{"574611":{"#nid":"574611","#data":{"type":"news","title":"Did the Patriot Act Change U.S. Attitudes on Surveillance?","body":[{"value":"\u003Cp\u003EIn the emotional wake of 9\/11, lawmakers pledged new protection with the Patriot Act. Fifteen years later, the law dramatically expanded the government\u0027s ability to gather surveillance, broadened the definition of terrorism and sought to strengthen border security. Peter Swire, associate director of policy for the Institute of Information Security \u0026amp; Privacy, explains what has changed since the law was first enacted.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.nbcnews.com\/storyline\/9-11-anniversary\/did-patriot-act-change-us-attitudes-surveillance-n641586\u0022 target=\u0022_blank\u0022\u003ERead more\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EPeter Swire, associate director of policy for the Institute of Information Security \u0026amp; Privacy, explains how intelligence surveillance of American citizens has changed since Sept. 11, 2001 and the Patriot Act.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Peter Swire, associate director of policy for the Institute of Information Security \u0026 Privacy, explains what has changed since the Patriot Act was enacted."}],"uid":"27490","created_gmt":"2016-09-09 09:35:23","changed_gmt":"2016-10-08 03:22:33","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-09-09T00:00:00-04:00","iso_date":"2016-09-09T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"232191":{"id":"232191","type":"image","title":"Professor Peter Swire","body":null,"created":"1449243627","gmt_created":"2015-12-04 15:40:27","changed":"1475894906","gmt_changed":"2016-10-08 02:48:26","alt":"Professor Peter Swire","file":{"fid":"197584","name":"peterswire.jpg","image_path":"\/sites\/default\/files\/images\/peterswire_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/peterswire_0.jpg","mime":"image\/jpeg","size":1745031,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/peterswire_0.jpg?itok=JZS3Hvxi"}}},"media_ids":["232191"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"169145","name":"information privacy"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"564851":{"#nid":"564851","#data":{"type":"news","title":"Cybersecurity IRI Completes First Year","body":[{"value":"\u003Cp\u003EThe Institute for Information Security \u0026amp; Privacy (IISP) \u2013 Georgia Tech\u2019s eleventh interdisciplinary research institute \u2013 launched in Fall \u201915 and since has leveraged intellectual capital from seven units across Georgia Tech in profound new ways.\u003C\/p\u003E\u003Cblockquote\u003E\u003Ch5\u003E\u003Cem\u003E\u201cWe believe few other universities are tackling cybersecurity research with the breadth and depth of Georgia Tech,\u201d says Wenke Lee, co-director of the IISP and the John P. Imlay Chair II in Software for the School of Computer Science.\u003C\/em\u003E\u003C\/h5\u003E\u003C\/blockquote\u003E\u003Cp\u003EThe inaugural year began by dissecting and defining Georgia Tech\u2019s cybersecurity capacity, then creating new experiences for students, faculty and industry to coalesce around solutions. Astounding truths were revealed: cybersecurity research at Georgia Tech spans six critical thrusts, nine labs, and more than 460 researchers. Cybersecurity no longer is just a computer programmer\u2019s problem; it is an urgent concern for disciplines as diverse as public policy, business, defense and ubiquitous computing.\u003C\/p\u003E\u003Ch5\u003E\u003Cstrong\u003ELegacy in Computer Science\u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003EThe IISP builds upon the successful Georgia Tech Information Security Center (GTISC), that was established in 1998 in the School of Computer Science after the \u003Ca title=\u0022Sam Nunn\u0022 href=\u0022https:\/\/en.wikipedia.org\/wiki\/Sam_Nunn\u0022\u003ESam Nunn\u003C\/a\u003E Information Security Forum. Attendees determined that Georgia Tech\u0027s strengths in technology and policy warranted it to take a leading role in improved security research, education and more reliable computing.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;Ralph Merkle, former director of GTISC, remarked during the early years: \u201cFor the past couple of decades we have put up with buggy code, unreliable computers, insecure computers, and computers that are vulnerable to viruses, worms, spam and other problems. All of this has to change. We need to have reliable computers, systems and networks that we can trust.\u0022\u003C\/p\u003E\u003Cp\u003EThat mission now has evolved beyond the College of Computing to include the Ivan Allen College of Liberal Arts, Scheller College of Business, Georgia Tech Professional Education, Office of Information Technology, and of course the Georgia Tech Research Institute and College of Engineering \u2013 both of which have deep roots in secure information transfer and device design.\u003C\/p\u003E\u003Ch5\u003E\u003Cstrong\u003EMission and Focus\u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003EUnder the IISP, Lee says focus is intently on three areas: research, education and commercialization. Objectives include:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EIncreasing by 50% the volume of cybersecurity research by 2020\u003C\/li\u003E\u003Cli\u003EExpanding pathways into the Master\u2019s of Information Security degree\u003C\/li\u003E\u003Cli\u003EProducing 60 Ph.D. candidates in the next five years\u003C\/li\u003E\u003Cli\u003EDeveloping at least five commercial start-ups from academic or applied research\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EAffiliated faculty of the IISP conducted research projects conservatively valued at $24 million in the past year alone. More than 1,100 individuals attended new events organized by the IISP. Eighteen industry partners were engaged -- global businesses such as British Petroleum, Intel and IBM; Atlanta-based companies, such as Norfolk Southern Railway and The Home Depot, and information security alumni, such as Ionic Security, and Pindrop Security.\u003C\/p\u003E\u003Cp\u003EOne of the most exciting aspects of the IISP\u2019s first year, Lee says, was the success of graduate \u003Cstrong\u003EMusheer Ahmed\u003C\/strong\u003E (Ph.D. CS \u201916). Ahmed\u2019s graduate research, under the advisement of Prof. \u003Cstrong\u003EMustaque Ahamad\u003C\/strong\u003E, led him to win the IISP\u2019s inaugural Demo Day Finale.\u003C\/p\u003E\u003Cp\u003EAhmed and Ahamad have filed a provisional patent for \u201cFraudScope\u201d to help insurers mine healthcare data and calculate risk among a provider pool. They are continuing translational research to develop a solution that addresses growing healthcare fraud and ensures that more healthcare dollars go to patient care. In addition to keen interest from businesses and entrepreneurs across Atlanta, FraudScope has received $400,000 in funding from the prestigious Wallace H. Coulter Foundation and Georgia Research Alliance.\u003C\/p\u003E\u003Cp\u003E\u201cThis work is an example of how Georgia Tech will and should expand its cybersecurity leadership,\u201d says \u003Cstrong\u003EBo Rotoloni\u003C\/strong\u003E, co-director of the IISP and director of GTRI\u2019s Information \u0026amp; Cyber Science Directorate. \u201cIndustry is hungry for solutions and Georgia Tech has them.\u201d\u003C\/p\u003E\u003Ch5\u003E\u003Cstrong\u003ESecond Steps Begin\u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003ELooking ahead, the IISP already has a busy second year in play. It is organizing a two-day cybersecurity symposium in Atlanta with the French Embassy; sending speakers to premier conferences with the Association for Computer Machinery, the Department of Defense and Federal Reserve, and again hosting the popular Georgia Tech Cyber Security Summit. Under Ahamad, who serves as associate director of education and outreach for the IISP, it is assisting development of new professional education offerings, degree expansions, and scholarship opportunities to attract more to the field. Under \u003Cstrong\u003EMichael Farrell\u003C\/strong\u003E, associate director of attribution research for the IISP, the group is preparing large-scale projects that allow Georgia Tech to pioneer new scientific approaches to difficult cybersecurity problems.\u003C\/p\u003E\u003Cp\u003E\u201cAnd that\u2019s just the first quarter of the year,\u201d Lee says. \u201cWe are truly forming into a gateway for faculty, students, scientists, government and industry \u2013 the place for national and international collaboration. It\u2019s exciting.\u201d\u003C\/p\u003E\u003Ch4\u003ESee \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/iisp-completes-first-year\u0022 target=\u0022_blank\u0022\u003Ehighlights\u003C\/a\u003E from the IISP\u0027s first annual report.\u003C\/h4\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Institute for Information Security \u0026amp; Privacy \u2013 Georgia Tech\u2019s eleventh interdisciplinary research institute \u2013 launched in Fall \u201915 and since has leveraged intellectual capital from seven units across Georgia Tech in profound new ways.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Few other universities are tacking cybersecurity research with the breadth and depth of Georgia Tech."}],"uid":"27490","created_gmt":"2016-08-17 22:58:52","changed_gmt":"2016-10-08 03:22:23","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-08-17T00:00:00-04:00","iso_date":"2016-08-17T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"564861":{"id":"564861","type":"image","title":"IISP Faculty and Students Discuss Current Research","body":null,"created":"1471489547","gmt_created":"2016-08-18 03:05:47","changed":"1475895369","gmt_changed":"2016-10-08 02:56:09","alt":"IISP Faculty and Students Discuss Current Research","file":{"fid":"206881","name":"iisp_cyber_research_team_web.jpg","image_path":"\/sites\/default\/files\/images\/iisp_cyber_research_team_web.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/iisp_cyber_research_team_web.jpg","mime":"image\/jpeg","size":423225,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/iisp_cyber_research_team_web.jpg?itok=wLIzBM0-"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}}},"media_ids":["564861","451391"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"10577","name":"Electrical and Computer Engineering; ECE"},{"id":"626","name":"public policy"},{"id":"168019","name":"Scheller"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, \u003Ca href=\u0022mailto:tara.labouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E, 404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"560851":{"#nid":"560851","#data":{"type":"news","title":"CEOs Attend Inaugural Georgia Tech Cybersecurity Leadership Certificate Program presented","body":[{"value":"\u003Cp class=\u0022p1\u0022\u003EThe Georgia Tech Cybersecurity Leadership Certificate Program was presented under the guidance of Admiral James A. Winnefeld, Jr., former Vice Chair of the Joint Chiefs of Staff, retired. This intensive, four-day program addressed cybersecurity risks and the technology, policy, legal, and human dimensions that senior executives need to master to proactively manage, evaluate, and respond to cybersecurity threats. In addition to engaging lectures for Georgia Tech experts, the program also included presentations from industry and government leaders, a tour of a security operations center, and a table top scenario exercise.\u003C\/p\u003E\u003Cp class=\u0022p1\u0022\u003EThe program was made possible by a cyber workforce development collaboration between Georgia Tech Professional Education, the Georgia Tech Research Institute, the Ivan Allen College School of Public Policy, the Institute for Information Security and Privacy, and the Ivan Allen College Sam Nunn School of International Affairs.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp class=\u0022p1\u0022\u003EThe Georgia Tech Cybersecurity Leadership Certificate Program was presented under the guidance of Admiral James A. Winnefeld, Jr., former Vice Chair of the Joint Chiefs of Staff, retired. This intensive, four-day program addressed cybersecurity risks and the technology, policy, legal, and human dimensions that senior executives need to master to proactively manage, evaluate, and respond to cybersecurity threats. In addition to engaging lectures for Georgia Tech experts, the program also included presentations from industry and government leaders, a tour of a security operations center, and a table top scenario exercise.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The Georgia Tech Cybersecurity Leadership Certificate Program was presented under the guidance of Admiral James A. Winnefeld, Jr., former Vice Chair of the Joint Chiefs of Staff, retired."}],"uid":"27751","created_gmt":"2016-08-10 11:39:49","changed_gmt":"2016-10-08 03:22:19","author":"Vince Pedicino","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-08-10T00:00:00-04:00","iso_date":"2016-08-10T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"560831":{"id":"560831","type":"image","title":"GT Nunn School Cybersecurity Leadership Program 2016","body":null,"created":"1470843434","gmt_created":"2016-08-10 15:37:14","changed":"1475895364","gmt_changed":"2016-10-08 02:56:04","alt":"GT Nunn School Cybersecurity Leadership Program 2016","file":{"fid":"218270","name":"cybersecurity_program_group_photo.jpg","image_path":"\/sites\/default\/files\/images\/cybersecurity_program_group_photo.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/cybersecurity_program_group_photo.jpg","mime":"image\/jpeg","size":62416,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cybersecurity_program_group_photo.jpg?itok=e5IfeFgD"}}},"media_ids":["560831"],"groups":[{"id":"1285","name":"Sam Nunn School of International Affairs"}],"categories":[{"id":"133","name":"Special Events and Guest Speakers"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"147","name":"Military Technology"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"851","name":"INTA"},{"id":"10536","name":"Nunn School"},{"id":"13310","name":"Winnefeld"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39481","name":"National Security"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EChris McDermott\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022mailto:chris.mcdermott@inta.gatech.edu\u0022\u003Echris.mcdermott@inta.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":["chris.mcdermott@inta.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"556931":{"#nid":"556931","#data":{"type":"news","title":"Monitoring Side-Channel Signals Could Detect Malicious Software on IoT Devices","body":[{"value":"\u003Cp\u003EA $9.4 million grant from the Defense Advanced Research Projects Agency (DARPA) could lead to development of a new technique for wirelessly monitoring Internet of Things (IoT) devices for malicious software \u2013 without affecting the operation of the ubiquitous but low-power equipment.\u003C\/p\u003E\u003Cp\u003EThe technique will rely on receiving and analyzing side-channel signals, electromagnetic emissions that are produced unintentionally by the electronic devices as they execute programs. These signals are produced by semiconductors, capacitors, power supplies and other components, and can currently be measured up to a half-meter away from operating IoT devices.\u003C\/p\u003E\u003Cp\u003EBy comparing these unintended side-channel emissions to a database of what the devices should be doing when they are operating normally, researchers can tell if malicious software has been installed.\u003C\/p\u003E\u003Cp\u003E\u201cWe will be looking at how the program is changing its behavior,\u201d explained \u003Ca href=\u0022https:\/\/www.ece.gatech.edu\/faculty-staff-directory\/alenka-zajic\u0022\u003EAlenka Zajic\u003C\/a\u003E, the project\u2019s principal investigator and an assistant professor in the \u003Ca href=\u0022http:\/\/www.ece.gatech.edu\/\u0022\u003ESchool of Electrical and Computer Engineering\u003C\/a\u003E at the Georgia Institute of Technology. \u201cIf an Internet of Things device is attacked, the insertion of malware will affect the program that is running, and we can detect that remotely.\u201d\u003C\/p\u003E\u003Cp\u003EThe four-year project will also include two faculty members from Georgia Tech\u0027s \u003Ca href=\u0022http:\/\/www.scs.gatech.edu\/\u0022\u003ESchool of Computer Science\u003C\/a\u003E: Professors \u003Ca href=\u0022http:\/\/www.scs.gatech.edu\/people\/9736\/milos-prvulovics\u0022\u003EMilos Prvulovic\u003C\/a\u003E and \u003Ca href=\u0022http:\/\/www.scs.gatech.edu\/people\/9739\/alessandro-orsos\u0022\u003EAlessandro Orso\u003C\/a\u003E. Also part of the project will be a research team from Northrop-Grumman, headed by Matthew Welborn. Details of an early prototype of the side-channel technique, called \u201cZero-Overhead Profiling\u201d because the monitoring doesn\u0027t affect the system being observed, were presented July 20th at the International Symposium on Software Testing and Analysis (ISSTA).\u003C\/p\u003E\u003Cp\u003EWithin the next four years, an estimated 30 billion IoT devices will be in operation, doing everything from controlling home heating and air conditioning to sensing and managing critical infrastructure. The devices are usually small with limited processor power and memory. Their limited computing capabilities means they can\u2019t run the kinds of malware protection software found on laptop computers, and they cannot use virtualization and other technology to protect the system software even when an application is taken over by an attacker. This means that once attackers compromise the internet-connected application, they typically \u201cown\u201d the entire IoT device and can even make it falsely respond to traditional queries about its own security status.\u003C\/p\u003E\u003Cp\u003E\u0022The main challenge from a security perspective is to make these devices secure so somebody can\u0027t take them over,\u0022 explained Zajic. \u0022There will be a lot of processing power out there that needs to be monitored, but you can\u0027t just put traditional security software on that processor because is doesn\u0027t have enough power for both the security software and the tasks the device is supposed to be doing.\u0022\u003C\/p\u003E\u003Cp\u003EZajic and Prvulovic pioneered research on measuring side-channel signals emitted from devices. These emissions differ from the signals the devices were intended to produce for communicating information across the Internet to other devices. The researchers have already shown that they can pick up the signals close to the devices using specially designed antennas, and one project goal is to extend the range to as much as three meters.\u003C\/p\u003E\u003Cp\u003E\u0022When a processor executes instructions, values are represented as ones and zeroes, which creates a fluctuation in the current,\u0022 Zajic said. \u0022That creates changes in the electromagnetic field we are measuring, providing a pattern for what each part of the program looks like on a spectrum analyzer.\u0022\u003C\/p\u003E\u003Cp\u003EKey to detecting changes in the signals is getting a \u0022before\u0022 recording of what these signals should look like to draw a comparison with an \u0022after\u0022 set of signals for each combination of device and software. The researchers plan to evaluate each IoT device, sampling and recording its typical operation to create a database. To avoid recording overwhelming amounts of data, the system will take periodic samples from different stages of program loops.\u003C\/p\u003E\u003Cp\u003E\u0022If somebody inserts something into the program loop, the peaks in the spectrum will shift and we can detect that,\u0022 Zajic said. \u0022This is something that we can monitor in real time using advanced pattern-matching technology that uses machine learning to improve its performance.\u0022\u003C\/p\u003E\u003Cp\u003EDetecting malware, however, is more of a challenge.\u003C\/p\u003E\u003Cp\u003E\u201cThe technique is currently 95 percent accurate at profiling \u2013 pinpointing the exact point in the IoT program code that is currently executing,\u201d explained Prvulovic. \u201cHowever, detection of malware is a much more difficult problem. Profiling is about identifying which part of the program is the best match for the signal, whereas malware detection is about detecting, with sufficient confidence, that the signal does not match any part of the original program, even when the malware is designed to resemble the original code of the application.\u201d\u003C\/p\u003E\u003Cp\u003EZajic and Prvulovic have been studying a wide range of devices to determine the emissions produced.\u003C\/p\u003E\u003Cp\u003E\u201cWe have more than one source on a circuit board, so we have been trying to localize the sources so we can build an antenna to give us the best possible signal,\u201d said Zajic. \u201cThere are multiple places on the board where you connect to the same information, though it may be modulated at different frequencies.\u201d\u003C\/p\u003E\u003Cp\u003EUltimately, researchers expect the project \u2013 dubbed Computational Activity Monitoring by Externally Leveraging Involuntary Analog Signals (CAMELIA) \u2013 to be capable of monitoring several IoT devices simultaneously. That will require development of advanced processing techniques able to differentiate signals from each device, and new antennas able to pick up the signals from a greater distance.\u003C\/p\u003E\u003Cp\u003ECAMELIA is part of a DARPA program called Leveraging the Analog Domain for Security (LADS), which is investing in six different initiatives to address IoT security. The Georgia Tech-Northrop Grumman project is the only one of the projects led by an academic institution.\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003EThe research is supported by the DARPA LADS program under contract FA8650-16-C-7620. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the sponsoring agency.\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EResearch News\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cstrong\u003EGeorgia Institute of Technology\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cstrong\u003E177 North Avenue\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cstrong\u003EAtlanta, Georgia 30332-0181 USA\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EMedia Relations Contacts\u003C\/strong\u003E: John Toon (404-894-6986) (\u003Ca href=\u0022mailto:jtoon@gatech.edu\u0022\u003Ejtoon@gatech.edu\u003C\/a\u003E) or Ben Brumfield (404-385-1933) (\u003Ca href=\u0022mailto:ben.brumfield@comm.gatech.edu\u0022\u003Eben.brumfield@comm.gatech.edu\u003C\/a\u003E).\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EWriter:\u003C\/strong\u003E John Toon\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EA $9.4 million grant from the Defense Advanced Research Projects Agency (DARPA) could lead to development of a new technique for wirelessly monitoring Internet of Things (IoT) devices for malicious software \u2013 without affecting the operation of the ubiquitous but low-power equipment.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"DARPA awards $9.4 million to develop a new technique for monitoring IoT devices."}],"uid":"27303","created_gmt":"2016-07-31 19:19:16","changed_gmt":"2016-10-08 03:22:12","author":"John Toon","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-08-01T00:00:00-04:00","iso_date":"2016-08-01T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"556881":{"id":"556881","type":"image","title":"Measuring side-channel emissions","body":null,"created":"1470006053","gmt_created":"2016-07-31 23:00:53","changed":"1475895355","gmt_changed":"2016-10-08 02:55:55","alt":"Measuring side-channel emissions","file":{"fid":"206645","name":"side-channel15.jpg","image_path":"\/sites\/default\/files\/images\/side-channel15.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/side-channel15.jpg","mime":"image\/jpeg","size":1139465,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/side-channel15.jpg?itok=nGL7Gyp_"}},"556891":{"id":"556891","type":"image","title":"Measuring side-channel emissions2","body":null,"created":"1470006138","gmt_created":"2016-07-31 23:02:18","changed":"1475895355","gmt_changed":"2016-10-08 02:55:55","alt":"Measuring side-channel emissions2","file":{"fid":"206646","name":"side-channel18.jpg","image_path":"\/sites\/default\/files\/images\/side-channel18.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/side-channel18.jpg","mime":"image\/jpeg","size":1004709,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/side-channel18.jpg?itok=lFWMQvV8"}},"556901":{"id":"556901","type":"image","title":"Systematic side-channel measurement","body":null,"created":"1470006254","gmt_created":"2016-07-31 23:04:14","changed":"1475895355","gmt_changed":"2016-10-08 02:55:55","alt":"Systematic side-channel measurement","file":{"fid":"206647","name":"side-channel12.jpg","image_path":"\/sites\/default\/files\/images\/side-channel12.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/side-channel12.jpg","mime":"image\/jpeg","size":1480456,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/side-channel12.jpg?itok=HZjMG6fa"}},"556911":{"id":"556911","type":"image","title":"Signal outputs from electronic devices","body":null,"created":"1470006358","gmt_created":"2016-07-31 23:05:58","changed":"1475895355","gmt_changed":"2016-10-08 02:55:55","alt":"Signal outputs from electronic devices","file":{"fid":"206648","name":"side-channel13.jpg","image_path":"\/sites\/default\/files\/images\/side-channel13.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/side-channel13.jpg","mime":"image\/jpeg","size":1866503,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/side-channel13.jpg?itok=glNR8iMJ"}},"556921":{"id":"556921","type":"image","title":"Studying side-channel signals","body":null,"created":"1470006479","gmt_created":"2016-07-31 23:07:59","changed":"1475895358","gmt_changed":"2016-10-08 02:55:58","alt":"Studying side-channel signals","file":{"fid":"206649","name":"side-channel1.jpg","image_path":"\/sites\/default\/files\/images\/side-channel1.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/side-channel1.jpg","mime":"image\/jpeg","size":1736216,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/side-channel1.jpg?itok=0SMAwa6c"}}},"media_ids":["556881","556891","556901","556911","556921"],"groups":[{"id":"1188","name":"Research Horizons"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"}],"keywords":[{"id":"11173","name":"Alenka Zajic"},{"id":"64421","name":"Internet-of-Things"},{"id":"97401","name":"IoT"},{"id":"172220","name":"malicious"},{"id":"7772","name":"malware"},{"id":"168627","name":"side-channel"},{"id":"169696","name":"side-channel signal"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39451","name":"Electronics and Nanotechnology"},{"id":"39481","name":"National Security"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJohn Toon\u003C\/p\u003E\u003Cp\u003EResearch News\u003C\/p\u003E\u003Cp\u003E(404) 894-6986\u003C\/p\u003E","format":"limited_html"}],"email":["jtoon@gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"551021":{"#nid":"551021","#data":{"type":"news","title":"Minding Your Business: Cybersecurity in Georgia","body":[{"value":"\u003Cp\u003EA growing number of Georgia companies are devoted to preventing and containing damage from data breaches at businesses and government agencies. The information security industry, known as info-sec, is fueled by research at Georgia Tech, a cluster of well-funded start-ups from alumni and entrepreneurs, and concentration of the Army\u0027s Cyber Command at Fort Gordon.