{"484721":{"#nid":"484721","#data":{"type":"event","title":"Cybersecurity Lecture Series - Jan. 29","body":[{"value":"\u003Cp\u003EMeet academic and industry leaders for intimate discussions about new threats, trends and technologies. Preview new cybersecurity research ahead of international conferences. Hear from exceptional Georgia Tech students about their body of work.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EJan. 29\u0026nbsp; Guest Speaker\u003C\/strong\u003E\u003C\/p\u003E\u003Ch3\u003E\u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/~blee303\/\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003EByoungyoung Lee\u003C\/strong\u003E\u003C\/a\u003E\u003Cbr \/\u003E\u003Cem\u003EPhD Candidate, College of Computing\u003C\/em\u003E\u003C\/h3\u003E\u003Cp\u003E\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EPhD Candidate Byoungyoung Lee presents a summary of cybersecurity research results and accomplishments while at Georgia Tech.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003EAbstract:\u003C\/em\u003E\u003C\/strong\u003E Many system components and network applications are written in unsafe programming languages that are prone to memory corruption vulnerabilities. To combat countless catastrophes from these vulnerabilities, there have been many defense research efforts. However, these were largely limited because their techniques focused on certain negative side effects from those vulnerabilities. As a result, there have been many unfortunate cases when security holes in these mitigation solutions are later uncovered, and significantly thwart the security of underlying systems. In this talk, I\u0027ll present a protection system which completely eliminates the root cause of those vulnerabilities. Specifically, I have targeted two popular and emerging vulnerabilities, use-after-free and bad-casting, each of which can be addressed with protection systems that I developed as a student at Georgia Tech: DangNull and CaVer, respectively. Since DangNull and CaVer directly fix the origin of such issues, they do not leave any security holes that attackers could abuse in the future. \u003Cbr \/\u003EDangNull and CaVer have been recognized by both academia and industry for their highly practical impacts: Facebook and USENIX awarded the Internet Defense Prize, and CSAW awarded the \u0022best applied security research paper.\u0022 Meanwhile, Google and Mozilla deployed DangNull and CaVer, respectively, in their development infrastructures.\u003C\/p\u003E\u003Cp\u003ELunch provided. No registration necessary.\u003Cbr \/\u003E\u003Cbr \/\u003E\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003E\u003Cem\u003ESpring 2016 Schedule\u003C\/em\u003E\u003C\/strong\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EJan. 15\u003C\/strong\u003E \u2014 Opening discussion\u003Cbr \/\u003E \u003Cstrong\u003EJan. 22\u003C\/strong\u003E \u2014 Milos Prvulovic\u003Cbr \/\u003E \u003Cstrong\u003EJan. 29\u003C\/strong\u003E \u2014 PhD Candidate - Byoungyoung Lee\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 5\u003C\/strong\u003E \u2014 TBD \u003Cbr \/\u003E \u003Cstrong\u003EFeb. 12\u003C\/strong\u003E \u2014 TBD \u003Cbr \/\u003E \u003Cstrong\u003EFeb. 19\u003C\/strong\u003E \u2014 NDSS Conference Preview -\u0026nbsp; Chengyu Song, Wei Meng\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 26\u003C\/strong\u003E \u2014 Stephen Pair, co-founder and CEO, \u003Ca href=\u0022https:\/\/bitpay.com\/about\u0022 target=\u0022_blank\u0022\u003EBitPay\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 4\u003C\/strong\u003E \u2014 Frank Wang, coordinator, \u003Ca href=\u0022http:\/\/cybersecurityfactory.com\/\u0022 target=\u0022_blank\u0022\u003EThe Cybersecurity Factory\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 11\u003C\/strong\u003E \u2013 David Formby, Xiaojing Liao\u003Cbr \/\u003E \u003Cstrong\u003EMar. 18\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EMar. 25\u003C\/strong\u003E \u2013 Spring Break\u003Cbr \/\u003E \u003Cstrong\u003EApr. 1\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 8 \u003C\/strong\u003E\u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 15\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 22 \u003C\/strong\u003E\u2013 Closing session\u003C\/p\u003E\u003Cp\u003ESponsored by MailChimp\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Anyone interested in cybersecurity intelligence and skill development is invited to a free lecture series, held each Friday at Georgia Tech."}],"uid":"27490","created_gmt":"2016-01-11 21:17:20","changed_gmt":"2017-04-13 21:17:11","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-01-29T11:00:00-05:00","event_time_end":"2016-01-29T12:00:00-05:00","event_time_end_last":"2016-01-29T12:00:00-05:00","gmt_time_start":"2016-01-29 16:00:00","gmt_time_end":"2016-01-29 17:00:00","gmt_time_end_last":"2016-01-29 17:00:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}}},"media_ids":["451391"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"141341","name":"Institute for Information Security \u0026 Privacy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}