Search for tag: "information."

Josiah Dykstra - Invisible Security: Protecting Users with No Time to Spare

For over 50 years, the cybersecurity community has sought to protect vulnerable systems and users from victimization. Despite ongoing and valiant work at adoption and usability, some users cannot or…

From  Katie Gentilello 3 plays 0  

Nadiya Kostyuk - Deterrence in the Cyber Realm: Public versus Private Cyber Capacity

Can cyber deterrence work? Existing scholarly works argue that deterrence by punishment using cyberattacks is ineffective because the difficulty of attributing the origin of cyberattacks makes the…

From  Katie Gentilello 13 plays 0  

Jonathan Fuller, Carter Yagemann, Sena Sahin - GT Cybersecurty Students Preview Research Appearing at ACM Computer and Communications Security Conference (CCS)

Jonathan Fuller, c3pO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration Current techniques to monitor botnets towards disruption or takedown are…

From  Katie Gentilello 15 plays 0  

Chris Rouland - A Random Walk Through 1,000,000 Things

From  Katie Gentilello 3 plays 0  

Joseph Jaeger - Bridging the Theory and Practice of Cryptography

Cryptography is deployed at scale to protect data, both in transit and at rest. However, protocols are often designed or even deployed aiming for security that extends beyond what is formally…

From  Katie Gentilello 32 plays 0  

William Robertson - How I Learned to Stop Worrying and Love the Bug

Software bugs underlie many security vulnerabilities, and have proven impossible to eradicate in practical settings. Indeed, new bugs and classes of bugs are found all the time, and one can safely…

From  Katie Gentilello 15 plays 0  

Neil Gong - Secure Federated Learning

From  Katie Gentilello 21 plays 0  

Kevin Hutto - Sensing with Random Encoding for Enhanced Security in Embedded Systems

Embedded systems in physically insecure environments are subject to additional security risk via capture by an adversary. A captured microchip device can be reverse engineered to recover internal…

From  Katie Gentilello 67 plays 0  

Kennon Bittick - Function Equivalence with Symbolic Execution

Summarizing and comparing basic blocks or functions across different binaries or between binary and source code has many applications for program verification including verifying compilation, source…

From  Katie Gentilello 15 plays 0  

Elie Khoury - Voice Biometrics and Emerging Security Threats in the Voice Channel

Voice Biometrics is the automated recognition of individuals based on their voice characteristics that are both biological and behavioral. Voice Biometrics is currently deployed in many real world…

From  Katie Gentilello 23 plays 0  

Tianxin Tang - Provably-Secure Approximate k-NN Search Protocol

This talk examines the problem of privacy-preserving approximate kNN search in an outsourced environment — the client sends the encrypted data to an untrusted server and later can perform…

From  Katie Gentilello 30 plays 0  

Ambrose Kam - Applying Deep Reinforcement Learning (DRL) in a Cyber Wargaming Engine

Cybersecurity is inherently complicated due to the dynamic nature of the threats and ever-expanding attack surfaces. Ironically, this challenge is exacerbated by the rapid advancement of many new…

From  Katie Gentilello 29 plays 0  

Hany Farid - Creating, Weaponizing, and Detecting Deep Fakes

The past few years have seen a startling and troubling rise in the fake-news phenomena in which everyone from individuals to nation-sponsored entities can produce and distribute misinformation. The…

From  Katie Gentilello 24 plays 0  

Yuliia Lut - Recent Insights from Analysis of Users' Web Browsing Behavior

Accurately analyzing and modeling online browsing behavior plays a key role in understanding users and technology interactions. Specifically, understanding whether users have correct perceptions of…

From  Katie Gentilello 18 plays 0  

Beliz Kaleli - To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media

To make their services more user friendly, online social media platforms automatically identify text that corresponds to URLs and render it as clickable links. In this paper, we show that the…

From  Katie Gentilello 11 plays 0  

Phani Vadrevu - What You See is NOT What You Get: Discovering and Tracking Ad-driven Social Engineering Attack Campaigns

From  Katie Gentilello 12 plays 0