<nodes> <node id="574611">  <title><![CDATA[Did the Patriot Act Change U.S. Attitudes on Surveillance?]]></title>  <uid>27490</uid>  <body><![CDATA[<p>In the emotional wake of 9/11, lawmakers pledged new protection with the Patriot Act. Fifteen years later, the law dramatically expanded the government's ability to gather surveillance, broadened the definition of terrorism and sought to strengthen border security. Peter Swire, associate director of policy for the Institute of Information Security &amp; Privacy, explains what has changed since the law was first enacted.</p><p><a href="http://www.nbcnews.com/storyline/9-11-anniversary/did-patriot-act-change-us-attitudes-surveillance-n641586" target="_blank">Read more</a></p><p>&nbsp;</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1473413723</created>  <gmt_created>2016-09-09 09:35:23</gmt_created>  <changed>1475896953</changed>  <gmt_changed>2016-10-08 03:22:33</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Peter Swire, associate director of policy for the Institute of Information Security & Privacy, explains what has changed since the Patriot Act was enacted.]]></teaser>  <type>news</type>  <sentence><![CDATA[Peter Swire, associate director of policy for the Institute of Information Security & Privacy, explains what has changed since the Patriot Act was enacted.]]></sentence>  <summary><![CDATA[<p>Peter Swire, associate director of policy for the Institute of Information Security &amp; Privacy, explains how intelligence surveillance of American citizens has changed since Sept. 11, 2001 and the Patriot Act.</p>]]></summary>  <dateline>2016-09-09T00:00:00-04:00</dateline>  <iso_dateline>2016-09-09T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-09-09 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>232191</item>      </media>  <hg_media>          <item>          <nid>232191</nid>          <type>image</type>          <title><![CDATA[Professor Peter Swire]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[peterswire.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/peterswire_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/peterswire_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/peterswire_0.jpg?itok=xp9dVDb2]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Professor Peter Swire]]></image_alt>                    <created>1449243627</created>          <gmt_created>2015-12-04 15:40:27</gmt_created>          <changed>1475894906</changed>          <gmt_changed>2016-10-08 02:48:26</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="169145"><![CDATA[information privacy]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="564851">  <title><![CDATA[Cybersecurity IRI Completes First Year]]></title>  <uid>27490</uid>  <body><![CDATA[<p>The Institute for Information Security &amp; Privacy (IISP) – Georgia Tech’s eleventh interdisciplinary research institute – launched in Fall ’15 and since has leveraged intellectual capital from seven units across Georgia Tech in profound new ways.</p><blockquote><h5><em>“We believe few other universities are tackling cybersecurity research with the breadth and depth of Georgia Tech,” says Wenke Lee, co-director of the IISP and the John P. Imlay Chair II in Software for the School of Computer Science.</em></h5></blockquote><p>The inaugural year began by dissecting and defining Georgia Tech’s cybersecurity capacity, then creating new experiences for students, faculty and industry to coalesce around solutions. Astounding truths were revealed: cybersecurity research at Georgia Tech spans six critical thrusts, nine labs, and more than 460 researchers. Cybersecurity no longer is just a computer programmer’s problem; it is an urgent concern for disciplines as diverse as public policy, business, defense and ubiquitous computing.</p><h5><strong>Legacy in Computer Science</strong></h5><p>The IISP builds upon the successful Georgia Tech Information Security Center (GTISC), that was established in 1998 in the School of Computer Science after the <a title="Sam Nunn" href="https://en.wikipedia.org/wiki/Sam_Nunn">Sam Nunn</a> Information Security Forum. Attendees determined that Georgia Tech's strengths in technology and policy warranted it to take a leading role in improved security research, education and more reliable computing.</p><p>&nbsp;Ralph Merkle, former director of GTISC, remarked during the early years: “For the past couple of decades we have put up with buggy code, unreliable computers, insecure computers, and computers that are vulnerable to viruses, worms, spam and other problems. All of this has to change. We need to have reliable computers, systems and networks that we can trust."</p><p>That mission now has evolved beyond the College of Computing to include the Ivan Allen College of Liberal Arts, Scheller College of Business, Georgia Tech Professional Education, Office of Information Technology, and of course the Georgia Tech Research Institute and College of Engineering – both of which have deep roots in secure information transfer and device design.</p><h5><strong>Mission and Focus</strong></h5><p>Under the IISP, Lee says focus is intently on three areas: research, education and commercialization. Objectives include:</p><ul><li>Increasing by 50% the volume of cybersecurity research by 2020</li><li>Expanding pathways into the Master’s of Information Security degree</li><li>Producing 60 Ph.D. candidates in the next five years</li><li>Developing at least five commercial start-ups from academic or applied research</li></ul><p>Affiliated faculty of the IISP conducted research projects conservatively valued at $24 million in the past year alone. More than 1,100 individuals attended new events organized by the IISP. Eighteen industry partners were engaged -- global businesses such as British Petroleum, Intel and IBM; Atlanta-based companies, such as Norfolk Southern Railway and The Home Depot, and information security alumni, such as Ionic Security, and Pindrop Security.</p><p>One of the most exciting aspects of the IISP’s first year, Lee says, was the success of graduate <strong>Musheer Ahmed</strong> (Ph.D. CS ’16). Ahmed’s graduate research, under the advisement of Prof. <strong>Mustaque Ahamad</strong>, led him to win the IISP’s inaugural Demo Day Finale.</p><p>Ahmed and Ahamad have filed a provisional patent for “FraudScope” to help insurers mine healthcare data and calculate risk among a provider pool. They are continuing translational research to develop a solution that addresses growing healthcare fraud and ensures that more healthcare dollars go to patient care. In addition to keen interest from businesses and entrepreneurs across Atlanta, FraudScope has received $400,000 in funding from the prestigious Wallace H. Coulter Foundation and Georgia Research Alliance.</p><p>“This work is an example of how Georgia Tech will and should expand its cybersecurity leadership,” says <strong>Bo Rotoloni</strong>, co-director of the IISP and director of GTRI’s Information &amp; Cyber Science Directorate. “Industry is hungry for solutions and Georgia Tech has them.”</p><h5><strong>Second Steps Begin</strong></h5><p>Looking ahead, the IISP already has a busy second year in play. It is organizing a two-day cybersecurity symposium in Atlanta with the French Embassy; sending speakers to premier conferences with the Association for Computer Machinery, the Department of Defense and Federal Reserve, and again hosting the popular Georgia Tech Cyber Security Summit. Under Ahamad, who serves as associate director of education and outreach for the IISP, it is assisting development of new professional education offerings, degree expansions, and scholarship opportunities to attract more to the field. Under <strong>Michael Farrell</strong>, associate director of attribution research for the IISP, the group is preparing large-scale projects that allow Georgia Tech to pioneer new scientific approaches to difficult cybersecurity problems.</p><p>“And that’s just the first quarter of the year,” Lee says. “We are truly forming into a gateway for faculty, students, scientists, government and industry – the place for national and international collaboration. It’s exciting.”</p><h4>See <a href="http://www.iisp.gatech.edu/iisp-completes-first-year" target="_blank">highlights</a> from the IISP's first annual report.</h4>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1471474732</created>  <gmt_created>2016-08-17 22:58:52</gmt_created>  <changed>1475896943</changed>  <gmt_changed>2016-10-08 03:22:23</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Few other universities are tacking cybersecurity research with the breadth and depth of Georgia Tech.]]></teaser>  <type>news</type>  <sentence><![CDATA[Few other universities are tacking cybersecurity research with the breadth and depth of Georgia Tech.]]></sentence>  <summary><![CDATA[<p>The Institute for Information Security &amp; Privacy – Georgia Tech’s eleventh interdisciplinary research institute – launched in Fall ’15 and since has leveraged intellectual capital from seven units across Georgia Tech in profound new ways.</p>]]></summary>  <dateline>2016-08-17T00:00:00-04:00</dateline>  <iso_dateline>2016-08-17T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-08-17 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Tara La Bouff, <a href="mailto:tara.labouff@iisp.gatech.edu">tara.labouff@iisp.gatech.edu</a>, 404.769.5408</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>564861</item>          <item>451391</item>      </media>  <hg_media>          <item>          <nid>564861</nid>          <type>image</type>          <title><![CDATA[IISP Faculty and Students Discuss Current Research]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[iisp_cyber_research_team_web.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/iisp_cyber_research_team_web.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/iisp_cyber_research_team_web.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/iisp_cyber_research_team_web.jpg?itok=8OgWx132]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IISP Faculty and Students Discuss Current Research]]></image_alt>                    <created>1471489547</created>          <gmt_created>2016-08-18 03:05:47</gmt_created>          <changed>1475895369</changed>          <gmt_changed>2016-10-08 02:56:09</gmt_changed>      </item>          <item>          <nid>451391</nid>          <type>image</type>          <title><![CDATA[IISP logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[instituteforinformationsecurityprivacy-outline-black874.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=1zeF6pZR]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IISP logo]]></image_alt>                    <created>1449256280</created>          <gmt_created>2015-12-04 19:11:20</gmt_created>          <changed>1475895192</changed>          <gmt_changed>2016-10-08 02:53:12</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="10577"><![CDATA[Electrical and Computer Engineering; ECE]]></keyword>          <keyword tid="626"><![CDATA[public policy]]></keyword>          <keyword tid="168019"><![CDATA[Scheller]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="560851">  <title><![CDATA[CEOs Attend Inaugural Georgia Tech Cybersecurity Leadership Certificate Program presented]]></title>  <uid>27751</uid>  <body><![CDATA[<p class="p1">The Georgia Tech Cybersecurity Leadership Certificate Program was presented under the guidance of Admiral James A. Winnefeld, Jr., former Vice Chair of the Joint Chiefs of Staff, retired. This intensive, four-day program addressed cybersecurity risks and the technology, policy, legal, and human dimensions that senior executives need to master to proactively manage, evaluate, and respond to cybersecurity threats. In addition to engaging lectures for Georgia Tech experts, the program also included presentations from industry and government leaders, a tour of a security operations center, and a table top scenario exercise.</p><p class="p1">The program was made possible by a cyber workforce development collaboration between Georgia Tech Professional Education, the Georgia Tech Research Institute, the Ivan Allen College School of Public Policy, the Institute for Information Security and Privacy, and the Ivan Allen College Sam Nunn School of International Affairs.</p>]]></body>  <author>Vince Pedicino</author>  <status>1</status>  <created>1470829189</created>  <gmt_created>2016-08-10 11:39:49</gmt_created>  <changed>1475896939</changed>  <gmt_changed>2016-10-08 03:22:19</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The Georgia Tech Cybersecurity Leadership Certificate Program was presented under the guidance of Admiral James A. Winnefeld, Jr., former Vice Chair of the Joint Chiefs of Staff, retired.]]></teaser>  <type>news</type>  <sentence><![CDATA[The Georgia Tech Cybersecurity Leadership Certificate Program was presented under the guidance of Admiral James A. Winnefeld, Jr., former Vice Chair of the Joint Chiefs of Staff, retired.]]></sentence>  <summary><![CDATA[<p class="p1">The Georgia Tech Cybersecurity Leadership Certificate Program was presented under the guidance of Admiral James A. Winnefeld, Jr., former Vice Chair of the Joint Chiefs of Staff, retired. This intensive, four-day program addressed cybersecurity risks and the technology, policy, legal, and human dimensions that senior executives need to master to proactively manage, evaluate, and respond to cybersecurity threats. In addition to engaging lectures for Georgia Tech experts, the program also included presentations from industry and government leaders, a tour of a security operations center, and a table top scenario exercise.</p>]]></summary>  <dateline>2016-08-10T00:00:00-04:00</dateline>  <iso_dateline>2016-08-10T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-08-10 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[chris.mcdermott@inta.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Chris McDermott</p><p><a href="mailto:chris.mcdermott@inta.gatech.edu">chris.mcdermott@inta.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>560831</item>      </media>  <hg_media>          <item>          <nid>560831</nid>          <type>image</type>          <title><![CDATA[GT Nunn School Cybersecurity Leadership Program 2016]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cybersecurity_program_group_photo.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cybersecurity_program_group_photo.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cybersecurity_program_group_photo.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cybersecurity_program_group_photo.jpg?itok=jrWlR0FB]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[GT Nunn School Cybersecurity Leadership Program 2016]]></image_alt>                    <created>1470843434</created>          <gmt_created>2016-08-10 15:37:14</gmt_created>          <changed>1475895364</changed>          <gmt_changed>2016-10-08 02:56:04</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1285"><![CDATA[Sam Nunn School of International Affairs]]></group>      </groups>  <categories>          <category tid="133"><![CDATA[Special Events and Guest Speakers]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>      </categories>  <news_terms>          <term tid="133"><![CDATA[Special Events and Guest Speakers]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="851"><![CDATA[INTA]]></keyword>          <keyword tid="10536"><![CDATA[Nunn School]]></keyword>          <keyword tid="13310"><![CDATA[Winnefeld]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="556931">  <title><![CDATA[Monitoring Side-Channel Signals Could Detect Malicious Software on IoT Devices]]></title>  <uid>27303</uid>  <body><![CDATA[<p>A $9.4 million grant from the Defense Advanced Research Projects Agency (DARPA) could lead to development of a new technique for wirelessly monitoring Internet of Things (IoT) devices for malicious software – without affecting the operation of the ubiquitous but low-power equipment.</p><p>The technique will rely on receiving and analyzing side-channel signals, electromagnetic emissions that are produced unintentionally by the electronic devices as they execute programs. These signals are produced by semiconductors, capacitors, power supplies and other components, and can currently be measured up to a half-meter away from operating IoT devices.</p><p>By comparing these unintended side-channel emissions to a database of what the devices should be doing when they are operating normally, researchers can tell if malicious software has been installed.</p><p>“We will be looking at how the program is changing its behavior,” explained <a href="https://www.ece.gatech.edu/faculty-staff-directory/alenka-zajic">Alenka Zajic</a>, the project’s principal investigator and an assistant professor in the <a href="http://www.ece.gatech.edu/">School of Electrical and Computer Engineering</a> at the Georgia Institute of Technology. “If an Internet of Things device is attacked, the insertion of malware will affect the program that is running, and we can detect that remotely.”</p><p>The four-year project will also include two faculty members from Georgia Tech's <a href="http://www.scs.gatech.edu/">School of Computer Science</a>: Professors <a href="http://www.scs.gatech.edu/people/9736/milos-prvulovics">Milos Prvulovic</a> and <a href="http://www.scs.gatech.edu/people/9739/alessandro-orsos">Alessandro Orso</a>. Also part of the project will be a research team from Northrop-Grumman, headed by Matthew Welborn. Details of an early prototype of the side-channel technique, called “Zero-Overhead Profiling” because the monitoring doesn't affect the system being observed, were presented July 20th at the International Symposium on Software Testing and Analysis (ISSTA).</p><p>Within the next four years, an estimated 30 billion IoT devices will be in operation, doing everything from controlling home heating and air conditioning to sensing and managing critical infrastructure. The devices are usually small with limited processor power and memory. Their limited computing capabilities means they can’t run the kinds of malware protection software found on laptop computers, and they cannot use virtualization and other technology to protect the system software even when an application is taken over by an attacker. This means that once attackers compromise the internet-connected application, they typically “own” the entire IoT device and can even make it falsely respond to traditional queries about its own security status.</p><p>"The main challenge from a security perspective is to make these devices secure so somebody can't take them over," explained Zajic. "There will be a lot of processing power out there that needs to be monitored, but you can't just put traditional security software on that processor because is doesn't have enough power for both the security software and the tasks the device is supposed to be doing."</p><p>Zajic and Prvulovic pioneered research on measuring side-channel signals emitted from devices. These emissions differ from the signals the devices were intended to produce for communicating information across the Internet to other devices. The researchers have already shown that they can pick up the signals close to the devices using specially designed antennas, and one project goal is to extend the range to as much as three meters.</p><p>"When a processor executes instructions, values are represented as ones and zeroes, which creates a fluctuation in the current," Zajic said. "That creates changes in the electromagnetic field we are measuring, providing a pattern for what each part of the program looks like on a spectrum analyzer."</p><p>Key to detecting changes in the signals is getting a "before" recording of what these signals should look like to draw a comparison with an "after" set of signals for each combination of device and software. The researchers plan to evaluate each IoT device, sampling and recording its typical operation to create a database. To avoid recording overwhelming amounts of data, the system will take periodic samples from different stages of program loops.</p><p>"If somebody inserts something into the program loop, the peaks in the spectrum will shift and we can detect that," Zajic said. "This is something that we can monitor in real time using advanced pattern-matching technology that uses machine learning to improve its performance."</p><p>Detecting malware, however, is more of a challenge.</p><p>“The technique is currently 95 percent accurate at profiling – pinpointing the exact point in the IoT program code that is currently executing,” explained Prvulovic. “However, detection of malware is a much more difficult problem. Profiling is about identifying which part of the program is the best match for the signal, whereas malware detection is about detecting, with sufficient confidence, that the signal does not match any part of the original program, even when the malware is designed to resemble the original code of the application.”</p><p>Zajic and Prvulovic have been studying a wide range of devices to determine the emissions produced.</p><p>“We have more than one source on a circuit board, so we have been trying to localize the sources so we can build an antenna to give us the best possible signal,” said Zajic. “There are multiple places on the board where you connect to the same information, though it may be modulated at different frequencies.”</p><p>Ultimately, researchers expect the project – dubbed Computational Activity Monitoring by Externally Leveraging Involuntary Analog Signals (CAMELIA) – to be capable of monitoring several IoT devices simultaneously. That will require development of advanced processing techniques able to differentiate signals from each device, and new antennas able to pick up the signals from a greater distance.</p><p>CAMELIA is part of a DARPA program called Leveraging the Analog Domain for Security (LADS), which is investing in six different initiatives to address IoT security. The Georgia Tech-Northrop Grumman project is the only one of the projects led by an academic institution.</p><p><em>The research is supported by the DARPA LADS program under contract FA8650-16-C-7620. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the sponsoring agency.</em></p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (404-894-6986) (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) or Ben Brumfield (404-385-1933) (<a href="mailto:ben.brumfield@comm.gatech.edu">ben.brumfield@comm.gatech.edu</a>).</p><p><strong>Writer:</strong> John Toon</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1469992756</created>  <gmt_created>2016-07-31 19:19:16</gmt_created>  <changed>1475896932</changed>  <gmt_changed>2016-10-08 03:22:12</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[DARPA awards $9.4 million to develop a new technique for monitoring IoT devices.]]></teaser>  <type>news</type>  <sentence><![CDATA[DARPA awards $9.4 million to develop a new technique for monitoring IoT devices.]]></sentence>  <summary><![CDATA[<p>A $9.4 million grant from the Defense Advanced Research Projects Agency (DARPA) could lead to development of a new technique for wirelessly monitoring Internet of Things (IoT) devices for malicious software – without affecting the operation of the ubiquitous but low-power equipment.</p>]]></summary>  <dateline>2016-08-01T00:00:00-04:00</dateline>  <iso_dateline>2016-08-01T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-08-01 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>556881</item>          <item>556891</item>          <item>556901</item>          <item>556911</item>          <item>556921</item>      </media>  <hg_media>          <item>          <nid>556881</nid>          <type>image</type>          <title><![CDATA[Measuring side-channel emissions]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[side-channel15.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/side-channel15.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/side-channel15.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/side-channel15.jpg?itok=PvVbaSpl]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Measuring side-channel emissions]]></image_alt>                    <created>1470006053</created>          <gmt_created>2016-07-31 23:00:53</gmt_created>          <changed>1475895355</changed>          <gmt_changed>2016-10-08 02:55:55</gmt_changed>      </item>          <item>          <nid>556891</nid>          <type>image</type>          <title><![CDATA[Measuring side-channel emissions2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[side-channel18.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/side-channel18.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/side-channel18.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/side-channel18.jpg?itok=MJ8OSXn0]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Measuring side-channel emissions2]]></image_alt>                    <created>1470006138</created>          <gmt_created>2016-07-31 23:02:18</gmt_created>          <changed>1475895355</changed>          <gmt_changed>2016-10-08 02:55:55</gmt_changed>      </item>          <item>          <nid>556901</nid>          <type>image</type>          <title><![CDATA[Systematic side-channel measurement]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[side-channel12.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/side-channel12.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/side-channel12.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/side-channel12.jpg?itok=n9P1uLRH]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Systematic side-channel measurement]]></image_alt>                    <created>1470006254</created>          <gmt_created>2016-07-31 23:04:14</gmt_created>          <changed>1475895355</changed>          <gmt_changed>2016-10-08 02:55:55</gmt_changed>      </item>          <item>          <nid>556911</nid>          <type>image</type>          <title><![CDATA[Signal outputs from electronic devices]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[side-channel13.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/side-channel13.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/side-channel13.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/side-channel13.jpg?itok=8uAHcmUV]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Signal outputs from electronic devices]]></image_alt>                    <created>1470006358</created>          <gmt_created>2016-07-31 23:05:58</gmt_created>          <changed>1475895355</changed>          <gmt_changed>2016-10-08 02:55:55</gmt_changed>      </item>          <item>          <nid>556921</nid>          <type>image</type>          <title><![CDATA[Studying side-channel signals]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[side-channel1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/side-channel1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/side-channel1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/side-channel1.jpg?itok=F4SHLmFZ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Studying side-channel signals]]></image_alt>                    <created>1470006479</created>          <gmt_created>2016-07-31 23:07:59</gmt_created>          <changed>1475895358</changed>          <gmt_changed>2016-10-08 02:55:58</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="11173"><![CDATA[Alenka Zajic]]></keyword>          <keyword tid="64421"><![CDATA[Internet-of-Things]]></keyword>          <keyword tid="97401"><![CDATA[IoT]]></keyword>          <keyword tid="172220"><![CDATA[malicious]]></keyword>          <keyword tid="7772"><![CDATA[malware]]></keyword>          <keyword tid="168627"><![CDATA[side-channel]]></keyword>          <keyword tid="169696"><![CDATA[side-channel signal]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="551021">  <title><![CDATA[Minding Your Business: Cybersecurity in Georgia]]></title>  <uid>27490</uid>  <body><![CDATA[<p>A growing number of Georgia companies are devoted to preventing and containing damage from data breaches at businesses and government agencies. The information security industry, known as info-sec, is fueled by research at Georgia Tech, a cluster of well-funded start-ups from alumni and entrepreneurs, and concentration of the Army's Cyber Command at Fort Gordon.