{"493961":{"#nid":"493961","#data":{"type":"event","title":"School of Computer Science Guest Lecture","body":[{"value":"\u003Ch3\u003ESpecial Guest\u003C\/h3\u003E\u003Ch4\u003E\u003Cstrong\u003EMuhammad Naveed\u003Cbr \/\u003E\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003E\u003Cem\u003EUniversity of Illinois Urbana-Champaign\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EMuhammad Naveed is a Ph.D. candidate at UIUC working on applied cryptography and systems security. In applied cryptography, he develops practical-yet-provably-secure cryptographic systems for real applications. In systems security, he explores the fundamental security flaws in popular systems and builds defense systems. His work has had a significant impact on Android security and has helped companies such as Google, Samsung, Facebook, and Amazon secure their products and services, improving security for millions of Android users. He is the recipient of a Google Ph.D. Fellowship in Security, the Sohaib and Sara Abbasi Fellowship, the CS@Illinois C.W. Gear Outstanding Graduate Student Award, and the best paper award at the NYU CSAW Security Research Competition. He was also a finalist in the NYU School of Engineering\u0027s \u0022Cyber Security Awareness Week\u0022 Cybersecurity Policy Competition.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch3\u003E\u0022Making the World a Better Place with Cryptography\u0022\u003C\/h3\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003EAbstract\u003C\/strong\u003E\u003C\/em\u003E: The U.S. Department of Health and Human Services reports that health records of 86% of the U.S. population have been hacked. The Ashley Madison breach revealed the private information of 37 million individuals and led to suicides and shattered families. The Apple iCloud breach led to the public release of nude photos of celebrities.\u0026nbsp; Data breaches like these abound.\u003Cbr \/\u003EIn this talk, I will describe my work on understanding the security of existing data breach prevention systems.\u0026nbsp; To thwart data breaches, property-preserving encryption has been adopted in many encrypted database systems such as CryptDB, Microsoft Cipherbase, Google Encrypted BigQuery, SAP SEEED, and the soon-to-be-shipped Microsoft SQL Always Encrypted system. To simultaneously attain practicality and functionality, property-preserving encryption schemes permit the leakage of certain information such as the relative order of encrypted messages. My work is among the first to study the practical implications of permitting such leakage, and to demonstrate in real-world contexts that property-preserving encryption often does not offer strong enough security.\u0026nbsp; I will describe an application-driven approach to developing practical cryptography to secure sensitive data: collaborating with application domain experts to formulate the requirements, investigating whether a practical solution meeting the requirements is possible, and if not, exploring the reasons behind it to relax requirements so as to find a useful solution for the application. I will describe how I developed a cryptographic model called Controlled Functional Encryption (CFE), and how it can support personalized medicine.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EMuhammad Naveed -- a Ph.D. candidate in cryptography at University of Illinois, Urbana Champaign -- presents \u0022Making the World a Better Place with Cryptography.\u0022\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Muhammad Naveed of Univ. Illinois Urbana-Champaign visits Georgia Tech as a guest lecturer."}],"uid":"27490","created_gmt":"2016-02-01 21:30:17","changed_gmt":"2017-04-13 21:16:48","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-02-25T10:00:00-05:00","event_time_end":"2016-02-25T11:00:00-05:00","event_time_end_last":"2016-02-25T11:00:00-05:00","gmt_time_start":"2016-02-25 15:00:00","gmt_time_end":"2016-02-25 16:00:00","gmt_time_end_last":"2016-02-25 16:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"493971":{"id":"493971","type":"image","title":"Muhammad Naveed","body":null,"created":"1454436000","gmt_created":"2016-02-02 18:00:00","changed":"1475895251","gmt_changed":"2016-10-08 02:54:11","alt":"Muhammad Naveed","file":{"fid":"204531","name":"naveed.jpeg","image_path":"\/sites\/default\/files\/images\/naveed.jpeg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/naveed.jpeg","mime":"image\/jpeg","size":62012,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/naveed.jpeg?itok=tsQ25QZH"}}},"media_ids":["493971"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"168112","name":"cryptography"},{"id":"1404","name":"Cybersecurity"},{"id":"2678","name":"information security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}