\u0026nbsp;\u003Cstrong\u003EDr. Wenke Lee\u003C\/strong\u003E describes the components of this \u0022perfect storm\u0022 for \u003Cem\u003EGeorgia Trend\u003C\/em\u003E magazine.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.georgiatrend.com\/July-2016\/Minding-Your-Business\/\u0022 target=\u0022_blank\u0022\u003ERead More\u003C\/a\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":[{"value":"Information security industry is booming in Georgia, fueled by startups and Army Cyber Command"}],"field_summary":[{"value":"\u003Cp\u003EA growing number of Georgia companies are devoted to preventing and containing damage from data breaches at businesses and government agencies. The information security industry, known as info-sec, is fueled by research at Georgia Tech, a cluster of well-funded start-ups from alumni and entrepreneurs, and concentration of the Army\u0027s Cyber Command at Fort Gordon.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"A growing number of Georgia organizations are devoted to preventing cyberattacks, with Georgia Tech faculty, students and alumni driving this growth as threats increase."}],"uid":"27490","created_gmt":"2016-07-06 17:08:12","changed_gmt":"2016-10-08 03:22:04","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-07-01T00:00:00-04:00","iso_date":"2016-07-01T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"551031":{"id":"551031","type":"image","title":"Photo Credit: JenniferStalcup.com","body":null,"created":"1467982834","gmt_created":"2016-07-08 13:00:34","changed":"1475895348","gmt_changed":"2016-10-08 02:55:48","alt":"Photo Credit: JenniferStalcup.com","file":{"fid":"93167","name":"26_cyberopener-96e939fe.jpg","image_path":"\/sites\/default\/files\/images\/26_cyberopener-96e939fe.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/26_cyberopener-96e939fe.jpg","mime":"image\/jpeg","size":21557,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/26_cyberopener-96e939fe.jpg?itok=BMzKTx-m"}}},"media_ids":["551031"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"2678","name":"information security"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39481","name":"National Security"},{"id":"39501","name":"People and Technology"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"546651":{"#nid":"546651","#data":{"type":"news","title":"Standardizing Communications for the Internet of Things","body":[{"value":"\u003Cp\u003EThe fast-growing Internet of Things (IoT) consists of millions of sensing devices in buildings, vehicles and elsewhere that deliver reams of data online. Yet this far-flung phenomenon involves so many different kinds of data, sources and communication modes that its myriad information streams can be onerous to acquire and process.\u003C\/p\u003E\u003Cp\u003EResearchers at the Georgia Tech Research Institute (GTRI) have developed a flexible, generic data-fusion software that simplifies interacting with sensor networks. Known as FUSE, it provides a framework to standardize the diverse IoT world. Its application programming interface (API) lets users capture, store, annotate and transform any data coming from Internet-connected sources.\u003C\/p\u003E\u003Cp\u003E\u201cThe Internet of Things has always been something of a Tower of Babel, because it gathers data from everywhere \u2013 from the latest smart-building microcontrollers and driver-assist vehicles to legacy sensors installed for years,\u201d said Heyward Adams, a GTRI research scientist who is leading the FUSE project. \u201cTraditionally, people wanting to utilize IoT information have had to examine the attributes of each individual sensor and then write custom software on an ad-hoc basis to handle it.\u201d\u003C\/p\u003E\u003Cp\u003EBefore FUSE, Adams said, a typical IoT task could require several manual steps. For example, users would acquire data from the Internet by manually finding and setting up the proper communication protocols. Then each data value would have to be assigned to a supporting database. Finally, the user would need to process the data, via approaches such as arithmetic manipulation or statistical evaluation, before it could be fed into a decision algorithm.\u003C\/p\u003E\u003Cp\u003E\u201cFUSE lets us take a task that used to involve a week or two, and complete it in 10 or 15 minutes,\u201d he said. \u201cIt provides a standard way of communicating in the unstandardized world of IoT.\u201d\u003C\/p\u003E\u003Cp\u003EAdams explained that the technical challenges in creating an Internet of Things framework include not just receiving and transmitting sensor data that use different communication protocols and modalities, but also digesting and processing a variety of data encodings and formats. One particular challenge involves dealing with timing differences between incoming data sources.\u003C\/p\u003E\u003Cp\u003ETo build their framework, the GTRI team developed advanced algorithms for handling the many different source types, communication modes and data types coming in over the internet. They also devised methods for managing interactions among data sources that use varying and unpredictable data rates.\u003C\/p\u003E\u003Cp\u003EThe result was FUSE, with capabilities that include:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EProviding users with online forms that let them define the sources they need in the form of \u201cdomains\u201d \u2013 abstract descriptions of how the targeted data interrelate;\u003C\/li\u003E\u003Cli\u003EGathering incoming raw data according to user specifications and mapping them into the specified domains. The data can then be transformed and manipulated using \u201ctasks,\u201d which are user-defined JavaScript functions or legacy software that run inside the FUSE service;\u003C\/li\u003E\u003Cli\u003EDisplaying the processed data to users on-screen via an interactive data visualization, exploration and analysis dashboard that supports most data types including numeric, logical, and text data. Users can also devise their own custom dashboards or other interfaces.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EFUSE makes extensive use of the generic representational state transfer (REST) data capability. Referred to as RESTful, this widely used Internet standard supports the framework\u2019s ability to receive and transmit divergent data streams.\u003C\/p\u003E\u003Cp\u003EThe FUSE framework is designed to be massively distributable. Using load-balancing techniques, the service can spread IOT workloads across entire computer clusters. Moreover, FUSE can also operate on small and inexpensive microcontrollers of the type increasingly found in buildings and vehicles performing a variety of smart sensing tasks.\u003C\/p\u003E\u003Cp\u003EThe development team has built a transform layer into FUSE that allows the framework to connect to legacy sensors, allowing integration of older devices that utilize diverse hardware and software designs. FUSE currently employs the open-source MongoDB program as its storage database, but GTRI researchers are developing adapters that let the service plug into common databases such as Oracle, MySQL and Microsoft SQL.\u003C\/p\u003E\u003Cp\u003E\u201cOne of the advantages of FUSE is that it can be broken up and distributed to accommodate any sensor and server architecture,\u201d Adams said. \u201cSo it can grow and change as a business, facility or campus changes over time.\u201d\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EResearch News\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cstrong\u003EGeorgia Institute of Technology\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cstrong\u003E177 North Avenue\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cstrong\u003EAtlanta, Georgia 30332-0181 USA\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EMedia Relations Contacts\u003C\/strong\u003E: John Toon (\u003Ca href=\u0022mailto:jtoon@gatech.edu\u0022\u003Ejtoon@gatech.edu\u003C\/a\u003E) (404-894-6986) or Ben Brumfield (\u003Ca href=\u0022mailto:ben.brumfield@comm.gatech.edu\u0022\u003Eben.brumfield@comm.gatech.edu\u003C\/a\u003E) (404-385-1933).\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EWriter\u003C\/strong\u003E: Rick Robinson\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EResearchers have developed a flexible, generic data-fusion software that simplifies interacting with sensor networks known as the Internet of Things. Their FUSE software provides a framework to standardize the diverse IoT world. Its application programming interface (API) lets users capture, store, annotate and transform any data coming from Internet-connected sources.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Researchers have developed a flexible, generic data-fusion software that simplifies interacting with sensor networks known as the Internet of Things."}],"uid":"27303","created_gmt":"2016-06-21 17:00:26","changed_gmt":"2016-10-08 03:21:57","author":"John Toon","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-06-22T00:00:00-04:00","iso_date":"2016-06-22T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"546611":{"id":"546611","type":"image","title":"FUSE and the Internet of Things","body":null,"created":"1466542800","gmt_created":"2016-06-21 21:00:00","changed":"1475895338","gmt_changed":"2016-10-08 02:55:38","alt":"FUSE and the Internet of Things","file":{"fid":"92179","name":"fuse-4597.jpg","image_path":"\/sites\/default\/files\/images\/fuse-4597.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/fuse-4597.jpg","mime":"image\/jpeg","size":1256498,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/fuse-4597.jpg?itok=v5dZtcgf"}},"546621":{"id":"546621","type":"image","title":"FUSE and the Internet of Things2","body":null,"created":"1466542800","gmt_created":"2016-06-21 21:00:00","changed":"1475895338","gmt_changed":"2016-10-08 02:55:38","alt":"FUSE and the Internet of Things2","file":{"fid":"92180","name":"fuse-4604.jpg","image_path":"\/sites\/default\/files\/images\/fuse-4604.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/fuse-4604.jpg","mime":"image\/jpeg","size":1221977,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/fuse-4604.jpg?itok=zsc1nQ2J"}}},"media_ids":["546611","546621"],"groups":[{"id":"1188","name":"Research Horizons"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"143","name":"Digital Media and Entertainment"},{"id":"135","name":"Research"}],"keywords":[{"id":"172147","name":"API"},{"id":"438","name":"data"},{"id":"172148","name":"data-fusion"},{"id":"172149","name":"Heyward Adams"},{"id":"68951","name":"Internet of Things"},{"id":"97401","name":"IoT"},{"id":"169638","name":"sensing"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39431","name":"Data Engineering and Science"},{"id":"39451","name":"Electronics and Nanotechnology"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJohn Toon\u003C\/p\u003E\u003Cp\u003EResearch News\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022mailto:jtoon@gatech.edu\u0022\u003Ejtoon@gatech.edu\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E(404) 894-6986\u003C\/p\u003E","format":"limited_html"}],"email":["jtoon@gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"537711":{"#nid":"537711","#data":{"type":"news","title":"SEISE Tool Uses Semantic Gaps to Detect Website Promotional Attacks","body":[{"value":"\u003Cp\u003EBy detecting semantic inconsistencies in content, researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations. Such attacks use code embedded in highly-ranked sites to drive traffic to sketchy websites selling fake drugs, counterfeit handbags and plagiarized term papers \u2013 or installing drive-by malware.\u003C\/p\u003E\u003Cp\u003EThe new technique, known as Semantic Inconsistency Search (SEISE), uses natural language processing to spot the differences between a compromised site\u2019s expected content and the malicious advertising and promotional code. Using SEISE, the researchers found 11,000 infected sites among non-commercial top-level sponsored .edu, .gov and .mil domains worldwide, and are working to extend the method to other domains.\u003C\/p\u003E\u003Cp\u003EThe research was supported by the U.S. National Science Foundation and Natural Science Foundation of China. It will be described in a presentation May 25, 2016 at the IEEE Symposium on Security and Privacy in San Jose. SEISE was developed by researchers from the Georgia Institute of Technology, Indiana University and Tsinghua University in China.\u003C\/p\u003E\u003Cp\u003E\u201cThe basic idea behind promotional infection is to attack websites that are highly-ranked and to leverage their importance to promote various things, most of them illegal,\u201d explained \u003Ca href=\u0022https:\/\/www.ece.gatech.edu\/faculty-staff-directory\/abdul-r-beyah\u0022\u003ERaheem Beyah\u003C\/a\u003E, who is the Motorola Foundation Professor in Georgia Tech\u2019s \u003Ca href=\u0022http:\/\/www.ece.gatech.edu\/\u0022\u003ESchool of Electrical and Computer Engineering\u003C\/a\u003E. \u201cThe bad content is nested into the prominent site to leverage the traffic of that domain. That gives the attackers a doorway to whatever they are promoting.\u201d\u003C\/p\u003E\u003Cp\u003EEssentially, said Beyah, the attackers are stealing the site\u2019s good name, even if they don\u2019t install malware or otherwise inflict harm on web visitors.\u003C\/p\u003E\u003Cp\u003E\u201cThe attackers essentially become part of the prominent website\u2019s brand and share in the ranking they have,\u201d he added. \u201cIt\u2019s like setting up operations inside a well-known coffee shop chain. The attacker leverages the brand by becoming co-located with it.\u201d\u003C\/p\u003E\u003Cp\u003EThe promotional attacks can be difficult to detect, especially if they don\u2019t contain malicious computer code. But the semantic differences between the host site and the attacker\u2019s code can tip off the SEISE algorithm. Once it has characterized the content expected on a website \u2013 educational information on an .edu page, for example \u2013 the pitches for gambling or inexpensive prescription drugs become obvious.\u003C\/p\u003E\u003Cp\u003E\u201cIf you are visiting the website for a prestigious university, you don\u2019t expect to see information promoting casino gambling,\u201d said Beyah. \u201cIf we expect one thing from the website and see something significantly different, there is a huge semantic gap that we can detect.\u201d\u003C\/p\u003E\u003Cp\u003ESEISE doesn\u2019t have to review an entire site to determine what should be there; it can sample the pages to learn context that makes attacker terms stand out. Because their domain purposes are clear and well established, the researchers began with education and government websites. They now hope to extend the automated approach to commercial and other domains whose intended purposes may be less consistent.\u003C\/p\u003E\u003Cp\u003E\u201cWe are trying to figure out how to get the context right for these domains so we can help companies detect these infections,\u201d Beyah said. \u201cThere\u2019s no reason to believe that the commercial domains are any less attractive to attackers than the non-commercial ones.\u201d\u003C\/p\u003E\u003Cp\u003EBeyah and Georgia Tech Ph.D. student Xiaojing Liao began the work by using Google searches to find sites with known \u201cbad words\u201d denoting illicit products. They then utilized natural language processing to find terms associated with these known bad words, which were then used to train the SEISE before it was sent out to analyze 100,000 domains for the presence of the illicit terms. The approach identified 11,000 infected sites with a false detection rate of just 1.5 percent and coverage of more than 90 percent.\u003C\/p\u003E\u003Cp\u003ESEISE found promotional infections on the websites of top U.S. universities and government agencies, though the problem was truly worldwide, with three percent of .edu and .gov sites infected. Of the infected websites noted, 15 percent were in China and six percent were in the United States.\u003C\/p\u003E\u003Cp\u003ESites are infected using proven attack techniques such as SQL injection, URL redirection and phishing to compromise the credentials of users, Beyah said. Though central websites of the organizations may be secure, pages of individual users and units may be more vulnerable \u2013 and still provide the prestige of the overall domain.\u003C\/p\u003E\u003Cp\u003EExisting techniques for detecting promotional infections rely on examining redirects and following links, or observing how sites change over time. But those techniques aren\u2019t scalable and can\u2019t be automated in the same way as the new semantic gap approach, Beyah said.\u003C\/p\u003E\u003Cp\u003EThe researchers want to share their technique with the larger security community, and are discussing how best to make the algorithm available. \u201cOur study shows that by effective detection of infected sponsored top-level domains (sTLDs), the bar to promotion infections can be substantially raised,\u201d the authors wrote in their paper.\u003C\/p\u003E\u003Cp\u003EAbout those 11,000 compromised webpages? The researchers are attempting to contact the operators of all 11,000 of them to share the bad news. \u201cWe have spent a lot of time contacting those folks and letting them know what we have found,\u201d Beyah said. \u201cWe\u2019re still in the process of doing that because there are so many.\u201d\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003EThis work was supported by the National Science Foundation through Grants CNS-1223477, CNS-1223495 and CNS-1527141 and by the Natural Science Foundation of China through Grant 61472215. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsors.\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EResearch News\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cstrong\u003EGeorgia Institute of Technology\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cstrong\u003E177 North Avenue\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cstrong\u003EAtlanta, Georgia 30332-0181 USA\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EMedia Relations Contact\u003C\/strong\u003Es: John Toon (\u003Ca href=\u0022mailto:jtoon@gatech.edu\u0022\u003Ejtoon@gatech.edu\u003C\/a\u003E) (404-894-6986) or Ben Brumfield (\u003Ca href=\u0022mailto:ben.brumfield@comm.gatech.edu\u0022\u003Eben.brumfield@comm.gatech.edu\u003C\/a\u003E) (404-385-1933).\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EWriter\u003C\/strong\u003E: John Toon\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EBy detecting semantic inconsistencies in content, researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations. Such attacks use code embedded in highly-ranked sites to drive traffic to sketchy websites selling fake drugs, counterfeit handbags and plagiarized term papers \u2013 or installing drive-by malware.\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations."}],"uid":"27303","created_gmt":"2016-05-19 13:19:51","changed_gmt":"2016-10-08 03:21:42","author":"John Toon","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-05-19T00:00:00-04:00","iso_date":"2016-05-19T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"537681":{"id":"537681","type":"image","title":"Researchers with code promoting essays","body":null,"created":"1464282000","gmt_created":"2016-05-26 17:00:00","changed":"1475895324","gmt_changed":"2016-10-08 02:55:24","alt":"Researchers with code promoting essays","file":{"fid":"88892","name":"promo-infection_3289.jpg","image_path":"\/sites\/default\/files\/images\/promo-infection_3289.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/promo-infection_3289.jpg","mime":"image\/jpeg","size":1397524,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/promo-infection_3289.jpg?itok=dN2bR6Zg"}},"537661":{"id":"537661","type":"image","title":"Map of worldwide promotional infections","body":null,"created":"1464282000","gmt_created":"2016-05-26 17:00:00","changed":"1475895324","gmt_changed":"2016-10-08 02:55:24","alt":"Map of worldwide promotional infections","file":{"fid":"88890","name":"geolocation.jpg","image_path":"\/sites\/default\/files\/images\/geolocation.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/geolocation.jpg","mime":"image\/jpeg","size":394283,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/geolocation.jpg?itok=MY6JaVCj"}}},"media_ids":["537681","537661"],"groups":[{"id":"1188","name":"Research Horizons"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"170290","name":"promotional attack"},{"id":"67741","name":"Raheem Beyah"},{"id":"172044","name":"SEISE"},{"id":"170291","name":"semantic gap"},{"id":"172045","name":"semantic inconsistency"},{"id":"110271","name":"website"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"},{"id":"71901","name":"Society and Culture"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJohn Toon\u003C\/p\u003E\u003Cp\u003EResearch News\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022mailto:jtoon@gatech.edu\u0022\u003Ejtoon@gatech.edu\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E(404) 894-6986\u003C\/p\u003E","format":"limited_html"}],"email":["jtoon@gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"535881":{"#nid":"535881","#data":{"type":"news","title":"Georgia Tech to Develop Big Data Protection Protocol for the Cloud","body":[{"value":"\u003Cp\u003EGeorgia Tech researchers have been awarded a $1.19 million grant from the National Science Foundation (NSF) to devise privacy protection protocols for big data cloud computing throughout all phases of data processing.\u003C\/p\u003E\u003Cp\u003EKnown as PrivacyGuard, the project is a first step toward establishing a practical way of ensuring end-to-end privacy for big data computations. To achieve this, researchers at Georgia Tech\u2019s \u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/\u0022 target=\u0022_blank\u0022\u003ECollege of Computing\u003C\/a\u003E are working to develop protocols that split the responsibility for data privacy protection into three areas \u2013 data entry, execution, and output.\u003C\/p\u003E\u003Cp\u003E\u201cOur goals are to develop practical solutions for enabling a \u2018need to know\u2019 privacy model, and to protect private data from any unauthorized or unintended purposes in the big data life cycle,\u201d said School of Computer Science Professor and Lead Principal Investigator \u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/~lingliu\/\u0022 target=\u0022_blank\u0022\u003ELing Liu\u003C\/a\u003E. \u201cBy creating a practical and systematic framework with multiple checkpoints, we increase our opportunities to catch and eliminate threats.\u201d\u003C\/p\u003E\u003Cp\u003ELiu and her colleague on the project, Georgia Tech Professor \u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/~calton\/\u0022 target=\u0022_blank\u0022\u003ECalton Pu\u003C\/a\u003E, are affiliates of the \u003Ca href=\u0022http:\/\/iisp.gatech.edu\u0022 target=\u0022_blank\u0022\u003EInstitute for Information Security and Privacy\u003C\/a\u003E (IISP). The IISP is Georgia Tech\u2019s hub for cybersecurity and data protection research.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe first step in creating end-to-end protection is to develop proper protocols for entering data so that sensitive information cannot be reconstructed from the final output of a big data computation. The second step is to create procedures that ensure data integrity, confidentiality, and availability are maintained during the execution phase while the information is being processed. The third protocol protects the final product of big data computations by preventing malicious users from being able to glean any sensitive information from a database.\u003C\/p\u003E\u003Cp\u003EThe ability to perform efficient big data computations while preserving privacy in the cloud is critical. When these new protocols are in place, new opportunities will emerge for safe and effective data analytics. These opportunities may include healthcare applications that provide personalized medical treatments using an individual\u2019s DNA sequence, or enabling advertisers to create targeted advertisements, without violation of data privacy.\u003C\/p\u003E\u003Cp\u003E\u201cBig data and cloud computing are becoming more and more ubiquitous,\u201d said Liu. \u201cOnce established, PrivacyGuard research will be integrated into Georgia Tech\u2019s big data systems and analytics courses, contributing to the education of a new generation of data scientists that we hope will become privacy compliance advocates.\u201d\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EAbout the Researchers:\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EDr. Ling Liu\u003C\/strong\u003E,\u003Cem\u003E professor, School of Computer Science, College of Computing\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EAn internationally recognized expert, Dr. Ling Liu is a professor in the College of Computing\u2019s School of Computer Science at the Georgia Institute of Technology and an elected IEEE Fellow. She directs the research program in Distributed Data Intensive Systems program examining research issues and technical challenges in building distributed big data systems, ranging from performance, security, privacy, trust to availability. She has published more than 300 international journal and conference articles and served as a program chair for multiple IEEE and ACM conferences and is currently the editor-in-chief of IEEE Transactions on Services Computing. In addition, Dr. Liu has received numerous awards from the Institute of Electrical and Electronics Engineers, the Association for Computing Machinery, and many notable computing organizations. Professor Liu\u0027s current research is primarily sponsored by NSF, IBM, and Intel.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EDr. Calton Pu\u003C\/strong\u003E, \u003Cem\u003EProfessor and\u003C\/em\u003E \u003Cem\u003Ethe John P. Imlay, Jr. Chair in Software, School of Computer Science, and co-director of Center for Experimental Research in Computer Systems\u003C\/em\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ECalton Pu is currently a professor and John P. Imlay, Jr. Chair in Software at the College of Computing at the Georgia Institute of Technology and an elected IEEE fellow. Dr. Pu received his Ph.D. in computer science from the University of Washington. He has worked on several projects in systems and database research and provided many contributions to systems research including program specialization and software feedback. Professor Pu\u0027s recent research has focused on automated system management in clouds, information quality, and Big Data in the Internet-of-Things. Dr. Pu has published more than 70 journal papers and book chapters and an additional 280 conference and refereed workshop papers; he has also served on more than 120 program committees. Dr. Pu\u0027s prior research included government projects for DARPA and NSF. In addition, he has conducted industry research for IBM, Intel, and HP.