&nbsp;<strong>Dr. Wenke Lee</strong> describes the components of this "perfect storm" for <em>Georgia Trend</em> magazine.</p><p><a href="http://www.georgiatrend.com/July-2016/Minding-Your-Business/" target="_blank">Read More</a></p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1467824892</created>  <gmt_created>2016-07-06 17:08:12</gmt_created>  <changed>1475896924</changed>  <gmt_changed>2016-10-08 03:22:04</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A growing number of Georgia organizations are devoted to preventing cyberattacks, with Georgia Tech faculty, students and alumni driving this growth as threats increase.]]></teaser>  <type>news</type>  <sentence><![CDATA[A growing number of Georgia organizations are devoted to preventing cyberattacks, with Georgia Tech faculty, students and alumni driving this growth as threats increase.]]></sentence>  <summary><![CDATA[<p>A growing number of Georgia companies are devoted to preventing and containing damage from data breaches at businesses and government agencies. The information security industry, known as info-sec, is fueled by research at Georgia Tech, a cluster of well-funded start-ups from alumni and entrepreneurs, and concentration of the Army's Cyber Command at Fort Gordon.</p>]]></summary>  <dateline>2016-07-01T00:00:00-04:00</dateline>  <iso_dateline>2016-07-01T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-07-01 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Information security industry is booming in Georgia, fueled by startups and Army Cyber Command]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>551031</item>      </media>  <hg_media>          <item>          <nid>551031</nid>          <type>image</type>          <title><![CDATA[Photo Credit: JenniferStalcup.com]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[26_cyberopener-96e939fe.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/26_cyberopener-96e939fe.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/26_cyberopener-96e939fe.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/26_cyberopener-96e939fe.jpg?itok=HUWzT9j-]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Photo Credit: JenniferStalcup.com]]></image_alt>                    <created>1467982834</created>          <gmt_created>2016-07-08 13:00:34</gmt_created>          <changed>1475895348</changed>          <gmt_changed>2016-10-08 02:55:48</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="546651">  <title><![CDATA[Standardizing Communications for the Internet of Things]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The fast-growing Internet of Things (IoT) consists of millions of sensing devices in buildings, vehicles and elsewhere that deliver reams of data online. Yet this far-flung phenomenon involves so many different kinds of data, sources and communication modes that its myriad information streams can be onerous to acquire and process.</p><p>Researchers at the Georgia Tech Research Institute (GTRI) have developed a flexible, generic data-fusion software that simplifies interacting with sensor networks. Known as FUSE, it provides a framework to standardize the diverse IoT world. Its application programming interface (API) lets users capture, store, annotate and transform any data coming from Internet-connected sources.</p><p>“The Internet of Things has always been something of a Tower of Babel, because it gathers data from everywhere – from the latest smart-building microcontrollers and driver-assist vehicles to legacy sensors installed for years,” said Heyward Adams, a GTRI research scientist who is leading the FUSE project. “Traditionally, people wanting to utilize IoT information have had to examine the attributes of each individual sensor and then write custom software on an ad-hoc basis to handle it.”</p><p>Before FUSE, Adams said, a typical IoT task could require several manual steps. For example, users would acquire data from the Internet by manually finding and setting up the proper communication protocols. Then each data value would have to be assigned to a supporting database. Finally, the user would need to process the data, via approaches such as arithmetic manipulation or statistical evaluation, before it could be fed into a decision algorithm.</p><p>“FUSE lets us take a task that used to involve a week or two, and complete it in 10 or 15 minutes,” he said. “It provides a standard way of communicating in the unstandardized world of IoT.”</p><p>Adams explained that the technical challenges in creating an Internet of Things framework include not just receiving and transmitting sensor data that use different communication protocols and modalities, but also digesting and processing a variety of data encodings and formats. One particular challenge involves dealing with timing differences between incoming data sources.</p><p>To build their framework, the GTRI team developed advanced algorithms for handling the many different source types, communication modes and data types coming in over the internet. They also devised methods for managing interactions among data sources that use varying and unpredictable data rates.</p><p>The result was FUSE, with capabilities that include:</p><ul><li>Providing users with online forms that let them define the sources they need in the form of “domains” – abstract descriptions of how the targeted data interrelate;</li><li>Gathering incoming raw data according to user specifications and mapping them into the specified domains. The data can then be transformed and manipulated using “tasks,” which are user-defined JavaScript functions or legacy software that run inside the FUSE service;</li><li>Displaying the processed data to users on-screen via an interactive data visualization, exploration and analysis dashboard that supports most data types including numeric, logical, and text data. Users can also devise their own custom dashboards or other interfaces.</li></ul><p>FUSE makes extensive use of the generic representational state transfer (REST) data capability. Referred to as RESTful, this widely used Internet standard supports the framework’s ability to receive and transmit divergent data streams.</p><p>The FUSE framework is designed to be massively distributable. Using load-balancing techniques, the service can spread IOT workloads across entire computer clusters. Moreover, FUSE can also operate on small and inexpensive microcontrollers of the type increasingly found in buildings and vehicles performing a variety of smart sensing tasks.</p><p>The development team has built a transform layer into FUSE that allows the framework to connect to legacy sensors, allowing integration of older devices that utilize diverse hardware and software designs. FUSE currently employs the open-source MongoDB program as its storage database, but GTRI researchers are developing adapters that let the service plug into common databases such as Oracle, MySQL and Microsoft SQL.</p><p>“One of the advantages of FUSE is that it can be broken up and distributed to accommodate any sensor and server architecture,” Adams said. “So it can grow and change as a business, facility or campus changes over time.”</p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contacts</strong>: John Toon (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) (404-894-6986) or Ben Brumfield (<a href="mailto:ben.brumfield@comm.gatech.edu">ben.brumfield@comm.gatech.edu</a>) (404-385-1933).</p><p><strong>Writer</strong>: Rick Robinson</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1466528426</created>  <gmt_created>2016-06-21 17:00:26</gmt_created>  <changed>1475896917</changed>  <gmt_changed>2016-10-08 03:21:57</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have developed a flexible, generic data-fusion software that simplifies interacting with sensor networks known as the Internet of Things.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have developed a flexible, generic data-fusion software that simplifies interacting with sensor networks known as the Internet of Things.]]></sentence>  <summary><![CDATA[<p>Researchers have developed a flexible, generic data-fusion software that simplifies interacting with sensor networks known as the Internet of Things. Their FUSE software provides a framework to standardize the diverse IoT world. Its application programming interface (API) lets users capture, store, annotate and transform any data coming from Internet-connected sources.</p>]]></summary>  <dateline>2016-06-22T00:00:00-04:00</dateline>  <iso_dateline>2016-06-22T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-06-22 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>546611</item>          <item>546621</item>      </media>  <hg_media>          <item>          <nid>546611</nid>          <type>image</type>          <title><![CDATA[FUSE and the Internet of Things]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[fuse-4597.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/fuse-4597.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/fuse-4597.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/fuse-4597.jpg?itok=Zgx7YGBY]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[FUSE and the Internet of Things]]></image_alt>                    <created>1466542800</created>          <gmt_created>2016-06-21 21:00:00</gmt_created>          <changed>1475895338</changed>          <gmt_changed>2016-10-08 02:55:38</gmt_changed>      </item>          <item>          <nid>546621</nid>          <type>image</type>          <title><![CDATA[FUSE and the Internet of Things2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[fuse-4604.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/fuse-4604.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/fuse-4604.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/fuse-4604.jpg?itok=3q-3hcUz]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[FUSE and the Internet of Things2]]></image_alt>                    <created>1466542800</created>          <gmt_created>2016-06-21 21:00:00</gmt_created>          <changed>1475895338</changed>          <gmt_changed>2016-10-08 02:55:38</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="172147"><![CDATA[API]]></keyword>          <keyword tid="438"><![CDATA[data]]></keyword>          <keyword tid="172148"><![CDATA[data-fusion]]></keyword>          <keyword tid="172149"><![CDATA[Heyward Adams]]></keyword>          <keyword tid="68951"><![CDATA[Internet of Things]]></keyword>          <keyword tid="97401"><![CDATA[IoT]]></keyword>          <keyword tid="169638"><![CDATA[sensing]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="537711">  <title><![CDATA[SEISE Tool Uses Semantic Gaps to Detect Website Promotional Attacks]]></title>  <uid>27303</uid>  <body><![CDATA[<p>By detecting semantic inconsistencies in content, researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations. Such attacks use code embedded in highly-ranked sites to drive traffic to sketchy websites selling fake drugs, counterfeit handbags and plagiarized term papers – or installing drive-by malware.</p><p>The new technique, known as Semantic Inconsistency Search (SEISE), uses natural language processing to spot the differences between a compromised site’s expected content and the malicious advertising and promotional code. Using SEISE, the researchers found 11,000 infected sites among non-commercial top-level sponsored .edu, .gov and .mil domains worldwide, and are working to extend the method to other domains.</p><p>The research was supported by the U.S. National Science Foundation and Natural Science Foundation of China. It will be described in a presentation May 25, 2016 at the IEEE Symposium on Security and Privacy in San Jose. SEISE was developed by researchers from the Georgia Institute of Technology, Indiana University and Tsinghua University in China.</p><p>“The basic idea behind promotional infection is to attack websites that are highly-ranked and to leverage their importance to promote various things, most of them illegal,” explained <a href="https://www.ece.gatech.edu/faculty-staff-directory/abdul-r-beyah">Raheem Beyah</a>, who is the Motorola Foundation Professor in Georgia Tech’s <a href="http://www.ece.gatech.edu/">School of Electrical and Computer Engineering</a>. “The bad content is nested into the prominent site to leverage the traffic of that domain. That gives the attackers a doorway to whatever they are promoting.”</p><p>Essentially, said Beyah, the attackers are stealing the site’s good name, even if they don’t install malware or otherwise inflict harm on web visitors.</p><p>“The attackers essentially become part of the prominent website’s brand and share in the ranking they have,” he added. “It’s like setting up operations inside a well-known coffee shop chain. The attacker leverages the brand by becoming co-located with it.”</p><p>The promotional attacks can be difficult to detect, especially if they don’t contain malicious computer code. But the semantic differences between the host site and the attacker’s code can tip off the SEISE algorithm. Once it has characterized the content expected on a website – educational information on an .edu page, for example – the pitches for gambling or inexpensive prescription drugs become obvious.</p><p>“If you are visiting the website for a prestigious university, you don’t expect to see information promoting casino gambling,” said Beyah. “If we expect one thing from the website and see something significantly different, there is a huge semantic gap that we can detect.”</p><p>SEISE doesn’t have to review an entire site to determine what should be there; it can sample the pages to learn context that makes attacker terms stand out. Because their domain purposes are clear and well established, the researchers began with education and government websites. They now hope to extend the automated approach to commercial and other domains whose intended purposes may be less consistent.</p><p>“We are trying to figure out how to get the context right for these domains so we can help companies detect these infections,” Beyah said. “There’s no reason to believe that the commercial domains are any less attractive to attackers than the non-commercial ones.”</p><p>Beyah and Georgia Tech Ph.D. student Xiaojing Liao began the work by using Google searches to find sites with known “bad words” denoting illicit products. They then utilized natural language processing to find terms associated with these known bad words, which were then used to train the SEISE before it was sent out to analyze 100,000 domains for the presence of the illicit terms. The approach identified 11,000 infected sites with a false detection rate of just 1.5 percent and coverage of more than 90 percent.</p><p>SEISE found promotional infections on the websites of top U.S. universities and government agencies, though the problem was truly worldwide, with three percent of .edu and .gov sites infected. Of the infected websites noted, 15 percent were in China and six percent were in the United States.</p><p>Sites are infected using proven attack techniques such as SQL injection, URL redirection and phishing to compromise the credentials of users, Beyah said. Though central websites of the organizations may be secure, pages of individual users and units may be more vulnerable – and still provide the prestige of the overall domain.</p><p>Existing techniques for detecting promotional infections rely on examining redirects and following links, or observing how sites change over time. But those techniques aren’t scalable and can’t be automated in the same way as the new semantic gap approach, Beyah said.</p><p>The researchers want to share their technique with the larger security community, and are discussing how best to make the algorithm available. “Our study shows that by effective detection of infected sponsored top-level domains (sTLDs), the bar to promotion infections can be substantially raised,” the authors wrote in their paper.</p><p>About those 11,000 compromised webpages? The researchers are attempting to contact the operators of all 11,000 of them to share the bad news. “We have spent a lot of time contacting those folks and letting them know what we have found,” Beyah said. “We’re still in the process of doing that because there are so many.”</p><p><em>This work was supported by the National Science Foundation through Grants CNS-1223477, CNS-1223495 and CNS-1527141 and by the Natural Science Foundation of China through Grant 61472215. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsors.</em></p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contact</strong>s: John Toon (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>) (404-894-6986) or Ben Brumfield (<a href="mailto:ben.brumfield@comm.gatech.edu">ben.brumfield@comm.gatech.edu</a>) (404-385-1933).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1463663991</created>  <gmt_created>2016-05-19 13:19:51</gmt_created>  <changed>1475896902</changed>  <gmt_changed>2016-10-08 03:21:42</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations.]]></sentence>  <summary><![CDATA[<p>By detecting semantic inconsistencies in content, researchers have developed a new technique for identifying promotional infections of websites operated by government and educational organizations. Such attacks use code embedded in highly-ranked sites to drive traffic to sketchy websites selling fake drugs, counterfeit handbags and plagiarized term papers – or installing drive-by malware.&nbsp;</p>]]></summary>  <dateline>2016-05-19T00:00:00-04:00</dateline>  <iso_dateline>2016-05-19T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-05-19 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>537681</item>          <item>537661</item>      </media>  <hg_media>          <item>          <nid>537681</nid>          <type>image</type>          <title><![CDATA[Researchers with code promoting essays]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[promo-infection_3289.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/promo-infection_3289.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/promo-infection_3289.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/promo-infection_3289.jpg?itok=51uNyBK_]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Researchers with code promoting essays]]></image_alt>                    <created>1464282000</created>          <gmt_created>2016-05-26 17:00:00</gmt_created>          <changed>1475895324</changed>          <gmt_changed>2016-10-08 02:55:24</gmt_changed>      </item>          <item>          <nid>537661</nid>          <type>image</type>          <title><![CDATA[Map of worldwide promotional infections]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[geolocation.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/geolocation.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/geolocation.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/geolocation.jpg?itok=dzB_x8rp]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Map of worldwide promotional infections]]></image_alt>                    <created>1464282000</created>          <gmt_created>2016-05-26 17:00:00</gmt_created>          <changed>1475895324</changed>          <gmt_changed>2016-10-08 02:55:24</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="170290"><![CDATA[promotional attack]]></keyword>          <keyword tid="67741"><![CDATA[Raheem Beyah]]></keyword>          <keyword tid="172044"><![CDATA[SEISE]]></keyword>          <keyword tid="170291"><![CDATA[semantic gap]]></keyword>          <keyword tid="172045"><![CDATA[semantic inconsistency]]></keyword>          <keyword tid="110271"><![CDATA[website]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="535881">  <title><![CDATA[Georgia Tech to Develop Big Data Protection Protocol for the Cloud]]></title>  <uid>30267</uid>  <body><![CDATA[<p>Georgia Tech researchers have been awarded a $1.19 million grant from the National Science Foundation (NSF) to devise privacy protection protocols for big data cloud computing throughout all phases of data processing.</p><p>Known as PrivacyGuard, the project is a first step toward establishing a practical way of ensuring end-to-end privacy for big data computations. To achieve this, researchers at Georgia Tech’s <a href="http://www.cc.gatech.edu/" target="_blank">College of Computing</a> are working to develop protocols that split the responsibility for data privacy protection into three areas – data entry, execution, and output.</p><p>“Our goals are to develop practical solutions for enabling a ‘need to know’ privacy model, and to protect private data from any unauthorized or unintended purposes in the big data life cycle,” said School of Computer Science Professor and Lead Principal Investigator <a href="http://www.cc.gatech.edu/~lingliu/" target="_blank">Ling Liu</a>. “By creating a practical and systematic framework with multiple checkpoints, we increase our opportunities to catch and eliminate threats.”</p><p>Liu and her colleague on the project, Georgia Tech Professor <a href="http://www.cc.gatech.edu/~calton/" target="_blank">Calton Pu</a>, are affiliates of the <a href="http://iisp.gatech.edu" target="_blank">Institute for Information Security and Privacy</a> (IISP). The IISP is Georgia Tech’s hub for cybersecurity and data protection research.&nbsp;</p><p>The first step in creating end-to-end protection is to develop proper protocols for entering data so that sensitive information cannot be reconstructed from the final output of a big data computation. The second step is to create procedures that ensure data integrity, confidentiality, and availability are maintained during the execution phase while the information is being processed. The third protocol protects the final product of big data computations by preventing malicious users from being able to glean any sensitive information from a database.</p><p>The ability to perform efficient big data computations while preserving privacy in the cloud is critical. When these new protocols are in place, new opportunities will emerge for safe and effective data analytics. These opportunities may include healthcare applications that provide personalized medical treatments using an individual’s DNA sequence, or enabling advertisers to create targeted advertisements, without violation of data privacy.</p><p>“Big data and cloud computing are becoming more and more ubiquitous,” said Liu. “Once established, PrivacyGuard research will be integrated into Georgia Tech’s big data systems and analytics courses, contributing to the education of a new generation of data scientists that we hope will become privacy compliance advocates.”</p><p><strong>About the Researchers:</strong></p><p><strong>Dr. Ling Liu</strong>,<em> professor, School of Computer Science, College of Computing</em></p><p>An internationally recognized expert, Dr. Ling Liu is a professor in the College of Computing’s School of Computer Science at the Georgia Institute of Technology and an elected IEEE Fellow. She directs the research program in Distributed Data Intensive Systems program examining research issues and technical challenges in building distributed big data systems, ranging from performance, security, privacy, trust to availability. She has published more than 300 international journal and conference articles and served as a program chair for multiple IEEE and ACM conferences and is currently the editor-in-chief of IEEE Transactions on Services Computing. In addition, Dr. Liu has received numerous awards from the Institute of Electrical and Electronics Engineers, the Association for Computing Machinery, and many notable computing organizations. Professor Liu's current research is primarily sponsored by NSF, IBM, and Intel.</p><p>&nbsp;</p><p><strong>Dr. Calton Pu</strong>, <em>Professor and</em> <em>the John P. Imlay, Jr. Chair in Software, School of Computer Science, and co-director of Center for Experimental Research in Computer Systems</em>&nbsp;</p><p>Calton Pu is currently a professor and John P. Imlay, Jr. Chair in Software at the College of Computing at the Georgia Institute of Technology and an elected IEEE fellow. Dr. Pu received his Ph.D. in computer science from the University of Washington. He has worked on several projects in systems and database research and provided many contributions to systems research including program specialization and software feedback. Professor Pu's recent research has focused on automated system management in clouds, information quality, and Big Data in the Internet-of-Things. Dr. Pu has published more than 70 journal papers and book chapters and an additional 280 conference and refereed workshop papers; he has also served on more than 120 program committees. Dr. Pu's prior research included government projects for DARPA and NSF. In addition, he has conducted industry research for IBM, Intel, and HP.&nbsp;</p><p>&nbsp;</p>]]></body>  <author>Devin Young</author>  <status>1</status>  <created>1462986016</created>  <gmt_created>2016-05-11 17:00:16</gmt_created>  <changed>1475896899</changed>  <gmt_changed>2016-10-08 03:21:39</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers have been awarded a $1.19 million grant from the National Science Foundation (NSF) to devise privacy protection protocols.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers have been awarded a $1.19 million grant from the National Science Foundation (NSF) to devise privacy protection protocols.]]></sentence>  <summary><![CDATA[<p>Georgia Tech researchers have been awarded a $1.19 million grant from the National Science Foundation (NSF) to devise privacy protection protocols for Big Data cloud computations.</p>]]></summary>  <dateline>2016-05-11T00:00:00-04:00</dateline>  <iso_dateline>2016-05-11T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-05-11 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[devin.young@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Devin M. Young</p><p>Communications Assistant</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>535871</item>          <item>50515</item>      </media>  <hg_media>          <item>          <nid>535871</nid>          <type>image</type>          <title><![CDATA[Ling Liu]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[lingliu-2016jan.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/lingliu-2016jan_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/lingliu-2016jan_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/lingliu-2016jan_0.jpg?itok=yEYEoLQM]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Ling Liu]]></image_alt>                    <created>1463497200</created>          <gmt_created>2016-05-17 15:00:00</gmt_created>          <changed>1475895322</changed>          <gmt_changed>2016-10-08 02:55:22</gmt_changed>      </item>          <item>          <nid>50515</nid>          <type>image</type>          <title><![CDATA[Calton Pu]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[calton-pu.