Search for tag: "school of cybersecurity"

Josiah Dykstra - Invisible Security: Protecting Users with No Time to Spare

For over 50 years, the cybersecurity community has sought to protect vulnerable systems and users from victimization. Despite ongoing and valiant work at adoption and usability, some users cannot or…

From  Katie Gentilello 22 plays 0  

Nadiya Kostyuk - Deterrence in the Cyber Realm: Public versus Private Cyber Capacity

Can cyber deterrence work? Existing scholarly works argue that deterrence by punishment using cyberattacks is ineffective because the difficulty of attributing the origin of cyberattacks makes the…

From  Katie Gentilello 15 plays 0  

Jonathan Fuller, Carter Yagemann, Sena Sahin - GT Cybersecurty Students Preview Research Appearing at ACM Computer and Communications Security Conference (CCS)

Jonathan Fuller, c3pO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration Current techniques to monitor botnets towards disruption or takedown are…

From  Katie Gentilello 17 plays 0  

Chris Rouland - A Random Walk Through 1,000,000 Things

From  Katie Gentilello 3 plays 0  

Joseph Jaeger - Bridging the Theory and Practice of Cryptography

Cryptography is deployed at scale to protect data, both in transit and at rest. However, protocols are often designed or even deployed aiming for security that extends beyond what is formally…

From  Katie Gentilello 43 plays 0  

William Robertson - How I Learned to Stop Worrying and Love the Bug

Software bugs underlie many security vulnerabilities, and have proven impossible to eradicate in practical settings. Indeed, new bugs and classes of bugs are found all the time, and one can safely…

From  Katie Gentilello 15 plays 0  

Zane Ma - Understanding the Trust Relationships of the Web PKI

From  Katie Gentilello 15 plays 0  

Todd McClelland - Cyber on Trial: An Insider's View of the Legal Fallout from Cybersecurity Issues in the Corporate Enterprise

The recent rise in cybersecurity breaches, geopolitical cyber events, and resulting legal developments have placed the spotlight on the cybersecurity professional and their role in the corporate…

From  Katie Gentilello 8 plays 0  

Neil Gong - Secure Federated Learning

From  Katie Gentilello 25 plays 0  

Georgia Tech Cybersecurity and Privacy Roundtable Event with RK Sehgal

From  Katie Gentilello 5 plays 0  

Elie Khoury - Voice Biometrics and Emerging Security Threats in the Voice Channel

Voice Biometrics is the automated recognition of individuals based on their voice characteristics that are both biological and behavioral. Voice Biometrics is currently deployed in many real world…

From  Katie Gentilello 23 plays 0  

Tianxin Tang - Provably-Secure Approximate k-NN Search Protocol

This talk examines the problem of privacy-preserving approximate kNN search in an outsourced environment — the client sends the encrypted data to an untrusted server and later can perform…

From  Katie Gentilello 37 plays 0