Search for tag: "cybersecurity"

Joseph Jaeger - Bridging the Theory and Practice of Cryptography

Cryptography is deployed at scale to protect data, both in transit and at rest. However, protocols are often designed or even deployed aiming for security that extends beyond what is formally…

From  Katie Gentilello on October 12th, 2021 10 plays 0  

William Robertson - How I Learned to Stop Worrying and Love the Bug

Software bugs underlie many security vulnerabilities, and have proven impossible to eradicate in practical settings. Indeed, new bugs and classes of bugs are found all the time, and one can safely…

From  Katie Gentilello on October 9th, 2021 12 plays 0  

Todd McClelland - Cyber on Trial: An Insider's View of the Legal Fallout from Cybersecurity Issues in the Corporate Enterprise

The recent rise in cybersecurity breaches, geopolitical cyber events, and resulting legal developments have placed the spotlight on the cybersecurity professional and their role in the corporate…

From  Katie Gentilello on September 29th, 2021 3 plays 0  

Georgia Tech Cybersecurity and Privacy Roundtable Event with RK Sehgal

From  Katie Gentilello on August 27th, 2021 3 plays 0  

Kevin Hutto - Sensing with Random Encoding for Enhanced Security in Embedded Systems

Embedded systems in physically insecure environments are subject to additional security risk via capture by an adversary. A captured microchip device can be reverse engineered to recover internal…

From  Katie Gentilello on May 7th, 2021 64 plays 0  

Kennon Bittick - Function Equivalence with Symbolic Execution

Summarizing and comparing basic blocks or functions across different binaries or between binary and source code has many applications for program verification including verifying compilation, source…

From  Katie Gentilello on May 6th, 2021 13 plays 0  

The Cyber Gym: Safely and Cost-Effectively Developing Cybersecurity Skills

The Cyber Gym: Safely and Cost-Effectively Developing Cybersecurity Skills Sandra Leiterman and Philip Huff The cyber gym, soon to be released as open-source, provides a hands-on Google cloud…

From  Blair Banks on April 21st, 2021 2 plays 0  

Elie Khoury - Voice Biometrics and Emerging Security Threats in the Voice Channel

Voice Biometrics is the automated recognition of individuals based on their voice characteristics that are both biological and behavioral. Voice Biometrics is currently deployed in many real world…

From  Katie Gentilello on April 9th, 2021 21 plays 0  

Tianxin Tang - Provably-Secure Approximate k-NN Search Protocol

This talk examines the problem of privacy-preserving approximate kNN search in an outsourced environment — the client sends the encrypted data to an untrusted server and later can perform…

From  Katie Gentilello on April 1st, 2021 24 plays 0  

Ambrose Kam - Applying Deep Reinforcement Learning (DRL) in a Cyber Wargaming Engine

Cybersecurity is inherently complicated due to the dynamic nature of the threats and ever-expanding attack surfaces. Ironically, this challenge is exacerbated by the rapid advancement of many new…

From  Katie Gentilello on April 1st, 2021 27 plays 0  

Hany Farid - Creating, Weaponizing, and Detecting Deep Fakes

The past few years have seen a startling and troubling rise in the fake-news phenomena in which everyone from individuals to nation-sponsored entities can produce and distribute misinformation. The…

From  Katie Gentilello on March 30th, 2021 22 plays 0  

Harri Hursti - War By Other Means

From  Katie Gentilello on March 11th, 2021 19 plays 0  

Yuliia Lut - Recent Insights from Analysis of Users' Web Browsing Behavior

Accurately analyzing and modeling online browsing behavior plays a key role in understanding users and technology interactions. Specifically, understanding whether users have correct perceptions of…

From  Katie Gentilello on March 3rd, 2021 16 plays 0  

Beliz Kaleli - To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media

To make their services more user friendly, online social media platforms automatically identify text that corresponds to URLs and render it as clickable links. In this paper, we show that the…

From  Katie Gentilello on February 21st, 2021 10 plays 0