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/calton-pu_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/calton-pu_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/calton-pu_1.jpg?itok=3tg230z4]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Calton Pu]]></image_alt>                    <created>1449175400</created>          <gmt_created>2015-12-03 20:43:20</gmt_created>          <changed>1475894460</changed>          <gmt_changed>2016-10-08 02:41:00</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="575511">  <title><![CDATA[Raheem Beyah Named ECE Associate Chair for Strategic Initiatives and Innovation]]></title>  <uid>27241</uid>  <body><![CDATA[<p>Raheem Beyah has been appointed as the associate chair for Strategic Initiatives and Innovation in the Georgia Tech School of Electrical and Computer Engineering, effective September 1.</p><p>In this new position, Beyah will manage activities associated with the School’s large number of corporate partners and affiliates, support the partnership with the ECE Advisory Board, and will lead strategic initiatives internal and external to the School. He will also work with faculty members to develop and sustain a culture of innovation and entrepreneurship within their groups.</p><p>Beyah joined the ECE faculty in 2011, where he holds the Motorola Foundation Professorship. He&nbsp;leads the Communications Assurance and Performance (CAP) Group and is a member of the Communications Systems Center (CSC) and the Institute for Information Security and Privacy (IISP). Prior to returning to Georgia Tech, Beyah was an assistant professor in the Department of Computer Science at Georgia State University, a research faculty member with the CSC, and a consultant with Andersen Consulting’s (now Accenture) Network Solutions Group. A two-time Georgia Tech ECE alumnus, he earned his M.S. and Ph.D. degrees in 1999 and 2003, respectively. He currently holds the Motorola Foundation Professorship in ECE.</p><p>Beyah’s research interests include network security, network traffic characterization and performance, privacy, and cyber-physical systems security with a focus on critical infrastructure. His group has discovered critical flaws in many power grid devices across the globe, and this work has resulted in the development of security patches for these devices.</p><p>Beyah’s work has been highlighted in many news outlets, including<em> NSF Science 360 Radio</em>, <em>NetworkWorld</em>, and <em>Forbes</em>.&nbsp;He is an NSF CAREER Award recipient, was one of 12 junior faculty members selected for DARPA’s 2010 Computer Science Study Panel, and received the inaugural Department of Computer Science Outstanding Performance Award while at Georgia State University. His work has resulted in 114 refereed or invited publications, and he has served as an associate editor or guest editor for several journals in the field.</p><p>Beyah has graduated six Ph.D. students and over 18 M.S. students, and his research group currently consists of five Ph.D. students and two M.S. students.</p><p>He is currently the chair of ECE’s Computer Systems and Software (CSS) group, and he is leading the formation of ECE’s new proposed M.S. Cyber Security degree.</p><p>Beyah is a member of the Georgia Tech Sloan University Center of Exemplary Mentoring (UCEM) committee and currently serves as director of the Georgia Tech Summer Undergraduate Research Experience (SURE) program. Prior to becoming director of SURE, Beyah regularly served as a graduate student mentor and faculty advisor with the program. He is also a faculty advisor for the Georgia Tech Louis Stokes Alliances for Minority Participation Program and is a regular participant in the Georgia Tech FOCUS Program, an annual graduate student recruitment event that takes place over the Martin Luther King Jr. holiday weekend. Along with two faculty members in the Woodruff School of Mechanical Engineering, Beyah co-founded the Academic and Research Leadership Network (ARLN). Supported by 17 engineering deans and the NSF, the mission of ARLN is to increase the representation of underrepresented groups in the academy.</p><p>Beyah is a member of the University of Pittsburgh’s School of Information Sciences Board of Visitors and a member of MARTA’s Cyber Security Advisory Board. He has contributed to the Atlanta community through activities with Atlanta Public Schools and is a 2014 graduate of Leadership Atlanta, the city’s most prestigious executive leadership program and a 2011 graduate of Leadership Georgia. He is a member of AAAS and ASEE, a lifetime member of NSBE, and a senior member of ACM and IEEE.</p>]]></body>  <author>Jackie Nemeth</author>  <status>1</status>  <created>1473689287</created>  <gmt_created>2016-09-12 14:08:07</gmt_created>  <changed>1475896953</changed>  <gmt_changed>2016-10-08 03:22:33</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[ECE Professor Raheem Beyah has been appointed as the associate chair for Strategic Initiatives and Innovation in the Georgia Tech School of Electrical and Computer Engineering, effective September 1.]]></teaser>  <type>news</type>  <sentence><![CDATA[ECE Professor Raheem Beyah has been appointed as the associate chair for Strategic Initiatives and Innovation in the Georgia Tech School of Electrical and Computer Engineering, effective September 1.]]></sentence>  <summary><![CDATA[<p>ECE Professor Raheem Beyah has been appointed as the associate chair for Strategic Initiatives and Innovation in the Georgia Tech School of Electrical and Computer Engineering, effective September 1.</p>]]></summary>  <dateline>2016-09-27T00:00:00-04:00</dateline>  <iso_dateline>2016-09-27T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-09-27 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jackie.nemeth@ece.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Jackie Nemeth</p><p>School of Electrical and Computer Engineering</p><p>404-894-2906</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>509071</item>      </media>  <hg_media>          <item>          <nid>509071</nid>          <type>image</type>          <title><![CDATA[Raheem Beyah]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[raheembeyah131018ar396_web.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/raheembeyah131018ar396_web_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/raheembeyah131018ar396_web_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/raheembeyah131018ar396_web_0.jpg?itok=kaVfFgQd]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Raheem Beyah]]></image_alt>                    <created>1457114400</created>          <gmt_created>2016-03-04 18:00:00</gmt_created>          <changed>1475895270</changed>          <gmt_changed>2016-10-08 02:54:30</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.ece.gatech.edu/faculty-staff-directory/abdul-r-beyah]]></url>        <title><![CDATA[Raheem Beyah  ]]></title>      </link>          <link>        <url><![CDATA[http://www.ece.gatech.edu]]></url>        <title><![CDATA[School of Electrical and Computer Engineering]]></title>      </link>          <link>        <url><![CDATA[http://www2.ece.gatech.edu/cap/]]></url>        <title><![CDATA[Communications Assurance and Performance Group]]></title>      </link>          <link>        <url><![CDATA[http://iisp.gatech.edu]]></url>        <title><![CDATA[Institute for Information Security and Privacy]]></title>      </link>          <link>        <url><![CDATA[http://www.gatech.edu]]></url>        <title><![CDATA[Georgia Tech]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1255"><![CDATA[School of Electrical and Computer Engineering]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="130"><![CDATA[Alumni]]></category>          <category tid="132"><![CDATA[Institute Leadership]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="130"><![CDATA[Alumni]]></term>          <term tid="132"><![CDATA[Institute Leadership]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>      </news_terms>  <keywords>          <keyword tid="67761"><![CDATA[Communications Assurance and Performance Group]]></keyword>          <keyword tid="172329"><![CDATA[Communications Systems Center]]></keyword>          <keyword tid="109"><![CDATA[Georgia Tech]]></keyword>          <keyword tid="172330"><![CDATA[Georgia Tech Summer Undergraduate Research Experience program]]></keyword>          <keyword tid="169143"><![CDATA[Institute for Information Security and Privacy]]></keyword>          <keyword tid="67741"><![CDATA[Raheem Beyah]]></keyword>          <keyword tid="166855"><![CDATA[School of Electrical and Computer Engineering]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="106361"><![CDATA[Business and Economic Development]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="524951">  <title><![CDATA[PhD Student Wins Funding at Inaugural Demo Day Finale]]></title>  <uid>27490</uid>  <body><![CDATA[<p>Ph.D. student <a href="https://www.linkedin.com/in/musheerahmed" target="_blank"><strong>Musheer Ahmed</strong></a> took home first-place honors and a $3,000 check from the Institute for Information Security &amp; Privacy's "Demo Day Finale" for his data mining algorithm called "FraudScope" that helps detect Medicare fraud.</p><p>Ahmed examined two-years worth of Medicare claims data and found that his algorithm could accurately select which providers would be caught and indicted for healthcare fraud -- validating the technique as a risk predictor without the need for whistleblowers.</p><p>He and his faculty advisor, Prof. <strong><a href="http://www.cc.gatech.edu/people/mustaque-ahamad" target="_blank">Mustaque Ahamad</a></strong>, have filed a provisional patent for the research and intend to form a private company. They anticipate that insurance providers and government healthcare programs will be most interested in the tool, which assigns risk scores to healthcare providers who are most likely to file fraudulent claims. He will use the prize money to help develop a software interface.</p><p>Ahmed believes that criminals who file fake medical claims for money are causing healthcare costs to rise for all Americans. In nearly a decade, the FBI's healthcare fraud team has charged more than 2,300 defendants who collectively falsely billed Medicare more than $7 billion.&nbsp;</p><p>"If we catch the bad guys, we can lower healthcare costs," Ahmed says, who adds that most Americans don't realize healthcare identity fraud is a much bigger problem -- and harder to correct -- than stolen credit cards.</p><p>Venture capitalists and business leaders who served as judges at the Demo Day Finale picked Ahmed as the winner from among five student teams.</p><p>Investing in quality student work is an easy decision, said judge <a href="http://www.paladincapgroup.com/people/paul-conley-phd/" target="_blank"><strong>Paul Conley</strong></a>, managing director of the Paladin Capital Group.</p><p>"We're able to very efficiently deploy a little bit of capital alongside an entrepreneur, help them develop those ideas," he said after the event. "The ones that really achieve some traction or commercial success, we like to really get behind and back them as far as we can take them."</p><p>Also winning a cash prize at the Demo Day Finale was the research project, "Tying Public Key to Person with IDforWeb." Graduate students <a href="http://www.cc.gatech.edu/~yjang37/" target="_blank"><strong>Yeongjin Jang</strong></a> and <a href="https://www.linkedin.com/in/mark-wisneski-a865027" target="_blank"><strong>Mark Wisneski</strong> </a>--&nbsp; working with research scientist <a href="https://scholar.google.com/citations?user=qGeaSCYAAAAJ&amp;hl=en" target="_blank"><strong>Pak Ho Chung</strong></a> -- received $2,000 to continue their work to help make public key infrastructure easier and more intuitive to use. The group aims to explore creative new ways for individuals to record and announce their public key for user-friendly verification.</p><p>As for Ahmed, he says he has been interested in healthcare fraud and cybersecurity since he was an undergrad studying computer science at Georgia Tech; it will remain his focus.</p><p>“I took an information security class the last semester of my degree, and I knew this is what I wanted to do.”</p><p>His PhD studies have been entirely focused on the problem of healthcare identity fraud. Now he is about to complete his doctoral degree on May 6 and immediately will turn his attention to developing FraudScope as a business -- right here in Atlanta.</p><p>&nbsp;</p><p><a href="http://www.11alive.com/money/investors-green-light-gt-students-anti-fraud-program/131785548" target="_blank">11Alive News (WXIA-TV Atlanta)</a></p><p><a href="http://www.iisp.gatech.edu/news/students-show-venture-capitalists-their-best-cybersecurity-work">More about Demo Day Finale</a></p><p>&nbsp;</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1460651655</created>  <gmt_created>2016-04-14 16:34:15</gmt_created>  <changed>1475896881</changed>  <gmt_changed>2016-10-08 03:21:21</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Musheer Ahmed is the winner of the Inaugural Demo Day Finale by the Institute for Information Security & Privacy.]]></teaser>  <type>news</type>  <sentence><![CDATA[Musheer Ahmed is the winner of the Inaugural Demo Day Finale by the Institute for Information Security & Privacy.]]></sentence>  <summary><![CDATA[<p>Ph.D. student Musheer Ahmed took home first-place honors -- and a $3,000 check -- from the Institute for Information Security &amp; Privacy's "Demo Day Finale." His data mining algorithm, called FraudScope -- produced as part of doctoral dissertation research -- already has accurately detected Medicare fraud.</p>]]></summary>  <dateline>2016-04-14T00:00:00-04:00</dateline>  <iso_dateline>2016-04-14T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-04-14 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Plans to form company for healthcare fraud detection after graduation]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[tara.labouff@iisp.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Tara La Bouff, 404.769.5408</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>524981</item>          <item>524961</item>      </media>  <hg_media>          <item>          <nid>524981</nid>          <type>image</type>          <title><![CDATA[Musheer Ahmed]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[musheer_ahmed_fraudscope.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/musheer_ahmed_fraudscope_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/musheer_ahmed_fraudscope_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/musheer_ahmed_fraudscope_0.jpg?itok=5SnsBjwC]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Musheer Ahmed]]></image_alt>                    <created>1460995200</created>          <gmt_created>2016-04-18 16:00:00</gmt_created>          <changed>1475895296</changed>          <gmt_changed>2016-10-08 02:54:56</gmt_changed>      </item>          <item>          <nid>524961</nid>          <type>image</type>          <title><![CDATA[Demo Day Finale April 13, 2016]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[demo_day_finale_2016.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/demo_day_finale_2016_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/demo_day_finale_2016_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/demo_day_finale_2016_0.jpg?itok=yQPWN5eR]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Demo Day Finale April 13, 2016]]></image_alt>                    <created>1460995200</created>          <gmt_created>2016-04-18 16:00:00</gmt_created>          <changed>1475895296</changed>          <gmt_changed>2016-10-08 02:54:56</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="171922"><![CDATA[healthcare fraud]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="524801">  <title><![CDATA[Raheem Beyah Named Motorola Foundation Professor]]></title>  <uid>27241</uid>  <body><![CDATA[<p>Raheem Beyah has been named as the Motorola Foundation Professor in the Georgia Tech School of Electrical and Computer Engineering (ECE), effective March 1. This title was previously held by Ayanna Howard.</p><p>Beyah joined the ECE faculty in 2011, where he leads the Communications Assurance and Performance (CAP) Group and is a member of the Communications Systems Center (CSC) and the Institute for Information Security and Privacy (IISP). Prior to returning to Georgia Tech, Beyah was an assistant professor in the Department of Computer Science at Georgia State University, a research faculty member with the CSC, and a consultant with Andersen Consulting’s (now Accenture) Network Solutions Group. A two-time Georgia Tech ECE alumnus, he earned both his M.S. and Ph.D. degrees in 1999 and 2003, respectively. &nbsp;</p><p>Beyah’s research interests include network security, wireless networks, network traffic characterization and performance, privacy, and cyber-physical systems security with a focus on critical infrastructure. His group has discovered critical flaws in many power grid devices across the globe, and this work has resulted in the development of security patches for these devices.</p><p>Beyah’s work has been highlighted in many news outlets, including <em>NetworkWorld</em>&nbsp;and <em>Forbes</em>.&nbsp;He is an NSF CAREER Award recipient, was one of 12 junior faculty members selected for DARPA’s 2010 Computer Science Study Panel, and received the inaugural Department of Computer Science Outstanding Performance Award while at Georgia State University. &nbsp;His work has resulted in 110 refereed or invited publications, and he has served as an associate editor or guest editor for several journals in the field.</p><p>Beyah has graduated five Ph.D. students and over a dozen M.S. students. His research group currently consists of five Ph.D. students and two M.S. students, and he currently serves as director of the Georgia Tech Summer Undergraduate Research Experience (SURE) program. Prior to becoming director of SURE, Beyah regularly served as a graduate student mentor and faculty advisor with the program. He is also a faculty advisor for the Georgia Tech Louis Stokes Alliances for Minority Participation Program and is a regular participant in the Georgia Tech FOCUS Program, an annual graduate student recruitment event that takes place over the Martin Luther King Jr. holiday weekend.</p><p>Beyah is a member of the University of Pittsburgh’s School of Information Sciences Board of Visitors. He has contributed to the Atlanta community through activities with Atlanta Public Schools and is a 2014 graduate of Leadership Atlanta, the city’s most prestigious executive leadership program.</p>]]></body>  <author>Jackie Nemeth</author>  <status>1</status>  <created>1460641641</created>  <gmt_created>2016-04-14 13:47:21</gmt_created>  <changed>1475896881</changed>  <gmt_changed>2016-10-08 03:21:21</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Raheem Beyah has been named as the Motorola Foundation Professor in the Georgia Tech School of Electrical and Computer Engineering (ECE), effective March 1.]]></teaser>  <type>news</type>  <sentence><![CDATA[Raheem Beyah has been named as the Motorola Foundation Professor in the Georgia Tech School of Electrical and Computer Engineering (ECE), effective March 1.]]></sentence>  <summary><![CDATA[<p>Raheem Beyah has been named as the Motorola Foundation Professor in the Georgia Tech School of Electrical and Computer Engineering (ECE), effective March 1.&nbsp;</p>]]></summary>  <dateline>2016-04-14T00:00:00-04:00</dateline>  <iso_dateline>2016-04-14T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-04-14 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jackie.nemeth@ece.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Jackie Nemeth</p><p>School of Electrical and Computer Engineering</p><p>404-894-2906</p><p>&nbsp;</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>509071</item>      </media>  <hg_media>          <item>          <nid>509071</nid>          <type>image</type>          <title><![CDATA[Raheem Beyah]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[raheembeyah131018ar396_web.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/raheembeyah131018ar396_web_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/raheembeyah131018ar396_web_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/raheembeyah131018ar396_web_0.jpg?itok=kaVfFgQd]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Raheem Beyah]]></image_alt>                    <created>1457114400</created>          <gmt_created>2016-03-04 18:00:00</gmt_created>          <changed>1475895270</changed>          <gmt_changed>2016-10-08 02:54:30</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.ece.gatech.edu/]]></url>        <title><![CDATA[School of Electrical and Computer Engineering]]></title>      </link>          <link>        <url><![CDATA[http://www.gatech.edu/]]></url>        <title><![CDATA[Georgia Tech]]></title>      </link>          <link>        <url><![CDATA[http://www.iisp.gatech.edu/]]></url>        <title><![CDATA[Institute for Information Security and Privacy]]></title>      </link>          <link>        <url><![CDATA[https://www.ece.gatech.edu/faculty-staff-directory/abdul-r-beyah]]></url>        <title><![CDATA[A. Raheem Beyah]]></title>      </link>          <link>        <url><![CDATA[http://www2.ece.gatech.edu/cap/]]></url>        <title><![CDATA[Communications Assurance and Performance Group]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1255"><![CDATA[School of Electrical and Computer Engineering]]></group>      </groups>  <categories>          <category tid="130"><![CDATA[Alumni]]></category>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="130"><![CDATA[Alumni]]></term>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="67761"><![CDATA[Communications Assurance and Performance Group]]></keyword>          <keyword tid="1506"><![CDATA[faculty]]></keyword>          <keyword tid="109"><![CDATA[Georgia Tech]]></keyword>          <keyword tid="169143"><![CDATA[Institute for Information Security and Privacy]]></keyword>          <keyword tid="67741"><![CDATA[Raheem Beyah]]></keyword>          <keyword tid="166855"><![CDATA[School of Electrical and Computer Engineering]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="524541">  <title><![CDATA[Obama Names Antón to Commission on Enhancing National Cybersecurity]]></title>  <uid>28797</uid>  <body><![CDATA[<p>President Barack Obama has selected Georgia Tech School of Interactive Computing Chair and Professor Ana (Annie) Antón to serve as one of 12 members of the Commission on Enhancing National Cybersecurity. The bipartisan commission, created by presidential executive order on Feb. 9, 2016, is part of the Cybersecurity National Action Plan.</p><p>According to the executive order, the Commission “will make detailed recommendations to strengthen cybersecurity in both the public and private sectors while protecting privacy, ensuring public safety and economic and national security, fostering discovery and development of new technical solutions, and bolstering partnerships between federal, state and local government and the private sector in the development, promotion and use of cybersecurity technologies, policies and best practices. The Commission's recommendations should address actions that can be taken over the next decade to accomplish these goals.”</p><p>The Commission will be led by Chair Tom Donilon, former National Security Advisor to President Obama, and Vice Chair Sam Palmisano, former CEO of IBM. The commission will submit its final report to President Obama on Dec. 1, 2016.</p><p>“It is an honor to be asked to serve on the Commission,” said Antón, now in her fourth year at Georgia Tech. “I look forward to working with the other members to address ways in which our nation can leverage technological advances to enhance cybersecurity while preserving privacy.”</p><p>Antón, who is an expert on software compliance with federal privacy and security regulations, is a professor and chair of the School of Interactive Computing at Georgia Tech. She holds additional appointments in both the School of Computer Science and the Scheller College of Business. Before joining Georgia Tech, she was a professor of computer science at North Carolina State University, where she is now an adjunct professor. Antón has been a leader in privacy and cybersecurity since the late 1990s. She is an ACM Distinguished Scientist and Senior Member of IEEE.<br /><br />Antón has written more than 80 peer-reviewed technical papers, and testified before Congress as well as the Privacy and Civil Liberties Oversight Board. She has served on a number of privacy and security advisory boards, including for the U.S. Department of Homeland Security and the National Institutes of Standards and Technologies.</p><p>“Professor Antón has a wealth of experience in cybersecurity and privacy, and will bring strategic expertise to the important work of the new Commission on Enhancing National Cybersecurity,” said G. P. “Bud” Peterson, president of Georgia Tech.<br /><br />“We are thrilled that Professor Anton has been named to this panel,” said Zvi Galil, dean and John P. Imlay Chair of the Georgia Tech College of Computing. “She is one of the country’s foremost experts on privacy issues, and she will bring that critical perspective to one of the most important security conversations facing the country right now.”</p><p>“I have charged the Commission on Enhancing National Cybersecurity with the critically-important task of identifying the steps that our nation must take to ensure our cybersecurity in an increasingly digital world,” President Obama said. “These dedicated individuals bring a wealth of experience and talent to this important role, and I look forward to receiving the Commission's recommendations.”</p><p>In addition to Anton, here are the other members of the Commission:</p><p>General Keith Alexander, USA (Ret) – &nbsp;Chairman and CEO of IronNet, and former director of the National Security Agency.</p><p>Ajay Banga – president and CEO of MasterCard.</p><p>Steven Chabinsky – general counsel and chief risk officer for the cybersecurity technology firm CrowdStrike.</p><p>Patrick Gallagher – Chancellor and CEO of the University of Pittsburgh.</p><p>Peter Lee – corporate vice president of Microsoft Research.</p><p>Herbert Lin – Senior Research Scholar for Cyber Policy and Security at the Center for International Security and Cooperation and a Research Fellow at the Hoover Institution, both at Stanford University.</p><p>Heather Murren – private investor and member of the Board of Trustees of the Johns Hopkins University and the Johns Hopkins University Applied Physics Laboratory.</p><p>Joe Sullivan – chief security officer at Uber.</p><p>Maggie Wilderotter – Chief Executive Officer of Frontier Communications from 2004 to 2015, and then Executive Chairman of the company until April 1, 2016.</p>]]></body>  <author>Lance Wallace</author>  <status>1</status>  <created>1460570618</created>  <gmt_created>2016-04-13 18:03:38</gmt_created>  <changed>1475896881</changed>  <gmt_changed>2016-10-08 03:21:21</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[President Barack Obama has selected Georgia Tech School of Interactive Computing Chair and Professor Ana (Annie) Antón to serve as one of 12 members of the Commission on Enhancing National Cybersecurity.]]></teaser>  <type>news</type>  <sentence><![CDATA[President Barack Obama has selected Georgia Tech School of Interactive Computing Chair and Professor Ana (Annie) Antón to serve as one of 12 members of the Commission on Enhancing National Cybersecurity.]]></sentence>  <summary><![CDATA[<p>President Barack Obama has selected Georgia Tech School of Interactive Computing Chair and Professor Ana (Annie) Antón to serve as one of 12 members of the Commission on Enhancing National Cybersecurity. The bipartisan commission, created by presidential executive order on Feb. 9, 2016, is part of the Cybersecurity National Action Plan.