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EGeorgia Tech researchers have been awarded a $1.19 million grant from the National Science Foundation (NSF) to devise privacy protection protocols for Big Data cloud computations.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech researchers have been awarded a $1.19 million grant from the National Science Foundation (NSF) to devise privacy protection protocols."}],"uid":"30267","created_gmt":"2016-05-11 17:00:16","changed_gmt":"2016-10-08 03:21:39","author":"Devin Young","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-05-11T00:00:00-04:00","iso_date":"2016-05-11T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"535871":{"id":"535871","type":"image","title":"Ling Liu","body":null,"created":"1463497200","gmt_created":"2016-05-17 15:00:00","changed":"1475895322","gmt_changed":"2016-10-08 02:55:22","alt":"Ling Liu","file":{"fid":"88812","name":"lingliu-2016jan.jpg","image_path":"\/sites\/default\/files\/images\/lingliu-2016jan_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/lingliu-2016jan_0.jpg","mime":"image\/jpeg","size":157433,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/lingliu-2016jan_0.jpg?itok=rXOKmIGi"}},"50515":{"id":"50515","type":"image","title":"Calton Pu","body":null,"created":"1449175400","gmt_created":"2015-12-03 20:43:20","changed":"1475894460","gmt_changed":"2016-10-08 02:41:00","alt":"Calton Pu","file":{"fid":"128728","name":"calton-pu.jpg","image_path":"\/sites\/default\/files\/images\/calton-pu_1.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/calton-pu_1.jpg","mime":"image\/jpeg","size":14635,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/calton-pu_1.jpg?itok=Ai2OKf5V"}}},"media_ids":["535871","50515"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EDevin M. Young\u003C\/p\u003E\u003Cp\u003ECommunications Assistant\u003C\/p\u003E","format":"limited_html"}],"email":["devin.young@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"575511":{"#nid":"575511","#data":{"type":"news","title":"Raheem Beyah Named ECE Associate Chair for Strategic Initiatives and Innovation","body":[{"value":"\u003Cp\u003ERaheem Beyah has been appointed as the associate chair for Strategic Initiatives and Innovation in the Georgia Tech School of Electrical and Computer Engineering, effective September 1.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn this new position, Beyah will manage activities associated with the School\u2019s large number of corporate partners and affiliates, support the partnership with the ECE Advisory Board, and will lead strategic initiatives internal and external to the School. He will also work with faculty members to develop and sustain a culture of innovation and entrepreneurship within their groups.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EBeyah joined the ECE faculty in 2011, where he holds the Motorola Foundation Professorship. He\u0026nbsp;leads the Communications Assurance and Performance (CAP) Group and is a member of the Communications Systems Center (CSC) and the Institute for Information Security and Privacy (IISP). Prior to returning to Georgia Tech, Beyah was an assistant professor in the Department of Computer Science at Georgia State University, a research faculty member with the CSC, and a consultant with Andersen Consulting\u2019s (now Accenture) Network Solutions Group. A two-time Georgia Tech ECE alumnus, he earned his M.S. and Ph.D. degrees in 1999 and 2003, respectively. He currently holds the Motorola Foundation Professorship in ECE.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EBeyah\u2019s research interests include network security, network traffic characterization and performance, privacy, and cyber-physical systems security with a focus on critical infrastructure. His group has discovered critical flaws in many power grid devices across the globe, and this work has resulted in the development of security patches for these devices.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EBeyah\u2019s work has been highlighted in many news outlets, including\u003Cem\u003E NSF Science 360 Radio\u003C\/em\u003E, \u003Cem\u003ENetworkWorld\u003C\/em\u003E, and \u003Cem\u003EForbes\u003C\/em\u003E.\u0026nbsp;He is an NSF CAREER Award recipient, was one of 12 junior faculty members selected for DARPA\u2019s 2010 Computer Science Study Panel, and received the inaugural Department of Computer Science Outstanding Performance Award while at Georgia State University. His work has resulted in 114 refereed or invited publications, and he has served as an associate editor or guest editor for several journals in the field.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EBeyah has graduated six Ph.D. students and over 18 M.S. students, and his research group currently consists of five Ph.D. students and two M.S. students.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EHe is currently the chair of ECE\u2019s Computer Systems and Software (CSS) group, and he is leading the formation of ECE\u2019s new proposed M.S. Cyber Security degree.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EBeyah is a member of the Georgia Tech Sloan University Center of Exemplary Mentoring (UCEM) committee and currently serves as director of the Georgia Tech Summer Undergraduate Research Experience (SURE) program. Prior to becoming director of SURE, Beyah regularly served as a graduate student mentor and faculty advisor with the program. He is also a faculty advisor for the Georgia Tech Louis Stokes Alliances for Minority Participation Program and is a regular participant in the Georgia Tech FOCUS Program, an annual graduate student recruitment event that takes place over the Martin Luther King Jr. holiday weekend. Along with two faculty members in the Woodruff School of Mechanical Engineering, Beyah co-founded the Academic and Research Leadership Network (ARLN). Supported by 17 engineering deans and the NSF, the mission of ARLN is to increase the representation of underrepresented groups in the academy.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EBeyah is a member of the University of Pittsburgh\u2019s School of Information Sciences Board of Visitors and a member of MARTA\u2019s Cyber Security Advisory Board. He has contributed to the Atlanta community through activities with Atlanta Public Schools and is a 2014 graduate of Leadership Atlanta, the city\u2019s most prestigious executive leadership program and a 2011 graduate of Leadership Georgia. He is a member of AAAS and ASEE, a lifetime member of NSBE, and a senior member of ACM and IEEE.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EECE Professor Raheem Beyah has been appointed as the associate chair for Strategic Initiatives and Innovation in the Georgia Tech School of Electrical and Computer Engineering, effective September 1.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"ECE Professor Raheem Beyah has been appointed as the associate chair for Strategic Initiatives and Innovation in the Georgia Tech School of Electrical and Computer Engineering, effective September 1."}],"uid":"27241","created_gmt":"2016-09-12 14:08:07","changed_gmt":"2016-10-08 03:22:33","author":"Jackie Nemeth","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-09-27T00:00:00-04:00","iso_date":"2016-09-27T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"509071":{"id":"509071","type":"image","title":"Raheem Beyah","body":null,"created":"1457114400","gmt_created":"2016-03-04 18:00:00","changed":"1475895270","gmt_changed":"2016-10-08 02:54:30","alt":"Raheem Beyah","file":{"fid":"204930","name":"raheembeyah131018ar396_web.jpg","image_path":"\/sites\/default\/files\/images\/raheembeyah131018ar396_web_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/raheembeyah131018ar396_web_0.jpg","mime":"image\/jpeg","size":1412284,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/raheembeyah131018ar396_web_0.jpg?itok=xc6PEVHV"}}},"media_ids":["509071"],"related_links":[{"url":"https:\/\/www.ece.gatech.edu\/faculty-staff-directory\/abdul-r-beyah","title":"Raheem Beyah  "},{"url":"http:\/\/www.ece.gatech.edu","title":"School of Electrical and Computer Engineering"},{"url":"http:\/\/www2.ece.gatech.edu\/cap\/","title":"Communications Assurance and Performance Group"},{"url":"http:\/\/iisp.gatech.edu","title":"Institute for Information Security and Privacy"},{"url":"http:\/\/www.gatech.edu","title":"Georgia Tech"}],"groups":[{"id":"1255","name":"School of Electrical and Computer Engineering"}],"categories":[{"id":"129","name":"Institute and Campus"},{"id":"130","name":"Alumni"},{"id":"132","name":"Institute Leadership"},{"id":"134","name":"Student and Faculty"},{"id":"135","name":"Research"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"145","name":"Engineering"}],"keywords":[{"id":"67761","name":"Communications Assurance and Performance Group"},{"id":"172329","name":"Communications Systems Center"},{"id":"109","name":"Georgia Tech"},{"id":"172330","name":"Georgia Tech Summer Undergraduate Research Experience program"},{"id":"169143","name":"Institute for Information Security and Privacy"},{"id":"67741","name":"Raheem Beyah"},{"id":"166855","name":"School of Electrical and Computer Engineering"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39481","name":"National Security"}],"news_room_topics":[{"id":"106361","name":"Business and Economic Development"},{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJackie Nemeth\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESchool of Electrical and Computer Engineering\u003C\/p\u003E\r\n\r\n\u003Cp\u003E404-894-2906\u003C\/p\u003E\r\n","format":"limited_html"}],"email":["jackie.nemeth@ece.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"524951":{"#nid":"524951","#data":{"type":"news","title":"PhD Student Wins Funding at Inaugural Demo Day Finale","body":[{"value":"\u003Cp\u003EPh.D. student \u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/musheerahmed\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003EMusheer Ahmed\u003C\/strong\u003E\u003C\/a\u003E took home first-place honors and a $3,000 check from the Institute for Information Security \u0026amp; Privacy\u0027s \u0022Demo Day Finale\u0022 for his data mining algorithm called \u0022FraudScope\u0022 that helps detect Medicare fraud.\u003C\/p\u003E\u003Cp\u003EAhmed examined two-years worth of Medicare claims data and found that his algorithm could accurately select which providers would be caught and indicted for healthcare fraud -- validating the technique as a risk predictor without the need for whistleblowers.\u003C\/p\u003E\u003Cp\u003EHe and his faculty advisor, Prof. \u003Cstrong\u003E\u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/people\/mustaque-ahamad\u0022 target=\u0022_blank\u0022\u003EMustaque Ahamad\u003C\/a\u003E\u003C\/strong\u003E, have filed a provisional patent for the research and intend to form a private company. They anticipate that insurance providers and government healthcare programs will be most interested in the tool, which assigns risk scores to healthcare providers who are most likely to file fraudulent claims. He will use the prize money to help develop a software interface.\u003C\/p\u003E\u003Cp\u003EAhmed believes that criminals who file fake medical claims for money are causing healthcare costs to rise for all Americans. In nearly a decade, the FBI\u0027s healthcare fraud team has charged more than 2,300 defendants who collectively falsely billed Medicare more than $7 billion.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u0022If we catch the bad guys, we can lower healthcare costs,\u0022 Ahmed says, who adds that most Americans don\u0027t realize healthcare identity fraud is a much bigger problem -- and harder to correct -- than stolen credit cards.\u003C\/p\u003E\u003Cp\u003EVenture capitalists and business leaders who served as judges at the Demo Day Finale picked Ahmed as the winner from among five student teams.\u003C\/p\u003E\u003Cp\u003EInvesting in quality student work is an easy decision, said judge \u003Ca href=\u0022http:\/\/www.paladincapgroup.com\/people\/paul-conley-phd\/\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003EPaul Conley\u003C\/strong\u003E\u003C\/a\u003E, managing director of the Paladin Capital Group.\u003C\/p\u003E\u003Cp\u003E\u0022We\u0027re able to very efficiently deploy a little bit of capital alongside an entrepreneur, help them develop those ideas,\u0022 he said after the event. \u0022The ones that really achieve some traction or commercial success, we like to really get behind and back them as far as we can take them.\u0022\u003C\/p\u003E\u003Cp\u003EAlso winning a cash prize at the Demo Day Finale was the research project, \u0022Tying Public Key to Person with IDforWeb.\u0022 Graduate students \u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/~yjang37\/\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003EYeongjin Jang\u003C\/strong\u003E\u003C\/a\u003E and \u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/mark-wisneski-a865027\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003EMark Wisneski\u003C\/strong\u003E \u003C\/a\u003E--\u0026nbsp; working with research scientist \u003Ca href=\u0022https:\/\/scholar.google.com\/citations?user=qGeaSCYAAAAJ\u0026amp;hl=en\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003EPak Ho Chung\u003C\/strong\u003E\u003C\/a\u003E -- received $2,000 to continue their work to help make public key infrastructure easier and more intuitive to use. The group aims to explore creative new ways for individuals to record and announce their public key for user-friendly verification.\u003C\/p\u003E\u003Cp\u003EAs for Ahmed, he says he has been interested in healthcare fraud and cybersecurity since he was an undergrad studying computer science at Georgia Tech; it will remain his focus.\u003C\/p\u003E\u003Cp\u003E\u201cI took an information security class the last semester of my degree, and I knew this is what I wanted to do.\u201d\u003C\/p\u003E\u003Cp\u003EHis PhD studies have been entirely focused on the problem of healthcare identity fraud. Now he is about to complete his doctoral degree on May 6 and immediately will turn his attention to developing FraudScope as a business -- right here in Atlanta.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.11alive.com\/money\/investors-green-light-gt-students-anti-fraud-program\/131785548\u0022 target=\u0022_blank\u0022\u003E11Alive News (WXIA-TV Atlanta)\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/news\/students-show-venture-capitalists-their-best-cybersecurity-work\u0022\u003EMore about Demo Day Finale\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":[{"value":"Plans to form company for healthcare fraud detection after graduation"}],"field_summary":[{"value":"\u003Cp\u003EPh.D. student Musheer Ahmed took home first-place honors -- and a $3,000 check -- from the Institute for Information Security \u0026amp; Privacy\u0027s \u0022Demo Day Finale.\u0022 His data mining algorithm, called FraudScope -- produced as part of doctoral dissertation research -- already has accurately detected Medicare fraud.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Musheer Ahmed is the winner of the Inaugural Demo Day Finale by the Institute for Information Security \u0026 Privacy."}],"uid":"27490","created_gmt":"2016-04-14 16:34:15","changed_gmt":"2016-10-08 03:21:21","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-04-14T00:00:00-04:00","iso_date":"2016-04-14T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"524981":{"id":"524981","type":"image","title":"Musheer Ahmed","body":null,"created":"1460995200","gmt_created":"2016-04-18 16:00:00","changed":"1475895296","gmt_changed":"2016-10-08 02:54:56","alt":"Musheer Ahmed","file":{"fid":"205475","name":"musheer_ahmed_fraudscope.jpg","image_path":"\/sites\/default\/files\/images\/musheer_ahmed_fraudscope_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/musheer_ahmed_fraudscope_0.jpg","mime":"image\/jpeg","size":549627,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/musheer_ahmed_fraudscope_0.jpg?itok=E51A1p-F"}},"524961":{"id":"524961","type":"image","title":"Demo Day Finale April 13, 2016","body":null,"created":"1460995200","gmt_created":"2016-04-18 16:00:00","changed":"1475895296","gmt_changed":"2016-10-08 02:54:56","alt":"Demo Day Finale April 13, 2016","file":{"fid":"205474","name":"demo_day_finale_2016.jpg","image_path":"\/sites\/default\/files\/images\/demo_day_finale_2016_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/demo_day_finale_2016_0.jpg","mime":"image\/jpeg","size":461450,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/demo_day_finale_2016_0.jpg?itok=k4jWz8Dd"}}},"media_ids":["524981","524961"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"171922","name":"healthcare fraud"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, 404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":["tara.labouff@iisp.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"524801":{"#nid":"524801","#data":{"type":"news","title":"Raheem Beyah Named Motorola Foundation Professor","body":[{"value":"\u003Cp\u003ERaheem Beyah has been named as the Motorola Foundation Professor in the Georgia Tech School of Electrical and Computer Engineering (ECE), effective March 1. This title was previously held by Ayanna Howard.\u003C\/p\u003E\u003Cp\u003EBeyah joined the ECE faculty in 2011, where he leads the Communications Assurance and Performance (CAP) Group and is a member of the Communications Systems Center (CSC) and the Institute for Information Security and Privacy (IISP). Prior to returning to Georgia Tech, Beyah was an assistant professor in the Department of Computer Science at Georgia State University, a research faculty member with the CSC, and a consultant with Andersen Consulting\u2019s (now Accenture) Network Solutions Group. A two-time Georgia Tech ECE alumnus, he earned both his M.S. and Ph.D. degrees in 1999 and 2003, respectively. \u0026nbsp;\u003C\/p\u003E\u003Cp\u003EBeyah\u2019s research interests include network security, wireless networks, network traffic characterization and performance, privacy, and cyber-physical systems security with a focus on critical infrastructure. His group has discovered critical flaws in many power grid devices across the globe, and this work has resulted in the development of security patches for these devices.\u003C\/p\u003E\u003Cp\u003EBeyah\u2019s work has been highlighted in many news outlets, including \u003Cem\u003ENetworkWorld\u003C\/em\u003E\u0026nbsp;and \u003Cem\u003EForbes\u003C\/em\u003E.\u0026nbsp;He is an NSF CAREER Award recipient, was one of 12 junior faculty members selected for DARPA\u2019s 2010 Computer Science Study Panel, and received the inaugural Department of Computer Science Outstanding Performance Award while at Georgia State University. \u0026nbsp;His work has resulted in 110 refereed or invited publications, and he has served as an associate editor or guest editor for several journals in the field.\u003C\/p\u003E\u003Cp\u003EBeyah has graduated five Ph.D. students and over a dozen M.S. students. His research group currently consists of five Ph.D. students and two M.S. students, and he currently serves as director of the Georgia Tech Summer Undergraduate Research Experience (SURE) program. Prior to becoming director of SURE, Beyah regularly served as a graduate student mentor and faculty advisor with the program. He is also a faculty advisor for the Georgia Tech Louis Stokes Alliances for Minority Participation Program and is a regular participant in the Georgia Tech FOCUS Program, an annual graduate student recruitment event that takes place over the Martin Luther King Jr. holiday weekend.\u003C\/p\u003E\u003Cp\u003EBeyah is a member of the University of Pittsburgh\u2019s School of Information Sciences Board of Visitors. He has contributed to the Atlanta community through activities with Atlanta Public Schools and is a 2014 graduate of Leadership Atlanta, the city\u2019s most prestigious executive leadership program.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003ERaheem Beyah has been named as the Motorola Foundation Professor in the Georgia Tech School of Electrical and Computer Engineering (ECE), effective March 1.\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Raheem Beyah has been named as the Motorola Foundation Professor in the Georgia Tech School of Electrical and Computer Engineering (ECE), effective March 1."}],"uid":"27241","created_gmt":"2016-04-14 13:47:21","changed_gmt":"2016-10-08 03:21:21","author":"Jackie Nemeth","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-04-14T00:00:00-04:00","iso_date":"2016-04-14T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"509071":{"id":"509071","type":"image","title":"Raheem Beyah","body":null,"created":"1457114400","gmt_created":"2016-03-04 18:00:00","changed":"1475895270","gmt_changed":"2016-10-08 02:54:30","alt":"Raheem Beyah","file":{"fid":"204930","name":"raheembeyah131018ar396_web.jpg","image_path":"\/sites\/default\/files\/images\/raheembeyah131018ar396_web_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/raheembeyah131018ar396_web_0.jpg","mime":"image\/jpeg","size":1412284,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/raheembeyah131018ar396_web_0.jpg?itok=xc6PEVHV"}}},"media_ids":["509071"],"related_links":[{"url":"http:\/\/www.ece.gatech.edu\/","title":"School of Electrical and Computer Engineering"},{"url":"http:\/\/www.gatech.edu\/","title":"Georgia Tech"},{"url":"http:\/\/www.iisp.gatech.edu\/","title":"Institute for Information Security and Privacy"},{"url":"https:\/\/www.ece.gatech.edu\/faculty-staff-directory\/abdul-r-beyah","title":"A. Raheem Beyah"},{"url":"http:\/\/www2.ece.gatech.edu\/cap\/","title":"Communications Assurance and Performance Group"}],"groups":[{"id":"1255","name":"School of Electrical and Computer Engineering"}],"categories":[{"id":"130","name":"Alumni"},{"id":"129","name":"Institute and Campus"},{"id":"134","name":"Student and Faculty"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"145","name":"Engineering"},{"id":"135","name":"Research"}],"keywords":[{"id":"67761","name":"Communications Assurance and Performance Group"},{"id":"1506","name":"faculty"},{"id":"109","name":"Georgia Tech"},{"id":"169143","name":"Institute for Information Security and Privacy"},{"id":"67741","name":"Raheem Beyah"},{"id":"166855","name":"School of Electrical and Computer Engineering"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJackie Nemeth\u003C\/p\u003E\u003Cp\u003ESchool of Electrical and Computer Engineering\u003C\/p\u003E\u003Cp\u003E404-894-2906\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"email":["jackie.nemeth@ece.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"524541":{"#nid":"524541","#data":{"type":"news","title":"Obama Names Ant\u00f3n to Commission on Enhancing National Cybersecurity","body":[{"value":"\u003Cp\u003EPresident Barack Obama has selected Georgia Tech School of Interactive Computing Chair and Professor Ana (Annie) Ant\u00f3n to serve as one of 12 members of the Commission on Enhancing National Cybersecurity. The bipartisan commission, created by presidential executive order on Feb. 9, 2016, is part of the Cybersecurity National Action Plan.\u003C\/p\u003E\u003Cp\u003EAccording to the executive order, the Commission \u201cwill make detailed recommendations to strengthen cybersecurity in both the public and private sectors while protecting privacy, ensuring public safety and economic and national security, fostering discovery and development of new technical solutions, and bolstering partnerships between federal, state and local government and the private sector in the development, promotion and use of cybersecurity technologies, policies and best practices. The Commission\u0027s recommendations should address actions that can be taken over the next decade to accomplish these goals.\u201d\u003C\/p\u003E\u003Cp\u003EThe Commission will be led by Chair Tom Donilon, former National Security Advisor to President Obama, and Vice Chair Sam Palmisano, former CEO of IBM. The commission will submit its final report to President Obama on Dec. 1, 2016.\u003C\/p\u003E\u003Cp\u003E\u201cIt is an honor to be asked to serve on the Commission,\u201d said Ant\u00f3n, now in her fourth year at Georgia Tech. \u201cI look forward to working with the other members to address ways in which our nation can leverage technological advances to enhance cybersecurity while preserving privacy.\u201d\u003C\/p\u003E\u003Cp\u003EAnt\u00f3n, who is an expert on software compliance with federal privacy and security regulations, is a professor and chair of the School of Interactive Computing at Georgia Tech. She holds additional appointments in both the School of Computer Science and the Scheller College of Business. Before joining Georgia Tech, she was a professor of computer science at North Carolina State University, where she is now an adjunct professor. Ant\u00f3n has been a leader in privacy and cybersecurity since the late 1990s. She is an ACM Distinguished Scientist and Senior Member of IEEE.\u003Cbr \/\u003E\u003Cbr \/\u003EAnt\u00f3n has written more than 80 peer-reviewed technical papers, and testified before Congress as well as the Privacy and Civil Liberties Oversight Board. She has served on a number of privacy and security advisory boards, including for the U.S. Department of Homeland Security and the National Institutes of Standards and Technologies.\u003C\/p\u003E\u003Cp\u003E\u201cProfessor Ant\u00f3n has a wealth of experience in cybersecurity and privacy, and will bring strategic expertise to the important work of the new Commission on Enhancing National Cybersecurity,\u201d said G. P. \u201cBud\u201d Peterson, president of Georgia Tech.\u003Cbr \/\u003E\u003Cbr \/\u003E\u201cWe are thrilled that Professor Anton has been named to this panel,\u201d said Zvi Galil, dean and John P. Imlay Chair of the Georgia Tech College of Computing. \u201cShe is one of the country\u2019s foremost experts on privacy issues, and she will bring that critical perspective to one of the most important security conversations facing the country right now.\u201d\u003C\/p\u003E\u003Cp\u003E\u201cI have charged the Commission on Enhancing National Cybersecurity with the critically-important task of identifying the steps that our nation must take to ensure our cybersecurity in an increasingly digital world,\u201d President Obama said. \u201cThese dedicated individuals bring a wealth of experience and talent to this important role, and I look forward to receiving the Commission\u0027s recommendations.\u201d\u003C\/p\u003E\u003Cp\u003EIn addition to Anton, here are the other members of the Commission:\u003C\/p\u003E\u003Cp\u003EGeneral Keith Alexander, USA (Ret) \u2013 \u0026nbsp;Chairman and CEO of IronNet, and former director of the National Security Agency.\u003C\/p\u003E\u003Cp\u003EAjay Banga \u2013 president and CEO of MasterCard.\u003C\/p\u003E\u003Cp\u003ESteven Chabinsky \u2013 general counsel and chief risk officer for the cybersecurity technology firm CrowdStrike.