{"492031":{"#nid":"492031","#data":{"type":"event","title":"Institute for Information Security \u0026 Privacy\u0027s Demo Day Finale","body":[{"value":"\u003Ch3\u003EIndustry needs new solutions and Georgia Tech has them\u003C\/h3\u003E\u003Cp\u003EInformation security students at Georgia Tech compete before venture capitalists and industry leaders at the Institute for Information Security \u0026amp; Privacy\u0027s \u0022Demo Day Finale.\u0022\u0026nbsp; Five student teams will present TED-style talks about their research before an elite panel of business leaders, who then advise students about future considerations for commercialization. Research with the best chance of commercialization or demonstrating the most impact toward resolving an industry need receives a cash prize.\u003C\/p\u003E\u003Cp\u003EInitial cybersecurity research concepts were presented at the inaugural Fall Demo Day, held \u003Ca href=\u0022http:\/\/gtcybersecuritysummit.com\u0022 target=\u0022_blank\u0022\u003EOct. 28 at the Georgia Tech Cyber Security Summit\u003C\/a\u003E.\u003C\/p\u003E\u003Ch4\u003E\u0026nbsp;\u003C\/h4\u003E\u003Ch4\u003EFinalists are\u003C\/h4\u003E\u003Cp\u003E\u003Cem\u003E\u0022Cybersecurity Inspired Health Insurance Fraud Detector\u0022\u003C\/em\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMusheer Ahmed\u003C\/strong\u003E\u003Cbr \/\u003E Advisor: Mustaque Ahamad\u003C\/p\u003E\u003Cp\u003E\u003Cbr \/\u003E \u003Cem\u003E\u0022PARS: A Uniform and Open-source Password Analysis and Research System\u0022\u003C\/em\u003E\u003Cbr \/\u003E \u003Cstrong\u003EShukun Yang\u003C\/strong\u003E\u003Cbr \/\u003E Advisor: Raheem Beyah\u003C\/p\u003E\u003Cp\u003E\u003Cbr \/\u003E \u003Cem\u003E\u0022Preventing Use-after-free with Dangling Pointers Nullification\u0022\u003C\/em\u003E\u003Cbr \/\u003E \u003Cstrong\u003EByoungyoung Lee \u003C\/strong\u003Eand\u003Cstrong\u003E Chengyu Song\u003C\/strong\u003E\u003Cbr \/\u003E Advisor: Taesoo Kim\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u0022Tying Public Key to Person with \u2018idforweb\u2019 \u0022\u003C\/em\u003E\u003Cbr \/\u003E \u003Cstrong\u003EPak Ho Chung,\u003C\/strong\u003E\u003Cstrong\u003E Yeongjin Jang \u003C\/strong\u003Eand\u003Cstrong\u003E Mark Wisenski\u003C\/strong\u003E\u003Cbr \/\u003E Advisor: Wenke Lee\u003C\/p\u003E\u003Cp\u003E\u003Cbr \/\u003E \u003Cem\u003E\u0022UCognito: Private Browsing without Tears\u0022\u003C\/em\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMeng Xu \u003C\/strong\u003Eand\u003Cstrong\u003E Yeongjin Jang\u003C\/strong\u003E\u003Cbr \/\u003E Advisor:\u0026nbsp; Taesoo Kim and Wenke Lee\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EStudents compete before venture capitalists and industry leaders, where early cybersecurity research projects can win cash prizes and valuable tech-transfer advice.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Five student finalist teams present cybersecurity concepts for possible commercialization at the Spring Demo Day Finale."}],"uid":"27490","created_gmt":"2016-01-28 01:13:57","changed_gmt":"2017-04-13 21:16:52","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-04-13T16:00:00-04:00","event_time_end":"2016-04-13T18:00:00-04:00","event_time_end_last":"2016-04-13T18:00:00-04:00","gmt_time_start":"2016-04-13 20:00:00","gmt_time_end":"2016-04-13 22:00:00","gmt_time_end_last":"2016-04-13 22:00:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}}},"media_ids":["451391"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"168287","name":"cybsersecurity"},{"id":"3652","name":"Demo Day"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}