</p>&nbsp;]]></summary>  <dateline>2016-04-13T00:00:00-04:00</dateline>  <iso_dateline>2016-04-13T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-04-13 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[laura.diamond@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Laura Diamond&nbsp;<br />Media Relations&nbsp;<br />404-894-6016</p><p>@LauraRDiamond</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>522611</item>      </media>  <hg_media>          <item>          <nid>522611</nid>          <type>image</type>          <title><![CDATA[Annie Antón photo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[annie-anton1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/annie-anton1_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/annie-anton1_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/annie-anton1_0.jpg?itok=myRxgTGa]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1460134800</created>          <gmt_created>2016-04-08 17:00:00</gmt_created>          <changed>1480708522</changed>          <gmt_changed>2016-12-02 19:55:22</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.whitehouse.gov/the-press-office/2016/02/09/executive-order-commission-enhancing-national-cybersecurity]]></url>        <title><![CDATA[Executive Order Creating Commission on Enhancing National Cybersecurity]]></title>      </link>          <link>        <url><![CDATA[https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan]]></url>        <title><![CDATA[Cybersecurity National Action Plan Fact Sheet]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1183"><![CDATA[Home]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="171920"><![CDATA[Ana Anton]]></keyword>          <keyword tid="27641"><![CDATA[annie anton]]></keyword>          <keyword tid="10132"><![CDATA[commission]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="769"><![CDATA[President Obama]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="521791">  <title><![CDATA[FBI Offers iPhone Aid to Local Law Enforcement]]></title>  <uid>27490</uid>  <body><![CDATA[<p>The FBI announced that it had managed to access data on an iPhone used by the San Bernardino shooter, and now other law enforcement officials want the agency to help them unlock phones in their possession. Law enforcement’s attempts to defeat new security features have drawn criticism — especially if they keep the method to themselves. Georgia Tech's <strong>Peter Swire</strong> served on a White House intelligence review group that recommended the administration disclose most flaws to appropriate parties.</p><p><a href="http://www.sfgate.com/business/article/FBI-offers-iPhone-aid-to-local-law-enforcement-7226875.php" target="_blank">Read More</a></p><p>&nbsp;</p><p>&nbsp;</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1459863453</created>  <gmt_created>2016-04-05 13:37:33</gmt_created>  <changed>1475896877</changed>  <gmt_changed>2016-10-08 03:21:17</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Law enforcement agencies are asking the FBI to teach them how to unlock the iPhone, which raises new questions about public dsiclosure of a vulnerability.]]></teaser>  <type>news</type>  <sentence><![CDATA[Law enforcement agencies are asking the FBI to teach them how to unlock the iPhone, which raises new questions about public dsiclosure of a vulnerability.]]></sentence>  <summary><![CDATA[<p>Law enforcement’s attempts to defeat new security features have drawn criticism — especially if they keep the method to themselves. Georgia Tech's Peter Swire served on a White House intelligence review group that recommended the administration disclose most flaws to appropriate parties.</p>]]></summary>  <dateline>2016-04-04T00:00:00-04:00</dateline>  <iso_dateline>2016-04-04T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-04-04 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>232191</item>      </media>  <hg_media>          <item>          <nid>232191</nid>          <type>image</type>          <title><![CDATA[Professor Peter Swire]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[peterswire.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/peterswire_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/peterswire_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/peterswire_0.jpg?itok=xp9dVDb2]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Professor Peter Swire]]></image_alt>                    <created>1449243627</created>          <gmt_created>2015-12-04 15:40:27</gmt_created>          <changed>1475894906</changed>          <gmt_changed>2016-10-08 02:48:26</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="72451"><![CDATA[Peter Swire]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="517561">  <title><![CDATA[Students to Show Venture Capitalists Their Best Cybersecurity Work]]></title>  <uid>27490</uid>  <body><![CDATA[<p>A fraud detection system for healthcare claims… Ways to evaluate safer passwords…. Technical fixes for truly private browsing… These are some of the ideas proposed by Georgia Tech students who will compete before a national panel of venture capitalists for cash in the inaugural “Demo Day Finale” on April 13.</p><p>The event is hosted by the Institute for Information Security &amp; Privacy (IISP) and aims to give students an early introduction to potential investors as they continue their research.</p><p>“The hardest part of moving great ideas out to market is finding a trustworthy partner,” says <strong>Wenke Lee</strong>, co-director of the IISP and a professor in the School of Computer Science who has successfully transferred research to private corporations. “It can be awkward to turn over your hard work to someone at the end of a long project. We hope to introduce students to potential investors earlier in the process to help them consider steps to take that could make their project more appealing to consumers. This is one way we think the Institute for Information Security &amp; Privacy can help move solutions out to individuals who need better identity, data or hardware protection.”</p><p>Five student teams representing the School of Computer Science and School of Electrical Computing and Engineering are polishing their presentations now to deliver TED-style talks before the elite panel of business leaders from Washington D.C, Philadelphia, and Atlanta. Research with the best chance of commercialization or demonstrating the most impact toward resolving an industry need receives a cash prize – up to $5,000 this year.</p><p>Initial cybersecurity research concepts were presented at the inaugural Fall Demo Day, held <a href="http://gtcybersecuritysummit.com" target="_blank">Oct. 28 at the Georgia Tech Cyber Security Summit</a>, where more than 300 attendees viewed and voted on the best research work from Georgia Tech and GTRI. The top five finalists now advance to the finale. All finalists represent graduate students – some of whom have been working on their projects for many years.</p><p>“It means a great deal for me to know that my research can have a huge positive impact outside of the lab,” says <strong>Musheer Ahmed</strong>, a graduating PhD student (advised by Professor Mustaque Ahamad) whose patented, data analytics system assigns risk scores to healthcare providers and already has caught the eye of other incubator programs interested in its potential. “All students strive for this but never know if that will materialize with their work. I hope the momentum will continue and my work can be commercialized.”</p><p>Another team – “IDforWeb” -- hopes to gather validation from the Demo Day judges that they have an easy-to-use platform for secure transactions and communication authentication. IDforWeb seeks to create “killer apps” that improve public key infrastructure (PKI) with new ease of use.</p><p>“I'm glad that people believe the 10+ year-old PKI usability problem is an important problem to solve,&nbsp;and agree with us that new technologies like smartphones and&nbsp;blockchains offer some new angle,” said <strong>Pak Ho Chung</strong>, a researcher in the School of Computer Science, referring to the Fall audience that voted them through to the Spring Finale.</p><p>All projects that will be presented at Demo Day represent a broad range of solutions for healthcare, e-commerce, application development and more, says <strong>Bo Rotoloni</strong>, co-director of the IISP who also leads the information and cyber sciences directorate for the Georgia Tech Research Institute (GTRI).</p><p>“The investors coming to judge our first Demo Day are going to see unique ideas by Georgia Tech and clever solutions to existing and emerging challenges. We believe one of academia’s roles is to explore big ideas, prove the potential, and create new market spaces. Several of these finalists do that well.”</p><p>Due to limited space, <a href="http://tiny.cc/demoday16">registration is encouraged</a> for the event.</p><p>&nbsp;</p><h4><strong>The IISP Demo Day Spring ’16 Finalists are</strong></h4><p><em>"Cybersecurity Inspired Health Insurance Fraud Detector"</em><br /> <strong>Musheer Ahmed</strong><br /> Advisor: Mustaque Ahamad</p><p><br /><a href="http://www2.ece.gatech.edu/cap/PARS/" target="_blank"> <em>"PARS: A Uniform and Open-source Password Analysis and Research System"</em></a><br /> <strong>Shukun Yang</strong><br /> Advisor: Raheem Beyah</p><p><br /><a href="http://wenke.gtisc.gatech.edu/papers/dangnull.pdf" target="_blank"> <em>"Preventing Use-after-free with Dangling Pointers Nullification"</em></a><br /> <strong>Byoungyoung Lee </strong>and<strong> Chengyu Song</strong><br /> Advisor: Taesoo Kim</p><p>&nbsp;</p><p><em>"Tying Public Key to Person with ‘idforweb’ "</em><br /> <strong>Pak Ho Chung, Yeongjin Jang </strong>and<strong> Mark Wisneski</strong><br /> Advisor: Wenke Lee</p><p><br /><a href="http://wenke.gtisc.gatech.edu/papers/ucognito.pdf" target="_blank"> <em>"UCognito: Private Browsing without Tears"</em></a><br /> <strong>Meng Xu </strong>and<strong> Yeongjin Jang </strong><br /> Advisor:&nbsp; Taesoo Kim and Wenke Lee</p><p>&nbsp;</p><p>&nbsp;</p><h4><strong>Judges are</strong></h4><p><strong>Robin Bienfait</strong>, chief enterprise innovation officer, Samsung</p><p><strong>Paul Conley</strong>, managing director, Paladin Capital Group</p><p><strong>John Lee</strong>, senior associate, Osage Partners</p><p><strong>Glenn McGonnigle</strong>, general partner, TechOperators</p><p><strong>Sig Mosley</strong>, managing partner, Mosley Ventures</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1458908806</created>  <gmt_created>2016-03-25 12:26:46</gmt_created>  <changed>1475896869</changed>  <gmt_changed>2016-10-08 03:21:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Information security students will compete before a national panel of venture capitalists for cash in the inaugural “Demo Day Finale” on April 13.]]></teaser>  <type>news</type>  <sentence><![CDATA[Information security students will compete before a national panel of venture capitalists for cash in the inaugural “Demo Day Finale” on April 13.]]></sentence>  <summary><![CDATA[<p><em>A fraud detection system for healthcare claims… Ways to evaluate safer passwords…. Technical fixes for truly private browsing…</em> These are some of the ideas proposed by Georgia Tech students who will compete before a national panel of venture capitalists for cash in the inaugural “Demo Day Finale” on April 13, hosted by the Institute for Information Security &amp; Privacy.</p>]]></summary>  <dateline>2016-03-29T00:00:00-04:00</dateline>  <iso_dateline>2016-03-29T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-03-29 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[<h4>&nbsp;April Special Events</h4><p>Other special events organized this month by the IISP include</p><p><strong>April 13: <a href="http://iisp.gatech.edu/events/spring-distinguished-lecture-latanya-arvette-sweeney" target="_blank">Capital One Distinguished Lecture</a> with Latanya Arvette Sweeney</strong> of Harvard University's Data Privacy Lab</p><p><strong>April 1 - 22: <a href="http://iisp.gatech.edu/cyber-lecture" target="_self">Cybersecurity Lecture Series</a></strong> featuring speakers from federal government, start-ups and the financial sector.</p>]]></sidebar>  <email><![CDATA[tlabouff@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Tara La Bouff, 404.769.5408</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>518341</item>          <item>451391</item>      </media>  <hg_media>          <item>          <nid>518341</nid>          <type>image</type>          <title><![CDATA[Demo Day Spring '16]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[security-poster-web.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/security-poster-web_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/security-poster-web_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/security-poster-web_0.jpg?itok=s7Z0hIMD]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Demo Day Spring '16]]></image_alt>                    <created>1459274540</created>          <gmt_created>2016-03-29 18:02:20</gmt_created>          <changed>1475895284</changed>          <gmt_changed>2016-10-08 02:54:44</gmt_changed>      </item>          <item>          <nid>451391</nid>          <type>image</type>          <title><![CDATA[IISP logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[instituteforinformationsecurityprivacy-outline-black874.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=1zeF6pZR]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IISP logo]]></image_alt>                    <created>1449256280</created>          <gmt_created>2015-12-04 19:11:20</gmt_created>          <changed>1475895192</changed>          <gmt_changed>2016-10-08 02:53:12</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="3652"><![CDATA[Demo Day]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="507121">  <title><![CDATA[Device “Fingerprints” Could Help Protect Power Grid, Other Industrial Systems]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Human voices are individually recognizable because they’re generated by the unique components of each person’s voice box, pharynx, esophagus and other physical structures.</p><p>Researchers are using the same principle to identify devices on electrical grid control networks, using their unique electronic “voices” – fingerprints produced by the devices’ individual physical characteristics – to determine which signals are legitimate and which signals might be from attackers. A similar approach could also be used to protect networked industrial control systems in oil and gas refineries, manufacturing facilities, wastewater treatment plants and other critical industrial systems.</p><p>The research, reported February 23 at the Network and Distributed System Security Symposium in San Diego, was supported in part by the National Science Foundation (NSF). While device fingerprinting isn’t a complete solution in itself, the technique could help address the unique security challenges of the electrical grid and other cyber-physical systems. The approach has been successfully tested in two electrical substations.</p><p>“We have developed fingerprinting techniques that work together to protect various operations of the power grid to prevent or minimize spoofing of packets that could be injected to produce false data or false control commands into the system,” said Raheem Beyah, an associate professor in the School of Electrical and Computer Engineering at the Georgia Institute of Technology. “This is the first technique that can passively fingerprint different devices that are part of critical infrastructure networks. We believe it can be used to significantly improve the security of the grid and other networks.”</p><p>The networked systems controlling the U.S. electrical grid and other industrial systems often lack the ability to run modern encryption and authentication systems, and the legacy systems connected to them were never designed for networked security. Because they are distributed around the country, often in remote areas, the systems are also difficult to update using the “patching” techniques common in computer networks. And on the electric grid, keeping the power on is a priority, so security can’t cause delays or shutdowns.</p><p>“The stakes are extremely high, but the systems are very different from home or office computer networks,” said Beyah. “It is critical that we secure these systems against attackers who may introduce false data or issue malicious commands.”</p><p>Beyah, his students, and colleagues in Georgia Tech’s George W. Woodruff School of Mechanical Engineering set out to develop security techniques that take advantage of the unique physical properties of the grid and the consistent type of operations that take place there.</p><p>For instance, control devices used in the power grid produce signals that are distinctive because of their unique physical configurations and compositions. Security devices listening to signals traversing the grid’s control systems can differentiate between these legitimate devices and signals produced by equipment that’s not part of the system.</p><p>Another aspect of the work takes advantage of simple physics. Devices such as circuit breakers and electrical protection systems can be told to open or close remotely, and they then report on the actions they’ve taken. The time required to open a breaker or a valve is determined by the physical properties of the device. If an acknowledgement arrives too soon after the command is issued – less time than it would take for a breaker or valve to open, for instance – the security system could suspect spoofing, Beyah explained.</p><p>To develop the device fingerprints, the researchers, including mechanical engineering assistant professor Jonathan Rogers, have built computer models of utility grid devices to understand how they operate. Information to build the models came from “black box” techniques – watching the information that goes into and out of the system – and “white box” techniques that utilize schematics or physical access to the systems.</p><p>“Device fingerprinting is a unique signature that indicates the identity of a specific device, or device type, or an action associated with that device type,” Beyah explained. “We can use physics and mathematics to analyze and build a model using first principles based on the devices themselves. Schematics and specifications allow us to determine how the devices are actually operating.”</p><p>The researchers have demonstrated the technique on two electrical substations, and plan to continue refining it until it becomes close to 100 percent accurate. Their current technique addresses the protocol used for more than half of the devices on the electrical grid, and future work will include examining application of the method to other protocols.</p><p>Because they also include devices with measurable physical properties, Beyah believes the approach could have broad application to securing industrial control systems used in manufacturing, oil and gas refining, wastewater treatment and other industries. Beyond industrial controls, the principle could also apply to the Internet of Things (IoT), where the devices being controlled have specific signatures related to switching them on and off.</p><p>“All of these IoT devices will be doing physical things, such as turning your air-conditioning on or off,” Beyah said. “There will be a physical action occurring, which is similar to what we have studied with valves and actuators.”</p><p>In addition to those already mentioned, the research included graduate students David Formby, the paper’s first author; Preethi Srinivasan and Andrew Leonard.</p><p><em>This research was supported by the National Science Foundation under grant number 1140230. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.</em></p><p><strong>CITATION</strong>: David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers and Raheem Beyah, “Who’s in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems,” (NDSS 2016).&nbsp;</p><p><strong>Research News</strong><br /><strong>Georgia Institute of Technology</strong><br /><strong>177 North Avenue</strong><br /><strong>Atlanta, Georgia 30332-0181 USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (<a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a>).<br /><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1456679046</created>  <gmt_created>2016-02-28 17:04:06</gmt_created>  <changed>1475896853</changed>  <gmt_changed>2016-10-08 03:20:53</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers are using device fingerprints to help secure the electrical grid.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers are using device fingerprints to help secure the electrical grid.]]></sentence>  <summary><![CDATA[<p>Researchers are using the unique electronic “voices” produced by devices on the electrical grid to determine which signals are legitimate and which signals might be from attackers.</p>]]></summary>  <dateline>2016-02-29T00:00:00-05:00</dateline>  <iso_dateline>2016-02-29T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-02-29 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p><a href="mailto:jtoon@gatech.edu">jtoon@gatech.edu</a></p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>507061</item>          <item>507081</item>          <item>507101</item>      </media>  <hg_media>          <item>          <nid>507061</nid>          <type>image</type>          <title><![CDATA[Utility fingerprinting]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[utility-fingerprinting.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/utility-fingerprinting_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/utility-fingerprinting_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/utility-fingerprinting_1.jpg?itok=qToRKeiG]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Utility fingerprinting]]></image_alt>                    <created>1456765200</created>          <gmt_created>2016-02-29 17:00:00</gmt_created>          <changed>1475895268</changed>          <gmt_changed>2016-10-08 02:54:28</gmt_changed>      </item>          <item>          <nid>507081</nid>          <type>image</type>          <title><![CDATA[Device fingerprinting2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[utility-fingerprinting2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/utility-fingerprinting2_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/utility-fingerprinting2_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/utility-fingerprinting2_1.jpg?itok=NJNqufu0]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Device fingerprinting2]]></image_alt>                    <created>1456765200</created>          <gmt_created>2016-02-29 17:00:00</gmt_created>          <changed>1475895268</changed>          <gmt_changed>2016-10-08 02:54:28</gmt_changed>      </item>          <item>          <nid>507101</nid>          <type>image</type>          <title><![CDATA[Device fingerprinting3]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[utility-fingerprinting3.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/utility-fingerprinting3_1.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/utility-fingerprinting3_1.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/utility-fingerprinting3_1.jpg?itok=JHypfQme]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Device fingerprinting3]]></image_alt>                    <created>1456765200</created>          <gmt_created>2016-02-29 17:00:00</gmt_created>          <changed>1475895268</changed>          <gmt_changed>2016-10-08 02:54:28</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="144"><![CDATA[Energy]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="144"><![CDATA[Energy]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="171775"><![CDATA[device fingerprinting]]></keyword>          <keyword tid="170238"><![CDATA[electric utility]]></keyword>          <keyword tid="436"><![CDATA[electricity]]></keyword>          <keyword tid="145981"><![CDATA[IISP]]></keyword>          <keyword tid="67741"><![CDATA[Raheem Beyah]]></keyword>          <keyword tid="167055"><![CDATA[security]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="505561">  <title><![CDATA[AAU: Helping Safeguard the Connected World]]></title>  <uid>27490</uid>  <body><![CDATA[<p>As society grows increasingly dependent on electronic networks for managing everyday life, running the economy, and defending the nation, cybersecurity has become one of the most pressing challenges.</p><p>Can we protect the power grid, telecommunication networks, financial data, “smart” products, and our private information, while still enjoying the benefits technology affords us?</p><p>American universities are helping to answer that question, leading the way with multidisciplinary research, technology development, and education.</p><p>The second in a series on university research from the Association of American Universities (AAU), this link shows what university faculty, researchers, students, and alumni are doing to help secure electronic communications and data.</p><p><a href="http://www.aau.edu/research/article3.aspx?id=16895" target="_blank">Read more</a> from the AAU.</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1456310612</created>  <gmt_created>2016-02-24 10:43:32</gmt_created>  <changed>1475896853</changed>  <gmt_changed>2016-10-08 03:20:53</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The Association of American Universities highlights what faculty, researchers, students, and alumni are doing across the U.S. to help secure electronic communications and data.]]></teaser>  <type>news</type>  <sentence><![CDATA[The Association of American Universities highlights what faculty, researchers, students, and alumni are doing across the U.S. to help secure electronic communications and data.]]></sentence>  <summary><![CDATA[<p>The second in a series that addresses broad societal issues, the Association of American Universities examines what university faculty, researchers, students, and alumni are doing to help secure electronic communications and data for the nation.</p>]]></summary>  <dateline>2016-02-24T00:00:00-05:00</dateline>  <iso_dateline>2016-02-24T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-02-24 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>505201</item>      </media>  <hg_media>          <item>          <nid>505201</nid>          <type>image</type>          <title><![CDATA[University Cybersecurity Research Resources]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[istock_000071876403_small.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/istock_000071876403_small_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/istock_000071876403_small_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/istock_000071876403_small_0.jpg?itok=dcjxO8oH]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[University Cybersecurity Research Resources]]></image_alt>                    <created>1456344000</created>          <gmt_created>2016-02-24 20:00:00</gmt_created>          <changed>1475895265</changed>          <gmt_changed>2016-10-08 02:54:25</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="504131">  <title><![CDATA[Georgia Tech Discovers How Mobile Ads Leak Personal Data]]></title>  <uid>27490</uid>  <body><![CDATA[<p><strong>ATLANTA – February 22, 2016</strong> <strong>–</strong> The personal information of millions of smartphone users is at risk due to in-app advertising that can leak potentially sensitive user information between ad networks and mobile app developers, according to a new study by the <a href="http://www.scs.gatech.edu/">School of Computer Science</a> at the Georgia Institute of Technology.