\u003C\/p\u003E\u003Cp\u003EPatrick Gallagher \u2013 Chancellor and CEO of the University of Pittsburgh.\u003C\/p\u003E\u003Cp\u003EPeter Lee \u2013 corporate vice president of Microsoft Research.\u003C\/p\u003E\u003Cp\u003EHerbert Lin \u2013 Senior Research Scholar for Cyber Policy and Security at the Center for International Security and Cooperation and a Research Fellow at the Hoover Institution, both at Stanford University.\u003C\/p\u003E\u003Cp\u003EHeather Murren \u2013 private investor and member of the Board of Trustees of the Johns Hopkins University and the Johns Hopkins University Applied Physics Laboratory.\u003C\/p\u003E\u003Cp\u003EJoe Sullivan \u2013 chief security officer at Uber.\u003C\/p\u003E\u003Cp\u003EMaggie Wilderotter \u2013 Chief Executive Officer of Frontier Communications from 2004 to 2015, and then Executive Chairman of the company until April 1, 2016.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EPresident Barack Obama has selected Georgia Tech School of Interactive Computing Chair and Professor Ana (Annie) Ant\u00f3n to serve as one of 12 members of the Commission on Enhancing National Cybersecurity. The bipartisan commission, created by presidential executive order on Feb. 9, 2016, is part of the Cybersecurity National Action Plan.\u003C\/p\u003E\u0026nbsp;","format":"limited_html"}],"field_summary_sentence":[{"value":"President Barack Obama has selected Georgia Tech School of Interactive Computing Chair and Professor Ana (Annie) Ant\u00f3n to serve as one of 12 members of the Commission on Enhancing National Cybersecurity."}],"uid":"28797","created_gmt":"2016-04-13 18:03:38","changed_gmt":"2016-10-08 03:21:21","author":"Lance Wallace","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-04-13T00:00:00-04:00","iso_date":"2016-04-13T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"522611":{"id":"522611","type":"image","title":"Annie Ant\u00f3n photo","body":null,"created":"1460134800","gmt_created":"2016-04-08 17:00:00","changed":"1480708522","gmt_changed":"2016-12-02 19:55:22","alt":"","file":{"fid":"205377","name":"annie-anton1.jpg","image_path":"\/sites\/default\/files\/images\/annie-anton1_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/annie-anton1_0.jpg","mime":"image\/jpeg","size":2994372,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/annie-anton1_0.jpg?itok=PwUosnEq"}}},"media_ids":["522611"],"related_links":[{"url":"https:\/\/www.whitehouse.gov\/the-press-office\/2016\/02\/09\/executive-order-commission-enhancing-national-cybersecurity","title":"Executive Order Creating Commission on Enhancing National Cybersecurity"},{"url":"https:\/\/www.whitehouse.gov\/the-press-office\/2016\/02\/09\/fact-sheet-cybersecurity-national-action-plan","title":"Cybersecurity National Action Plan Fact Sheet"}],"groups":[{"id":"1183","name":"Home"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"171920","name":"Ana Anton"},{"id":"27641","name":"annie anton"},{"id":"10132","name":"commission"},{"id":"1404","name":"Cybersecurity"},{"id":"769","name":"President Obama"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ELaura Diamond\u0026nbsp;\u003Cbr \/\u003EMedia Relations\u0026nbsp;\u003Cbr \/\u003E404-894-6016\u003C\/p\u003E\u003Cp\u003E@LauraRDiamond\u003C\/p\u003E","format":"limited_html"}],"email":["laura.diamond@gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"521791":{"#nid":"521791","#data":{"type":"news","title":"FBI Offers iPhone Aid to Local Law Enforcement","body":[{"value":"\u003Cp\u003EThe FBI announced that it had managed to access data on an iPhone used by the San Bernardino shooter, and now other law enforcement officials want the agency to help them unlock phones in their possession. Law enforcement\u2019s attempts to defeat new security features have drawn criticism \u2014 especially if they keep the method to themselves. Georgia Tech\u0027s \u003Cstrong\u003EPeter Swire\u003C\/strong\u003E served on a White House intelligence review group that recommended the administration disclose most flaws to appropriate parties.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.sfgate.com\/business\/article\/FBI-offers-iPhone-aid-to-local-law-enforcement-7226875.php\u0022 target=\u0022_blank\u0022\u003ERead More\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003ELaw enforcement\u2019s attempts to defeat new security features have drawn criticism \u2014 especially if they keep the method to themselves. Georgia Tech\u0027s Peter Swire served on a White House intelligence review group that recommended the administration disclose most flaws to appropriate parties.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Law enforcement agencies are asking the FBI to teach them how to unlock the iPhone, which raises new questions about public dsiclosure of a vulnerability."}],"uid":"27490","created_gmt":"2016-04-05 13:37:33","changed_gmt":"2016-10-08 03:21:17","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-04-04T00:00:00-04:00","iso_date":"2016-04-04T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"232191":{"id":"232191","type":"image","title":"Professor Peter Swire","body":null,"created":"1449243627","gmt_created":"2015-12-04 15:40:27","changed":"1475894906","gmt_changed":"2016-10-08 02:48:26","alt":"Professor Peter Swire","file":{"fid":"197584","name":"peterswire.jpg","image_path":"\/sites\/default\/files\/images\/peterswire_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/peterswire_0.jpg","mime":"image\/jpeg","size":1745031,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/peterswire_0.jpg?itok=JZS3Hvxi"}}},"media_ids":["232191"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"72451","name":"Peter Swire"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"517561":{"#nid":"517561","#data":{"type":"news","title":"Students to Show Venture Capitalists Their Best Cybersecurity Work","body":[{"value":"\u003Cp\u003EA fraud detection system for healthcare claims\u2026 Ways to evaluate safer passwords\u2026. Technical fixes for truly private browsing\u2026 These are some of the ideas proposed by Georgia Tech students who will compete before a national panel of venture capitalists for cash in the inaugural \u201cDemo Day Finale\u201d on April 13.\u003C\/p\u003E\u003Cp\u003EThe event is hosted by the Institute for Information Security \u0026amp; Privacy (IISP) and aims to give students an early introduction to potential investors as they continue their research.\u003C\/p\u003E\u003Cp\u003E\u201cThe hardest part of moving great ideas out to market is finding a trustworthy partner,\u201d says \u003Cstrong\u003EWenke Lee\u003C\/strong\u003E, co-director of the IISP and a professor in the School of Computer Science who has successfully transferred research to private corporations. \u201cIt can be awkward to turn over your hard work to someone at the end of a long project. We hope to introduce students to potential investors earlier in the process to help them consider steps to take that could make their project more appealing to consumers. This is one way we think the Institute for Information Security \u0026amp; Privacy can help move solutions out to individuals who need better identity, data or hardware protection.\u201d\u003C\/p\u003E\u003Cp\u003EFive student teams representing the School of Computer Science and School of Electrical Computing and Engineering are polishing their presentations now to deliver TED-style talks before the elite panel of business leaders from Washington D.C, Philadelphia, and Atlanta. Research with the best chance of commercialization or demonstrating the most impact toward resolving an industry need receives a cash prize \u2013 up to $5,000 this year.\u003C\/p\u003E\u003Cp\u003EInitial cybersecurity research concepts were presented at the inaugural Fall Demo Day, held \u003Ca href=\u0022http:\/\/gtcybersecuritysummit.com\u0022 target=\u0022_blank\u0022\u003EOct. 28 at the Georgia Tech Cyber Security Summit\u003C\/a\u003E, where more than 300 attendees viewed and voted on the best research work from Georgia Tech and GTRI. The top five finalists now advance to the finale. All finalists represent graduate students \u2013 some of whom have been working on their projects for many years.\u003C\/p\u003E\u003Cp\u003E\u201cIt means a great deal for me to know that my research can have a huge positive impact outside of the lab,\u201d says \u003Cstrong\u003EMusheer Ahmed\u003C\/strong\u003E, a graduating PhD student (advised by Professor Mustaque Ahamad) whose patented, data analytics system assigns risk scores to healthcare providers and already has caught the eye of other incubator programs interested in its potential. \u201cAll students strive for this but never know if that will materialize with their work. I hope the momentum will continue and my work can be commercialized.\u201d\u003C\/p\u003E\u003Cp\u003EAnother team \u2013 \u201cIDforWeb\u201d -- hopes to gather validation from the Demo Day judges that they have an easy-to-use platform for secure transactions and communication authentication. IDforWeb seeks to create \u201ckiller apps\u201d that improve public key infrastructure (PKI) with new ease of use.\u003C\/p\u003E\u003Cp\u003E\u201cI\u0027m glad that people believe the 10+ year-old PKI usability problem is an important problem to solve,\u0026nbsp;and agree with us that new technologies like smartphones and\u0026nbsp;blockchains offer some new angle,\u201d said \u003Cstrong\u003EPak Ho Chung\u003C\/strong\u003E, a researcher in the School of Computer Science, referring to the Fall audience that voted them through to the Spring Finale.\u003C\/p\u003E\u003Cp\u003EAll projects that will be presented at Demo Day represent a broad range of solutions for healthcare, e-commerce, application development and more, says \u003Cstrong\u003EBo Rotoloni\u003C\/strong\u003E, co-director of the IISP who also leads the information and cyber sciences directorate for the Georgia Tech Research Institute (GTRI).\u003C\/p\u003E\u003Cp\u003E\u201cThe investors coming to judge our first Demo Day are going to see unique ideas by Georgia Tech and clever solutions to existing and emerging challenges. We believe one of academia\u2019s roles is to explore big ideas, prove the potential, and create new market spaces. Several of these finalists do that well.\u201d\u003C\/p\u003E\u003Cp\u003EDue to limited space, \u003Ca href=\u0022http:\/\/tiny.cc\/demoday16\u0022\u003Eregistration is encouraged\u003C\/a\u003E for the event.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EThe IISP Demo Day Spring \u201916 Finalists are\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003E\u003Cem\u003E\u0022Cybersecurity Inspired Health Insurance Fraud Detector\u0022\u003C\/em\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMusheer Ahmed\u003C\/strong\u003E\u003Cbr \/\u003E Advisor: Mustaque Ahamad\u003C\/p\u003E\u003Cp\u003E\u003Cbr \/\u003E\u003Ca href=\u0022http:\/\/www2.ece.gatech.edu\/cap\/PARS\/\u0022 target=\u0022_blank\u0022\u003E \u003Cem\u003E\u0022PARS: A Uniform and Open-source Password Analysis and Research System\u0022\u003C\/em\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EShukun Yang\u003C\/strong\u003E\u003Cbr \/\u003E Advisor: Raheem Beyah\u003C\/p\u003E\u003Cp\u003E\u003Cbr \/\u003E\u003Ca href=\u0022http:\/\/wenke.gtisc.gatech.edu\/papers\/dangnull.pdf\u0022 target=\u0022_blank\u0022\u003E \u003Cem\u003E\u0022Preventing Use-after-free with Dangling Pointers Nullification\u0022\u003C\/em\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EByoungyoung Lee \u003C\/strong\u003Eand\u003Cstrong\u003E Chengyu Song\u003C\/strong\u003E\u003Cbr \/\u003E Advisor: Taesoo Kim\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u0022Tying Public Key to Person with \u2018idforweb\u2019 \u0022\u003C\/em\u003E\u003Cbr \/\u003E \u003Cstrong\u003EPak Ho Chung, Yeongjin Jang \u003C\/strong\u003Eand\u003Cstrong\u003E Mark Wisneski\u003C\/strong\u003E\u003Cbr \/\u003E Advisor: Wenke Lee\u003C\/p\u003E\u003Cp\u003E\u003Cbr \/\u003E\u003Ca href=\u0022http:\/\/wenke.gtisc.gatech.edu\/papers\/ucognito.pdf\u0022 target=\u0022_blank\u0022\u003E \u003Cem\u003E\u0022UCognito: Private Browsing without Tears\u0022\u003C\/em\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMeng Xu \u003C\/strong\u003Eand\u003Cstrong\u003E Yeongjin Jang \u003C\/strong\u003E\u003Cbr \/\u003E Advisor:\u0026nbsp; Taesoo Kim and Wenke Lee\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EJudges are\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003E\u003Cstrong\u003ERobin Bienfait\u003C\/strong\u003E, chief enterprise innovation officer, Samsung\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EPaul Conley\u003C\/strong\u003E, managing director, Paladin Capital Group\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EJohn Lee\u003C\/strong\u003E, senior associate, Osage Partners\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EGlenn McGonnigle\u003C\/strong\u003E, general partner, TechOperators\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003ESig Mosley\u003C\/strong\u003E, managing partner, Mosley Ventures\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003E\u003Cem\u003EA fraud detection system for healthcare claims\u2026 Ways to evaluate safer passwords\u2026. Technical fixes for truly private browsing\u2026\u003C\/em\u003E These are some of the ideas proposed by Georgia Tech students who will compete before a national panel of venture capitalists for cash in the inaugural \u201cDemo Day Finale\u201d on April 13, hosted by the Institute for Information Security \u0026amp; Privacy.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Information security students will compete before a national panel of venture capitalists for cash in the inaugural \u201cDemo Day Finale\u201d on April 13."}],"uid":"27490","created_gmt":"2016-03-25 12:26:46","changed_gmt":"2016-10-08 03:21:09","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-03-29T00:00:00-04:00","iso_date":"2016-03-29T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"518341":{"id":"518341","type":"image","title":"Demo Day Spring \u002716","body":null,"created":"1459274540","gmt_created":"2016-03-29 18:02:20","changed":"1475895284","gmt_changed":"2016-10-08 02:54:44","alt":"Demo Day Spring \u002716","file":{"fid":"205200","name":"security-poster-web.jpg","image_path":"\/sites\/default\/files\/images\/security-poster-web_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/security-poster-web_0.jpg","mime":"image\/jpeg","size":112810,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/security-poster-web_0.jpg?itok=GyKjitFn"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}}},"media_ids":["518341","451391"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"3652","name":"Demo Day"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, 404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":["tlabouff@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"507121":{"#nid":"507121","#data":{"type":"news","title":"Device \u201cFingerprints\u201d Could Help Protect Power Grid, Other Industrial Systems","body":[{"value":"\u003Cp\u003EHuman voices are individually recognizable because they\u2019re generated by the unique components of each person\u2019s voice box, pharynx, esophagus and other physical structures.\u003C\/p\u003E\u003Cp\u003EResearchers are using the same principle to identify devices on electrical grid control networks, using their unique electronic \u201cvoices\u201d \u2013 fingerprints produced by the devices\u2019 individual physical characteristics \u2013 to determine which signals are legitimate and which signals might be from attackers. A similar approach could also be used to protect networked industrial control systems in oil and gas refineries, manufacturing facilities, wastewater treatment plants and other critical industrial systems.\u003C\/p\u003E\u003Cp\u003EThe research, reported February 23 at the Network and Distributed System Security Symposium in San Diego, was supported in part by the National Science Foundation (NSF). While device fingerprinting isn\u2019t a complete solution in itself, the technique could help address the unique security challenges of the electrical grid and other cyber-physical systems. The approach has been successfully tested in two electrical substations.\u003C\/p\u003E\u003Cp\u003E\u201cWe have developed fingerprinting techniques that work together to protect various operations of the power grid to prevent or minimize spoofing of packets that could be injected to produce false data or false control commands into the system,\u201d said Raheem Beyah, an associate professor in the School of Electrical and Computer Engineering at the Georgia Institute of Technology. \u201cThis is the first technique that can passively fingerprint different devices that are part of critical infrastructure networks. We believe it can be used to significantly improve the security of the grid and other networks.\u201d\u003C\/p\u003E\u003Cp\u003EThe networked systems controlling the U.S. electrical grid and other industrial systems often lack the ability to run modern encryption and authentication systems, and the legacy systems connected to them were never designed for networked security. Because they are distributed around the country, often in remote areas, the systems are also difficult to update using the \u201cpatching\u201d techniques common in computer networks. And on the electric grid, keeping the power on is a priority, so security can\u2019t cause delays or shutdowns.\u003C\/p\u003E\u003Cp\u003E\u201cThe stakes are extremely high, but the systems are very different from home or office computer networks,\u201d said Beyah. \u201cIt is critical that we secure these systems against attackers who may introduce false data or issue malicious commands.\u201d\u003C\/p\u003E\u003Cp\u003EBeyah, his students, and colleagues in Georgia Tech\u2019s George W. Woodruff School of Mechanical Engineering set out to develop security techniques that take advantage of the unique physical properties of the grid and the consistent type of operations that take place there.\u003C\/p\u003E\u003Cp\u003EFor instance, control devices used in the power grid produce signals that are distinctive because of their unique physical configurations and compositions. Security devices listening to signals traversing the grid\u2019s control systems can differentiate between these legitimate devices and signals produced by equipment that\u2019s not part of the system.\u003C\/p\u003E\u003Cp\u003EAnother aspect of the work takes advantage of simple physics. Devices such as circuit breakers and electrical protection systems can be told to open or close remotely, and they then report on the actions they\u2019ve taken. The time required to open a breaker or a valve is determined by the physical properties of the device. If an acknowledgement arrives too soon after the command is issued \u2013 less time than it would take for a breaker or valve to open, for instance \u2013 the security system could suspect spoofing, Beyah explained.\u003C\/p\u003E\u003Cp\u003ETo develop the device fingerprints, the researchers, including mechanical engineering assistant professor Jonathan Rogers, have built computer models of utility grid devices to understand how they operate. Information to build the models came from \u201cblack box\u201d techniques \u2013 watching the information that goes into and out of the system \u2013 and \u201cwhite box\u201d techniques that utilize schematics or physical access to the systems.\u003C\/p\u003E\u003Cp\u003E\u201cDevice fingerprinting is a unique signature that indicates the identity of a specific device, or device type, or an action associated with that device type,\u201d Beyah explained. \u201cWe can use physics and mathematics to analyze and build a model using first principles based on the devices themselves. Schematics and specifications allow us to determine how the devices are actually operating.\u201d\u003C\/p\u003E\u003Cp\u003EThe researchers have demonstrated the technique on two electrical substations, and plan to continue refining it until it becomes close to 100 percent accurate. Their current technique addresses the protocol used for more than half of the devices on the electrical grid, and future work will include examining application of the method to other protocols.\u003C\/p\u003E\u003Cp\u003EBecause they also include devices with measurable physical properties, Beyah believes the approach could have broad application to securing industrial control systems used in manufacturing, oil and gas refining, wastewater treatment and other industries. Beyond industrial controls, the principle could also apply to the Internet of Things (IoT), where the devices being controlled have specific signatures related to switching them on and off.\u003C\/p\u003E\u003Cp\u003E\u201cAll of these IoT devices will be doing physical things, such as turning your air-conditioning on or off,\u201d Beyah said. \u201cThere will be a physical action occurring, which is similar to what we have studied with valves and actuators.\u201d\u003C\/p\u003E\u003Cp\u003EIn addition to those already mentioned, the research included graduate students David Formby, the paper\u2019s first author; Preethi Srinivasan and Andrew Leonard.\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003EThis research was supported by the National Science Foundation under grant number 1140230. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003ECITATION\u003C\/strong\u003E: David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers and Raheem Beyah, \u201cWho\u2019s in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems,\u201d (NDSS 2016).\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EResearch News\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cstrong\u003EGeorgia Institute of Technology\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cstrong\u003E177 North Avenue\u003C\/strong\u003E\u003Cbr \/\u003E\u003Cstrong\u003EAtlanta, Georgia 30332-0181 USA\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EMedia Relations Contact\u003C\/strong\u003E: John Toon (404-894-6986) (\u003Ca href=\u0022mailto:jtoon@gatech.edu\u0022\u003Ejtoon@gatech.edu\u003C\/a\u003E).\u003Cbr \/\u003E\u003Cstrong\u003EWriter\u003C\/strong\u003E: John Toon\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EResearchers are using the unique electronic \u201cvoices\u201d produced by devices on the electrical grid to determine which signals are legitimate and which signals might be from attackers.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Researchers are using device fingerprints to help secure the electrical grid."}],"uid":"27303","created_gmt":"2016-02-28 17:04:06","changed_gmt":"2016-10-08 03:20:53","author":"John Toon","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-02-29T00:00:00-05:00","iso_date":"2016-02-29T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"507061":{"id":"507061","type":"image","title":"Utility fingerprinting","body":null,"created":"1456765200","gmt_created":"2016-02-29 17:00:00","changed":"1475895268","gmt_changed":"2016-10-08 02:54:28","alt":"Utility fingerprinting","file":{"fid":"204875","name":"utility-fingerprinting.jpg","image_path":"\/sites\/default\/files\/images\/utility-fingerprinting_1.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/utility-fingerprinting_1.jpg","mime":"image\/jpeg","size":1745094,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/utility-fingerprinting_1.jpg?itok=oRKERA7K"}},"507081":{"id":"507081","type":"image","title":"Device fingerprinting2","body":null,"created":"1456765200","gmt_created":"2016-02-29 17:00:00","changed":"1475895268","gmt_changed":"2016-10-08 02:54:28","alt":"Device fingerprinting2","file":{"fid":"204877","name":"utility-fingerprinting2.jpg","image_path":"\/sites\/default\/files\/images\/utility-fingerprinting2_1.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/utility-fingerprinting2_1.jpg","mime":"image\/jpeg","size":2463783,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/utility-fingerprinting2_1.jpg?itok=W5jNWm5l"}},"507101":{"id":"507101","type":"image","title":"Device fingerprinting3","body":null,"created":"1456765200","gmt_created":"2016-02-29 17:00:00","changed":"1475895268","gmt_changed":"2016-10-08 02:54:28","alt":"Device fingerprinting3","file":{"fid":"204879","name":"utility-fingerprinting3.jpg","image_path":"\/sites\/default\/files\/images\/utility-fingerprinting3_1.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/utility-fingerprinting3_1.jpg","mime":"image\/jpeg","size":1977450,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/utility-fingerprinting3_1.jpg?itok=SPNH0isC"}}},"media_ids":["507061","507081","507101"],"groups":[{"id":"1188","name":"Research Horizons"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"144","name":"Energy"},{"id":"145","name":"Engineering"},{"id":"135","name":"Research"}],"keywords":[{"id":"171775","name":"device fingerprinting"},{"id":"170238","name":"electric utility"},{"id":"436","name":"electricity"},{"id":"145981","name":"IISP"},{"id":"67741","name":"Raheem Beyah"},{"id":"167055","name":"security"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39531","name":"Energy and Sustainable Infrastructure"},{"id":"39481","name":"National Security"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJohn Toon\u003C\/p\u003E\u003Cp\u003EResearch News\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022mailto:jtoon@gatech.edu\u0022\u003Ejtoon@gatech.edu\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E(404) 894-6986\u003C\/p\u003E","format":"limited_html"}],"email":["jtoon@gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"505561":{"#nid":"505561","#data":{"type":"news","title":"AAU: Helping Safeguard the Connected World","body":[{"value":"\u003Cp\u003EAs society grows increasingly dependent on electronic networks for managing everyday life, running the economy, and defending the nation, cybersecurity has become one of the most pressing challenges.\u003C\/p\u003E\u003Cp\u003ECan we protect the power grid, telecommunication networks, financial data, \u201csmart\u201d products, and our private information, while still enjoying the benefits technology affords us?\u003C\/p\u003E\u003Cp\u003EAmerican universities are helping to answer that question, leading the way with multidisciplinary research, technology development, and education.\u003C\/p\u003E\u003Cp\u003EThe second in a series on university research from the Association of American Universities (AAU), this link shows what university faculty, researchers, students, and alumni are doing to help secure electronic communications and data.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.aau.edu\/research\/article3.aspx?id=16895\u0022 target=\u0022_blank\u0022\u003ERead more\u003C\/a\u003E from the AAU.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe second in a series that addresses broad societal issues, the Association of American Universities examines what university faculty, researchers, students, and alumni are doing to help secure electronic communications and data for the nation.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The Association of American Universities highlights what faculty, researchers, students, and alumni are doing across the U.S. to help secure electronic communications and data."