn Gentilello on February 24th, 2020 30 plays 0  

Michael D. Brown - The Impact of Compiler-Based Performance Optimizations on Security

The security impacts of compiler-based software optimizations are typically not considered during their design and implementation. As a result, a number of well-intentioned compiler optimizations…

From  Kathryn Gentilello on February 17th, 2020 36 plays 0  

Hong Hu - Space Wars: Exploiting Program (in)Variants for Software Security

The ever-increasing code base of modern software inevitably introduces vulnerabilities which enable attackers to construct sophisticated exploits and compromise our computer systems. Control-flow…

From  Kathryn Gentilello on February 6th, 2020 19 plays 0  

Luong Nguyen - Hardware Trojan detection using the backscattering side channel

Integrated circuits (IC) have become an integral aspect of our lives. Thus, the problem of ensuring authenticity and trust for ICs is critically important, especially for sensitive fields such as…

From  Kathryn Gentilello on February 3rd, 2020 11 plays 0