</p><p>Results will be presented Tuesday, Feb. 23 at the <a href="http://www.internetsociety.org/events/ndss-symposium-2016">2016 Network and Distributed System Security Symposium (NDSS '16)</a> in San Diego, Calif., by researchers <strong>Wei Meng</strong>, <strong>Ren Ding</strong>, <strong>Simon Chung</strong>, and <strong>Steven Han</strong> under the direction of Professor <a href="http://www.iisp.gatech.edu/wenke-lee"><strong>Wenke Lee</strong></a>.</p><p>The study examined more than 200 participants who used a custom-built app for Android-based smartphones, which account for 52 percent of the U.S. smartphone market according to <a href="https://www.comscore.com/Insights/Market-Rankings/comScore-Reports-April-2015-U.S.-Smartphone-Subscriber-Market-Share">comScore’s April 2015 report</a>. Georgia Tech researchers reviewed the accuracy of personalized ads that were served to test subjects from the Google AdNetwork based upon their personal interests and demographic profiles; and secondly, examined how much a mobile app creator could uncover about users because of the personalized ads served to them.</p><p>Researchers found that 73 percent of ad impressions for 92 percent of users are correctly aligned with their demographic profiles. Researchers also found that, based on ads shown, a mobile app developer could learn a user’s:</p><ul><li>gender with 75 percent accuracy,</li><li>parental status with 66 percent accuracy,</li><li>age group with 54 percent accuracy, and</li><li>could also predict income, political affiliation, marital status, with higher accuracy than random guesses.</li></ul><p>Some personal information is deemed so sensitive that Google explicitly states those factors are not used for personalization, yet the study found that app developers still can discover this information due to leakage between ad networks and app developers.</p><p>“Free smart phone apps are not really free,” says Wei Meng, lead researcher and a graduate student studying computer science. “Apps – especially malicious apps – can be used to collect potentially sensitive information about someone simply by hosting ads in the app and observing what is received by a user. Mobile, personalized in-app ads absolutely present a new privacy threat.”</p><h6><strong>How it Works</strong></h6><ul><li>Mobile app developers choose to accept in-app ads inside their app.</li><li>Ad networks pay a fee to app developers in order to show ads and monitor user activity – collecting app lists, device models, geo-locations, etc. This aggregate information is made available to help advertisers choose where to place ads.</li><li>Advertisers instruct an ad network to show their ads based on topic targeting (such as “Autos &amp; Vehicles”), interest targeting (such as user usage patterns and previous click thrus), and demographic targeting (such as estimated age range).</li><li>The ad network displays ads to appropriate mobile app users and receives payment from advertisers for successful views or click thrus by the recipient of the ad.</li><li>In-app ads are displayed unencrypted as part of the app’s graphical user interface. Therefore, mobile app developers can access the targeted ad content delivered to its own app users and then reverse engineer that data to construct a profile of their app customer.</li></ul><p>Unlike advertising on a website page, where personalized ad content is protected from publishers and other third parties by the <a href="https://en.wikipedia.org/wiki/Same-origin_policy">Same Origin Policy</a>, there is no isolation of personalized ad content from the mobile app developer.</p><p>For the smartphone dependent population – the 7 percent of largely low-income Americans, defined by <a href="http://www.pewinternet.org/2015/04/01/us-smartphone-use-in-2015/">Pew Internet ("U.S. Smartphone Use in 2015")</a>, who have neither traditional broadband at home nor any other online alternative – their personal information may be particularly at risk.</p><p>“People use their smartphones now for online dating, banking, and social media every day,” said Wenke Lee, professor of computer science and co-director of the Institute for Information Security &amp; Privacy at Georgia Tech. “Mobile devices are intimate to users, so safeguarding personal information from malicious parties is more important than ever.”</p><p>The study acknowledges that the online advertising industry is taking steps to protect users’ information by improving the HTTPS protocol, but researchers believe the threat to user privacy is greater than HTTPS protection can provide under a mobile scenario.</p><p>The researchers contacted Google AdNetworks about their finding.</p><h6><strong><a href="http://www.cc.gatech.edu/%7Ewmeng6/ndss16_mobile_ad.pdf">Download</a> the complete research paper.</strong></h6><p>&nbsp;</p><h5><strong>Additional research at NDSS '16</strong></h5><p><em>Georgia Tech's School of Computer Science will present three additional papers at the conference. </em></p><ul><li>"<a href="https://taesoo.gtisc.gatech.edu/pubs/2016/kdfi/kdfi.pdf">Enforcing Kernel Security Invariants with Data Flow Integrity</a>" by Chengyu Song, Byoungyoung Lee, Kangjie Lu, William Harris, and Wenke Lee</li><li>"<a href="http://www.cc.gatech.edu/%7Eklu38/publications/runtimeaslr-ndss16.pdf">How to Make ASLR Win the Clone Wars: Runtime Re-Randomization</a><em>" </em>by Kangjie Lu, Stefan Nurnberger, Michael Backes, and Wenke Lee</li><li>"<a href="https://taesoo.gtisc.gatech.edu/pubs/2016/opensgx/opensgx.pdf">OpenSGX: &nbsp;An Open Platform for SGX Research</a><em>" </em>by Prerit Jain, Soham Desai, Ming-Wei Shih, and Taesoo Kim in partnership with KAIST of South Korea researchers Seongmin Kim, JaeHyuk Lee, Changho Choi, Youjung Shin, Brent Byunghoon Kang, and Dongsu Han</li></ul>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1456134580</created>  <gmt_created>2016-02-22 09:49:40</gmt_created>  <changed>1475896849</changed>  <gmt_changed>2016-10-08 03:20:49</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[School of Computer Science researchers find that personalized in-app ads can leak sensitive profile information between developers and ad networks.]]></teaser>  <type>news</type>  <sentence><![CDATA[School of Computer Science researchers find that personalized in-app ads can leak sensitive profile information between developers and ad networks.]]></sentence>  <summary><![CDATA[<p>School of Computer Science researchers find that personalized in-app ads can leak sensitive profile information between developers and ad networks. Their study will be presented Feb. 23 at the 2016 Network and Distributed System Symposium in San Diego, Calif.</p>]]></summary>  <dateline>2016-02-22T00:00:00-05:00</dateline>  <iso_dateline>2016-02-22T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-02-22 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[tlabouff@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Tara La Bouff</p><p>602.770.0264</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>504141</item>          <item>504151</item>      </media>  <hg_media>          <item>          <nid>504141</nid>          <type>image</type>          <title><![CDATA[Researchers Wei Meng and Ren Ding]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[ndss_presenters_meng_-_ding.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/ndss_presenters_meng_-_ding_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/ndss_presenters_meng_-_ding_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/ndss_presenters_meng_-_ding_0.jpg?itok=6HlzSCoJ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Researchers Wei Meng and Ren Ding]]></image_alt>                    <created>1456167600</created>          <gmt_created>2016-02-22 19:00:00</gmt_created>          <changed>1475895263</changed>          <gmt_changed>2016-10-08 02:54:23</gmt_changed>      </item>          <item>          <nid>504151</nid>          <type>image</type>          <title><![CDATA[Mobile App Ad Delivery]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[mobile_app_ad_ecosystem_crop.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/mobile_app_ad_ecosystem_crop_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/mobile_app_ad_ecosystem_crop_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/mobile_app_ad_ecosystem_crop_0.jpg?itok=XQ1fDN5Q]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Mobile App Ad Delivery]]></image_alt>                    <created>1456167600</created>          <gmt_created>2016-02-22 19:00:00</gmt_created>          <changed>1475895263</changed>          <gmt_changed>2016-10-08 02:54:23</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="34741"><![CDATA[mobile app]]></keyword>          <keyword tid="166941"><![CDATA[School of Computer Science]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="503391">  <title><![CDATA[Why Apple's Fight With the FBI Matters]]></title>  <uid>27490</uid>  <body><![CDATA[<p>A federal court ordered Apple to help the FBI unlock an iPhone used by one of the attackers in the San Bernardino shooting. Apple is challenging the court’s request.&nbsp; This battle between tech companies and the government over encryption could open a Pandora’s box, said <strong>Andrew Howard</strong>, director of the Cyber Technology and Information Security Laboratory at the Georgia Tech Research Institute.</p><p><br /><a href="http://amplifier.gatech.edu/articles/2016/02/why-apple%E2%80%99s-fight-fbi-matters" target="_blank">Read more</a></p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1455838205</created>  <gmt_created>2016-02-18 23:30:05</gmt_created>  <changed>1475896849</changed>  <gmt_changed>2016-10-08 03:20:49</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A federal court ordered Apple to help the FBI unlock an iPhone used in a crime.]]></teaser>  <type>news</type>  <sentence><![CDATA[A federal court ordered Apple to help the FBI unlock an iPhone used in a crime.]]></sentence>  <summary><![CDATA[<p>A federal court order asks Apple to do more than simply flip a one-time switch to disable security; it's asking Apple to manufacture vulnerability, says Andrew Howard, director of the Cyber Technology and Information Security Laboratory.</p>]]></summary>  <dateline>2016-02-18T00:00:00-05:00</dateline>  <iso_dateline>2016-02-18T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-02-18 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>503141</item>      </media>  <hg_media>          <item>          <nid>503141</nid>          <type>image</type>          <title><![CDATA[Andrew Howard]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[img_6830.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/img_6830_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/img_6830_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/img_6830_0.jpg?itok=roNWy5TU]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Andrew Howard]]></image_alt>                    <created>1456167600</created>          <gmt_created>2016-02-22 19:00:00</gmt_created>          <changed>1475895258</changed>          <gmt_changed>2016-10-08 02:54:18</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="503371">  <title><![CDATA[How Should Apple Balance Privacy and National Security?]]></title>  <uid>27490</uid>  <body><![CDATA[<p>Apple fights back against a federal court order to develop a "backdoor" into its devices. NPR's Here &amp; Now asks <a href="http://peterswire.net/" target="_blank">Peter Swire</a> -- Huang Professor of Law and Ethics at the Scheller College of Business and associate director of policy for the Institute for Information Security &amp; Privacy at Georgia Tech -- to explain the argument between Apple and the U.S. Justice Department.</p><p><a href="http://hereandnow.wbur.org/2016/02/17/apple-ethics-privacy-national-security" target="_blank">Listen here</a> (5:39)</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1455836749</created>  <gmt_created>2016-02-18 23:05:49</gmt_created>  <changed>1475896849</changed>  <gmt_changed>2016-10-08 03:20:49</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech's Peter Swire explains the fight between Apple and the U.S. government.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech's Peter Swire explains the fight between Apple and the U.S. government.]]></sentence>  <summary><![CDATA[<p>Georgia Tech's Peter Swire explains the fight between Apple and the U.S. government.</p>]]></summary>  <dateline>2016-02-17T00:00:00-05:00</dateline>  <iso_dateline>2016-02-17T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-02-17 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>503381</item>      </media>  <hg_media>          <item>          <nid>503381</nid>          <type>image</type>          <title><![CDATA[Can Apple be cracked?]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[istock_000063644127_small.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/istock_000063644127_small_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/istock_000063644127_small_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/istock_000063644127_small_0.jpg?itok=aDo4hyHe]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Can Apple be cracked?]]></image_alt>                    <created>1456167600</created>          <gmt_created>2016-02-22 19:00:00</gmt_created>          <changed>1475895263</changed>          <gmt_changed>2016-10-08 02:54:23</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>          <keyword tid="2895"><![CDATA[Apple]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="72451"><![CDATA[Peter Swire]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="532141">  <title><![CDATA[Georgia Tech to Dismantle Pervasive Cyberattacks in 10 Seconds or Less]]></title>  <uid>32045</uid>  <body><![CDATA[<p>Georgia Tech researchers have been awarded a $2.9 million contract from the U.S. Defense Advanced Research Projects Agency (DARPA) to develop a cybersecurity method that will identify and defend against low-volume distributed denial of service (DDoS) attacks.</p><p>High-volume DDoS attacks that overwhelm servers with large amounts of malicious traffic in order to shut down a particular website have received a significant amount of study. However, low-volume attacks have not.</p><p>Low-volume attacks—while generally receiving less attention from scholars and media outlets—account for a significant percentage of all DDoS assaults. They can take down a website and be as damaging, but may use less bandwidth, are often shorter in duration, and may be designed to distract a security team from the aftershocks of follow-on attacks. In fact, according to Neustar, Inc., around 54 percent of DDoS attacks were found to be relatively small at less than 5 Gbps, yet 43 percent leave behind malware or viruses. Neustar’s <a href="https://www.neustar.biz/about-us/news-room/press-releases/2016/neustartwentysixteenaprddos">April 2016</a> report found that 82 percent of corporations were attacked repeatedly.</p><p>“This has been a 25-year problem with no practical solution,” says <a href="http://www.cc.gatech.edu/people/taesoo-kim">Taesoo Kim</a>, lead principal investigator for the study and assistant professor in Georgia Tech’s School of Computer Science. “Our goal is to create a precise and timely detection method that identifies attacks by how they subtly change the resource consumption of a machine. With little to no degradation of system performance, we believe we can mitigate the threat and write a new signature for it inside the hardware within approximately 10 seconds so a network interface card will recognize it again. This effectively puts an anti-virus patch into your hardware in real time.”</p><p>Under the project name ROKI, Kim and colleagues propose to first establish a baseline of resource consumption using three Intel hardware features. Next, they will develop continuous analysis algorithms to compare a packet’s effect on system performance against historical consumption under similar scenarios. A new path-reconstruction engine will then produce a sequence of instructions to nullify an attack and encode the finding into the network interface card to stop current or future attack traffic.</p><p>“ROKI has the potential to achieve both timeliness and precision,” says <a href="http://www.iisp.gatech.edu/wenke-lee">Wenke Lee</a>, co-PI on the project and co-director of the <a href="http://iisp.gatech.edu/">Institute for Information Security &amp; Privacy</a> at Georgia Tech. “We don’t need to know what an attack looks like, just that it deviates from the baseline. Existing defenses against low-volume DDoS attacks lack precision and they cannot create a response in a timely manner. This will.”</p><p>The research is part of DARPA’s <a href="http://www.darpa.mil/program/extreme-ddos-defense">Extreme DDoS Defense</a> (XD3) program (awarded under contract #HR0011-16-C-0059) and began in April. First deliverables are expected in approximately 18 months, beginning with a prototype to demonstrate the core idea. The project is expected to be complete in three years. Field exercises to mitigate previously unknown DDoS attacks will occur in 2019.</p><p><strong>About the Researchers</strong></p><p><strong>Taesoo Kim</strong>, <em>assistant professor, School of Computer Science, College of Computing </em></p><p>He received his Ph.D. in Computer Science from the Massachusetts Institute of Technology in 2014 and since has taught at Georgia Tech, attracting nearly $6 million in research awards to the university, inclusive of this announcement. He leads and co-leads projects on large-scale analytics, scalable manycore operating systems, defense mechanisms to harden software, and tag-tracking. His thesis work focused on the design of an intrusion recovery method for operating systems, web applications, distributed web services, and web frameworks that is today the foundation of a company called Nerati.</p><p><strong>William Harris</strong>, <em>assistant professor, School of Computer Science, College of Computing</em></p><p>He studies program synthesis, analysis and verification and has developed tools that generate programs to help operating systems meet specified security requirements even if the underlying components may not be trusted.</p><p><strong>Wenke Lee</strong>, <em>the John P. Imlay Jr. Professor, School of Computer Science, and co-director of the Institute for Information Security &amp; Privacy at Georgia Tech</em></p><p>Dr. Lee has worked on large-scale network monitoring, botnet detection, and malware analysis for more than 10 years. His research interests also include systems and network security, applied cryptography, and data mining.</p><p><strong>Clifton (Trent) Brunson</strong>, <em>research scientist, Georgia Tech Research Institute</em></p><p>In his prior academic studies and work, he has performed multiple projects for the Air Force Research Laboratory and DARPA in the areas of cryptography, insider threats, programming languages, cyber battle damage assessment, agentless network monitoring, and IPv6.</p><p><strong>About Georgia Tech’s College of Computing</strong></p><p>The Georgia Tech College of Computing is a national leader in the creation of real-world computing breakthroughs that drive social and scientific progress. With its graduate program ranked 9th nationally by <em>U.S. News and World Report</em>, the College’s unconventional approach to education is expanding the horizons of traditional computer science students through interdisciplinary collaboration and a focus on human-centered solutions. For more information about the Georgia Tech College of Computing, its academic divisions and research centers, please visit <a href="http://www.cc.gatech.edu">www.cc.gatech.edu</a></p>]]></body>  <author>Ben Snedeker</author>  <status>1</status>  <created>1462282076</created>  <gmt_created>2016-05-03 13:27:56</gmt_created>  <changed>1475896892</changed>  <gmt_changed>2016-10-08 03:21:32</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers have earned a DARPA contract to determine ways of defeating low-volume denial of service attacks on websites.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers have earned a DARPA contract to determine ways of defeating low-volume denial of service attacks on websites.]]></sentence>  <summary><![CDATA[<p>Georgia Tech researchers have been awarded a $2.9 million contract from the U.S. Defense Advanced Research Projects Agency (DARPA) to develop a cybersecurity method that will identify and defend against low-volume distributed denial of service (DDoS) attacks.</p>]]></summary>  <dateline>2016-05-03T00:00:00-04:00</dateline>  <iso_dateline>2016-05-03T00:00:00-04:00</iso_dateline>  <gmt_dateline>2016-05-03 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Researchers Earn $2.9M DARPA Contract to Fight Low-Volume DDoS Attacks]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[albert.snedeker@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Ben Snedeker, News &amp; Media Relations Manager, Georgia Tech College of Computing. 404-894-7253, <a href="mailto:albert.snedeker@cc.gatech.edu" target="_blank">albert.snedeker@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>532171</item>      </media>  <hg_media>          <item>          <nid>532171</nid>          <type>image</type>          <title><![CDATA[Taesoo Kim]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[taesoo_kim_-_klaus_atrium.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/taesoo_kim_-_klaus_atrium.jpeg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/taesoo_kim_-_klaus_atrium.jpeg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/taesoo_kim_-_klaus_atrium.jpeg?itok=J-R4tqPE]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Taesoo Kim]]></image_alt>                    <created>1462377601</created>          <gmt_created>2016-05-04 16:00:01</gmt_created>          <changed>1475895314</changed>          <gmt_changed>2016-10-08 02:55:14</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="13253"><![CDATA[DARPA grant]]></keyword>          <keyword tid="170216"><![CDATA[DDoS]]></keyword>          <keyword tid="171994"><![CDATA[denial of service attack]]></keyword>          <keyword tid="171995"><![CDATA[malicious traffic]]></keyword>          <keyword tid="171996"><![CDATA[Taesoo]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="498021">  <title><![CDATA[Statement re: White House Cybersecurity National Action Plan]]></title>  <uid>27490</uid>  <body><![CDATA[<p>President Barack Obama’s budget proposal for fiscal 2017, unveiled yesterday, brings a welcome <a href="http://www.reuters.com/article/us-obama-budget-cyber-idUSKCN0VI0R1" target="_blank">35 percent increase for cybersecurity</a>. As part of <a href="https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan" target="_blank">the plan</a>, the creation of a federal Chief Information Security Officer (CISO) also was announced to parallel what most major organizations already do to coordinate information security and risk. Yet the devil will be in the details for this new spending and new position.</p><p>Will the United States' CISO have any real authority? Will the new hardware and software bought with these funds be as insecurely configured or poorly implemented as the current systems? Two weeks ago&nbsp;Rob Joyce, chief of the NSA's Tailored Access Operations (TAO), publicly reminded defenders that attackers know what actually is on a target network, whereas agency leaders often only think they know their own information environment. What should be and what is are often different, and this delta is usually the most fertile area of the attack surface.</p><p>This additional funding should be applied in two ways, first addressing the present and second looking to the future:</p><p>1)&nbsp;&nbsp;&nbsp; Compel federal government agencies to prove they are doing the basics:</p><ul><li>inventory authorized and unauthorized devices (know what you’ve got)</li><li>inventory authorized and unauthorized software (know what it’s running)</li><li>reduce and control use of admin privileges</li><li>read your logs (yes, really read them!)</li><li>establish secure configs for all apps and devices, roll this out, don’t deviate, and patch it aggressively.</li></ul><p>None of this is new, but actually doing it consistently would be novel for much of the U.S. government.&nbsp; The new CISO and cognizant officials can’t keep admiring the problem, but actually must measure progress and hold poor performance accountable.</p><p>2)&nbsp;&nbsp;&nbsp; Fund research and development for cybersecurity across disciplinary lines – computer science, engineering, policy, etc:</p><ul><li>Attribution of cyberthreats</li><li>Consumer-facing privacy</li><li>Cyber-physical systems</li></ul><p>Reward those working on hard problems and seek revolutionary gains.&nbsp; Don’t be afraid to fail.&nbsp; Create the next!&nbsp;</p><p><em>Michael Farrell is chief scientist for the Cyber Technology &amp; Information Security Lab (CTISL) and associate director of attribution for the Institute for Information Security &amp; Privacy (IISP) at Georgia Tech.</em></p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1455104433</created>  <gmt_created>2016-02-10 11:40:33</gmt_created>  <changed>1475896838</changed>  <gmt_changed>2016-10-08 03:20:38</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Associate Director Michael Farrell provides a public statement on behalf of the Institute for Information Security & Privacy.]]></teaser>  <type>news</type>  <sentence><![CDATA[Associate Director Michael Farrell provides a public statement on behalf of the Institute for Information Security & Privacy.]]></sentence>  <summary><![CDATA[<p>President Barack Obama’s budget proposal for fiscal 2017 includes a <a href="http://www.reuters.com/article/us-obama-budget-cyber-idUSKCN0VI0R1" target="_blank">35 percent increase for cybersecurity</a>, creating a new "Cybersecurity National Action Plan." Georgia Tech's Michael Farrell, associate director of attribution for the Institute for Information Security &amp; Privacy, explains what that should mean and provide.</p>]]></summary>  <dateline>2016-02-10T00:00:00-05:00</dateline>  <iso_dateline>2016-02-10T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-02-10 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>492491</item>      </media>  <hg_media>          <item>          <nid>492491</nid>          <type>image</type>          <title><![CDATA[IISP - required security poster]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[required_security.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/required_security.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/required_security.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/required_security.jpg?itok=h8h76yMK]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IISP - required security poster]]></image_alt>                    <created>1454090400</created>          <gmt_created>2016-01-29 18:00:00</gmt_created>          <changed>1475895248</changed>          <gmt_changed>2016-10-08 02:54:08</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="6467"><![CDATA[Barack Obama]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="90001"><![CDATA[federal budget]]></keyword>          <keyword tid="146931"><![CDATA[The White House]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="501331">  <title><![CDATA[Next Billion People Online Will Get Odd Versions of the Internet]]></title>  <uid>27490</uid>  <body><![CDATA[<p>Tech giants are racing to extend internet access to large parts of the developing world. But will people get the digital experience they expect? A new project -- "<a href="https://michaelannedye.files.wordpress.com/2015/03/cuba-cscw2016-cameraready.pdf" target="_blank">Cuba Intercambio</a>" by Georgia Tech's Michaelanne Dye, Annie Anton and Amy Bruckman from the School of Interactive Computing -- is helping Cubans freely access information until acces and broadband becomes more widely available.