}],"uid":"27490","created_gmt":"2016-02-24 10:43:32","changed_gmt":"2016-10-08 03:20:53","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-02-24T00:00:00-05:00","iso_date":"2016-02-24T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"505201":{"id":"505201","type":"image","title":"University Cybersecurity Research Resources","body":null,"created":"1456344000","gmt_created":"2016-02-24 20:00:00","changed":"1475895265","gmt_changed":"2016-10-08 02:54:25","alt":"University Cybersecurity Research Resources","file":{"fid":"204816","name":"istock_000071876403_small.jpg","image_path":"\/sites\/default\/files\/images\/istock_000071876403_small_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/istock_000071876403_small_0.jpg","mime":"image\/jpeg","size":288021,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/istock_000071876403_small_0.jpg?itok=oczk57II"}}},"media_ids":["505201"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"504131":{"#nid":"504131","#data":{"type":"news","title":"Georgia Tech Discovers How Mobile Ads Leak Personal Data","body":[{"value":"\u003Cp\u003E\u003Cstrong\u003EATLANTA \u2013 February 22, 2016\u003C\/strong\u003E \u003Cstrong\u003E\u2013\u003C\/strong\u003E The personal information of millions of smartphone users is at risk due to in-app advertising that can leak potentially sensitive user information between ad networks and mobile app developers, according to a new study by the \u003Ca href=\u0022http:\/\/www.scs.gatech.edu\/\u0022\u003ESchool of Computer Science\u003C\/a\u003E at the Georgia Institute of Technology.\u003C\/p\u003E\u003Cp\u003EResults will be presented Tuesday, Feb. 23 at the \u003Ca href=\u0022http:\/\/www.internetsociety.org\/events\/ndss-symposium-2016\u0022\u003E2016 Network and Distributed System Security Symposium (NDSS \u002716)\u003C\/a\u003E in San Diego, Calif., by researchers \u003Cstrong\u003EWei Meng\u003C\/strong\u003E, \u003Cstrong\u003ERen Ding\u003C\/strong\u003E, \u003Cstrong\u003ESimon Chung\u003C\/strong\u003E, and \u003Cstrong\u003ESteven Han\u003C\/strong\u003E under the direction of Professor \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/wenke-lee\u0022\u003E\u003Cstrong\u003EWenke Lee\u003C\/strong\u003E\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003EThe study examined more than 200 participants who used a custom-built app for Android-based smartphones, which account for 52 percent of the U.S. smartphone market according to \u003Ca href=\u0022https:\/\/www.comscore.com\/Insights\/Market-Rankings\/comScore-Reports-April-2015-U.S.-Smartphone-Subscriber-Market-Share\u0022\u003EcomScore\u2019s April 2015 report\u003C\/a\u003E. Georgia Tech researchers reviewed the accuracy of personalized ads that were served to test subjects from the Google AdNetwork based upon their personal interests and demographic profiles; and secondly, examined how much a mobile app creator could uncover about users because of the personalized ads served to them.\u003C\/p\u003E\u003Cp\u003EResearchers found that 73 percent of ad impressions for 92 percent of users are correctly aligned with their demographic profiles. Researchers also found that, based on ads shown, a mobile app developer could learn a user\u2019s:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003Egender with 75 percent accuracy,\u003C\/li\u003E\u003Cli\u003Eparental status with 66 percent accuracy,\u003C\/li\u003E\u003Cli\u003Eage group with 54 percent accuracy, and\u003C\/li\u003E\u003Cli\u003Ecould also predict income, political affiliation, marital status, with higher accuracy than random guesses.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003ESome personal information is deemed so sensitive that Google explicitly states those factors are not used for personalization, yet the study found that app developers still can discover this information due to leakage between ad networks and app developers.\u003C\/p\u003E\u003Cp\u003E\u201cFree smart phone apps are not really free,\u201d says Wei Meng, lead researcher and a graduate student studying computer science. \u201cApps \u2013 especially malicious apps \u2013 can be used to collect potentially sensitive information about someone simply by hosting ads in the app and observing what is received by a user. Mobile, personalized in-app ads absolutely present a new privacy threat.\u201d\u003C\/p\u003E\u003Ch6\u003E\u003Cstrong\u003EHow it Works\u003C\/strong\u003E\u003C\/h6\u003E\u003Cul\u003E\u003Cli\u003EMobile app developers choose to accept in-app ads inside their app.\u003C\/li\u003E\u003Cli\u003EAd networks pay a fee to app developers in order to show ads and monitor user activity \u2013 collecting app lists, device models, geo-locations, etc. This aggregate information is made available to help advertisers choose where to place ads.\u003C\/li\u003E\u003Cli\u003EAdvertisers instruct an ad network to show their ads based on topic targeting (such as \u201cAutos \u0026amp; Vehicles\u201d), interest targeting (such as user usage patterns and previous click thrus), and demographic targeting (such as estimated age range).\u003C\/li\u003E\u003Cli\u003EThe ad network displays ads to appropriate mobile app users and receives payment from advertisers for successful views or click thrus by the recipient of the ad.\u003C\/li\u003E\u003Cli\u003EIn-app ads are displayed unencrypted as part of the app\u2019s graphical user interface. Therefore, mobile app developers can access the targeted ad content delivered to its own app users and then reverse engineer that data to construct a profile of their app customer.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EUnlike advertising on a website page, where personalized ad content is protected from publishers and other third parties by the \u003Ca href=\u0022https:\/\/en.wikipedia.org\/wiki\/Same-origin_policy\u0022\u003ESame Origin Policy\u003C\/a\u003E, there is no isolation of personalized ad content from the mobile app developer.\u003C\/p\u003E\u003Cp\u003EFor the smartphone dependent population \u2013 the 7 percent of largely low-income Americans, defined by \u003Ca href=\u0022http:\/\/www.pewinternet.org\/2015\/04\/01\/us-smartphone-use-in-2015\/\u0022\u003EPew Internet (\u0022U.S. Smartphone Use in 2015\u0022)\u003C\/a\u003E, who have neither traditional broadband at home nor any other online alternative \u2013 their personal information may be particularly at risk.\u003C\/p\u003E\u003Cp\u003E\u201cPeople use their smartphones now for online dating, banking, and social media every day,\u201d said Wenke Lee, professor of computer science and co-director of the Institute for Information Security \u0026amp; Privacy at Georgia Tech. \u201cMobile devices are intimate to users, so safeguarding personal information from malicious parties is more important than ever.\u201d\u003C\/p\u003E\u003Cp\u003EThe study acknowledges that the online advertising industry is taking steps to protect users\u2019 information by improving the HTTPS protocol, but researchers believe the threat to user privacy is greater than HTTPS protection can provide under a mobile scenario.\u003C\/p\u003E\u003Cp\u003EThe researchers contacted Google AdNetworks about their finding.\u003C\/p\u003E\u003Ch6\u003E\u003Cstrong\u003E\u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/%7Ewmeng6\/ndss16_mobile_ad.pdf\u0022\u003EDownload\u003C\/a\u003E the complete research paper.\u003C\/strong\u003E\u003C\/h6\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch5\u003E\u003Cstrong\u003EAdditional research at NDSS \u002716\u003C\/strong\u003E\u003C\/h5\u003E\u003Cp\u003E\u003Cem\u003EGeorgia Tech\u0027s School of Computer Science will present three additional papers at the conference. \u003C\/em\u003E\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003E\u0022\u003Ca href=\u0022https:\/\/taesoo.gtisc.gatech.edu\/pubs\/2016\/kdfi\/kdfi.pdf\u0022\u003EEnforcing Kernel Security Invariants with Data Flow Integrity\u003C\/a\u003E\u0022 by Chengyu Song, Byoungyoung Lee, Kangjie Lu, William Harris, and Wenke Lee\u003C\/li\u003E\u003Cli\u003E\u0022\u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/%7Eklu38\/publications\/runtimeaslr-ndss16.pdf\u0022\u003EHow to Make ASLR Win the Clone Wars: Runtime Re-Randomization\u003C\/a\u003E\u003Cem\u003E\u0022 \u003C\/em\u003Eby Kangjie Lu, Stefan Nurnberger, Michael Backes, and Wenke Lee\u003C\/li\u003E\u003Cli\u003E\u0022\u003Ca href=\u0022https:\/\/taesoo.gtisc.gatech.edu\/pubs\/2016\/opensgx\/opensgx.pdf\u0022\u003EOpenSGX: \u0026nbsp;An Open Platform for SGX Research\u003C\/a\u003E\u003Cem\u003E\u0022 \u003C\/em\u003Eby Prerit Jain, Soham Desai, Ming-Wei Shih, and Taesoo Kim in partnership with KAIST of South Korea researchers Seongmin Kim, JaeHyuk Lee, Changho Choi, Youjung Shin, Brent Byunghoon Kang, and Dongsu Han\u003C\/li\u003E\u003C\/ul\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003ESchool of Computer Science researchers find that personalized in-app ads can leak sensitive profile information between developers and ad networks. Their study will be presented Feb. 23 at the 2016 Network and Distributed System Symposium in San Diego, Calif.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"School of Computer Science researchers find that personalized in-app ads can leak sensitive profile information between developers and ad networks."}],"uid":"27490","created_gmt":"2016-02-22 09:49:40","changed_gmt":"2016-10-08 03:20:49","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-02-22T00:00:00-05:00","iso_date":"2016-02-22T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"504141":{"id":"504141","type":"image","title":"Researchers Wei Meng and Ren Ding","body":null,"created":"1456167600","gmt_created":"2016-02-22 19:00:00","changed":"1475895263","gmt_changed":"2016-10-08 02:54:23","alt":"Researchers Wei Meng and Ren Ding","file":{"fid":"205913","name":"ndss_presenters_meng_-_ding.jpg","image_path":"\/sites\/default\/files\/images\/ndss_presenters_meng_-_ding_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/ndss_presenters_meng_-_ding_0.jpg","mime":"image\/jpeg","size":246676,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/ndss_presenters_meng_-_ding_0.jpg?itok=ALdLR18E"}},"504151":{"id":"504151","type":"image","title":"Mobile App Ad Delivery","body":null,"created":"1456167600","gmt_created":"2016-02-22 19:00:00","changed":"1475895263","gmt_changed":"2016-10-08 02:54:23","alt":"Mobile App Ad Delivery","file":{"fid":"205914","name":"mobile_app_ad_ecosystem_crop.jpg","image_path":"\/sites\/default\/files\/images\/mobile_app_ad_ecosystem_crop_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/mobile_app_ad_ecosystem_crop_0.jpg","mime":"image\/jpeg","size":339404,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/mobile_app_ad_ecosystem_crop_0.jpg?itok=T35mlCbr"}}},"media_ids":["504141","504151"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"34741","name":"mobile app"},{"id":"166941","name":"School of Computer Science"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39501","name":"People and Technology"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"},{"id":"71901","name":"Society and Culture"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff\u003C\/p\u003E\u003Cp\u003E602.770.0264\u003C\/p\u003E","format":"limited_html"}],"email":["tlabouff@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"503391":{"#nid":"503391","#data":{"type":"news","title":"Why Apple\u0027s Fight With the FBI Matters","body":[{"value":"\u003Cp\u003EA federal court ordered Apple to help the FBI unlock an iPhone used by one of the attackers in the San Bernardino shooting. Apple is challenging the court\u2019s request.\u0026nbsp; This battle between tech companies and the government over encryption could open a Pandora\u2019s box, said \u003Cstrong\u003EAndrew Howard\u003C\/strong\u003E, director of the Cyber Technology and Information Security Laboratory at the Georgia Tech Research Institute.\u003C\/p\u003E\u003Cp\u003E\u003Cbr \/\u003E\u003Ca href=\u0022http:\/\/amplifier.gatech.edu\/articles\/2016\/02\/why-apple%E2%80%99s-fight-fbi-matters\u0022 target=\u0022_blank\u0022\u003ERead more\u003C\/a\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EA federal court order asks Apple to do more than simply flip a one-time switch to disable security; it\u0027s asking Apple to manufacture vulnerability, says Andrew Howard, director of the Cyber Technology and Information Security Laboratory.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"A federal court ordered Apple to help the FBI unlock an iPhone used in a crime."}],"uid":"27490","created_gmt":"2016-02-18 23:30:05","changed_gmt":"2016-10-08 03:20:49","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-02-18T00:00:00-05:00","iso_date":"2016-02-18T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"503141":{"id":"503141","type":"image","title":"Andrew Howard","body":null,"created":"1456167600","gmt_created":"2016-02-22 19:00:00","changed":"1475895258","gmt_changed":"2016-10-08 02:54:18","alt":"Andrew Howard","file":{"fid":"204671","name":"img_6830.jpg","image_path":"\/sites\/default\/files\/images\/img_6830_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/img_6830_0.jpg","mime":"image\/jpeg","size":90030,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/img_6830_0.jpg?itok=ysgXxr4V"}}},"media_ids":["503141"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"503371":{"#nid":"503371","#data":{"type":"news","title":"How Should Apple Balance Privacy and National Security?","body":[{"value":"\u003Cp\u003EApple fights back against a federal court order to develop a \u0022backdoor\u0022 into its devices. NPR\u0027s Here \u0026amp; Now asks \u003Ca href=\u0022http:\/\/peterswire.net\/\u0022 target=\u0022_blank\u0022\u003EPeter Swire\u003C\/a\u003E -- Huang Professor of Law and Ethics at the Scheller College of Business and associate director of policy for the Institute for Information Security \u0026amp; Privacy at Georgia Tech -- to explain the argument between Apple and the U.S. Justice Department.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/hereandnow.wbur.org\/2016\/02\/17\/apple-ethics-privacy-national-security\u0022 target=\u0022_blank\u0022\u003EListen here\u003C\/a\u003E (5:39)\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EGeorgia Tech\u0027s Peter Swire explains the fight between Apple and the U.S. government.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech\u0027s Peter Swire explains the fight between Apple and the U.S. government."}],"uid":"27490","created_gmt":"2016-02-18 23:05:49","changed_gmt":"2016-10-08 03:20:49","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-02-17T00:00:00-05:00","iso_date":"2016-02-17T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"503381":{"id":"503381","type":"image","title":"Can Apple be cracked?","body":null,"created":"1456167600","gmt_created":"2016-02-22 19:00:00","changed":"1475895263","gmt_changed":"2016-10-08 02:54:23","alt":"Can Apple be cracked?","file":{"fid":"204781","name":"istock_000063644127_small.jpg","image_path":"\/sites\/default\/files\/images\/istock_000063644127_small_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/istock_000063644127_small_0.jpg","mime":"image\/jpeg","size":232211,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/istock_000063644127_small_0.jpg?itok=sKDflS17"}}},"media_ids":["503381"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"2895","name":"Apple"},{"id":"1404","name":"Cybersecurity"},{"id":"72451","name":"Peter Swire"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"532141":{"#nid":"532141","#data":{"type":"news","title":"Georgia Tech to Dismantle Pervasive Cyberattacks in 10 Seconds or Less","body":[{"value":"\u003Cp\u003EGeorgia Tech researchers have been awarded a $2.9 million contract from the U.S. Defense Advanced Research Projects Agency (DARPA) to develop a cybersecurity method that will identify and defend against low-volume distributed denial of service (DDoS) attacks.\u003C\/p\u003E\u003Cp\u003EHigh-volume DDoS attacks that overwhelm servers with large amounts of malicious traffic in order to shut down a particular website have received a significant amount of study. However, low-volume attacks have not.\u003C\/p\u003E\u003Cp\u003ELow-volume attacks\u2014while generally receiving less attention from scholars and media outlets\u2014account for a significant percentage of all DDoS assaults. They can take down a website and be as damaging, but may use less bandwidth, are often shorter in duration, and may be designed to distract a security team from the aftershocks of follow-on attacks. In fact, according to Neustar, Inc., around 54 percent of DDoS attacks were found to be relatively small at less than 5 Gbps, yet 43 percent leave behind malware or viruses. Neustar\u2019s \u003Ca href=\u0022https:\/\/www.neustar.biz\/about-us\/news-room\/press-releases\/2016\/neustartwentysixteenaprddos\u0022\u003EApril 2016\u003C\/a\u003E report found that 82 percent of corporations were attacked repeatedly.\u003C\/p\u003E\u003Cp\u003E\u201cThis has been a 25-year problem with no practical solution,\u201d says \u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/people\/taesoo-kim\u0022\u003ETaesoo Kim\u003C\/a\u003E, lead principal investigator for the study and assistant professor in Georgia Tech\u2019s School of Computer Science. \u201cOur goal is to create a precise and timely detection method that identifies attacks by how they subtly change the resource consumption of a machine. With little to no degradation of system performance, we believe we can mitigate the threat and write a new signature for it inside the hardware within approximately 10 seconds so a network interface card will recognize it again. This effectively puts an anti-virus patch into your hardware in real time.\u201d\u003C\/p\u003E\u003Cp\u003EUnder the project name ROKI, Kim and colleagues propose to first establish a baseline of resource consumption using three Intel hardware features. Next, they will develop continuous analysis algorithms to compare a packet\u2019s effect on system performance against historical consumption under similar scenarios. A new path-reconstruction engine will then produce a sequence of instructions to nullify an attack and encode the finding into the network interface card to stop current or future attack traffic.\u003C\/p\u003E\u003Cp\u003E\u201cROKI has the potential to achieve both timeliness and precision,\u201d says \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/wenke-lee\u0022\u003EWenke Lee\u003C\/a\u003E, co-PI on the project and co-director of the \u003Ca href=\u0022http:\/\/iisp.gatech.edu\/\u0022\u003EInstitute for Information Security \u0026amp; Privacy\u003C\/a\u003E at Georgia Tech. \u201cWe don\u2019t need to know what an attack looks like, just that it deviates from the baseline. Existing defenses against low-volume DDoS attacks lack precision and they cannot create a response in a timely manner. This will.\u201d\u003C\/p\u003E\u003Cp\u003EThe research is part of DARPA\u2019s \u003Ca href=\u0022http:\/\/www.darpa.mil\/program\/extreme-ddos-defense\u0022\u003EExtreme DDoS Defense\u003C\/a\u003E (XD3) program (awarded under contract #HR0011-16-C-0059) and began in April. First deliverables are expected in approximately 18 months, beginning with a prototype to demonstrate the core idea. The project is expected to be complete in three years. Field exercises to mitigate previously unknown DDoS attacks will occur in 2019.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EAbout the Researchers\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003ETaesoo Kim\u003C\/strong\u003E, \u003Cem\u003Eassistant professor, School of Computer Science, College of Computing \u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EHe received his Ph.D. in Computer Science from the Massachusetts Institute of Technology in 2014 and since has taught at Georgia Tech, attracting nearly $6 million in research awards to the university, inclusive of this announcement. He leads and co-leads projects on large-scale analytics, scalable manycore operating systems, defense mechanisms to harden software, and tag-tracking. His thesis work focused on the design of an intrusion recovery method for operating systems, web applications, distributed web services, and web frameworks that is today the foundation of a company called Nerati.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EWilliam Harris\u003C\/strong\u003E, \u003Cem\u003Eassistant professor, School of Computer Science, College of Computing\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EHe studies program synthesis, analysis and verification and has developed tools that generate programs to help operating systems meet specified security requirements even if the underlying components may not be trusted.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EWenke Lee\u003C\/strong\u003E, \u003Cem\u003Ethe John P. Imlay Jr. Professor, School of Computer Science, and co-director of the Institute for Information Security \u0026amp; Privacy at Georgia Tech\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EDr. Lee has worked on large-scale network monitoring, botnet detection, and malware analysis for more than 10 years. His research interests also include systems and network security, applied cryptography, and data mining.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EClifton (Trent) Brunson\u003C\/strong\u003E, \u003Cem\u003Eresearch scientist, Georgia Tech Research Institute\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EIn his prior academic studies and work, he has performed multiple projects for the Air Force Research Laboratory and DARPA in the areas of cryptography, insider threats, programming languages, cyber battle damage assessment, agentless network monitoring, and IPv6.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EAbout Georgia Tech\u2019s College of Computing\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EThe Georgia Tech College of Computing is a national leader in the creation of real-world computing breakthroughs that drive social and scientific progress. With its graduate program ranked 9th nationally by \u003Cem\u003EU.S. News and World Report\u003C\/em\u003E, the College\u2019s unconventional approach to education is expanding the horizons of traditional computer science students through interdisciplinary collaboration and a focus on human-centered solutions. For more information about the Georgia Tech College of Computing, its academic divisions and research centers, please visit \u003Ca href=\u0022http:\/\/www.cc.gatech.edu\u0022\u003Ewww.cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":[{"value":"Researchers Earn $2.9M DARPA Contract to Fight Low-Volume DDoS Attacks"}],"field_summary":[{"value":"\u003Cp\u003EGeorgia Tech researchers have been awarded a $2.9 million contract from the U.S. Defense Advanced Research Projects Agency (DARPA) to develop a cybersecurity method that will identify and defend against low-volume distributed denial of service (DDoS) attacks.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech researchers have earned a DARPA contract to determine ways of defeating low-volume denial of service attacks on websites."}],"uid":"32045","created_gmt":"2016-05-03 13:27:56","changed_gmt":"2016-10-08 03:21:32","author":"Ben Snedeker","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-05-03T00:00:00-04:00","iso_date":"2016-05-03T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"532171":{"id":"532171","type":"image","title":"Taesoo Kim","body":null,"created":"1462377601","gmt_created":"2016-05-04 16:00:01","changed":"1475895314","gmt_changed":"2016-10-08 02:55:14","alt":"Taesoo Kim","file":{"fid":"214991","name":"taesoo_kim_-_klaus_atrium.jpeg","image_path":"\/sites\/default\/files\/images\/taesoo_kim_-_klaus_atrium.jpeg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/taesoo_kim_-_klaus_atrium.jpeg","mime":"image\/jpeg","size":1053934,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/taesoo_kim_-_klaus_atrium.jpeg?itok=WfpLlalj"}}},"media_ids":["532171"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"135","name":"Research"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"13253","name":"DARPA grant"},{"id":"170216","name":"DDoS"},{"id":"171994","name":"denial of service attack"},{"id":"171995","name":"malicious traffic"},{"id":"171996","name":"Taesoo"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EBen Snedeker, News \u0026amp; Media Relations Manager, Georgia Tech College of Computing. 404-894-7253, \u003Ca href=\u0022mailto:albert.snedeker@cc.gatech.edu\u0022 target=\u0022_blank\u0022\u003Ealbert.snedeker@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":["albert.snedeker@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"498021":{"#nid":"498021","#data":{"type":"news","title":"Statement re: White House Cybersecurity National Action Plan","body":[{"value":"\u003Cp\u003EPresident Barack Obama\u2019s budget proposal for fiscal 2017, unveiled yesterday, brings a welcome \u003Ca href=\u0022http:\/\/www.reuters.com\/article\/us-obama-budget-cyber-idUSKCN0VI0R1\u0022 target=\u0022_blank\u0022\u003E35 percent increase for cybersecurity\u003C\/a\u003E. As part of \u003Ca href=\u0022https:\/\/www.whitehouse.gov\/the-press-office\/2016\/02\/09\/fact-sheet-cybersecurity-national-action-plan\u0022 target=\u0022_blank\u0022\u003Ethe plan\u003C\/a\u003E, the creation of a federal Chief Information Security Officer (CISO) also was announced to parallel what most major organizations already do to coordinate information security and risk. Yet the devil will be in the details for this new spending and new position.\u003C\/p\u003E\u003Cp\u003EWill the United States\u0027 CISO have any real authority? Will the new hardware and software bought with these funds be as insecurely configured or poorly implemented as the current systems? Two weeks ago\u0026nbsp;Rob Joyce, chief of the NSA\u0027s Tailored Access Operations (TAO), publicly reminded defenders that attackers know what actually is on a target network, whereas agency leaders often only think they know their own information environment. What should be and what is are often different, and this delta is usually the most fertile area of the attack surface.\u003C\/p\u003E\u003Cp\u003EThis additional funding should be applied in two ways, first addressing the present and second looking to the future:\u003C\/p\u003E\u003Cp\u003E1)\u0026nbsp;\u0026nbsp;\u0026nbsp; Compel federal government agencies to prove they are doing the basics:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003Einventory authorized and unauthorized devices (know what you\u2019ve got)\u003C\/li\u003E\u003Cli\u003Einventory authorized and unauthorized software (know what it\u2019s running)\u003C\/li\u003E\u003Cli\u003Ereduce and control use of admin privileges\u003C\/li\u003E\u003Cli\u003Eread your logs (yes, really read them!)\u003C\/li\u003E\u003Cli\u003Eestablish secure configs for all apps and devices, roll this out, don\u2019t deviate, and patch it aggressively.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003ENone of this is new, but actually doing it consistently would be novel for much of the U.S. government.