<node id="592306">
  <nid>592306</nid>
  <type>news</type>
  <uid>
    <user id="32045"><![CDATA[32045]]></user>
  </uid>
  <created>1496324493</created>
  <changed>1496325043</changed>
  <title><![CDATA[Paper Earns Accolades from Security and Privacy Research Community]]></title>
  <body><![CDATA[<p>A research paper from Georgia Tech revealing new Android security vulnerabilities recently earned a prestigious award at the <a href="https://www.ieee-security.org/TC/SP2017/">38th IEEE Symposium on Security and Privacy&nbsp;</a>&ndash;&nbsp;a top-tier academic conference &ndash; held May 22-24 in San Jose, Calif.</p>

<p>Although all 60 papers accepted by the conference were considered for the recognition,<em> Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop</em> was singled out as the event&rsquo;s 2017 distinguished practical paper.</p>

<p>The paper&rsquo;s lead author is <strong>Yanick Fratantonio</strong>, a Georgia Tech Ph.D. summer intern from the University of California Santa Barbara. Co-authors include Georgia Tech School of Computer Science Ph.D. student <strong>Chenxiong Qian</strong>, research scientist <strong>Simon Chung</strong>, and <a href="http://www.scs.gatech.edu/people/11062/wenke-lees"><strong>Wenke Lee</strong></a>, a professor in Georgia Tech&rsquo;s&nbsp;<a href="http://www.scs.gatech.edu/">School of Computer Science</a>&nbsp;and co-director of the&nbsp;<a href="http://www.iisp.gatech.edu/">Institute for Information Security &amp; Privacy</a> (IISP).</p>

<p>&ldquo;This award, which is given by our fellow researchers in security and privacy, underscores the important work IISP is doing to identify, resolve, and prevent real-world security risks that can adversely impact millions of people,&rdquo; said Lee.</p>

<p>Along with earning industry accolades, the Georgia Tech paper detailing previously unknown threats to Android users has also attracted media attention. Coverage includes bylined articles published by <a href="http://www.newsweek.com/cloak-dagger-malware-android-hack-security-cyber-617448">Newsweek</a>, <a href="http://mashable.com/2017/05/26/cloak-and-dagger/#VEXLD5j47aqm">Mashable</a>, <a href="https://www.engadget.com/2017/05/25/android-hack-cloak-dagger-secret-layers-google/">Engadget</a>, and the <a href="http://www.ibtimes.com/android-malware-cloak-dagger-attack-can-secretly-record-user-activity-2543884">International Business Times</a>.</p>

<p>The paper was one of four from Georgia Tech authors accepted to the conference.</p>

<p><a href="http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm">According to independent research</a> by Georgia Tech alumnus Guofei Gu, a professor at Texas A&amp;M University, the IEE Security and Privacy Symposium has one of the lowest acceptance rates of peer-reviewed work with just 13.3 percent of all submissions being accepted for presentation in 2016.</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2017-06-01T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[A paper identifying a new security vulnerability in the Android operating system has earned a significant industry award.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="592308">
            <nid>592308</nid>
            <type>image</type>
            <title><![CDATA[IEEE SSP paper award]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>225732</fid>
                  <filename><![CDATA[IEEE SSP paper award_.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/IEEE%20SSP%20paper%20award_.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/IEEE%20SSP%20paper%20award_.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[albert.snedeker@cc.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Albert Snedeker, Communications Manager</p>

<p>404-894-7253</p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
          <item>430601</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>430601</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
          <item><![CDATA[School of Computer Science]]></item>
      </og_groups_both>
  <field_keywords>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