</p><p><br /><a href="https://www.newscientist.com/article/2075978-next-billion-people-online-will-get-odd-versions-of-the-internet/" target="_blank">Read more</a> in <em>New Scientist</em> (free site registration required)</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1455653010</created>  <gmt_created>2016-02-16 20:03:30</gmt_created>  <changed>1475896846</changed>  <gmt_changed>2016-10-08 03:20:46</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new project seeks to remove censorship barriers for Cubans on the Internet.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new project seeks to remove censorship barriers for Cubans on the Internet.]]></sentence>  <summary><![CDATA[<p>Tech giants are racing to extend internet access to large parts of the developing world. But will people get the digital experience they expect? A new project -- "<a href="https://michaelannedye.files.wordpress.com/2015/03/cuba-cscw2016-cameraready.pdf" target="_blank">Cuba Intercambio</a>" by Georgia Tech's Michaelanne Dye, Annie Anton and Amy Bruckman from the School of Interactive Computing -- is helping Cubans freely access information until acces and broadband becomes more widely available.</p>]]></summary>  <dateline>2016-02-03T00:00:00-05:00</dateline>  <iso_dateline>2016-02-03T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-02-03 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[tlabouff@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:tlabouff@cc.gatech.edu"><strong>Tara La </strong><strong>Bouff</strong></a><br /> Marketing Communications Manager<br /> 404-894-7253 (Office)<br /> 404-769-5408 (Mobile)</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>495761</item>      </media>  <hg_media>          <item>          <nid>495761</nid>          <type>image</type>          <title><![CDATA[Cuba Intercambio]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[istock_000041377480_small.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/istock_000041377480_small_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/istock_000041377480_small_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/istock_000041377480_small_0.jpg?itok=HwvXG5em]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Cuba Intercambio]]></image_alt>                    <created>1455120000</created>          <gmt_created>2016-02-10 16:00:00</gmt_created>          <changed>1475895253</changed>          <gmt_changed>2016-10-08 02:54:13</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="140011"><![CDATA[Amy Bruckman; Michaelanne Dye; School of Interactive Computing; Cuba; Casey Fiesler; ACM&#039;s Computer-Supported Cooperative Work &amp; Social Computing Conference; multi-user domains]]></keyword>          <keyword tid="2699"><![CDATA[cuba]]></keyword>          <keyword tid="2229"><![CDATA[Internet]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="501351">  <title><![CDATA[New Privacy Deal Between US and Europe Reached]]></title>  <uid>27490</uid>  <body><![CDATA[<p>U.S. and European regulators agreed to a tentative&nbsp;deal that would allow U.S. companies to continue moving the personal information of Europeans across the Atlantic. The new "E.U.-U.S. Privacy Shield" deal replaces the original "Safe Harbor" pact — an agreement that was struck down by Europe's top court last year, sending regulators&nbsp;on both sides scrambling to establish a new arrangement. Georgia Tech's Peter Swire, associate director of policy for the Institute for Information Security &amp; Privacy, said legal challenges could continue but he believes the deal has benefits for individuals on both sides of the pond.</p><p>&nbsp;</p><p><a href="https://www.washingtonpost.com/news/the-switch/wp/2016/02/02/the-massive-new-privacy-deal-between-u-s-and-europe-explained/" target="_blank">Read more</a> in <em>The Washington Post</em>.</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1455653871</created>  <gmt_created>2016-02-16 20:17:51</gmt_created>  <changed>1475896846</changed>  <gmt_changed>2016-10-08 03:20:46</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[U.S. and European regulators agreed to a tentative deal that would allow U.S. companies to continue moving the personal information of Europeans overseas.]]></teaser>  <type>news</type>  <sentence><![CDATA[U.S. and European regulators agreed to a tentative deal that would allow U.S. companies to continue moving the personal information of Europeans overseas.]]></sentence>  <summary><![CDATA[<p>U.S. and European regulators agreed to a tentative&nbsp;deal that would allow U.S. companies to continue moving the personal information of Europeans across the Atlantic. Georgia Tech's Peter Swire, associate director of policy for the Institute for Information Security &amp; Privacy, explains.</p>]]></summary>  <dateline>2016-02-02T00:00:00-05:00</dateline>  <iso_dateline>2016-02-02T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-02-02 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>494631</item>      </media>  <hg_media>          <item>          <nid>494631</nid>          <type>image</type>          <title><![CDATA[European Community]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[istock_european_flags_small.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/istock_european_flags_small_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/istock_european_flags_small_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/istock_european_flags_small_0.jpg?itok=rtQ_xk2C]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[European Community]]></image_alt>                    <created>1454522400</created>          <gmt_created>2016-02-03 18:00:00</gmt_created>          <changed>1475895251</changed>          <gmt_changed>2016-10-08 02:54:11</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="2678"><![CDATA[information security]]></keyword>          <keyword tid="3221"><![CDATA[privacy]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="484801">  <title><![CDATA[Peter Swire to Debate European Privacy Activist Max Schrems]]></title>  <uid>27490</uid>  <body><![CDATA[<p>Since the&nbsp;European Court of Justice ruled on <em>Schrems v. Data Protection Commissioner</em> that personally identifiable information cannot be transfered between the EU and United States, Georgia Tech's Peter Swire has <a href="http://www.alstonprivacy.com/swire-challenges-factual-basis-of-schrems-decision/" target="_blank">challenged the factual basis</a> underpinning that decision. He will debate privacy activist Max Schrems on <a href="http://www.brusselsprivacyhub.org/events.php" target="_blank">January 26, 2015 in Brussels, Belgium</a>. Swire -- who is the associate director of policy at the Institute for Information Security &amp; Privacy and the Huang Professor of Law and Ethics at the Scheller College of Business at Georgia Tech -- plans to argue that the ECJ decision “suffers from particular inaccuracies concerning the law and practice of U.S. foreign intelligence law.”&nbsp; More recently, Swire <a href="http://www.alstonprivacy.com/swire-white-paper-for-eu-regulators/" target="_blank">authored a white paper through the Future of Privacy Forum</a> about the conequences of the Schrems judgement.</p><p>Read more in <a href="http://www.jdsupra.com/legalnews/the-digital-download-privacy-data-65740/" target="_blank">The Digital Download Privacy &amp; Security Monthly Newsletter</a></p><p>Listen to a <a href="https://soundcloud.com/justin-hemmings-44462987/privacy-in-the-eu-and-us-a-debate-between-max-schrems-and-peter-swire" target="_blank">recording of the debate</a>.</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1452595160</created>  <gmt_created>2016-01-12 10:39:20</gmt_created>  <changed>1475896824</changed>  <gmt_changed>2016-10-08 03:20:24</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Debate continues about transfer of personally identifiable information between EU and US.]]></teaser>  <type>news</type>  <sentence><![CDATA[Debate continues about transfer of personally identifiable information between EU and US.]]></sentence>  <summary><![CDATA[<p>Peter Swire -- associate director of policy at the Institute for Information Security &amp; Privacy and the Huang Professor of Law and Ethics at the Scheller College of Business at Georgia Tech -- challenges European activist Max Schrems to a debate about the Safe Harbor Agreement<a href="http://www.brusselsprivacyhub.org/events.php" target="_blank"> in Brussels, Belgium</a>.</p>]]></summary>  <dateline>2016-01-11T00:00:00-05:00</dateline>  <iso_dateline>2016-01-11T00:00:00-05:00</iso_dateline>  <gmt_dateline>2016-01-11 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>232191</item>      </media>  <hg_media>          <item>          <nid>232191</nid>          <type>image</type>          <title><![CDATA[Professor Peter Swire]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[peterswire.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/peterswire_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/peterswire_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/peterswire_0.jpg?itok=xp9dVDb2]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Professor Peter Swire]]></image_alt>                    <created>1449243627</created>          <gmt_created>2015-12-04 15:40:27</gmt_created>          <changed>1475894906</changed>          <gmt_changed>2016-10-08 02:48:26</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="141341"><![CDATA[Institute for Information Security &amp; Privacy]]></keyword>          <keyword tid="167089"><![CDATA[Scheller College of Business]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="501361">  <title><![CDATA[Air Forces Names Organizations for $5B Cyber Research Project]]></title>  <uid>27490</uid>  <body><![CDATA[<p>U.S. Air Force cybersecurity experts are choosing 10 more companies to draw from a pot of money as large as $5 billion over the next five years for military cybersecurity and <a href="http://www.militaryaerospace.com/articles/2015/03/darpa-brandeis-solicitation.html">information systems</a> research and development. Officials of the U.S. Air Force Installation Contracting Agency at Offutt Air Force Base, Neb., announced the contracts Thursday for the Cyber Security Technical Area Tasks (CS TATs) program. The contracts were awarded on behalf of the Air Force Combat Command.</p><p>&nbsp;</p><p><a href="http://www.militaryaerospace.com/articles/2015/11/air-force-cyber.html" target="_blank">Read more</a> in Military &amp; Aerospace Electronics</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1455656085</created>  <gmt_created>2016-02-16 20:54:45</gmt_created>  <changed>1475896835</changed>  <gmt_changed>2016-10-08 03:20:35</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The U.S. Air Forces names 10 organizations to share in cybersecurity research project.]]></teaser>  <type>news</type>  <sentence><![CDATA[The U.S. Air Forces names 10 organizations to share in cybersecurity research project.]]></sentence>  <summary><![CDATA[<p>U.S. Air Force cybersecurity experts choose 10 more companies to share in a $5-billion research project over the next five years, now including the Georgia Tech Research Institute.</p>]]></summary>  <dateline>2015-11-23T00:00:00-05:00</dateline>  <iso_dateline>2015-11-23T00:00:00-05:00</iso_dateline>  <gmt_dateline>2015-11-23 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>501371</item>      </media>  <hg_media>          <item>          <nid>501371</nid>          <type>image</type>          <title><![CDATA[USAF F-16]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[usaf_f-16.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/usaf_f-16_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/usaf_f-16_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/usaf_f-16_0.jpg?itok=Bc90yqju]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[USAF F-16]]></image_alt>                    <created>1455904800</created>          <gmt_created>2016-02-19 18:00:00</gmt_created>          <changed>1475895230</changed>          <gmt_changed>2016-10-08 02:53:50</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>          <keyword tid="9696"><![CDATA[US Air Force]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="470511">  <title><![CDATA[Georgia Tech Becomes First University to Join M3AAWG]]></title>  <uid>27490</uid>  <body><![CDATA[<p>Looking to share its advanced research on bot behavior, emerging infections and mitigation processes with the security community, the Georgia Institute of Technology is the first academic institution to join the Messaging, Malware and Mobile Anti-Abuse Working Group.&nbsp; The university sees the closed, vetted structure within M3AAWG as a rare opportunity to disseminate its findings on the latest threats directly to network operators and public policy advisors while also obtaining feedback from these industry professionals, according to <strong>Dr. Manos Antonakakis</strong>, computer systems and software assistant professor at Georgia Tech, School of Electrical and Computer Engineering, and M3AAWG Academic Committee co-chair.<br /><br />"M3AAWG bridges the gap between academia and industry.&nbsp; As researchers, we often identify new strategies to understand and disable complex illicit infrastructures, such as botnets and malware, and objectively measure other aspects of Internet abuse, for example, spam and ad fraud.&nbsp; We want to share this information with the security community as quickly as possible and M3AAWG is an active channel for disseminating this data.&nbsp; On the other hand, in order to commercialize this work, we need input from security professionals who are dealing with these challenges every day.&nbsp; M3AAWG closes this loophole by providing the operational feedback that helps us turn our research into products industry can use to solve specific threats," Antonakakis said.<br /><br />M3AAWG is recruiting university cybersecurity research programs to join its anti-abuse work so it can provide its members access to the experimental processes and academic studies that help improve end-user security.&nbsp; The in-depth research at these institutions is especially important in a world where criminals can change a bot's coding to avoid detection in just minutes and new threats are always emerging.&nbsp; In addition, universities also can participate in other projects.&nbsp; For example, <strong>Dr. Mustaque Ahamad</strong>, professor at Georgia Tech’s School of Computer Science, is co-chair of the M3AAWG Voice and Telephony Abuse Special Interest Group, according to Michael Adkins, M3AAWG chairman.<br /><br />Adkins said, "Georgia Tech has developed one of the leading computer science programs in the world and has a strong understanding of anti-abuse issues.&nbsp; They have presented groundbreaking research at our meetings in the past, including early research on the effectiveness of bot mitigation notifications with its study of the DNS Charger program in 2013, data on new malware infections and updates on known threats.&nbsp; We look forward to strengthening our relationship with their researchers, bringing the latest threat findings to our members, and providing input on new research and processes."<br /><br />The recently established Institute for Information Security and Privacy (IISP) at Georgia Tech will significantly grow these research programs and related curricula to make fundamental advances in cybersecurity. U.S. News and World Report ranked its computer engineering program among the top ten in the nation.&nbsp; <br /><br /><em><strong>About the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG)</strong></em><br />The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) is where the industry comes together to work against bots, malware, spam, viruses, denial-of-service attacks and other online exploitation. M3AAWG (<a href="http://www.m3aawg.org" title="www.m3aawg.org">www.m3aawg.org</a>) represents more than one billion mailboxes from some of the largest network operators worldwide. It leverages the depth and experience of its global membership to tackle abuse on existing networks and new emerging services through technology, collaboration and public policy. It also works to educate global policy makers on the technical and operational issues related to online abuse and messaging. Headquartered in San Francisco, Calif., M3AAWG is driven by market needs and supported by major network operators and messaging providers.<br /><br /><em><strong>M3AAWG Board of Directors</strong></em></p><p>AT&amp;T (NYSE: T); CenturyLink (NYSE: CTL); Cloudmark, Inc.; Comcast (NASDAQ: CMCSA); Constant Contact (NASDAQ: CTCT); Cox Communications; Damballa, Inc.; Facebook; Google; LinkedIn; Mailchimp; Orange (NYSE: ORAN) and (Euronext: ORA); Return Path; Time Warner Cable; Verizon Communications; and Yahoo! Inc.<br /><br /><strong><em>M3AAWG Full Members</em></strong></p><p>1&amp;1 Internet AG; Adobe Systems Inc.; AOL; Campaign Monitor Pty.; Cisco Systems, Inc.; CloudFlare; dotmailer; Dyn; ExactTarget, Inc.; IBM; iContact; Internet Initiative Japan (IIJ, NASDAQ: IIJI); Listrak; Litmus; McAfee Inc.; Microsoft Corp.; Mimecast; Nominum, Inc.; Oracle Marketing Cloud; OVH; PayPal; Proofpoint; Rackspace; Spamhaus; Sprint; Symantec and Twitter.<br /><br />A complete member list is available at <a href="http://www.m3aawg.org/about/roster" target="_blank">http://www.m3aawg.org/about/roster</a>.</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1447757772</created>  <gmt_created>2015-11-17 10:56:12</gmt_created>  <changed>1475896803</changed>  <gmt_changed>2016-10-08 03:20:03</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Looking to share its advanced research on bot behavior, emerging infections and mitigation, Georgia Tech is the first academic institution to join the cybersecurity trade association's anti-abuse working group.]]></teaser>  <type>news</type>  <sentence><![CDATA[Looking to share its advanced research on bot behavior, emerging infections and mitigation, Georgia Tech is the first academic institution to join the cybersecurity trade association's anti-abuse working group.]]></sentence>  <summary><![CDATA[<p>Georgia Tech sees the closed, vetted structure within M<sup>3</sup>AAWG as an opportunity to disseminate its findings on the latest threats directly to network operators and public policy advisors while also obtaining feedback from industry professionals.</p>]]></summary>  <dateline>2015-11-17T00:00:00-05:00</dateline>  <iso_dateline>2015-11-17T00:00:00-05:00</iso_dateline>  <gmt_dateline>2015-11-17 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Will Share Vital Cybersecurity Research with Anti-Abuse Industry]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jackie.nemeth@ece.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Jackie Nemeth, 404.894.2906</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>473691</item>      </media>  <hg_media>          <item>          <nid>473691</nid>          <type>image</type>          <title><![CDATA[M3AAWG]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[logo_2.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/logo_2_0.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/logo_2_0.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/logo_2_0.png?itok=2fvTMFBt]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[M3AAWG]]></image_alt>                    <created>1449257190</created>          <gmt_created>2015-12-04 19:26:30</gmt_created>          <changed>1475895223</changed>          <gmt_changed>2016-10-08 02:53:43</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="463301">  <title><![CDATA[Georgia Tech Establishes New Cybersecurity Research Effort]]></title>  <uid>27490</uid>  <body><![CDATA[<p>In response to widespread and persistent cybersecurity threats to businesses, government and individuals, the Georgia Institute of Technology today announces the formation of a new, interdisciplinary research collaborative – the Institute for Information Security &amp; Privacy (IISP).</p><p>The IISP aligns the expertise of 200 researchers and nine labs across <a href="http://www.gatech.edu/academics/colleges-and-schools">four colleges</a> and the <a href="http://gtri.gatech.edu/">Georgia Tech Research Institute</a> (GTRI) to form a single gateway to all cybersecurity efforts. Its purpose is to connect academia, industry and government to seamlessly develop vital solutions for national security, economic continuity and individual safety.</p><p>It is led by Co-Directors <a href="http://www.iisp.gatech.edu/bo-rotoloni">Bo Rotoloni</a>, a principal research engineer at GTRI, and <a href="http://www.iisp.gatech.edu/wenke-lee">Wenke Lee</a>, a professor in the <a href="http://www.cc.gatech.edu">College of Computing</a> and one of the world’s most prolific cybersecurity researchers. Associate directors include experts in law, business management, computing and defense.</p><p>“Cybersecurity is no longer just a computer science problem for programmers; this is an issue that now touches every area of society,” says Lee, whose research involves protecting industrial control systems, hardening defense equipment and secure Internet browsing. “It involves new policy considerations, better initial product design and more training for the professionals involved. We are doubling down to discover, connect and solve modern cybersecurity threats.”</p><p>Georgia Tech Executive Vice President for Research Stephen Cross says this effort is essential at a time when consumers readily trade private personal data for convenience and the public has become more dependent on cyber-physical systems.</p><p>“Georgia Tech has the academic foundational research and educational programs, the technology transfer and applied research that make a real impact with industry and government, and the ability to understand and study the broader, societal impact,” Cross says. “Cybersecurity work takes place in these three spheres, and the Institute for Information Security &amp; Privacy has been built at the intersection of all three.”</p><p>Initial research will focus on six areas: privacy policy, consumer-facing privacy, attribution, risk, trust and cyber-physical systems.</p><p>“Under the IISP, we expect to double our current cybersecurity research activity to move more research out to the marketplace, to develop new continuing education programs for professionals and to broaden the cybersecurity curriculum so it is taught across more degree fields at Georgia Tech,” says Rotoloni. “We want to be a catalyst for an information security industry in Georgia that is already attracting national attention and embolden it through joint research projects with companies of all sizes and critical government agencies.”</p><p>For more about the Institute for Information Security &amp; Privacy, see <a href="http://iisp.gatech.edu">http://iisp.gatech.edu</a></p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1445987755</created>  <gmt_created>2015-10-27 23:15:55</gmt_created>  <changed>1475896674</changed>  <gmt_changed>2016-10-08 03:17:54</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Institute of Technology today announces the formation of a new, interdisciplinary research collaborative – the Institute for Information Security & Privacy (IISP).]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Institute of Technology today announces the formation of a new, interdisciplinary research collaborative – the Institute for Information Security & Privacy (IISP).]]></sentence>  <summary><![CDATA[<p>In response to widespread and persistent cybersecurity threats to businesses, government and individuals, the Georgia Institute of Technology today announces the formation of a new, interdisciplinary research collaborative – the Institute for Information Security &amp; Privacy (IISP). The IISP aligns the expertise of 200 researchers and nine labs across <a href="http://www.gatech.edu/academics/colleges-and-schools">four colleges</a> and the <a href="http://gtri.gatech.edu/">Georgia Tech Research Institute</a> (GTRI) to form a single gateway to all cybersecurity efforts. Its purpose is to connect academia, industry and government to seamlessly develop vital solutions for national security, economic continuity and individual safety.</p>]]></summary>  <dateline>2015-10-27T00:00:00-04:00</dateline>  <iso_dateline>2015-10-27T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-10-27 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Eleventh Interdisciplinary Research Institute Brings More Colleges into Cybersecurity Work]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[tlabouff@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:tlabouff@cc.gatech.edu" target="_blank">Tara La Bouff</a></p><p>Communications Manager</p><p>404.769.5408</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>451401</item>      </media>  <hg_media>          <item>          <nid>451401</nid>          <type>image</type>          <title><![CDATA[IISP logo 2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[instituteforinformationsecurityprivacy-solid-black874.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/instituteforinformationsecurityprivacy-solid-black874_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/instituteforinformationsecurityprivacy-solid-black874_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/instituteforinformationsecurityprivacy-solid-black874_0.jpg?itok=e0fEdDsn]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IISP logo 2]]></image_alt>                    <created>1449256280</created>          <gmt_created>2015-12-04 19:11:20</gmt_created>          <changed>1475895192</changed>          <gmt_changed>2016-10-08 02:53:12</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://iisp.gatech.edu/]]></url>        <title><![CDATA[Visit the stitute for Information Security & Privacy Website]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="501391">  <title><![CDATA[University System of Georgia Explores Cybersecurity Center in Atlanta]]></title>  <uid>27490</uid>  <body><![CDATA[<p>The University System of Georgia asked Gov. Nathan Deal for funds to create a cybersecurity center in Atlanta at Georgia Tech that would drive research and curriculum development across all schools in the University System of Georgia system. Both Georgia Tech and Augusta University recently launched their own cybersecurity institutes.</p><p>&nbsp;</p><p><a href="http://chronicle.augusta.com/news/government/2015-11-04/university-system-georgia-wants-cybersecurity-center-atlanta?v=1446686470" target="_blank">Read more</a> in The Augusta Chronicle.</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1455658445</created>  <gmt_created>2016-02-16 21:34:05</gmt_created>  <changed>1475896803</changed>  <gmt_changed>2016-10-08 03:20:03</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The University System of Georgia asked Gov. Nathan Deal for funds to create a cybersecurity center in Atlanta at Georgia Tech.]]></teaser>  <type>news</type>  <sentence><![CDATA[The University System of Georgia asked Gov. Nathan Deal for funds to create a cybersecurity center in Atlanta at Georgia Tech.]]></sentence>  <summary><![CDATA[<p>The University System of Georgia asked Gov. Nathan Deal for funds to create a cybersecurity center in Atlanta at Georgia Tech.