\u0026nbsp; The new CISO and cognizant officials can\u2019t keep admiring the problem, but actually must measure progress and hold poor performance accountable.\u003C\/p\u003E\u003Cp\u003E2)\u0026nbsp;\u0026nbsp;\u0026nbsp; Fund research and development for cybersecurity across disciplinary lines \u2013 computer science, engineering, policy, etc:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EAttribution of cyberthreats\u003C\/li\u003E\u003Cli\u003EConsumer-facing privacy\u003C\/li\u003E\u003Cli\u003ECyber-physical systems\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EReward those working on hard problems and seek revolutionary gains.\u0026nbsp; Don\u2019t be afraid to fail.\u0026nbsp; Create the next!\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003EMichael Farrell is chief scientist for the Cyber Technology \u0026amp; Information Security Lab (CTISL) and associate director of attribution for the Institute for Information Security \u0026amp; Privacy (IISP) at Georgia Tech.\u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EPresident Barack Obama\u2019s budget proposal for fiscal 2017 includes a \u003Ca href=\u0022http:\/\/www.reuters.com\/article\/us-obama-budget-cyber-idUSKCN0VI0R1\u0022 target=\u0022_blank\u0022\u003E35 percent increase for cybersecurity\u003C\/a\u003E, creating a new \u0022Cybersecurity National Action Plan.\u0022 Georgia Tech\u0027s Michael Farrell, associate director of attribution for the Institute for Information Security \u0026amp; Privacy, explains what that should mean and provide.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Associate Director Michael Farrell provides a public statement on behalf of the Institute for Information Security \u0026 Privacy."}],"uid":"27490","created_gmt":"2016-02-10 11:40:33","changed_gmt":"2016-10-08 03:20:38","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-02-10T00:00:00-05:00","iso_date":"2016-02-10T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"492491":{"id":"492491","type":"image","title":"IISP - required security poster","body":null,"created":"1454090400","gmt_created":"2016-01-29 18:00:00","changed":"1475895248","gmt_changed":"2016-10-08 02:54:08","alt":"IISP - required security poster","file":{"fid":"205850","name":"required_security.jpg","image_path":"\/sites\/default\/files\/images\/required_security.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/required_security.jpg","mime":"image\/jpeg","size":174490,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/required_security.jpg?itok=XkOTjjaW"}}},"media_ids":["492491"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"6467","name":"Barack Obama"},{"id":"1404","name":"Cybersecurity"},{"id":"90001","name":"federal budget"},{"id":"146931","name":"The White House"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"501331":{"#nid":"501331","#data":{"type":"news","title":"Next Billion People Online Will Get Odd Versions of the Internet","body":[{"value":"\u003Cp\u003ETech giants are racing to extend internet access to large parts of the developing world. But will people get the digital experience they expect? A new project -- \u0022\u003Ca href=\u0022https:\/\/michaelannedye.files.wordpress.com\/2015\/03\/cuba-cscw2016-cameraready.pdf\u0022 target=\u0022_blank\u0022\u003ECuba Intercambio\u003C\/a\u003E\u0022 by Georgia Tech\u0027s Michaelanne Dye, Annie Anton and Amy Bruckman from the School of Interactive Computing -- is helping Cubans freely access information until acces and broadband becomes more widely available.\u003C\/p\u003E\u003Cp\u003E\u003Cbr \/\u003E\u003Ca href=\u0022https:\/\/www.newscientist.com\/article\/2075978-next-billion-people-online-will-get-odd-versions-of-the-internet\/\u0022 target=\u0022_blank\u0022\u003ERead more\u003C\/a\u003E in \u003Cem\u003ENew Scientist\u003C\/em\u003E (free site registration required)\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003ETech giants are racing to extend internet access to large parts of the developing world. But will people get the digital experience they expect? A new project -- \u0022\u003Ca href=\u0022https:\/\/michaelannedye.files.wordpress.com\/2015\/03\/cuba-cscw2016-cameraready.pdf\u0022 target=\u0022_blank\u0022\u003ECuba Intercambio\u003C\/a\u003E\u0022 by Georgia Tech\u0027s Michaelanne Dye, Annie Anton and Amy Bruckman from the School of Interactive Computing -- is helping Cubans freely access information until acces and broadband becomes more widely available.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"A new project seeks to remove censorship barriers for Cubans on the Internet."}],"uid":"27490","created_gmt":"2016-02-16 20:03:30","changed_gmt":"2016-10-08 03:20:46","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-02-03T00:00:00-05:00","iso_date":"2016-02-03T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"495761":{"id":"495761","type":"image","title":"Cuba Intercambio","body":null,"created":"1455120000","gmt_created":"2016-02-10 16:00:00","changed":"1475895253","gmt_changed":"2016-10-08 02:54:13","alt":"Cuba Intercambio","file":{"fid":"204574","name":"istock_000041377480_small.jpg","image_path":"\/sites\/default\/files\/images\/istock_000041377480_small_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/istock_000041377480_small_0.jpg","mime":"image\/jpeg","size":530718,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/istock_000041377480_small_0.jpg?itok=7CSs_OYL"}}},"media_ids":["495761"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"140011","name":"Amy Bruckman; Michaelanne Dye; School of Interactive Computing; Cuba; Casey Fiesler; ACM\u0027s Computer-Supported Cooperative Work \u0026 Social Computing Conference; multi-user domains"},{"id":"2699","name":"cuba"},{"id":"2229","name":"Internet"}],"core_research_areas":[{"id":"39501","name":"People and Technology"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:tlabouff@cc.gatech.edu\u0022\u003E\u003Cstrong\u003ETara La \u003C\/strong\u003E\u003Cstrong\u003EBouff\u003C\/strong\u003E\u003C\/a\u003E\u003Cbr \/\u003E Marketing Communications Manager\u003Cbr \/\u003E 404-894-7253 (Office)\u003Cbr \/\u003E 404-769-5408 (Mobile)\u003C\/p\u003E","format":"limited_html"}],"email":["tlabouff@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"501351":{"#nid":"501351","#data":{"type":"news","title":"New Privacy Deal Between US and Europe Reached","body":[{"value":"\u003Cp\u003EU.S. and European regulators agreed to a tentative\u0026nbsp;deal that would allow U.S. companies to continue moving the personal information of Europeans across the Atlantic. The new \u0022E.U.-U.S. Privacy Shield\u0022 deal replaces the original \u0022Safe Harbor\u0022 pact \u2014 an agreement that was struck down by Europe\u0027s top court last year, sending regulators\u0026nbsp;on both sides scrambling to establish a new arrangement. Georgia Tech\u0027s Peter Swire, associate director of policy for the Institute for Information Security \u0026amp; Privacy, said legal challenges could continue but he believes the deal has benefits for individuals on both sides of the pond.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2016\/02\/02\/the-massive-new-privacy-deal-between-u-s-and-europe-explained\/\u0022 target=\u0022_blank\u0022\u003ERead more\u003C\/a\u003E in \u003Cem\u003EThe Washington Post\u003C\/em\u003E.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EU.S. and European regulators agreed to a tentative\u0026nbsp;deal that would allow U.S. companies to continue moving the personal information of Europeans across the Atlantic. Georgia Tech\u0027s Peter Swire, associate director of policy for the Institute for Information Security \u0026amp; Privacy, explains.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"U.S. and European regulators agreed to a tentative deal that would allow U.S. companies to continue moving the personal information of Europeans overseas."}],"uid":"27490","created_gmt":"2016-02-16 20:17:51","changed_gmt":"2016-10-08 03:20:46","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-02-02T00:00:00-05:00","iso_date":"2016-02-02T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"494631":{"id":"494631","type":"image","title":"European Community","body":null,"created":"1454522400","gmt_created":"2016-02-03 18:00:00","changed":"1475895251","gmt_changed":"2016-10-08 02:54:11","alt":"European Community","file":{"fid":"204545","name":"istock_european_flags_small.jpg","image_path":"\/sites\/default\/files\/images\/istock_european_flags_small_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/istock_european_flags_small_0.jpg","mime":"image\/jpeg","size":614751,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/istock_european_flags_small_0.jpg?itok=5_EO5jJq"}}},"media_ids":["494631"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"2678","name":"information security"},{"id":"3221","name":"privacy"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39501","name":"People and Technology"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"484801":{"#nid":"484801","#data":{"type":"news","title":"Peter Swire to Debate European Privacy Activist Max Schrems","body":[{"value":"\u003Cp\u003ESince the\u0026nbsp;European Court of Justice ruled on \u003Cem\u003ESchrems v. Data Protection Commissioner\u003C\/em\u003E that personally identifiable information cannot be transfered between the EU and United States, Georgia Tech\u0027s Peter Swire has \u003Ca href=\u0022http:\/\/www.alstonprivacy.com\/swire-challenges-factual-basis-of-schrems-decision\/\u0022 target=\u0022_blank\u0022\u003Echallenged the factual basis\u003C\/a\u003E underpinning that decision. He will debate privacy activist Max Schrems on \u003Ca href=\u0022http:\/\/www.brusselsprivacyhub.org\/events.php\u0022 target=\u0022_blank\u0022\u003EJanuary 26, 2015 in Brussels, Belgium\u003C\/a\u003E. Swire -- who is the associate director of policy at the Institute for Information Security \u0026amp; Privacy and the Huang Professor of Law and Ethics at the Scheller College of Business at Georgia Tech -- plans to argue that the ECJ decision \u201csuffers from particular inaccuracies concerning the law and practice of U.S. foreign intelligence law.\u201d\u0026nbsp; More recently, Swire \u003Ca href=\u0022http:\/\/www.alstonprivacy.com\/swire-white-paper-for-eu-regulators\/\u0022 target=\u0022_blank\u0022\u003Eauthored a white paper through the Future of Privacy Forum\u003C\/a\u003E about the conequences of the Schrems judgement.\u003C\/p\u003E\u003Cp\u003ERead more in \u003Ca href=\u0022http:\/\/www.jdsupra.com\/legalnews\/the-digital-download-privacy-data-65740\/\u0022 target=\u0022_blank\u0022\u003EThe Digital Download Privacy \u0026amp; Security Monthly Newsletter\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003EListen to a \u003Ca href=\u0022https:\/\/soundcloud.com\/justin-hemmings-44462987\/privacy-in-the-eu-and-us-a-debate-between-max-schrems-and-peter-swire\u0022 target=\u0022_blank\u0022\u003Erecording of the debate\u003C\/a\u003E.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EPeter Swire -- associate director of policy at the Institute for Information Security \u0026amp; Privacy and the Huang Professor of Law and Ethics at the Scheller College of Business at Georgia Tech -- challenges European activist Max Schrems to a debate about the Safe Harbor Agreement\u003Ca href=\u0022http:\/\/www.brusselsprivacyhub.org\/events.php\u0022 target=\u0022_blank\u0022\u003E in Brussels, Belgium\u003C\/a\u003E.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Debate continues about transfer of personally identifiable information between EU and US."}],"uid":"27490","created_gmt":"2016-01-12 10:39:20","changed_gmt":"2016-10-08 03:20:24","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-01-11T00:00:00-05:00","iso_date":"2016-01-11T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"232191":{"id":"232191","type":"image","title":"Professor Peter Swire","body":null,"created":"1449243627","gmt_created":"2015-12-04 15:40:27","changed":"1475894906","gmt_changed":"2016-10-08 02:48:26","alt":"Professor Peter Swire","file":{"fid":"197584","name":"peterswire.jpg","image_path":"\/sites\/default\/files\/images\/peterswire_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/peterswire_0.jpg","mime":"image\/jpeg","size":1745031,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/peterswire_0.jpg?itok=JZS3Hvxi"}}},"media_ids":["232191"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"141341","name":"Institute for Information Security \u0026 Privacy"},{"id":"167089","name":"Scheller College of Business"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"501361":{"#nid":"501361","#data":{"type":"news","title":"Air Forces Names Organizations for $5B Cyber Research Project","body":[{"value":"\u003Cp\u003EU.S. Air Force cybersecurity experts are choosing 10 more companies to draw from a pot of money as large as $5 billion over the next five years for military cybersecurity and \u003Ca href=\u0022http:\/\/www.militaryaerospace.com\/articles\/2015\/03\/darpa-brandeis-solicitation.html\u0022\u003Einformation systems\u003C\/a\u003E research and development. Officials of the U.S. Air Force Installation Contracting Agency at Offutt Air Force Base, Neb., announced the contracts Thursday for the Cyber Security Technical Area Tasks (CS TATs) program. The contracts were awarded on behalf of the Air Force Combat Command.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.militaryaerospace.com\/articles\/2015\/11\/air-force-cyber.html\u0022 target=\u0022_blank\u0022\u003ERead more\u003C\/a\u003E in Military \u0026amp; Aerospace Electronics\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EU.S. Air Force cybersecurity experts choose 10 more companies to share in a $5-billion research project over the next five years, now including the Georgia Tech Research Institute.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The U.S. Air Forces names 10 organizations to share in cybersecurity research project."}],"uid":"27490","created_gmt":"2016-02-16 20:54:45","changed_gmt":"2016-10-08 03:20:35","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-11-23T00:00:00-05:00","iso_date":"2015-11-23T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"501371":{"id":"501371","type":"image","title":"USAF F-16","body":null,"created":"1455904800","gmt_created":"2016-02-19 18:00:00","changed":"1475895230","gmt_changed":"2016-10-08 02:53:50","alt":"USAF F-16","file":{"fid":"204125","name":"usaf_f-16.jpg","image_path":"\/sites\/default\/files\/images\/usaf_f-16_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/usaf_f-16_0.jpg","mime":"image\/jpeg","size":299991,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/usaf_f-16_0.jpg?itok=TP-Zjtuh"}}},"media_ids":["501371"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"416","name":"GTRI"},{"id":"2678","name":"information security"},{"id":"9696","name":"US Air Force"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"470511":{"#nid":"470511","#data":{"type":"news","title":"Georgia Tech Becomes First University to Join M3AAWG","body":[{"value":"\u003Cp\u003ELooking to share its advanced research on bot behavior, emerging infections and mitigation processes with the security community, the Georgia Institute of Technology is the first academic institution to join the Messaging, Malware and Mobile Anti-Abuse Working Group.\u0026nbsp; The university sees the closed, vetted structure within M3AAWG as a rare opportunity to disseminate its findings on the latest threats directly to network operators and public policy advisors while also obtaining feedback from these industry professionals, according to \u003Cstrong\u003EDr. Manos Antonakakis\u003C\/strong\u003E, computer systems and software assistant professor at Georgia Tech, School of Electrical and Computer Engineering, and M3AAWG Academic Committee co-chair.\u003Cbr \/\u003E\u003Cbr \/\u003E\u0022M3AAWG bridges the gap between academia and industry.\u0026nbsp; As researchers, we often identify new strategies to understand and disable complex illicit infrastructures, such as botnets and malware, and objectively measure other aspects of Internet abuse, for example, spam and ad fraud.\u0026nbsp; We want to share this information with the security community as quickly as possible and M3AAWG is an active channel for disseminating this data.\u0026nbsp; On the other hand, in order to commercialize this work, we need input from security professionals who are dealing with these challenges every day.\u0026nbsp; M3AAWG closes this loophole by providing the operational feedback that helps us turn our research into products industry can use to solve specific threats,\u0022 Antonakakis said.\u003Cbr \/\u003E\u003Cbr \/\u003EM3AAWG is recruiting university cybersecurity research programs to join its anti-abuse work so it can provide its members access to the experimental processes and academic studies that help improve end-user security.\u0026nbsp; The in-depth research at these institutions is especially important in a world where criminals can change a bot\u0027s coding to avoid detection in just minutes and new threats are always emerging.\u0026nbsp; In addition, universities also can participate in other projects.\u0026nbsp; For example, \u003Cstrong\u003EDr. Mustaque Ahamad\u003C\/strong\u003E, professor at Georgia Tech\u2019s School of Computer Science, is co-chair of the M3AAWG Voice and Telephony Abuse Special Interest Group, according to Michael Adkins, M3AAWG chairman.\u003Cbr \/\u003E\u003Cbr \/\u003EAdkins said, \u0022Georgia Tech has developed one of the leading computer science programs in the world and has a strong understanding of anti-abuse issues.\u0026nbsp; They have presented groundbreaking research at our meetings in the past, including early research on the effectiveness of bot mitigation notifications with its study of the DNS Charger program in 2013, data on new malware infections and updates on known threats.\u0026nbsp; We look forward to strengthening our relationship with their researchers, bringing the latest threat findings to our members, and providing input on new research and processes.\u0022\u003Cbr \/\u003E\u003Cbr \/\u003EThe recently established Institute for Information Security and Privacy (IISP) at Georgia Tech will significantly grow these research programs and related curricula to make fundamental advances in cybersecurity. U.S. News and World Report ranked its computer engineering program among the top ten in the nation.\u0026nbsp; \u003Cbr \/\u003E\u003Cbr \/\u003E\u003Cem\u003E\u003Cstrong\u003EAbout the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG)\u003C\/strong\u003E\u003C\/em\u003E\u003Cbr \/\u003EThe Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) is where the industry comes together to work against bots, malware, spam, viruses, denial-of-service attacks and other online exploitation. M3AAWG (\u003Ca href=\u0022http:\/\/www.m3aawg.org\u0022 title=\u0022www.m3aawg.org\u0022\u003Ewww.m3aawg.org\u003C\/a\u003E) represents more than one billion mailboxes from some of the largest network operators worldwide. It leverages the depth and experience of its global membership to tackle abuse on existing networks and new emerging services through technology, collaboration and public policy. It also works to educate global policy makers on the technical and operational issues related to online abuse and messaging. Headquartered in San Francisco, Calif., M3AAWG is driven by market needs and supported by major network operators and messaging providers.\u003Cbr \/\u003E\u003Cbr \/\u003E\u003Cem\u003E\u003Cstrong\u003EM3AAWG Board of Directors\u003C\/strong\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EAT\u0026amp;T (NYSE: T); CenturyLink (NYSE: CTL); Cloudmark, Inc.; Comcast (NASDAQ: CMCSA); Constant Contact (NASDAQ: CTCT); Cox Communications; Damballa, Inc.; Facebook; Google; LinkedIn; Mailchimp; Orange (NYSE: ORAN) and (Euronext: ORA); Return Path; Time Warner Cable; Verizon Communications; and Yahoo! Inc.\u003Cbr \/\u003E\u003Cbr \/\u003E\u003Cstrong\u003E\u003Cem\u003EM3AAWG Full Members\u003C\/em\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E1\u0026amp;1 Internet AG; Adobe Systems Inc.; AOL; Campaign Monitor Pty.; Cisco Systems, Inc.; CloudFlare; dotmailer; Dyn; ExactTarget, Inc.; IBM; iContact; Internet Initiative Japan (IIJ, NASDAQ: IIJI); Listrak; Litmus; McAfee Inc.; Microsoft Corp.; Mimecast; Nominum, Inc.; Oracle Marketing Cloud; OVH; PayPal; Proofpoint; Rackspace; Spamhaus; Sprint; Symantec and Twitter.\u003Cbr \/\u003E\u003Cbr \/\u003EA complete member list is available at \u003Ca href=\u0022http:\/\/www.m3aawg.org\/about\/roster\u0022 target=\u0022_blank\u0022\u003Ehttp:\/\/www.m3aawg.org\/about\/roster\u003C\/a\u003E.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":[{"value":"Will Share Vital Cybersecurity Research with Anti-Abuse Industry"}],"field_summary":[{"value":"\u003Cp\u003EGeorgia Tech sees the closed, vetted structure within M\u003Csup\u003E3\u003C\/sup\u003EAAWG as an opportunity to disseminate its findings on the latest threats directly to network operators and public policy advisors while also obtaining feedback from industry professionals.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Looking to share its advanced research on bot behavior, emerging infections and mitigation, Georgia Tech is the first academic institution to join the cybersecurity trade association\u0027s anti-abuse working group."}],"uid":"27490","created_gmt":"2015-11-17 10:56:12","changed_gmt":"2016-10-08 03:20:03","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-11-17T00:00:00-05:00","iso_date":"2015-11-17T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"473691":{"id":"473691","type":"image","title":"M3AAWG","body":null,"created":"1449257190","gmt_created":"2015-12-04 19:26:30","changed":"1475895223","gmt_changed":"2016-10-08 02:53:43","alt":"M3AAWG","file":{"fid":"203978","name":"logo_2.png","image_path":"\/sites\/default\/files\/images\/logo_2_0.png","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/logo_2_0.png","mime":"image\/png","size":13909,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/logo_2_0.png?itok=2Lwea1g4"}}},"media_ids":["473691"],"groups":[{"id":"50875","name":"School of Computer Science"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJackie Nemeth, 404.894.2906\u003C\/p\u003E","format":"limited_html"}],"email":["jackie.nemeth@ece.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"463301":{"#nid":"463301","#data":{"type":"news","title":"Georgia Tech Establishes New Cybersecurity Research Effort","body":[{"value":"\u003Cp\u003EIn response to widespread and persistent cybersecurity threats to businesses, government and individuals, the Georgia Institute of Technology today announces the formation of a new, interdisciplinary research collaborative \u2013 the Institute for Information Security \u0026amp; Privacy (IISP).\u003C\/p\u003E\u003Cp\u003EThe IISP aligns the expertise of 200 researchers and nine labs across \u003Ca href=\u0022http:\/\/www.gatech.edu\/academics\/colleges-and-schools\u0022\u003Efour colleges\u003C\/a\u003E and the \u003Ca href=\u0022http:\/\/gtri.gatech.edu\/\u0022\u003EGeorgia Tech Research Institute\u003C\/a\u003E (GTRI) to form a single gateway to all cybersecurity efforts. Its purpose is to connect academia, industry and government to seamlessly develop vital solutions for national security, economic continuity and individual safety.\u003C\/p\u003E\u003Cp\u003EIt is led by Co-Directors \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/bo-rotoloni\u0022\u003EBo Rotoloni\u003C\/a\u003E, a principal research engineer at GTRI, and \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/wenke-lee\u0022\u003EWenke Lee\u003C\/a\u003E, a professor in the \u003Ca href=\u0022http:\/\/www.cc.gatech.edu\u0022\u003ECollege of Computing\u003C\/a\u003E and one of the world\u2019s most prolific cybersecurity researchers. Associate directors include experts in law, business management, computing and defense.\u003C\/p\u003E\u003Cp\u003E\u201cCybersecurity is no longer just a computer science problem for programmers; this is an issue that now touches every area of society,\u201d says Lee, whose research involves protecting industrial control systems, hardening defense equipment and secure Internet browsing. \u201cIt involves new policy considerations, better initial product design and more training for the professionals involved. We are doubling down to discover, connect and solve modern cybersecurity threats.\u201d\u003C\/p\u003E\u003Cp\u003EGeorgia Tech Executive Vice President for Research Stephen Cross says this effort is essential at a time when consumers readily trade private personal data for convenience and the public has become more dependent on cyber-physical systems.\u003C\/p\u003E\u003Cp\u003E\u201cGeorgia Tech has the academic foundational research and educational programs, the technology transfer and applied research that make a real impact with industry and government, and the ability to understand and study the broader, societal impact,\u201d Cross says. \u201cCybersecurity work takes place in these three spheres, and the Institute for Information Security \u0026amp; Privacy has been built at the intersection of all three.\u201d\u003C\/p\u003E\u003Cp\u003EInitial research will focus on six areas: privacy policy, consumer-facing privacy, attribution, risk, trust and cyber-physical systems.\u003C\/p\u003E\u003Cp\u003E\u201cUnder the IISP, we expect to double our current cybersecurity research activity to move more research out to the marketplace, to develop new continuing education programs for professionals and to broaden the cybersecurity curriculum so it is taught across more degree fields at Georgia Tech,\u201d says Rotoloni. \u201cWe want to be a catalyst for an information security industry in Georgia that is already attracting national attention and embolden it through joint research projects with companies of all sizes and critical government agencies.\u201d\u003C\/p\u003E\u003Cp\u003EFor more about the Institute for Information Security \u0026amp; Privacy, see \u003Ca href=\u0022http:\/\/iisp.gatech.edu\u0022\u003Ehttp:\/\/iisp.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":[{"value":"Eleventh Interdisciplinary Research Institute Brings More Colleges into Cybersecurity Work"}],"field_summary":[{"value":"\u003Cp\u003EIn response to widespread and persistent cybersecurity threats to businesses, government and individuals, the Georgia Institute of Technology today announces the formation of a new, interdisciplinary research collaborative \u2013 the Institute for Information Security \u0026amp; Privacy (IISP). The IISP aligns the expertise of 200 researchers and nine labs across \u003Ca href=\u0022http:\/\/www.gatech.edu\/academics\/colleges-and-schools\u0022\u003Efour colleges\u003C\/a\u003E and the \u003Ca href=\u0022http:\/\/gtri.gatech.edu\/\u0022\u003EGeorgia Tech Research Institute\u003C\/a\u003E (GTRI) to form a single gateway to all cybersecurity efforts. Its purpose is to connect academia, industry and government to seamlessly develop vital solutions for national security, economic continuity and individual safety.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Institute of Technology today announces the formation of a new, interdisciplinary research collaborative \u2013 the Institute for Information Security \u0026 Privacy (IISP)."