<node id="517561">
  <nid>517561</nid>
  <type>news</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1458908806</created>
  <changed>1475896869</changed>
  <title><![CDATA[Students to Show Venture Capitalists Their Best Cybersecurity Work]]></title>
  <body><![CDATA[<p>A fraud detection system for healthcare claims… Ways to evaluate safer passwords…. Technical fixes for truly private browsing… These are some of the ideas proposed by Georgia Tech students who will compete before a national panel of venture capitalists for cash in the inaugural “Demo Day Finale” on April 13.</p><p>The event is hosted by the Institute for Information Security &amp; Privacy (IISP) and aims to give students an early introduction to potential investors as they continue their research.</p><p>“The hardest part of moving great ideas out to market is finding a trustworthy partner,” says <strong>Wenke Lee</strong>, co-director of the IISP and a professor in the School of Computer Science who has successfully transferred research to private corporations. “It can be awkward to turn over your hard work to someone at the end of a long project. We hope to introduce students to potential investors earlier in the process to help them consider steps to take that could make their project more appealing to consumers. This is one way we think the Institute for Information Security &amp; Privacy can help move solutions out to individuals who need better identity, data or hardware protection.”</p><p>Five student teams representing the School of Computer Science and School of Electrical Computing and Engineering are polishing their presentations now to deliver TED-style talks before the elite panel of business leaders from Washington D.C, Philadelphia, and Atlanta. Research with the best chance of commercialization or demonstrating the most impact toward resolving an industry need receives a cash prize – up to $5,000 this year.</p><p>Initial cybersecurity research concepts were presented at the inaugural Fall Demo Day, held <a href="http://gtcybersecuritysummit.com" target="_blank">Oct. 28 at the Georgia Tech Cyber Security Summit</a>, where more than 300 attendees viewed and voted on the best research work from Georgia Tech and GTRI. The top five finalists now advance to the finale. All finalists represent graduate students – some of whom have been working on their projects for many years.</p><p>“It means a great deal for me to know that my research can have a huge positive impact outside of the lab,” says <strong>Musheer Ahmed</strong>, a graduating PhD student (advised by Professor Mustaque Ahamad) whose patented, data analytics system assigns risk scores to healthcare providers and already has caught the eye of other incubator programs interested in its potential. “All students strive for this but never know if that will materialize with their work. I hope the momentum will continue and my work can be commercialized.”</p><p>Another team – “IDforWeb” -- hopes to gather validation from the Demo Day judges that they have an easy-to-use platform for secure transactions and communication authentication. IDforWeb seeks to create “killer apps” that improve public key infrastructure (PKI) with new ease of use.</p><p>“I'm glad that people believe the 10+ year-old PKI usability problem is an important problem to solve,&nbsp;and agree with us that new technologies like smartphones and&nbsp;blockchains offer some new angle,” said <strong>Pak Ho Chung</strong>, a researcher in the School of Computer Science, referring to the Fall audience that voted them through to the Spring Finale.</p><p>All projects that will be presented at Demo Day represent a broad range of solutions for healthcare, e-commerce, application development and more, says <strong>Bo Rotoloni</strong>, co-director of the IISP who also leads the information and cyber sciences directorate for the Georgia Tech Research Institute (GTRI).</p><p>“The investors coming to judge our first Demo Day are going to see unique ideas by Georgia Tech and clever solutions to existing and emerging challenges. We believe one of academia’s roles is to explore big ideas, prove the potential, and create new market spaces. Several of these finalists do that well.”</p><p>Due to limited space, <a href="http://tiny.cc/demoday16">registration is encouraged</a> for the event.</p><p>&nbsp;</p><h4><strong>The IISP Demo Day Spring ’16 Finalists are</strong></h4><p><em>"Cybersecurity Inspired Health Insurance Fraud Detector"</em><br /> <strong>Musheer Ahmed</strong><br /> Advisor: Mustaque Ahamad</p><p><br /><a href="http://www2.ece.gatech.edu/cap/PARS/" target="_blank"> <em>"PARS: A Uniform and Open-source Password Analysis and Research System"</em></a><br /> <strong>Shukun Yang</strong><br /> Advisor: Raheem Beyah</p><p><br /><a href="http://wenke.gtisc.gatech.edu/papers/dangnull.pdf" target="_blank"> <em>"Preventing Use-after-free with Dangling Pointers Nullification"</em></a><br /> <strong>Byoungyoung Lee </strong>and<strong> Chengyu Song</strong><br /> Advisor: Taesoo Kim</p><p>&nbsp;</p><p><em>"Tying Public Key to Person with ‘idforweb’ "</em><br /> <strong>Pak Ho Chung, Yeongjin Jang </strong>and<strong> Mark Wisneski</strong><br /> Advisor: Wenke Lee</p><p><br /><a href="http://wenke.gtisc.gatech.edu/papers/ucognito.pdf" target="_blank"> <em>"UCognito: Private Browsing without Tears"</em></a><br /> <strong>Meng Xu </strong>and<strong> Yeongjin Jang </strong><br /> Advisor:&nbsp; Taesoo Kim and Wenke Lee</p><p>&nbsp;</p><p>&nbsp;</p><h4><strong>Judges are</strong></h4><p><strong>Robin Bienfait</strong>, chief enterprise innovation officer, Samsung</p><p><strong>Paul Conley</strong>, managing director, Paladin Capital Group</p><p><strong>John Lee</strong>, senior associate, Osage Partners</p><p><strong>Glenn McGonnigle</strong>, general partner, TechOperators</p><p><strong>Sig Mosley</strong>, managing partner, Mosley Ventures</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2016-03-29T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Information security students will compete before a national panel of venture capitalists for cash in the inaugural “Demo Day Finale” on April 13.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p><em>A fraud detection system for healthcare claims… Ways to evaluate safer passwords…. Technical fixes for truly private browsing…</em> These are some of the ideas proposed by Georgia Tech students who will compete before a national panel of venture capitalists for cash in the inaugural “Demo Day Finale” on April 13, hosted by the Institute for Information Security &amp; Privacy.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="518341">
            <nid>518341</nid>
            <type>image</type>
            <title><![CDATA[Demo Day Spring '16]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>205200</fid>
                  <filename><![CDATA[security-poster-web.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/security-poster-web_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/security-poster-web_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Demo Day Spring '16]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="451391">
            <nid>451391</nid>
            <type>image</type>
            <title><![CDATA[IISP logo]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>203339</fid>
                  <filename><![CDATA[instituteforinformationsecurityprivacy-outline-black874.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[IISP logo]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[tlabouff@cc.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Tara La Bouff, 404.769.5408</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[<h4>&nbsp;April Special Events</h4><p>Other special events organized this month by the IISP include</p><p><strong>April 13: <a href="http://iisp.gatech.edu/events/spring-distinguished-lecture-latanya-arvette-sweeney" target="_blank">Capital One Distinguished Lecture</a> with Latanya Arvette Sweeney</strong> of Harvard University's Data Privacy Lab</p><p><strong>April 1 - 22: <a href="http://iisp.gatech.edu/cyber-lecture" target="_self">Cybersecurity Lecture Series</a></strong> featuring speakers from federal government, start-ups and the financial sector.</p>]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>3652</tid>
        <value><![CDATA[Demo Day]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