</p>]]></summary>  <dateline>2015-11-04T00:00:00-05:00</dateline>  <iso_dateline>2015-11-04T00:00:00-05:00</iso_dateline>  <gmt_dateline>2015-11-04 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>54724</item>      </media>  <hg_media>          <item>          <nid>54724</nid>          <type>image</type>          <title><![CDATA[USG Logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449175459</created>          <gmt_created>2015-12-03 20:44:19</gmt_created>          <changed>1475894476</changed>          <gmt_changed>2016-10-08 02:41:16</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="459721">  <title><![CDATA[Georgia Tech Ranked in Top 10 of World&#039;s Engineering Colleges]]></title>  <uid>28124</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>One of the famous engineering institutes in the world, the Georgia Institute of Technology is more commonly referred to as Georgia Tech. It was established in 1885. It has six colleges and 31 departments with science and technology being its main focus.</p><p>Jimmy Carter, former US president and a Nobel laureate at studied at Georgia Tech. Apart from him, there are many great personalities who have studied at Georgia Tech are Mike Duke, the CEO of WalMart, Nobel laureate Kary Mullis, astronaut William S. McArthur, Richard H. Truly, former head of NASA and many others.</p>]]></body>  <author>Tyler Sharp</author>  <status>1</status>  <created>1444986536</created>  <gmt_created>2015-10-16 09:08:56</gmt_created>  <changed>1475893666</changed>  <gmt_changed>2016-10-08 02:27:46</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[private space missions]]></publication>  <article_dateline>2015-10-16T00:00:00-04:00</article_dateline>  <iso_article_dateline>2015-10-16T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2015-10-16T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://ireport.cnn.com/docs/DOC-1276978]]></article_url>  <media>          <item><![CDATA[449181]]></item>      </media>  <hg_media>          <item>          <nid>449181</nid>          <type>image</type>          <title><![CDATA[Tech Tower]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[tech_tower_ii.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/tech_tower_ii_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/tech_tower_ii_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/tech_tower_ii_0.jpg?itok=5LMsUQPS]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Tech Tower]]></image_alt>                              <created>1449256264</created>          <gmt_created>2015-12-04 19:11:04</gmt_created>          <changed>1475895189</changed>          <gmt_changed>2016-10-08 02:53:09</gmt_changed>      </item>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="462191">  <title><![CDATA[Feds Come to Georgia to Talk Cell Phones in Prisons]]></title>  <uid>27490</uid>  <body><![CDATA[<p>A member of the Federal Communications Commission wants to address contraband cell phones in prisons, and cell phone jammers have been suggested as one solution. The problem is a national one, but in Georgia prisons alone, 8,305 contraband cellphones have been seized in 2015, either from inmates or from people trying to smuggle them in. Georgia Tech <strong>Research Engineer Chuck Bokath</strong> explains why jammers may not be the right solution because they indiscrimately block call access for anyone inside the prisons.</p><p><a href="http://www.timesfreepress.com/news/local/story/2015/oct/16/8000-contraband-cellphones-seized-georgia-prisons-just-year/330917/" target="_blank">Read more in TimesFreePress.com</a></p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1445770196</created>  <gmt_created>2015-10-25 10:49:56</gmt_created>  <changed>1475896791</changed>  <gmt_changed>2016-10-08 03:19:51</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech's Chuck Bokath explains why cell phone jammers could hinder safety in prisons.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech's Chuck Bokath explains why cell phone jammers could hinder safety in prisons.]]></sentence>  <summary><![CDATA[<p>Cell phone jammers have been suggested as one solution to contraband phones inside prisons across the United States. Georgia Tech's Chuck Bokath explains why jammers actually could hinder prison safety.</p>]]></summary>  <dateline>2015-10-15T00:00:00-04:00</dateline>  <iso_dateline>2015-10-15T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-10-15 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[tara.labouff@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:tlabouff@cc.gatech.edu" target="_blank">Tara La Bouff</a></p><p>Communications Manager</p><p>404.769.5408</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>462181</item>      </media>  <hg_media>          <item>          <nid>462181</nid>          <type>image</type>          <title><![CDATA[Contraband Phones | Photo by Associated Press]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[prisoncellphones_ap.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/prisoncellphones_ap_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/prisoncellphones_ap_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/prisoncellphones_ap_0.jpg?itok=2oAOQHqQ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Contraband Phones | Photo by Associated Press]]></image_alt>                    <created>1449256373</created>          <gmt_created>2015-12-04 19:12:53</gmt_created>          <changed>1475895206</changed>          <gmt_changed>2016-10-08 02:53:26</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>          <keyword tid="862"><![CDATA[Cell Phones]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="501381">  <title><![CDATA[Army Shows Commanders What Cyber Capabilities Are Possible]]></title>  <uid>27490</uid>  <body><![CDATA[<p>The Army's cyber branch is using pilot programs and training center rotations to show commanders at a variety of echelons what cyber capabilities can be brought to the table and, at the same time, refine how cyber will be a part of tactical operations both on the defensive and offensive side, leaders said Tuesday&nbsp;at an Association of the US Army forum. Georgia Tech's J.D. McCreary explains.</p><p>&nbsp;</p><p><a href="http://www.defensenews.com/story/defense/land/army/2015/11/10/army-learning-how-cyber-support-plays-role-in-tactical-operations/75545442/" target="_blank">Read more</a> in Defense News.</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1455657451</created>  <gmt_created>2016-02-16 21:17:31</gmt_created>  <changed>1475896816</changed>  <gmt_changed>2016-10-08 03:20:16</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The Army's cyber branch is using pilot programs to show commanders what cyber capabilities can be used.]]></teaser>  <type>news</type>  <sentence><![CDATA[The Army's cyber branch is using pilot programs to show commanders what cyber capabilities can be used.]]></sentence>  <summary><![CDATA[<p>The Army's cyber branch is using pilot programs and training center rotations to show commanders what cyber capabilities can be used on the defensive and offensive side. Georgia Tech's J.D. McCreary explains.</p>]]></summary>  <dateline>2015-10-10T00:00:00-04:00</dateline>  <iso_dateline>2015-10-10T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-10-10 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>340941</item>      </media>  <hg_media>          <item>          <nid>340941</nid>          <type>image</type>          <title><![CDATA[Research Horizons - Tackling Cyber Threats -Army]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cybersecurity_threats_8.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cybersecurity_threats_8_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cybersecurity_threats_8_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cybersecurity_threats_8_0.jpg?itok=9NuV1tyL]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Research Horizons - Tackling Cyber Threats -Army]]></image_alt>                    <created>1449245595</created>          <gmt_created>2015-12-04 16:13:15</gmt_created>          <changed>1475895057</changed>          <gmt_changed>2016-10-08 02:50:57</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="130751"><![CDATA[Military Cyberdefense]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="457051">  <title><![CDATA[Solving the Internet’s Identity Crisis]]></title>  <uid>28124</uid>  <body><![CDATA[<p>On the Internet, “nobody knows you’re a dog,” is the joke behind a famous&nbsp;<em>New Yorker</em>&nbsp;cartoon with a canine at the keyboard. But identity trust is a serious problem for Internet Service Providers (ISPs) who are responsible for routing billions of users to the right destination every day.</p><p>Researchers at the Georgia Institute of Technology are working on a new, multi-year project funded by the National Science Foundation, called “Resource Public Key Infrastructure,” to help end Internet trickery. It begins with new tools that allow ISPs to better verify the true owner of a network and legitimate traffic paths.</p><p>“We know it’s easy to lie on the Internet,” says primary investigator&nbsp;<strong>Russ Clark</strong>, a senior research scientist in the School of Computer Science at Georgia Tech. “It happens because of a weakness in the trust relationship between routing protocols. Those protocols were not designed to recognize imposters and especially not fake ISPs.”</p><p>Clark, along with&nbsp;<strong>Cas D’Angelo</strong>&nbsp;and&nbsp;<strong>Scott Friedrich</strong>&nbsp;from Georgia Tech’s Office of Information Technology and undergraduate student&nbsp;<strong>Sam Norris</strong>&nbsp;(EIA), will address the Internet identity problem with new protocols such as RPKI, the Resource Public Key Infrastructure.</p><p>Trust is determined in the router and the server resources alongside. To verify that network owners are legitimate, Georgia Tech will add a new type of server to the routing infrastructure as a first step. Next, it will update the software inside routers, gradually deploying the changes through the Southern Crossroads Internet Exchange (SoX), documenting observations, and creating a recipe for others across the United States to follow.</p><p>“This solution has been known for about the past five years, but network operators are reluctant to try it out of fear of slowing down traffic for customers in the interim,” Clark says. “The NSF tasked Georgia Tech with moving deployment along. We’re going to prove that it’s possible, work through the pains, and show others how to do it.”</p><p>The deployment will happen in phases.</p><p>In addition to Georgia Tech researchers and labs, Clark and his team help manage the Southern Crossroads (SoX) regional network where 21 member institutions come together for shared network services. The project team expects to deploy over SoX in the next year.</p><p>“In the quest to make the Internet faster, we’ve often tried to find the shortest route to a website. This is making us vulnerable,” Clark says. “Now, we need to find the smartest route.”</p><p>&nbsp;</p>]]></body>  <author>Tyler Sharp</author>  <status>1</status>  <created>1444294808</created>  <gmt_created>2015-10-08 09:00:08</gmt_created>  <changed>1475896783</changed>  <gmt_changed>2016-10-08 03:19:43</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers at the Georgia Institute of Technology are developing new tools to help ISPs verify the true owner of a network and legitimate traffic paths.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers at the Georgia Institute of Technology are developing new tools to help ISPs verify the true owner of a network and legitimate traffic paths.]]></sentence>  <summary><![CDATA[<p>Researchers at the Georgia Institute of Technology are developing new tools to help ISPs verify the true owner of a network and legitimate traffic paths.</p>]]></summary>  <dateline>2015-10-08T00:00:00-04:00</dateline>  <iso_dateline>2015-10-08T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-10-08 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Georgia Tech leads effort to establish new trust relationships between ISPs]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[tlabouff@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:tlabouff@cc.gatech.edu">Tara La Bouff</a><br />Communications Manager<br />404.894.7253</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>357321</item>      </media>  <hg_media>          <item>          <nid>357321</nid>          <type>image</type>          <title><![CDATA[Russ Clark compressed]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[russ-clark.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/russ-clark_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/russ-clark_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/russ-clark_0.jpg?itok=VYnIwgTG]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Russ Clark compressed]]></image_alt>                    <created>1449245767</created>          <gmt_created>2015-12-04 16:16:07</gmt_created>          <changed>1475895091</changed>          <gmt_changed>2016-10-08 02:51:31</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>          <keyword tid="136171"><![CDATA[Cas D&#039;Angelo]]></keyword>          <keyword tid="362"><![CDATA[National Science Foundation]]></keyword>          <keyword tid="144171"><![CDATA[Resource Public Key Infrastructure]]></keyword>          <keyword tid="11167"><![CDATA[Russ Clark]]></keyword>          <keyword tid="171491"><![CDATA[Scott Friedrich]]></keyword>          <keyword tid="171492"><![CDATA[Southern Crossroads regional network]]></keyword>          <keyword tid="171466"><![CDATA[SoX]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="446691">  <title><![CDATA[Computer Science Students, Faculty Take Honors at FSE ‘15]]></title>  <uid>28124</uid>  <body><![CDATA[<p>Multiple students and faculty from Georgia Tech's College of Computing achieved the highest honors at <em>ACM SIGSOFT Symposium on the Foundations of Software Engineering</em><em> (</em>FSE ’15) -- one of the two flagship software engineering conferences, held in Italy, Aug 30-Sept 7.</p><p>The paper "Visualization of Test Information to Assist Fault Localization" co-authored by James Jones (who received his PhD in CS from Georgia Tech and currently an associate professor at University of California - Irvine), the late Mary Jean Harrold (CS), and John Stasko (IC), won the ACM SIGSOFT “Impact Paper Award” at the conference.&nbsp; The paper, which was published at the International Conference on Software Engineering (ICSE ‘02), is one of the most cited software-engineering papers and has influenced many subsequent research endeavors, particularly in the popular field of spectra-based fault localization. The plaque that recognizes Harrold’s contribution will be hung in the CS Faculty Lounge, and the check that comes with it will be donated to Harrold’s Graduate Fellowship (both courtesy of her family).</p><p>Additionally, two papers won ACM SIGSOFT Distinguished Paper Awards at the conference:&nbsp;</p><ul><li>"A User-Guided Approach to Program Analysis" by Ravi Mangal (MS CS), Xin Zhang (MS CS), Aditya V. Nori (external collaborator), and Assistant Professor Mayur Naik (CS). Both Ravi and Xin are advised by Naik.</li></ul><ul><li>"Users Beware: Preference Inconsistencies Ahead" by Farnaz Behrang (MS CS), Myra Cohen (external collaborator), and Associate Chair Alex Orso (CS). Farnaz is advised by Orso.</li></ul><p>Between these two papers, Georgia Tech bagged 25% of the Distinguished Paper Awards given at FSE 2015, says Naik.</p><p>Besides the above two papers, a third paper "FlexJava: Language Support for Safe and Modular Approximate Programming" by Jongsea Park (MS CS), Xin Zhang (MS CS), Assistant Professor Hadi Esmaeilzadeh (CS), Naik, and Assistant Professor Bill Harris (CS) also was accepted to FSE ‘15.</p>]]></body>  <author>Tyler Sharp</author>  <status>1</status>  <created>1441959750</created>  <gmt_created>2015-09-11 08:22:30</gmt_created>  <changed>1475896773</changed>  <gmt_changed>2016-10-08 03:19:33</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Multiple students and faculty from Georgia Tech's College of Computing achieved the highest honors at ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE ’15) -- one of the two flagship software engineering conferences, held last week.]]></teaser>  <type>news</type>  <sentence><![CDATA[Multiple students and faculty from Georgia Tech's College of Computing achieved the highest honors at ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE ’15) -- one of the two flagship software engineering conferences, held last week.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2015-09-11T00:00:00-04:00</dateline>  <iso_dateline>2015-09-11T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-09-11 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:tlabouff@cc.gatech.edu">Tara La Bouff</a><br />Communications Manager<br />404.894.7253</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>365201</item>      </media>  <hg_media>          <item>          <nid>365201</nid>          <type>image</type>          <title><![CDATA[Tech Tower close up]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[08c1004-p4-066_0.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/08c1004-p4-066_0_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/08c1004-p4-066_0_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/08c1004-p4-066_0_0.jpg?itok=WzxnbwTs]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Tech Tower close up]]></image_alt>                    <created>1449245805</created>          <gmt_created>2015-12-04 16:16:45</gmt_created>          <changed>1475895100</changed>          <gmt_changed>2016-10-08 02:51:40</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>          <keyword tid="141051"><![CDATA[FSE 2015; Farnaz Behrang; Alex Orso; Ravi Mangal; Mary Jean Harrold]]></keyword>          <keyword tid="141041"><![CDATA[Jongsea Park; Xin Zhang; Hadi Esmaeilzadeh; Mayur Naik; Bill Harris]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="447101">  <title><![CDATA[Want to Hack the Mars Rover? Take a Look at ...]]></title>  <uid>27490</uid>  <body><![CDATA[<p>There’s a simple flaw inside a widely used operating system, though not one most would be familiar with, called VxWorks. It happens to be the same software used to control parts of NASA’s Curiosity Mars Rover and many critical infrastructure systems... In June, the US Industrial Control Systems Computer Emergency Response Team TISI +%, run by the Department of Homeland Security, <a href="https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01">warned about a flaw</a> uncovered by <strong>Associate Professor Raheem Beyah</strong> and students David Formby and Sang Shin Jung of Georgia Tech.</p><p><a href="http://www.forbes.com/sites/thomasbrewster/2015/09/10/vxworks-remote-code-vulnerability/" target="_blank">Read more in <em>Forbes Online</em></a></p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1442181485</created>  <gmt_created>2015-09-13 21:58:05</gmt_created>  <changed>1475896773</changed>  <gmt_changed>2016-10-08 03:19:33</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech's Raheem Beyah ponders whether TCP protocol vulnerabilities add risk to the Mars Rover or persist in other systems used by NASA.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech's Raheem Beyah ponders whether TCP protocol vulnerabilities add risk to the Mars Rover or persist in other systems used by NASA.]]></sentence>  <summary><![CDATA[<p>A flaw inside a widely used operating system could allow hackers to control parts of NASA’s Curiosity Mars Rover... It was uncovered by Associate Professor Raheem Beyah and students at Georgia Tech.</p>]]></summary>  <dateline>2015-09-10T00:00:00-04:00</dateline>  <iso_dateline>2015-09-10T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-09-10 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>447111</item>      </media>  <hg_media>          <item>          <nid>447111</nid>          <type>image</type>          <title><![CDATA[Mars Rover]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[nasa_mars_rover.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/nasa_mars_rover_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/nasa_mars_rover_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/nasa_mars_rover_0.jpg?itok=39xx4YFI]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Mars Rover]]></image_alt>                    <created>1449256246</created>          <gmt_created>2015-12-04 19:10:46</gmt_created>          <changed>1475895187</changed>          <gmt_changed>2016-10-08 02:53:07</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="446321">  <title><![CDATA[ECE Programs Remain Strong in Latest U.S. News & World Report Rankings]]></title>  <uid>27241</uid>  <body><![CDATA[<p>The&nbsp;<em>U.S. News &amp; World Report&nbsp;</em>Best Colleges Issue, which includes undergraduate engineering program rankings, has been published and the results for the Georgia Tech School of Electrical and Computer Engineering (ECE) are fantastic.</p><p>Electrical engineering moved up two spots to place fourth, tying its previous best ranking, which was last held in 2011.&nbsp;Computer engineering remained strong at sixth place, maintaining the same position as last year.</p><p>The College of Engineering ranked fifth, and all of the programs offered by the College placed among the top seven of their respective disciplines.&nbsp;Georgia Tech also retained its seventh place standing among all public universities.</p><p>“We have incredible academic and research programs in ECE, thanks to the efforts of the finest faculty, staff, and students anywhere,” said Steven W. McLaughlin, professor and the Steve W. Chaddick School Chair. “I sincerely appreciate everything that everyone does to help make 'ECE the place to be.'"</p><p><em>Note: </em>U.S. News &amp; World Report <em>released the 2016 Best Colleges rankings on Sept. 9.&nbsp;At the initial publication of the Best Undergraduate Engineering Programs rankings – both of programs where a doctorate is the highest degree offered and programs where a doctorate is not offered – a database error caused schools to receive incorrect ranks. As a result, the rank of the Georgia Tech College of Engineering has been adjusted from sixth place to fifth place. This article, which was first published on September 10, 2015, has been updated to reflect that change. <a href="http://www.usnews.com/education/blogs/college-rankings-blog/2015/09/22/correction-to-best-undergraduate-business-engineering-rankings">Read here for more details</a>. </em></p>]]></body>  <author>Jackie Nemeth</author>  <status>1</status>  <created>1441879547</created>  <gmt_created>2015-09-10 10:05:47</gmt_created>  <changed>1475896769</changed>  <gmt_changed>2016-10-08 03:19:29</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech's electrical engineering program placed fourth, and the computer engineering program held steady at sixth place in the 2016 U.S. News & World Report Best Colleges Issue, which also includes undergraduate engineering program rankings.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech's electrical engineering program placed fourth, and the computer engineering program held steady at sixth place in the 2016 U.S. News & World Report Best Colleges Issue, which also includes undergraduate engineering program rankings.]]></sentence>  <summary><![CDATA[<p>Georgia Tech's electrical engineering program ranked 4th and computer engineering held&nbsp; at #6 in the 2016 <em>U.S. News &amp; World Report</em> Best Colleges Issue.</p>]]></summary>  <dateline>2015-09-10T00:00:00-04:00</dateline>  <iso_dateline>2015-09-10T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-09-10 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jackie.nemeth@ece.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Jackie Nemeth</p><p>School of Electrical and Computer Engineering</p><p>404-894-2906</p><p><a href="mailto:jackie.nemeth@ece.gatech.edu">jackie.nemeth@ece.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>161361</item>      </media>  <hg_media>          <item>          <nid>161361</nid>          <type>image</type>          <title><![CDATA[Tech Tower in the Fall]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[falltower.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/falltower_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/falltower_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/falltower_0.jpg?itok=VPrhgC6R]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Tech Tower in the Fall]]></image_alt>                    <created>1449178896</created>          <gmt_created>2015-12-03 21:41:36</gmt_created>          <changed>1475894796</changed>          <gmt_changed>2016-10-08 02:46:36</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://www.ece.gatech.edu/]]></url>        <title><![CDATA[School of Electrical and Computer Engineering]]></title>      </link>          <link>        <url><![CDATA[http://coe.gatech.edu/news/undergraduate-engineering-programs-rank-high-latest-us-news-world-report-best-college-rankings]]></url>        <title><![CDATA[College of Engineering 2016 U.S. News rankings story]]></title>      </link>          <link>        <url><![CDATA[http://www.news.gatech.edu/2015/09/09/georgia-tech-remains-strong-us-news-world-report-rankings]]></url>        <title><![CDATA[Georgia Tech 2016 U.S. News rankings story]]></title>      </link>          <link>        <url><![CDATA[http://www.usnews.com/]]></url>        <title><![CDATA[U.S. News & World Report]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>      </news_terms>  <keywords>          <keyword tid="109"><![CDATA[Georgia Tech]]></keyword>          <keyword tid="166855"><![CDATA[School of Electrical and Computer Engineering]]></keyword>          <keyword tid="1875"><![CDATA[U.S. News &amp; World Report]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="446121">  <title><![CDATA[Encryption and Privacy Top Priorities for Tech Firms]]></title>  <uid>27490</uid>  <body><![CDATA[<p>The Justice Department and Microsoft go head-to-head in the U.S. Second Circuit Court of Appeals in Manhattan on Wednesday. The battleground? Data privacy. At issue is the question of whether U.S. law enforcement can use a search warrant — in this case, in a drug investigation — to force the U.S.-based technology company to turn over emails it has stored in a data center in Ireland. Lower courts have sided with the government, and held Microsoft in contempt for refusing to comply with the search warrant. Microsoft has appealed, arguing that its data center is subject to Irish and European privacy laws and outside the jurisdiction of U.S. authorities. Civil liberties and internet-privacy advocates are watching the case closely, as are company and law-enforcement lawyers. They're also watching another case, also involving a drug investigation, in which Apple was served with a court order instructing it to turn over text messages between iPhone owners…. “This way, the companies don’t open up the device,” says&nbsp;<strong>Peter Swire</strong>, an expert on computer security at <strong>Georgia Tech </strong>who served on President Obama’s task force on surveillance and cybersecurity.&nbsp;“The companies don’t have access to the content between Alice and Bob.” If the company that made the device, or is carrying the communication on its network, can’t eavesdrop on users like Alice and Bob, he says, the FBI and other outside parties can’t either.</p><p><a href="http://www.marketplace.org/topics/tech/encryption-and-privacy-top-priorities-tech-firms" target="_blank">Read more in Marketplace</a></p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1441832037</created>  <gmt_created>2015-09-09 20:53:57</gmt_created>  <changed>1475896769</changed>  <gmt_changed>2016-10-08 03:19:29</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Marketplace report]]></teaser>  <type>news</type>  <sentence><![CDATA[Marketplace report]]></sentence>  <summary><![CDATA[<p>The Justice Department and Microsoft battle in court over data privacy -- whether U.S. law enforcement can use a search warrant to obtain emails stored in an overseas data center.