}],"uid":"27490","created_gmt":"2015-10-27 23:15:55","changed_gmt":"2016-10-08 03:17:54","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-10-27T00:00:00-04:00","iso_date":"2015-10-27T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"451401":{"id":"451401","type":"image","title":"IISP logo 2","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo 2","file":{"fid":"203340","name":"instituteforinformationsecurityprivacy-solid-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-solid-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-solid-black874_0.jpg","mime":"image\/jpeg","size":78240,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-solid-black874_0.jpg?itok=45BN7to8"}}},"media_ids":["451401"],"related_links":[{"url":"http:\/\/iisp.gatech.edu\/","title":"Visit the stitute for Information Security \u0026 Privacy Website"}],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"135","name":"Research"}],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:tlabouff@cc.gatech.edu\u0022 target=\u0022_blank\u0022\u003ETara La Bouff\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003ECommunications Manager\u003C\/p\u003E\u003Cp\u003E404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":["tlabouff@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"501391":{"#nid":"501391","#data":{"type":"news","title":"University System of Georgia Explores Cybersecurity Center in Atlanta","body":[{"value":"\u003Cp\u003EThe University System of Georgia asked Gov. Nathan Deal for funds to create a cybersecurity center in Atlanta at Georgia Tech that would drive research and curriculum development across all schools in the University System of Georgia system. Both Georgia Tech and Augusta University recently launched their own cybersecurity institutes.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/chronicle.augusta.com\/news\/government\/2015-11-04\/university-system-georgia-wants-cybersecurity-center-atlanta?v=1446686470\u0022 target=\u0022_blank\u0022\u003ERead more\u003C\/a\u003E in The Augusta Chronicle.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe University System of Georgia asked Gov. Nathan Deal for funds to create a cybersecurity center in Atlanta at Georgia Tech.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The University System of Georgia asked Gov. Nathan Deal for funds to create a cybersecurity center in Atlanta at Georgia Tech."}],"uid":"27490","created_gmt":"2016-02-16 21:34:05","changed_gmt":"2016-10-08 03:20:03","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-11-04T00:00:00-05:00","iso_date":"2015-11-04T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"54724":{"id":"54724","type":"image","title":"USG Logo","body":null,"created":"1449175459","gmt_created":"2015-12-03 20:44:19","changed":"1475894476","gmt_changed":"2016-10-08 02:41:16"}},"media_ids":["54724"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"459721":{"#nid":"459721","#data":{"type":"external_news","title":"Georgia Tech Ranked in Top 10 of World\u0027s Engineering Colleges","body":[{"value":"\u003Cp\u003EOne of the famous engineering institutes in the world, the Georgia Institute of Technology is more commonly referred to as Georgia Tech. It was established in 1885. It has six colleges and 31 departments with science and technology being its main focus.\u003C\/p\u003E\u003Cp\u003EJimmy Carter, former US president and a Nobel laureate at studied at Georgia Tech. Apart from him, there are many great personalities who have studied at Georgia Tech are Mike Duke, the CEO of WalMart, Nobel laureate Kary Mullis, astronaut William S. McArthur, Richard H. Truly, former head of NASA and many others.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"28124","created_gmt":"2015-10-16 09:08:56","changed_gmt":"2016-10-08 02:27:46","author":"Tyler Sharp","boilerplate_text":"","field_publication":"","publication":"private space missions","field_article_url":"","publication_url":"http:\/\/ireport.cnn.com\/docs\/DOC-1276978","dateline":{"date":"2015-10-16T00:00:00-04:00","iso_date":"2015-10-16T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"449181":{"id":"449181","type":"image","title":"Tech Tower","body":null,"created":"1449256264","gmt_created":"2015-12-04 19:11:04","changed":"1475895189","gmt_changed":"2016-10-08 02:53:09","alt":"Tech Tower","file":{"fid":"203285","name":"tech_tower_ii.jpg","image_path":"\/sites\/default\/files\/images\/tech_tower_ii_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/tech_tower_ii_0.jpg","mime":"image\/jpeg","size":5997542,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/tech_tower_ii_0.jpg?itok=42L1g--1"}}},"media_ids":["449181"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"462191":{"#nid":"462191","#data":{"type":"news","title":"Feds Come to Georgia to Talk Cell Phones in Prisons","body":[{"value":"\u003Cp\u003EA member of the Federal Communications Commission wants to address contraband cell phones in prisons, and cell phone jammers have been suggested as one solution. The problem is a national one, but in Georgia prisons alone, 8,305 contraband cellphones have been seized in 2015, either from inmates or from people trying to smuggle them in. Georgia Tech \u003Cstrong\u003EResearch Engineer Chuck Bokath\u003C\/strong\u003E explains why jammers may not be the right solution because they indiscrimately block call access for anyone inside the prisons.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.timesfreepress.com\/news\/local\/story\/2015\/oct\/16\/8000-contraband-cellphones-seized-georgia-prisons-just-year\/330917\/\u0022 target=\u0022_blank\u0022\u003ERead more in TimesFreePress.com\u003C\/a\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003ECell phone jammers have been suggested as one solution to contraband phones inside prisons across the United States. Georgia Tech\u0027s Chuck Bokath explains why jammers actually could hinder prison safety.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech\u0027s Chuck Bokath explains why cell phone jammers could hinder safety in prisons."}],"uid":"27490","created_gmt":"2015-10-25 10:49:56","changed_gmt":"2016-10-08 03:19:51","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-10-15T00:00:00-04:00","iso_date":"2015-10-15T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"462181":{"id":"462181","type":"image","title":"Contraband Phones | Photo by Associated Press","body":null,"created":"1449256373","gmt_created":"2015-12-04 19:12:53","changed":"1475895206","gmt_changed":"2016-10-08 02:53:26","alt":"Contraband Phones | Photo by Associated Press","file":{"fid":"203630","name":"prisoncellphones_ap.jpg","image_path":"\/sites\/default\/files\/images\/prisoncellphones_ap_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/prisoncellphones_ap_0.jpg","mime":"image\/jpeg","size":102351,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/prisoncellphones_ap_0.jpg?itok=NPy2tl_z"}}},"media_ids":["462181"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"862","name":"Cell Phones"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39481","name":"National Security"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:tlabouff@cc.gatech.edu\u0022 target=\u0022_blank\u0022\u003ETara La Bouff\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003ECommunications Manager\u003C\/p\u003E\u003Cp\u003E404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":["tara.labouff@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"501381":{"#nid":"501381","#data":{"type":"news","title":"Army Shows Commanders What Cyber Capabilities Are Possible","body":[{"value":"\u003Cp\u003EThe Army\u0027s cyber branch is using pilot programs and training center rotations to show commanders at a variety of echelons what cyber capabilities can be brought to the table and, at the same time, refine how cyber will be a part of tactical operations both on the defensive and offensive side, leaders said Tuesday\u0026nbsp;at an Association of the US Army forum. Georgia Tech\u0027s J.D. McCreary explains.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.defensenews.com\/story\/defense\/land\/army\/2015\/11\/10\/army-learning-how-cyber-support-plays-role-in-tactical-operations\/75545442\/\u0022 target=\u0022_blank\u0022\u003ERead more\u003C\/a\u003E in Defense News.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Army\u0027s cyber branch is using pilot programs and training center rotations to show commanders what cyber capabilities can be used on the defensive and offensive side. Georgia Tech\u0027s J.D. McCreary explains.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The Army\u0027s cyber branch is using pilot programs to show commanders what cyber capabilities can be used."}],"uid":"27490","created_gmt":"2016-02-16 21:17:31","changed_gmt":"2016-10-08 03:20:16","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-10-10T00:00:00-04:00","iso_date":"2015-10-10T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"340941":{"id":"340941","type":"image","title":"Research Horizons - Tackling Cyber Threats -Army","body":null,"created":"1449245595","gmt_created":"2015-12-04 16:13:15","changed":"1475895057","gmt_changed":"2016-10-08 02:50:57","alt":"Research Horizons - Tackling Cyber Threats -Army","file":{"fid":"200719","name":"cybersecurity_threats_8.jpg","image_path":"\/sites\/default\/files\/images\/cybersecurity_threats_8_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/cybersecurity_threats_8_0.jpg","mime":"image\/jpeg","size":659156,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cybersecurity_threats_8_0.jpg?itok=0sC3RAdP"}}},"media_ids":["340941"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"130751","name":"Military Cyberdefense"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"457051":{"#nid":"457051","#data":{"type":"news","title":"Solving the Internet\u2019s Identity Crisis","body":[{"value":"\u003Cp\u003EOn the Internet, \u201cnobody knows you\u2019re a dog,\u201d is the joke behind a famous\u0026nbsp;\u003Cem\u003ENew Yorker\u003C\/em\u003E\u0026nbsp;cartoon with a canine at the keyboard. But identity trust is a serious problem for Internet Service Providers (ISPs) who are responsible for routing billions of users to the right destination every day.\u003C\/p\u003E\u003Cp\u003EResearchers at the Georgia Institute of Technology are working on a new, multi-year project funded by the National Science Foundation, called \u201cResource Public Key Infrastructure,\u201d to help end Internet trickery. It begins with new tools that allow ISPs to better verify the true owner of a network and legitimate traffic paths.\u003C\/p\u003E\u003Cp\u003E\u201cWe know it\u2019s easy to lie on the Internet,\u201d says primary investigator\u0026nbsp;\u003Cstrong\u003ERuss Clark\u003C\/strong\u003E, a senior research scientist in the School of Computer Science at Georgia Tech. \u201cIt happens because of a weakness in the trust relationship between routing protocols. Those protocols were not designed to recognize imposters and especially not fake ISPs.\u201d\u003C\/p\u003E\u003Cp\u003EClark, along with\u0026nbsp;\u003Cstrong\u003ECas D\u2019Angelo\u003C\/strong\u003E\u0026nbsp;and\u0026nbsp;\u003Cstrong\u003EScott Friedrich\u003C\/strong\u003E\u0026nbsp;from Georgia Tech\u2019s Office of Information Technology and undergraduate student\u0026nbsp;\u003Cstrong\u003ESam Norris\u003C\/strong\u003E\u0026nbsp;(EIA), will address the Internet identity problem with new protocols such as RPKI, the Resource Public Key Infrastructure.\u003C\/p\u003E\u003Cp\u003ETrust is determined in the router and the server resources alongside. To verify that network owners are legitimate, Georgia Tech will add a new type of server to the routing infrastructure as a first step. Next, it will update the software inside routers, gradually deploying the changes through the Southern Crossroads Internet Exchange (SoX), documenting observations, and creating a recipe for others across the United States to follow.\u003C\/p\u003E\u003Cp\u003E\u201cThis solution has been known for about the past five years, but network operators are reluctant to try it out of fear of slowing down traffic for customers in the interim,\u201d Clark says. \u201cThe NSF tasked Georgia Tech with moving deployment along. We\u2019re going to prove that it\u2019s possible, work through the pains, and show others how to do it.\u201d\u003C\/p\u003E\u003Cp\u003EThe deployment will happen in phases.\u003C\/p\u003E\u003Cp\u003EIn addition to Georgia Tech researchers and labs, Clark and his team help manage the Southern Crossroads (SoX) regional network where 21 member institutions come together for shared network services. The project team expects to deploy over SoX in the next year.\u003C\/p\u003E\u003Cp\u003E\u201cIn the quest to make the Internet faster, we\u2019ve often tried to find the shortest route to a website. This is making us vulnerable,\u201d Clark says. \u201cNow, we need to find the smartest route.\u201d\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":[{"value":"Georgia Tech leads effort to establish new trust relationships between ISPs"}],"field_summary":[{"value":"\u003Cp\u003EResearchers at the Georgia Institute of Technology are developing new tools to help ISPs verify the true owner of a network and legitimate traffic paths.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Researchers at the Georgia Institute of Technology are developing new tools to help ISPs verify the true owner of a network and legitimate traffic paths."}],"uid":"28124","created_gmt":"2015-10-08 09:00:08","changed_gmt":"2016-10-08 03:19:43","author":"Tyler Sharp","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-10-08T00:00:00-04:00","iso_date":"2015-10-08T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"357321":{"id":"357321","type":"image","title":"Russ Clark compressed","body":null,"created":"1449245767","gmt_created":"2015-12-04 16:16:07","changed":"1475895091","gmt_changed":"2016-10-08 02:51:31","alt":"Russ Clark compressed","file":{"fid":"201445","name":"russ-clark.jpg","image_path":"\/sites\/default\/files\/images\/russ-clark_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/russ-clark_0.jpg","mime":"image\/jpeg","size":13656,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/russ-clark_0.jpg?itok=GwgRs9_w"}}},"media_ids":["357321"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"136171","name":"Cas D\u0027Angelo"},{"id":"362","name":"National Science Foundation"},{"id":"144171","name":"Resource Public Key Infrastructure"},{"id":"11167","name":"Russ Clark"},{"id":"171491","name":"Scott Friedrich"},{"id":"171492","name":"Southern Crossroads regional network"},{"id":"171466","name":"SoX"}],"core_research_areas":[{"id":"39501","name":"People and Technology"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:tlabouff@cc.gatech.edu\u0022\u003ETara La Bouff\u003C\/a\u003E\u003Cbr \/\u003ECommunications Manager\u003Cbr \/\u003E404.894.7253\u003C\/p\u003E","format":"limited_html"}],"email":["tlabouff@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"446691":{"#nid":"446691","#data":{"type":"news","title":"Computer Science Students, Faculty Take Honors at FSE \u201815","body":[{"value":"\u003Cp\u003EMultiple students and faculty from Georgia Tech\u0027s College of Computing achieved the highest honors at \u003Cem\u003EACM SIGSOFT Symposium on the Foundations of Software Engineering\u003C\/em\u003E\u003Cem\u003E (\u003C\/em\u003EFSE \u201915) -- one of the two flagship software engineering conferences, held in Italy, Aug 30-Sept 7.\u003C\/p\u003E\u003Cp\u003EThe paper \u0022Visualization of Test Information to Assist Fault Localization\u0022 co-authored by James Jones (who received his PhD in CS from Georgia Tech and currently an associate professor at University of California - Irvine), the late Mary Jean Harrold (CS), and John Stasko (IC), won the ACM SIGSOFT \u201cImpact Paper Award\u201d at the conference.\u0026nbsp; The paper, which was published at the International Conference on Software Engineering (ICSE \u201802), is one of the most cited software-engineering papers and has influenced many subsequent research endeavors, particularly in the popular field of spectra-based fault localization. The plaque that recognizes Harrold\u2019s contribution will be hung in the CS Faculty Lounge, and the check that comes with it will be donated to Harrold\u2019s Graduate Fellowship (both courtesy of her family).\u003C\/p\u003E\u003Cp\u003EAdditionally, two papers won ACM SIGSOFT Distinguished Paper Awards at the conference:\u0026nbsp;\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003E\u0022A User-Guided Approach to Program Analysis\u0022 by Ravi Mangal (MS CS), Xin Zhang (MS CS), Aditya V. Nori (external collaborator), and Assistant Professor Mayur Naik (CS). Both Ravi and Xin are advised by Naik.\u003C\/li\u003E\u003C\/ul\u003E\u003Cul\u003E\u003Cli\u003E\u0022Users Beware: Preference Inconsistencies Ahead\u0022 by Farnaz Behrang (MS CS), Myra Cohen (external collaborator), and Associate Chair Alex Orso (CS). Farnaz is advised by Orso.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EBetween these two papers, Georgia Tech bagged 25% of the Distinguished Paper Awards given at FSE 2015, says Naik.\u003C\/p\u003E\u003Cp\u003EBesides the above two papers, a third paper \u0022FlexJava: Language Support for Safe and Modular Approximate Programming\u0022 by Jongsea Park (MS CS), Xin Zhang (MS CS), Assistant Professor Hadi Esmaeilzadeh (CS), Naik, and Assistant Professor Bill Harris (CS) also was accepted to FSE \u201815.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Multiple students and faculty from Georgia Tech\u0027s College of Computing achieved the highest honors at ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE \u201915) -- one of the two flagship software engineering conferences, held last week."}],"uid":"28124","created_gmt":"2015-09-11 08:22:30","changed_gmt":"2016-10-08 03:19:33","author":"Tyler Sharp","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-09-11T00:00:00-04:00","iso_date":"2015-09-11T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"365201":{"id":"365201","type":"image","title":"Tech Tower close up","body":null,"created":"1449245805","gmt_created":"2015-12-04 16:16:45","changed":"1475895100","gmt_changed":"2016-10-08 02:51:40","alt":"Tech Tower close up","file":{"fid":"201663","name":"08c1004-p4-066_0.jpg","image_path":"\/sites\/default\/files\/images\/08c1004-p4-066_0_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/08c1004-p4-066_0_0.jpg","mime":"image\/jpeg","size":833349,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/08c1004-p4-066_0_0.jpg?itok=nrpGz199"}}},"media_ids":["365201"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"141051","name":"FSE 2015; Farnaz Behrang; Alex Orso; Ravi Mangal; Mary Jean Harrold"},{"id":"141041","name":"Jongsea Park; Xin Zhang; Hadi Esmaeilzadeh; Mayur Naik; Bill Harris"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:tlabouff@cc.gatech.edu\u0022\u003ETara La Bouff\u003C\/a\u003E\u003Cbr \/\u003ECommunications Manager\u003Cbr \/\u003E404.894.7253\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"447101":{"#nid":"447101","#data":{"type":"news","title":"Want to Hack the Mars Rover? Take a Look at ...","body":[{"value":"\u003Cp\u003EThere\u2019s a simple flaw inside a widely used operating system, though not one most would be familiar with, called VxWorks. It happens to be the same software used to control parts of NASA\u2019s Curiosity Mars Rover and many critical infrastructure systems... In June, the US Industrial Control Systems Computer Emergency Response Team TISI +%, run by the Department of Homeland Security, \u003Ca href=\u0022https:\/\/ics-cert.us-cert.gov\/advisories\/ICSA-15-169-01\u0022\u003Ewarned about a flaw\u003C\/a\u003E uncovered by \u003Cstrong\u003EAssociate Professor Raheem Beyah\u003C\/strong\u003E and students David Formby and Sang Shin Jung of Georgia Tech.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.forbes.com\/sites\/thomasbrewster\/2015\/09\/10\/vxworks-remote-code-vulnerability\/\u0022 target=\u0022_blank\u0022\u003ERead more in \u003Cem\u003EForbes Online\u003C\/em\u003E\u003C\/a\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EA flaw inside a widely used operating system could allow hackers to control parts of NASA\u2019s Curiosity Mars Rover... It was uncovered by Associate Professor Raheem Beyah and students at Georgia Tech.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech\u0027s Raheem Beyah ponders whether TCP protocol vulnerabilities add risk to the Mars Rover or persist in other systems used by NASA."}],"uid":"27490","created_gmt":"2015-09-13 21:58:05","changed_gmt":"2016-10-08 03:19:33","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-09-10T00:00:00-04:00","iso_date":"2015-09-10T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"447111":{"id":"447111","type":"image","title":"Mars Rover","body":null,"created":"1449256246","gmt_created":"2015-12-04 19:10:46","changed":"1475895187","gmt_changed":"2016-10-08 02:53:07","alt":"Mars Rover","file":{"fid":"203236","name":"nasa_mars_rover.jpg","image_path":"\/sites\/default\/files\/images\/nasa_mars_rover_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/nasa_mars_rover_0.jpg","mime":"image\/jpeg","size":877752,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/nasa_mars_rover_0.jpg?itok=g_GE3YIq"}}},"media_ids":["447111"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"446321":{"#nid":"446321","#data":{"type":"news","title":"ECE Programs Remain Strong in Latest U.S. News \u0026 World Report Rankings","body":[{"value":"\u003Cp\u003EThe\u0026nbsp;\u003Cem\u003EU.S. News \u0026amp; World Report\u0026nbsp;\u003C\/em\u003EBest Colleges Issue, which includes undergraduate engineering program rankings, has been published and the results for the Georgia Tech School of Electrical and Computer Engineering (ECE) are fantastic.\u003C\/p\u003E\u003Cp\u003EElectrical engineering moved up two spots to place fourth, tying its previous best ranking, which was last held in 2011.\u0026nbsp;Computer engineering remained strong at sixth place, maintaining the same position as last year.\u003C\/p\u003E\u003Cp\u003EThe College of Engineering ranked fifth, and all of the programs offered by the College placed among the top seven of their respective disciplines.\u0026nbsp;Georgia Tech also retained its seventh place standing among all public universities.\u003C\/p\u003E\u003Cp\u003E\u201cWe have incredible academic and research programs in ECE, thanks to the efforts of the finest faculty, staff, and students anywhere,\u201d said Steven W. McLaughlin, professor and the Steve W. Chaddick School Chair. \u201cI sincerely appreciate everything that everyone does to help make \u0027ECE the place to be.\u0027\u0022\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003ENote: \u003C\/em\u003EU.S. News \u0026amp; World Report \u003Cem\u003Ereleased the 2016 Best Colleges rankings on Sept. 9.\u0026nbsp;At the initial publication of the Best Undergraduate Engineering Programs rankings \u2013 both of programs where a doctorate is the highest degree offered and programs where a doctorate is not offered \u2013 a database error caused schools to receive incorrect ranks. As a result, the rank of the Georgia Tech College of Engineering has been adjusted from sixth place to fifth place. This article, which was first published on September 10, 2015, has been updated to reflect that change. \u003Ca href=\u0022http:\/\/www.usnews.com\/education\/blogs\/college-rankings-blog\/2015\/09\/22\/correction-to-best-undergraduate-business-engineering-rankings\u0022\u003ERead here for more details\u003C\/a\u003E. \u003C\/em\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EGeorgia Tech\u0027s electrical engineering program ranked 4th and computer engineering held\u0026nbsp; at #6 in the 2016 \u003Cem\u003EU.S. News \u0026amp; World Report\u003C\/em\u003E Best Colleges Issue.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech\u0027s electrical engineering program placed fourth, and the computer engineering program held steady at sixth place in the 2016 U.S. News \u0026 World Report Best Colleges Issue, which also includes undergraduate engineering program rankings."}],"uid":"27241","created_gmt":"2015-09-10 10:05:47","changed_gmt":"2016-10-08 03:19:29","author":"Jackie Nemeth","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-09-10T00:00:00-04:00","iso_date":"2015-09-10T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"161361":{"id":"161361","type":"image","title":"Tech Tower in the Fall","body":null,"created":"1449178896","gmt_created":"2015-12-03 21:41:36","changed":"1475894796","gmt_changed":"2016-10-08 02:46:36","alt":"Tech Tower in the Fall","file":{"fid":"195425","name":"falltower.jpg","image_path":"\/sites\/default\/files\/images\/falltower_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/falltower_0.jpg","mime":"image\/jpeg","size":752640,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/falltower_0.jpg?itok=izUpS3UR"}}},"media_ids":["161361"],"related_links":[{"url":"http:\/\/www.ece.gatech.edu\/","title":"School of Electrical and Computer Engineering"},{"url":"http:\/\/coe.gatech.edu\/news\/undergraduate-engineering-programs-rank-high-latest-us-news-world-report-best-college-rankings","title":"College of Engineering 2016 U.S. News rankings story"},{"url":"http:\/\/www.news.gatech.edu\/2015\/09\/09\/georgia-tech-remains-strong-us-news-world-report-rankings","title":"Georgia Tech 2016 U.S. News rankings story"},{"url":"http:\/\/www.usnews.com\/","title":"U.S. News \u0026 World Report"}],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"129","name":"Institute and Campus"},{"id":"134","name":"Student and Faculty"}],"keywords":[{"id":"109","name":"Georgia Tech"},{"id":"166855","name":"School of Electrical and Computer Engineering"},{"id":"1875","name":"U.S. News \u0026 World Report"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJackie Nemeth\u003C\/p\u003E\u003Cp\u003ESchool of Electrical and Computer Engineering\u003C\/p\u003E\u003Cp\u003E404-894-2906\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022mailto:jackie.nemeth@ece.gatech.edu\u0022\u003Ejackie.nemeth@ece.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":["jackie.nemeth@ece.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"446121":{"#nid":"446121","#data":{"type":"news","title":"Encryption and Privacy Top Priorities for Tech Firms","body":[{"value":"\u003Cp\u003EThe Justice Department and Microsoft go head-to-head in the U.S. Second Circuit Court of Appeals in Manhattan on Wednesday. The battleground? Data privacy. At issue is the question of whether U.S. law enforcement can use a search warrant \u2014 in this case, in a drug investigation \u2014 to force the U.S.