</p>]]></summary>  <dateline>2015-09-09T00:00:00-04:00</dateline>  <iso_dateline>2015-09-09T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-09-09 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>446131</item>      </media>  <hg_media>          <item>          <nid>446131</nid>          <type>image</type>          <title><![CDATA[IISP - data privacy image]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[istock_000067318595_double.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/istock_000067318595_double_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/istock_000067318595_double_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/istock_000067318595_double_0.jpg?itok=qF9Use3J]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[IISP - data privacy image]]></image_alt>                    <created>1449256217</created>          <gmt_created>2015-12-04 19:10:17</gmt_created>          <changed>1475895187</changed>          <gmt_changed>2016-10-08 02:53:07</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="447061">  <title><![CDATA[Georgia Tech Helps Thwart Cyber Attacks]]></title>  <uid>27490</uid>  <body><![CDATA[<p>In this guest column for the Atlanta Journal-Constitution, <strong>Dr. Wenke Lee,</strong> professor and co-director of the Institute for Information Security &amp; Privacy, explains how Georgia Tech is at the forefront of developing the groundbreaking cybersecurity protections needed today and why where the government spends its money can be a harbinger of what is needed most.</p><p><a href="http://www.myajc.com/news/news/opinion/tech-helps-thwart-cyberterrorism/nnbbN/" target="_blank">Read more in the <em>Atlanta Journal-Constitution</em></a></p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1442178129</created>  <gmt_created>2015-09-13 21:02:09</gmt_created>  <changed>1475896773</changed>  <gmt_changed>2016-10-08 03:19:33</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech Information Security Center Director and Professor Wenke Lee explains how Tech is at the forefront of developing the groundbreaking cybersecurity protections needed today.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech Information Security Center Director and Professor Wenke Lee explains how Tech is at the forefront of developing the groundbreaking cybersecurity protections needed today.]]></sentence>  <summary><![CDATA[<p>Dr. Wenke Lee describes the growing sophistication of cyberattacks and makes a case for bolder solutions in this guest column for the Atlanta Journal-Constitution.</p>]]></summary>  <dateline>2015-09-09T00:00:00-04:00</dateline>  <iso_dateline>2015-09-09T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-09-09 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>447071</item>      </media>  <hg_media>          <item>          <nid>447071</nid>          <type>image</type>          <title><![CDATA[Dr. Wenke Lee, IISP]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[lee_iisp_sm.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/lee_iisp_sm_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/lee_iisp_sm_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/lee_iisp_sm_0.jpg?itok=i0ySLmED]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Dr. Wenke Lee, IISP]]></image_alt>                    <created>1449256246</created>          <gmt_created>2015-12-04 19:10:46</gmt_created>          <changed>1475895187</changed>          <gmt_changed>2016-10-08 02:53:07</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="447081">  <title><![CDATA[Research Horizons: Preventing the Click Up]]></title>  <uid>27490</uid>  <body><![CDATA[The rise of digital devices and technologies has dramatically increased online activities for individuals, businesses, and governments. And though this accelerated connectivity brings many benefits, it also creates a treasure-trove of data to plunder — along with new forms of foul play... Georgia Tech puts the sting on cyber criminals with an arsenal of security tools and a new Institute for Information Security &amp; Privacy, led by co-directors <strong>Wenke Lee</strong> and <strong>Bo Rotoloni</strong>.&nbsp;<a href="https://www.rh.gatech.edu/features/preventing-click" target="_self">Read more in the September edition of <em>Georgia Tech Research Horizons</em>.</a>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1442180230</created>  <gmt_created>2015-09-13 21:37:10</gmt_created>  <changed>1475896773</changed>  <gmt_changed>2016-10-08 03:19:33</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[As cybercriminals become more cunning, Georgia Tech researchers expand their arsenal of security innovations.]]></teaser>  <type>news</type>  <sentence><![CDATA[As cybercriminals become more cunning, Georgia Tech researchers expand their arsenal of security innovations.]]></sentence>  <summary><![CDATA[<p>As cybercriminals become more cunning, Georgia Tech researchers expand their arsenal of security innovations.</p>]]></summary>  <dateline>2015-09-07T00:00:00-04:00</dateline>  <iso_dateline>2015-09-07T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-09-07 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>447091</item>      </media>  <hg_media>          <item>          <nid>447091</nid>          <type>image</type>          <title><![CDATA[Preventing the Click-Up]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[infosec_teaser_0.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/infosec_teaser_0_0.png]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/infosec_teaser_0_0.png]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/infosec_teaser_0_0.png?itok=wWhXbusC]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Preventing the Click-Up]]></image_alt>                    <created>1449256246</created>          <gmt_created>2015-12-04 19:10:46</gmt_created>          <changed>1475895187</changed>          <gmt_changed>2016-10-08 02:53:07</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="430601"><![CDATA[Institute for Information Security and Privacy]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="443671">  <title><![CDATA[Technology Professionals Say Georgia Tech is a Top College in America]]></title>  <uid>28124</uid>  <summary><![CDATA[]]></summary>  <body><![CDATA[<p>Georgia Tech is ranked number 13 in a survey of tech industry professionals.</p>]]></body>  <author>Tyler Sharp</author>  <status>1</status>  <created>1441183898</created>  <gmt_created>2015-09-02 08:51:38</gmt_created>  <changed>1475893661</changed>  <gmt_changed>2016-10-08 02:27:41</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[]]></teaser>  <type>hgTechInTheNews</type>  <publication><![CDATA[LZRD sleeve]]></publication>  <article_dateline>2015-09-02T00:00:00-04:00</article_dateline>  <iso_article_dateline>2015-09-02T00:00:00-04:00</iso_article_dateline>  <gmt_article_dateline>2015-09-02T00:00:00-04:00</gmt_article_dateline>  <article_url><![CDATA[http://www.businessinsider.in/People-who-work-in-tech-say-these-are-the-25-best-colleges-in-America/articleshow/48715751.cms]]></article_url>  <media>          <item><![CDATA[373671]]></item>      </media>  <hg_media>          <item>          <nid>373671</nid>          <type>image</type>          <title><![CDATA[Tech Tower]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[15c6001-p6-003.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/15c6001-p6-003.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/15c6001-p6-003.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/15c6001-p6-003.jpg?itok=XOKux7CA]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Tech Tower]]></image_alt>                              <created>1449246186</created>          <gmt_created>2015-12-04 16:23:06</gmt_created>          <changed>1475894352</changed>          <gmt_changed>2016-10-08 02:39:12</gmt_changed>      </item>      </hg_media>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <keywords>          <keyword tid="107931"><![CDATA[business insider]]></keyword>          <keyword tid="109"><![CDATA[Georgia Tech]]></keyword>          <keyword tid="623"><![CDATA[Technology]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>      </news_room_topics>    <userdata>      <![CDATA[]]>  </userdata></node><node id="434021">  <title><![CDATA[Georgia Tech Finds 11 Security Flaws in Popular Internet Browsers Using New Analysis Method]]></title>  <uid>27490</uid>  <body><![CDATA[<p><strong>WASHINGTON, D.C., Aug. 13, 2015&shy;</strong>—Researchers from the Georgia Institute of Technology College of Computing developed a new cyber security analysis method that discovered 11 previously unknown Internet browser security flaws, and were honored with the Internet Defense Prize, an award offered by Facebook in partnership with USENIX, on Wednesday evening in Washington, D.C., at the 24<sup>th</sup> USENIX Security Symposium.</p><p>Ph.D. students <strong>Byoungyoung Lee</strong> and <strong>Chengyu Song</strong>, with Professors <a href="https://taesoo.gtisc.gatech.edu/" target="_blank"><strong>Taesoo Kim</strong></a> and <a href="http://wenke.gtisc.gatech.edu/" target="_blank"><strong>Wenke Lee</strong></a>, of Georgia Tech received $100,000 from Facebook to continue their research and increase its impact to make the Internet safer.</p><p>Their research, “Type Casting Verification: Stopping an Emerging Attack Vector,” explores vulnerabilities in C++ programs (such as Chrome and Firefox) that result from “bad casting” or “type confusion.” Bad casting enables an attacker to corrupt the memory in a browser so that it follows a malicious logic instead of proper instructions. The researchers developed a new, proprietary detection tool called CAVER to catch them. CAVER is a run-time detection tool with 7.6 percent - 64.6 percent overhead on browser performance (Chrome and Firefox, respectively). The 11 vulnerabilities identified by Georgia Tech have been confirmed and fixed by vendors.</p><p>“It is time for the Internet community to start addressing the more difficult, deeper security problems,” says <strong>Wenke Lee</strong>, professor in the School of Computer Science and an adviser to the team. “The security research community has been working on various ways to detect and fix memory safety bugs for decades, and have made progress on ‘stack overflow’ and ‘heap overflow’ bugs, but these have now become relatively easy problems. Our work studied the much harder and deeper bugs—in particular ‘use-after-free’ and ‘bad casting’—and our tools discovered serious security bugs in widely used software, such as Firefox and libstdc++. We are grateful to Facebook for this recognition.”</p><p>The work was selected for Facebook's second ever Internet Defense Prize award, which recognizes superior quality research that combines a working prototype with significant contributions to the security of the Internet -- particularly in the areas of protection and defense. The award is meant to recognize the direction of the research and to inspire researchers to focus on high-impact areas.</p><p>“Designing defensive security technology has never been more important, and that’s why we are once again offering the Internet Defense Prize to stimulate high quality research in this area,” said Ioannis Papagiannis, Security Engineering Manager at Facebook. “The Georgia Tech team’s novel technique for detecting bad type casts in C++ programs is the type of standout approach we want to encourage. We look forward to seeing what the team does next to create broader impact and improve security on the Internet.”</p><p>“Georgia Tech’s award-winning entry exemplifies the groundbreaking security research that has become a hallmark of the USENIX Security Symposium,” said Casey Henderson, Executive Director of the USENIX Association. "Their trailblazing work stood out among the many outstanding submissions judged by the USENIX Security Awards Committee and Facebook. We look forward to their continued progress enabled by the Internet Defense Prize in the coming year.”</p><p><strong>About the Georgia Tech College of Computing</strong></p><p>The Georgia Tech College of Computing is a national leader in the creation of real-world computing breakthroughs that drive social and scientific progress. With its graduate program ranked 9th nationally by <em>U.S. News and World Report</em>, the College’s unconventional approach to education is expanding the horizons of traditional computer science students through interdisciplinary collaboration and a focus on human-centered solutions. For more information about the Georgia Tech College of Computing, its academic divisions and research centers, please visit <a href="http://www.cc.gatech.edu/">www.cc.gatech.edu</a>.</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1439452195</created>  <gmt_created>2015-08-13 07:49:55</gmt_created>  <changed>1475896762</changed>  <gmt_changed>2016-10-08 03:19:22</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers from the College of Computing discovered previously unknown browser security flaws, and were honored with the Internet Defense Prize by Facebook and USENIX on Aug. 12 in Washington, D.C.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers from the College of Computing discovered previously unknown browser security flaws, and were honored with the Internet Defense Prize by Facebook and USENIX on Aug. 12 in Washington, D.C.]]></sentence>  <summary><![CDATA[<p>College of Computing researchers discovered 11 previously unknown Internet browser security flaws, and were honored with the Internet Defense Prize by Facebook and USENIX.</p>]]></summary>  <dateline>2015-08-13T00:00:00-04:00</dateline>  <iso_dateline>2015-08-13T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-08-13 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[Receives $100,000 Internet Defense Prize from Facebook at USENIX Security ’15]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[tlabouff@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:tlabouff@cc.gatech.edu">Tara La Bouff</a><br />Communications Manager<br />404.894.7253</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>434031</item>      </media>  <hg_media>          <item>          <nid>434031</nid>          <type>image</type>          <title><![CDATA[Facebook Winning Team]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449256148</created>          <gmt_created>2015-12-04 19:09:08</gmt_created>          <changed>1475895174</changed>          <gmt_changed>2016-10-08 02:52:54</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="345"><![CDATA[cyber security]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>          <keyword tid="2229"><![CDATA[Internet]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="429511">  <title><![CDATA[Georgia Tech Receives $4.2 Million for Military Research to Better Secure Data Transfer]]></title>  <uid>27490</uid>  <body><![CDATA[<p>Researchers from the College of Computing at the Georgia Institute of Technology were awarded $4.2 million from the Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory (AFRL) to improve how data is tracked between computers, Internet hosts, and browsers for better cyber security.</p><p>The four-year project, titled “THEIA” after the Greek goddess of shining light, attempts to shed light on exactly where data moves as it is routed from one Internet host to another and whether any malicious code, for example, is attached to data during transfer.</p><p>“The project has wide implications for any industry and anyone who needs to send secure information, make sure it is not manipulated during transfer, and that it arrives securely in tact – but especially for those banking, shopping or trading online,” says Dr. Wenke Lee, primary investigator and professor in the College of Computing. “If we have the ability to fully track how data is processed until it reaches the intended recipient, then we can better detect and stop advanced persistent threats (APT).”</p><p>For example, currently it is not possible for a network intrusion detection system to determine whether data sent from an end-host was modified by a malicious browser extension after a user completed a web form. State-of-the-art information flow tracking today typically applies only to a single layer (such as the program level), or does not utilize the full semantics at all layers (to verify if input was entered by the original user, for example).</p><p>THEIA will track and record information at three layers: user interaction with a program, program processing of data input, and program and network interactions with an operating system. Together, THEIA will monitor secure data flow from user to program, from program to file system storage, and storage to network output, and back again. Such completeness is critical to APT detection.</p><p>“Our ultimate goal is to provide complete transparency, or full visibility, into host events and data so that APT activities cannot evade detection,” Lee says. “THEIA represents what could be a significant advance over state-of-the-art approaches, which typically are forced to make arbitrary trade-offs between verifying accuracy and maintaining total computational efficiency.”</p><p>THEIA would make no such compromise. THEIA will record the sufficient amount of data at runtime, replay and analyze recorded events in semi-real-time when suspicious alerts are triggered, or analyze data completely offline.</p><p>Lee, a co-director of the Institute for Information Security and Privacy at Georgia Tech, has conducted cyber security research from Atlanta since 2001. Lee’s research interests include systems and network security, applied cryptography, and data mining. Most recently, he has focused on botnet detection and malware analysis, security of mobile systems and apps, and detection and mitigation of information manipulation on the Internet.&nbsp;Lee has published over 140 articles. In 2006, Lee co-founded Damballa, Inc., a spin-off from his lab that focuses on botnet detection and mitigation.</p><p>The DARPA-AFRL project is funded with $4,253,126 over 48 months. Participating in the work will be Dr. Taesoo Kim, assistant professor; Dr. Alessandro Orso, associate chair; Dr. Simon Chung, research scientist, all with the School of Computer Science, College of Computing; and Dr. Albert Brzeczko, research engineer at Georgia Tech Research Institute (GTRI).</p>]]></body>  <author>Tara La Bouff</author>  <status>1</status>  <created>1438242908</created>  <gmt_created>2015-07-30 07:55:08</gmt_created>  <changed>1475896759</changed>  <gmt_changed>2016-10-08 03:19:19</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory (AFRL) seek better cyber security between computers, Internet hosts, and browsers.]]></teaser>  <type>news</type>  <sentence><![CDATA[Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory (AFRL) seek better cyber security between computers, Internet hosts, and browsers.]]></sentence>  <summary><![CDATA[<p>Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory (AFRL) seek better cyber security between computers, Internet hosts, and browsers with the help of Georgia Tech's College of Computing.</p>]]></summary>  <dateline>2015-07-30T00:00:00-04:00</dateline>  <iso_dateline>2015-07-30T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-07-30 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[tlabouff@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:tlabouff@cc.gatech.edu" target="_blank">Tara La Bouff</a></p><p>Marketing Communications Manager</p><p>404.769.5408</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>429521</item>      </media>  <hg_media>          <item>          <nid>429521</nid>          <type>image</type>          <title><![CDATA[Wenke Lee 2015 headshot]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[]]></image_name>            <image_path><![CDATA[]]></image_path>            <image_full_path><![CDATA[]]></image_full_path>            <image_740><![CDATA[]]></image_740>            <image_mime></image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1449254358</created>          <gmt_created>2015-12-04 18:39:18</gmt_created>          <changed>1475895169</changed>          <gmt_changed>2016-10-08 02:52:49</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="147"><![CDATA[Military Technology]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="147"><![CDATA[Military Technology]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="208"><![CDATA[computing]]></keyword>          <keyword tid="345"><![CDATA[cyber security]]></keyword>          <keyword tid="136881"><![CDATA[data transfer]]></keyword>          <keyword tid="2678"><![CDATA[information security]]></keyword>          <keyword tid="136871"><![CDATA[Internet host]]></keyword>          <keyword tid="525"><![CDATA[military]]></keyword>      </keywords>  <core_research_areas>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node><node id="417741">  <title><![CDATA[Georgia Tech Receives Nearly $2 million for Naval Research to Bolster Cyber Defense]]></title>  <uid>28124</uid>  <body><![CDATA[<p><strong>ATLANTA – June 24, 2015 –</strong> Researchers from the College of Computing at <a href="mailto:www.gatech.edu">Georgia Institute of Technology</a> in Atlanta have been awarded nearly $2 million from the Department of the Navy, <a href="mailto:http://www.onr.navy.mil/">Office of Naval Research</a> (ONR) and the Assistant Secretary of Defense for Research and Engineering (ASD R&amp;E) to fund projects that will bolster defense and other large-scale systems against cyber attack.</p><p>Their work can help improve national security and also the functional safety and resiliency of automotive or industrial control systems, which are increasingly connected to the wider world through personal devices or other means.</p><p>The first project, titled <strong><em>“BFT++: Attack Tolerance in Hard Real-Time Systems,” </em></strong>will develop the foundations, principles and techniques for building attack-tolerant cyber physical systems.</p><p>“Many intrusion tolerance techniques slow down the control system, which is undesirable and may be life-threatening in a weapons system,” said primary investigator Taesoo Kim, assistant professor in the School of Computer Science at Georgia Tech. “We will develop the techniques to detect failure due to an attack, replace the compromised node with a back-up, and reconstitute it – all within the hard, real-time requirement. In addition, we will develop software and system diversification techniques to ensure that an attack is detected early.”</p><p>More specifically, the techniques will eliminate common software vulnerabilities in different nodes of a networked group and distribute a security protection into multiple – but not all – nodes of the group, so that protection strength remains undiluted without reducing total performance overhead.</p><p>The second project, titled <strong><em>“Embedasploit: a Pen-test in a Box for Industrial Control Systems,” </em></strong>will create a system to fingerprint an industrial control network, catalog its known flaws, emulate the whole system for simulation and outline a model that prevents hackers from listening to system activity, injecting malicious traffic or obtaining binary code. The research will be tested on engine control units in a modern car.</p><p>“Assessing the security of industrial control systems today often takes the form of a ‘penetration test’ that requires someone familiar with security practices, reverse engineering, real-world exploitation and the intricacies of a particular industrial domain,” says primary investigator Wenke Lee, director of the Georgia Tech Information Security Center in the School of Computer Science. “All of that is rare in a single team or person, so we propose an end-to-end system that can automatically detect, and adapt inside new systems and networks.”</p><p>Each is a three-year project. Additional researchers include Tielei Wang at Georgia Tech, Salvatore Stolfo at Columbia University, and Brendan Dolan-Gavitt at New York University Polytechnic School of Engineering, along with graduate students at Georgia Tech, Columbia and NYU Poly. Results – including technical papers, teaching materials, software prototypes and experiment data (when appropriate) – will be made available via the <a href="http://gtisc.gatech.edu">project’s web page</a> maintained at the Georgia Institute of Technology [http://gtisc.gatech.edu].</p><p>&nbsp;<strong>About Georgia Tech’s College of Computing</strong></p><p>The Georgia Tech College of Computing is a national leader in the creation of real-world computing breakthroughs that drive social and scientific progress. With its graduate program ranked 9th nationally by <em>U.S. News and World Report</em>, the College’s unconventional approach to education is expanding the horizons of traditional computer science students through interdisciplinary collaboration and a focus on human-centered solutions. For more information about the Georgia Tech College of Computing, its academic divisions and research centers, please visit <a href="http://www.cc.gatech.edu/">www.cc.gatech.edu</a>.</p>]]></body>  <author>Tyler Sharp</author>  <status>1</status>  <created>1435141425</created>  <gmt_created>2015-06-24 10:23:45</gmt_created>  <changed>1475896725</changed>  <gmt_changed>2016-10-08 03:18:45</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers from the College of Computing at Georgia Institute of Technology in Atlanta have been awarded nearly $2 million from the Department of the Navy, Office of Naval Research (ONR).]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers from the College of Computing at Georgia Institute of Technology in Atlanta have been awarded nearly $2 million from the Department of the Navy, Office of Naval Research (ONR).]]></sentence>  <summary><![CDATA[<p>Researchers at College of Computing are tasked with two cyberdefense projects to help improve national security and the functional safety and resiliency of automotive or industrial control systems.</p>]]></summary>  <dateline>2015-06-24T00:00:00-04:00</dateline>  <iso_dateline>2015-06-24T00:00:00-04:00</iso_dateline>  <gmt_dateline>2015-06-24 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Tara La Bouff<br /><a href="mailto:tlabouff@cc.gatech.edu">tlabouff@cc.gatech.edu</a><br />602-770-0264</p><p>Jason Maderer<br /><a href="mailto:jason.maderer@comm.gatech.edu">jason.maderer@comm.gatech.edu<br /></a>404-660-2926</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>424221</item>      </media>  <hg_media>          <item>          <nid>424221</nid>          <type>image</type>          <title><![CDATA[US Army cybersecurity training exercise]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[cyberprotectionteam022715.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/cyberprotectionteam022715_0.jpg]]></image_path>            <image_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/cyberprotectionteam022715_0.jpg]]></image_full_path>            <image_740><![CDATA[http://www.tlwarc.hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/cyberprotectionteam022715_0.jpg?itok=5JV5fNL3]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[US Army cybersecurity training exercise]]></image_alt>                    <created>1449254319</created>          <gmt_created>2015-12-04 18:38:39</gmt_created>          <changed>1475895162</changed>          <gmt_changed>2016-10-08 02:52:42</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>          <keyword tid="2254"><![CDATA[gtisc]]></keyword>          <keyword tid="3117"><![CDATA[Office of Naval Research]]></keyword>          <keyword tid="166941"><![CDATA[School of Computer Science]]></keyword>          <keyword tid="129951"><![CDATA[Taesoo Kim]]></keyword>          <keyword tid="10893"><![CDATA[wenke lee]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata>      <![CDATA[]]>  </userdata></node></nodes>