-based technology company to turn over emails it has stored in a data center in Ireland. Lower courts have sided with the government, and held Microsoft in contempt for refusing to comply with the search warrant. Microsoft has appealed, arguing that its data center is subject to Irish and European privacy laws and outside the jurisdiction of U.S. authorities. Civil liberties and internet-privacy advocates are watching the case closely, as are company and law-enforcement lawyers. They\u0027re also watching another case, also involving a drug investigation, in which Apple was served with a court order instructing it to turn over text messages between iPhone owners\u2026. \u201cThis way, the companies don\u2019t open up the device,\u201d says\u0026nbsp;\u003Cstrong\u003EPeter Swire\u003C\/strong\u003E, an expert on computer security at \u003Cstrong\u003EGeorgia Tech \u003C\/strong\u003Ewho served on President Obama\u2019s task force on surveillance and cybersecurity.\u0026nbsp;\u201cThe companies don\u2019t have access to the content between Alice and Bob.\u201d If the company that made the device, or is carrying the communication on its network, can\u2019t eavesdrop on users like Alice and Bob, he says, the FBI and other outside parties can\u2019t either.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.marketplace.org\/topics\/tech\/encryption-and-privacy-top-priorities-tech-firms\u0022 target=\u0022_blank\u0022\u003ERead more in Marketplace\u003C\/a\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Justice Department and Microsoft battle in court over data privacy -- whether U.S. law enforcement can use a search warrant to obtain emails stored in an overseas data center.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Marketplace report"}],"uid":"27490","created_gmt":"2015-09-09 20:53:57","changed_gmt":"2016-10-08 03:19:29","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-09-09T00:00:00-04:00","iso_date":"2015-09-09T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"446131":{"id":"446131","type":"image","title":"IISP - data privacy image","body":null,"created":"1449256217","gmt_created":"2015-12-04 19:10:17","changed":"1475895187","gmt_changed":"2016-10-08 02:53:07","alt":"IISP - data privacy image","file":{"fid":"203202","name":"istock_000067318595_double.jpg","image_path":"\/sites\/default\/files\/images\/istock_000067318595_double_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/istock_000067318595_double_0.jpg","mime":"image\/jpeg","size":3146478,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/istock_000067318595_double_0.jpg?itok=qsTFUF07"}}},"media_ids":["446131"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"447061":{"#nid":"447061","#data":{"type":"news","title":"Georgia Tech Helps Thwart Cyber Attacks","body":[{"value":"\u003Cp\u003EIn this guest column for the Atlanta Journal-Constitution, \u003Cstrong\u003EDr. Wenke Lee,\u003C\/strong\u003E professor and co-director of the Institute for Information Security \u0026amp; Privacy, explains how Georgia Tech is at the forefront of developing the groundbreaking cybersecurity protections needed today and why where the government spends its money can be a harbinger of what is needed most.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.myajc.com\/news\/news\/opinion\/tech-helps-thwart-cyberterrorism\/nnbbN\/\u0022 target=\u0022_blank\u0022\u003ERead more in the \u003Cem\u003EAtlanta Journal-Constitution\u003C\/em\u003E\u003C\/a\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EDr. Wenke Lee describes the growing sophistication of cyberattacks and makes a case for bolder solutions in this guest column for the Atlanta Journal-Constitution.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech Information Security Center Director and Professor Wenke Lee explains how Tech is at the forefront of developing the groundbreaking cybersecurity protections needed today."}],"uid":"27490","created_gmt":"2015-09-13 21:02:09","changed_gmt":"2016-10-08 03:19:33","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-09-09T00:00:00-04:00","iso_date":"2015-09-09T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"447071":{"id":"447071","type":"image","title":"Dr. Wenke Lee, IISP","body":null,"created":"1449256246","gmt_created":"2015-12-04 19:10:46","changed":"1475895187","gmt_changed":"2016-10-08 02:53:07","alt":"Dr. Wenke Lee, IISP","file":{"fid":"203234","name":"lee_iisp_sm.jpg","image_path":"\/sites\/default\/files\/images\/lee_iisp_sm_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/lee_iisp_sm_0.jpg","mime":"image\/jpeg","size":1130772,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/lee_iisp_sm_0.jpg?itok=_p3MZ7Pb"}}},"media_ids":["447071"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"447081":{"#nid":"447081","#data":{"type":"news","title":"Research Horizons: Preventing the Click Up","body":[{"value":"The rise of digital devices and technologies has dramatically increased online activities for individuals, businesses, and governments. And though this accelerated connectivity brings many benefits, it also creates a treasure-trove of data to plunder \u2014 along with new forms of foul play... Georgia Tech puts the sting on cyber criminals with an arsenal of security tools and a new Institute for Information Security \u0026amp; Privacy, led by co-directors \u003Cstrong\u003EWenke Lee\u003C\/strong\u003E and \u003Cstrong\u003EBo Rotoloni\u003C\/strong\u003E.\u0026nbsp;\u003Ca href=\u0022https:\/\/www.rh.gatech.edu\/features\/preventing-click\u0022 target=\u0022_self\u0022\u003ERead more in the September edition of \u003Cem\u003EGeorgia Tech Research Horizons\u003C\/em\u003E.\u003C\/a\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EAs cybercriminals become more cunning, Georgia Tech researchers expand their arsenal of security innovations.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"As cybercriminals become more cunning, Georgia Tech researchers expand their arsenal of security innovations."}],"uid":"27490","created_gmt":"2015-09-13 21:37:10","changed_gmt":"2016-10-08 03:19:33","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-09-07T00:00:00-04:00","iso_date":"2015-09-07T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"447091":{"id":"447091","type":"image","title":"Preventing the Click-Up","body":null,"created":"1449256246","gmt_created":"2015-12-04 19:10:46","changed":"1475895187","gmt_changed":"2016-10-08 02:53:07","alt":"Preventing the Click-Up","file":{"fid":"203235","name":"infosec_teaser_0.png","image_path":"\/sites\/default\/files\/images\/infosec_teaser_0_0.png","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/infosec_teaser_0_0.png","mime":"image\/png","size":223552,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/infosec_teaser_0_0.png?itok=U9bXVxGt"}}},"media_ids":["447091"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"443671":{"#nid":"443671","#data":{"type":"external_news","title":"Technology Professionals Say Georgia Tech is a Top College in America","body":[{"value":"\u003Cp\u003EGeorgia Tech is ranked number 13 in a survey of tech industry professionals.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"28124","created_gmt":"2015-09-02 08:51:38","changed_gmt":"2016-10-08 02:27:41","author":"Tyler Sharp","boilerplate_text":"","field_publication":"","publication":"LZRD sleeve","field_article_url":"","publication_url":"http:\/\/www.businessinsider.in\/People-who-work-in-tech-say-these-are-the-25-best-colleges-in-America\/articleshow\/48715751.cms","dateline":{"date":"2015-09-02T00:00:00-04:00","iso_date":"2015-09-02T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"373671":{"id":"373671","type":"image","title":"Tech Tower","body":null,"created":"1449246186","gmt_created":"2015-12-04 16:23:06","changed":"1475894352","gmt_changed":"2016-10-08 02:39:12","alt":"Tech Tower","file":{"fid":"75105","name":"15c6001-p6-003.jpg","image_path":"\/sites\/default\/files\/images\/15c6001-p6-003.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/15c6001-p6-003.jpg","mime":"image\/jpeg","size":759372,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/15c6001-p6-003.jpg?itok=U1fLm6gm"}}},"media_ids":["373671"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"107931","name":"business insider"},{"id":"109","name":"Georgia Tech"},{"id":"623","name":"Technology"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"434021":{"#nid":"434021","#data":{"type":"news","title":"Georgia Tech Finds 11 Security Flaws in Popular Internet Browsers Using New Analysis Method","body":[{"value":"\u003Cp\u003E\u003Cstrong\u003EWASHINGTON, D.C., Aug. 13, 2015\u0026shy;\u003C\/strong\u003E\u2014Researchers from the Georgia Institute of Technology College of Computing developed a new cyber security analysis method that discovered 11 previously unknown Internet browser security flaws, and were honored with the Internet Defense Prize, an award offered by Facebook in partnership with USENIX, on Wednesday evening in Washington, D.C., at the 24\u003Csup\u003Eth\u003C\/sup\u003E USENIX Security Symposium.\u003C\/p\u003E\u003Cp\u003EPh.D. students \u003Cstrong\u003EByoungyoung Lee\u003C\/strong\u003E and \u003Cstrong\u003EChengyu Song\u003C\/strong\u003E, with Professors \u003Ca href=\u0022https:\/\/taesoo.gtisc.gatech.edu\/\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003ETaesoo Kim\u003C\/strong\u003E\u003C\/a\u003E and \u003Ca href=\u0022http:\/\/wenke.gtisc.gatech.edu\/\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003EWenke Lee\u003C\/strong\u003E\u003C\/a\u003E, of Georgia Tech received $100,000 from Facebook to continue their research and increase its impact to make the Internet safer.\u003C\/p\u003E\u003Cp\u003ETheir research, \u201cType Casting Verification: Stopping an Emerging Attack Vector,\u201d explores vulnerabilities in C++ programs (such as Chrome and Firefox) that result from \u201cbad casting\u201d or \u201ctype confusion.\u201d Bad casting enables an attacker to corrupt the memory in a browser so that it follows a malicious logic instead of proper instructions. The researchers developed a new, proprietary detection tool called CAVER to catch them. CAVER is a run-time detection tool with 7.6 percent - 64.6 percent overhead on browser performance (Chrome and Firefox, respectively). The 11 vulnerabilities identified by Georgia Tech have been confirmed and fixed by vendors.\u003C\/p\u003E\u003Cp\u003E\u201cIt is time for the Internet community to start addressing the more difficult, deeper security problems,\u201d says \u003Cstrong\u003EWenke Lee\u003C\/strong\u003E, professor in the School of Computer Science and an adviser to the team. \u201cThe security research community has been working on various ways to detect and fix memory safety bugs for decades, and have made progress on \u2018stack overflow\u2019 and \u2018heap overflow\u2019 bugs, but these have now become relatively easy problems. Our work studied the much harder and deeper bugs\u2014in particular \u2018use-after-free\u2019 and \u2018bad casting\u2019\u2014and our tools discovered serious security bugs in widely used software, such as Firefox and libstdc++. We are grateful to Facebook for this recognition.\u201d\u003C\/p\u003E\u003Cp\u003EThe work was selected for Facebook\u0027s second ever Internet Defense Prize award, which recognizes superior quality research that combines a working prototype with significant contributions to the security of the Internet -- particularly in the areas of protection and defense. The award is meant to recognize the direction of the research and to inspire researchers to focus on high-impact areas.\u003C\/p\u003E\u003Cp\u003E\u201cDesigning defensive security technology has never been more important, and that\u2019s why we are once again offering the Internet Defense Prize to stimulate high quality research in this area,\u201d said Ioannis Papagiannis, Security Engineering Manager at Facebook. \u201cThe Georgia Tech team\u2019s novel technique for detecting bad type casts in C++ programs is the type of standout approach we want to encourage. We look forward to seeing what the team does next to create broader impact and improve security on the Internet.\u201d\u003C\/p\u003E\u003Cp\u003E\u201cGeorgia Tech\u2019s award-winning entry exemplifies the groundbreaking security research that has become a hallmark of the USENIX Security Symposium,\u201d said Casey Henderson, Executive Director of the USENIX Association. \u0022Their trailblazing work stood out among the many outstanding submissions judged by the USENIX Security Awards Committee and Facebook. We look forward to their continued progress enabled by the Internet Defense Prize in the coming year.\u201d\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EAbout the Georgia Tech College of Computing\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EThe Georgia Tech College of Computing is a national leader in the creation of real-world computing breakthroughs that drive social and scientific progress. With its graduate program ranked 9th nationally by \u003Cem\u003EU.S. News and World Report\u003C\/em\u003E, the College\u2019s unconventional approach to education is expanding the horizons of traditional computer science students through interdisciplinary collaboration and a focus on human-centered solutions. For more information about the Georgia Tech College of Computing, its academic divisions and research centers, please visit \u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/\u0022\u003Ewww.cc.gatech.edu\u003C\/a\u003E.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":[{"value":"Receives $100,000 Internet Defense Prize from Facebook at USENIX Security \u201915"}],"field_summary":[{"value":"\u003Cp\u003ECollege of Computing researchers discovered 11 previously unknown Internet browser security flaws, and were honored with the Internet Defense Prize by Facebook and USENIX.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Researchers from the College of Computing discovered previously unknown browser security flaws, and were honored with the Internet Defense Prize by Facebook and USENIX on Aug. 12 in Washington, D.C."}],"uid":"27490","created_gmt":"2015-08-13 07:49:55","changed_gmt":"2016-10-08 03:19:22","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-08-13T00:00:00-04:00","iso_date":"2015-08-13T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"434031":{"id":"434031","type":"image","title":"Facebook Winning Team","body":null,"created":"1449256148","gmt_created":"2015-12-04 19:09:08","changed":"1475895174","gmt_changed":"2016-10-08 02:52:54"}},"media_ids":["434031"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"}],"keywords":[{"id":"345","name":"cyber security"},{"id":"2678","name":"information security"},{"id":"2229","name":"Internet"}],"core_research_areas":[{"id":"39501","name":"People and Technology"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:tlabouff@cc.gatech.edu\u0022\u003ETara La Bouff\u003C\/a\u003E\u003Cbr \/\u003ECommunications Manager\u003Cbr \/\u003E404.894.7253\u003C\/p\u003E","format":"limited_html"}],"email":["tlabouff@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"429511":{"#nid":"429511","#data":{"type":"news","title":"Georgia Tech Receives $4.2 Million for Military Research to Better Secure Data Transfer","body":[{"value":"\u003Cp\u003EResearchers from the College of Computing at the Georgia Institute of Technology were awarded $4.2 million from the Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory (AFRL) to improve how data is tracked between computers, Internet hosts, and browsers for better cyber security.\u003C\/p\u003E\u003Cp\u003EThe four-year project, titled \u201cTHEIA\u201d after the Greek goddess of shining light, attempts to shed light on exactly where data moves as it is routed from one Internet host to another and whether any malicious code, for example, is attached to data during transfer.\u003C\/p\u003E\u003Cp\u003E\u201cThe project has wide implications for any industry and anyone who needs to send secure information, make sure it is not manipulated during transfer, and that it arrives securely in tact \u2013 but especially for those banking, shopping or trading online,\u201d says Dr. Wenke Lee, primary investigator and professor in the College of Computing. \u201cIf we have the ability to fully track how data is processed until it reaches the intended recipient, then we can better detect and stop advanced persistent threats (APT).\u201d\u003C\/p\u003E\u003Cp\u003EFor example, currently it is not possible for a network intrusion detection system to determine whether data sent from an end-host was modified by a malicious browser extension after a user completed a web form. State-of-the-art information flow tracking today typically applies only to a single layer (such as the program level), or does not utilize the full semantics at all layers (to verify if input was entered by the original user, for example).\u003C\/p\u003E\u003Cp\u003ETHEIA will track and record information at three layers: user interaction with a program, program processing of data input, and program and network interactions with an operating system. Together, THEIA will monitor secure data flow from user to program, from program to file system storage, and storage to network output, and back again. Such completeness is critical to APT detection.\u003C\/p\u003E\u003Cp\u003E\u201cOur ultimate goal is to provide complete transparency, or full visibility, into host events and data so that APT activities cannot evade detection,\u201d Lee says. \u201cTHEIA represents what could be a significant advance over state-of-the-art approaches, which typically are forced to make arbitrary trade-offs between verifying accuracy and maintaining total computational efficiency.\u201d\u003C\/p\u003E\u003Cp\u003ETHEIA would make no such compromise. THEIA will record the sufficient amount of data at runtime, replay and analyze recorded events in semi-real-time when suspicious alerts are triggered, or analyze data completely offline.\u003C\/p\u003E\u003Cp\u003ELee, a co-director of the Institute for Information Security and Privacy at Georgia Tech, has conducted cyber security research from Atlanta since 2001. Lee\u2019s research interests include systems and network security, applied cryptography, and data mining. Most recently, he has focused on botnet detection and malware analysis, security of mobile systems and apps, and detection and mitigation of information manipulation on the Internet.\u0026nbsp;Lee has published over 140 articles. In 2006, Lee co-founded Damballa, Inc., a spin-off from his lab that focuses on botnet detection and mitigation.\u003C\/p\u003E\u003Cp\u003EThe DARPA-AFRL project is funded with $4,253,126 over 48 months. Participating in the work will be Dr. Taesoo Kim, assistant professor; Dr. Alessandro Orso, associate chair; Dr. Simon Chung, research scientist, all with the School of Computer Science, College of Computing; and Dr. Albert Brzeczko, research engineer at Georgia Tech Research Institute (GTRI).\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EDefense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory (AFRL) seek better cyber security between computers, Internet hosts, and browsers with the help of Georgia Tech\u0027s College of Computing.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory (AFRL) seek better cyber security between computers, Internet hosts, and browsers."}],"uid":"27490","created_gmt":"2015-07-30 07:55:08","changed_gmt":"2016-10-08 03:19:19","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-07-30T00:00:00-04:00","iso_date":"2015-07-30T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"429521":{"id":"429521","type":"image","title":"Wenke Lee 2015 headshot","body":null,"created":"1449254358","gmt_created":"2015-12-04 18:39:18","changed":"1475895169","gmt_changed":"2016-10-08 02:52:49"}},"media_ids":["429521"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"147","name":"Military Technology"},{"id":"135","name":"Research"}],"keywords":[{"id":"208","name":"computing"},{"id":"345","name":"cyber security"},{"id":"136881","name":"data transfer"},{"id":"2678","name":"information security"},{"id":"136871","name":"Internet host"},{"id":"525","name":"military"}],"core_research_areas":[{"id":"39481","name":"National Security"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:tlabouff@cc.gatech.edu\u0022 target=\u0022_blank\u0022\u003ETara La Bouff\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003EMarketing Communications Manager\u003C\/p\u003E\u003Cp\u003E404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":["tlabouff@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"417741":{"#nid":"417741","#data":{"type":"news","title":"Georgia Tech Receives Nearly $2 million for Naval Research to Bolster Cyber Defense","body":[{"value":"\u003Cp\u003E\u003Cstrong\u003EATLANTA \u2013 June 24, 2015 \u2013\u003C\/strong\u003E Researchers from the College of Computing at \u003Ca href=\u0022mailto:www.gatech.edu\u0022\u003EGeorgia Institute of Technology\u003C\/a\u003E in Atlanta have been awarded nearly $2 million from the Department of the Navy, \u003Ca href=\u0022mailto:http:\/\/www.onr.navy.mil\/\u0022\u003EOffice of Naval Research\u003C\/a\u003E (ONR) and the Assistant Secretary of Defense for Research and Engineering (ASD R\u0026amp;E) to fund projects that will bolster defense and other large-scale systems against cyber attack.\u003C\/p\u003E\u003Cp\u003ETheir work can help improve national security and also the functional safety and resiliency of automotive or industrial control systems, which are increasingly connected to the wider world through personal devices or other means.\u003C\/p\u003E\u003Cp\u003EThe first project, titled \u003Cstrong\u003E\u003Cem\u003E\u201cBFT++: Attack Tolerance in Hard Real-Time Systems,\u201d \u003C\/em\u003E\u003C\/strong\u003Ewill develop the foundations, principles and techniques for building attack-tolerant cyber physical systems.\u003C\/p\u003E\u003Cp\u003E\u201cMany intrusion tolerance techniques slow down the control system, which is undesirable and may be life-threatening in a weapons system,\u201d said primary investigator Taesoo Kim, assistant professor in the School of Computer Science at Georgia Tech. \u201cWe will develop the techniques to detect failure due to an attack, replace the compromised node with a back-up, and reconstitute it \u2013 all within the hard, real-time requirement. In addition, we will develop software and system diversification techniques to ensure that an attack is detected early.\u201d\u003C\/p\u003E\u003Cp\u003EMore specifically, the techniques will eliminate common software vulnerabilities in different nodes of a networked group and distribute a security protection into multiple \u2013 but not all \u2013 nodes of the group, so that protection strength remains undiluted without reducing total performance overhead.\u003C\/p\u003E\u003Cp\u003EThe second project, titled \u003Cstrong\u003E\u003Cem\u003E\u201cEmbedasploit: a Pen-test in a Box for Industrial Control Systems,\u201d \u003C\/em\u003E\u003C\/strong\u003Ewill create a system to fingerprint an industrial control network, catalog its known flaws, emulate the whole system for simulation and outline a model that prevents hackers from listening to system activity, injecting malicious traffic or obtaining binary code. The research will be tested on engine control units in a modern car.\u003C\/p\u003E\u003Cp\u003E\u201cAssessing the security of industrial control systems today often takes the form of a \u2018penetration test\u2019 that requires someone familiar with security practices, reverse engineering, real-world exploitation and the intricacies of a particular industrial domain,\u201d says primary investigator Wenke Lee, director of the Georgia Tech Information Security Center in the School of Computer Science. \u201cAll of that is rare in a single team or person, so we propose an end-to-end system that can automatically detect, and adapt inside new systems and networks.\u201d\u003C\/p\u003E\u003Cp\u003EEach is a three-year project. Additional researchers include Tielei Wang at Georgia Tech, Salvatore Stolfo at Columbia University, and Brendan Dolan-Gavitt at New York University Polytechnic School of Engineering, along with graduate students at Georgia Tech, Columbia and NYU Poly. Results \u2013 including technical papers, teaching materials, software prototypes and experiment data (when appropriate) \u2013 will be made available via the \u003Ca href=\u0022http:\/\/gtisc.gatech.edu\u0022\u003Eproject\u2019s web page\u003C\/a\u003E maintained at the Georgia Institute of Technology [http:\/\/gtisc.gatech.edu].\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003Cstrong\u003EAbout Georgia Tech\u2019s College of Computing\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EThe Georgia Tech College of Computing is a national leader in the creation of real-world computing breakthroughs that drive social and scientific progress. With its graduate program ranked 9th nationally by \u003Cem\u003EU.S. News and World Report\u003C\/em\u003E, the College\u2019s unconventional approach to education is expanding the horizons of traditional computer science students through interdisciplinary collaboration and a focus on human-centered solutions. For more information about the Georgia Tech College of Computing, its academic divisions and research centers, please visit \u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/\u0022\u003Ewww.cc.gatech.edu\u003C\/a\u003E.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EResearchers at College of Computing are tasked with two cyberdefense projects to help improve national security and the functional safety and resiliency of automotive or industrial control systems.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Researchers from the College of Computing at Georgia Institute of Technology in Atlanta have been awarded nearly $2 million from the Department of the Navy, Office of Naval Research (ONR)."}],"uid":"28124","created_gmt":"2015-06-24 10:23:45","changed_gmt":"2016-10-08 03:18:45","author":"Tyler Sharp","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-06-24T00:00:00-04:00","iso_date":"2015-06-24T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"424221":{"id":"424221","type":"image","title":"US Army cybersecurity training exercise","body":null,"created":"1449254319","gmt_created":"2015-12-04 18:38:39","changed":"1475895162","gmt_changed":"2016-10-08 02:52:42","alt":"US Army cybersecurity training exercise","file":{"fid":"202742","name":"cyberprotectionteam022715.jpg","image_path":"\/sites\/default\/files\/images\/cyberprotectionteam022715_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/cyberprotectionteam022715_0.jpg","mime":"image\/jpeg","size":1680268,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cyberprotectionteam022715_0.jpg?itok=QpnwcyJq"}}},"media_ids":["424221"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"2254","name":"gtisc"},{"id":"3117","name":"Office of Naval Research"},{"id":"166941","name":"School of Computer Science"},{"id":"129951","name":"Taesoo Kim"},{"id":"10893","name":"wenke lee"}],"core_research_areas":[{"id":"39431","name":"Data Engineering and Science"},{"id":"39481","name":"National Security"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff\u003Cbr \/\u003E\u003Ca href=\u0022mailto:tlabouff@cc.gatech.edu\u0022\u003Etlabouff@cc.gatech.edu\u003C\/a\u003E\u003Cbr \/\u003E602-770-0264\u003C\/p\u003E\u003Cp\u003EJason Maderer\u003Cbr \/\u003E\u003Ca href=\u0022mailto:jason.maderer@comm.gatech.edu\u0022\u003Ejason.maderer@comm.gatech.edu\u003Cbr \/\u003E\u003C\/a\u003E404-660-2926\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}