<node id="597034">
  <nid>597034</nid>
  <type>news</type>
  <uid>
    <user id="34541"><![CDATA[34541]]></user>
  </uid>
  <created>1507295500</created>
  <changed>1507295770</changed>
  <title><![CDATA[SCS Students Kick-Off Cybersecurity Demo Day]]></title>
  <body><![CDATA[<p>Eleven School of Computer Science (SCS) students competed in phase one of Demo Day at Georgia Tech&rsquo;s <a href="http://cyber.gatech.edu/2017-cyber-security-summit">Cyber Security Summit</a> on September 27. Showcasing research posters, the 16 entrants were all vying for the chance to win up to $125,000 in startup funding, grants, and mentorship toward commercializing their work.</p>

<p>Although the Institute for Information Security &amp; Privacy hosts <a href="http://cyber.gatech.edu/cyber-demo-day">Demo Day</a> in the spring semester, the summit was the first opportunity for students to receive feedback on research from industry professionals and investors.</p>

<p>&ldquo;It&rsquo;s a good way to say involved in the cybersecurity community,&rdquo; said <a href="https://www.cc.gatech.edu/~snewman36/"><strong>Stacey Truex</strong></a>, a SCS Ph.D. student who competed with her project on privacy-preserving decision tree ensembles. &ldquo;You aren&rsquo;t going to accomplish anything just staring at your computer on your own.&rdquo;</p>

<p>Summit attendees voted on the most compelling projects, with the top three receiving $500 cash and immediate advancement to the spring competition. The <a href="http://www.iisp.gatech.edu/cybersecurity-demo-day-phase-1-results">winners</a> were <strong>Majid Ahmadi</strong>&rsquo;s <em>Tackling Cybersecurity Threats in Smart Grids</em>, <a href="http://www.internetgovernance.org/people/karim-farhat/"><strong>Karim Farhat</strong>&rsquo;s</a> <em>Internet of Things Security Management Dashboard</em>, and CS student <a href="https://tonytan.io/about/"><strong>Tony Zhaocheng Tan</strong></a>&rsquo;s <em>Phish or Fish: Tackling Phishing as a Usability Problem</em>.</p>

<p>The 16 other competitors can still advance to the final round if they attend six coaching sessions between now and April. Some SCS research highlights:</p>

<p>-<em>Privacy Preserving Deep Learning</em> by SCS Ph.D. student <a href="https://www.cc.gatech.edu/~lyu79/"><strong>Lei Yu</strong></a>: Deep learning has led to breakthroughs in AI from speech recognition to game playing &mdash; but by going through big data that often contain sensitive personal information. Yu&rsquo;s neural network model preserves data privacy by applying differential privacy techniques to training algorithms while stay maintaining accuracy.</p>

<p>-<em>RAIN: Redefinable Attack Investigation with On-Demand Inter-process Information Flow Tracking</em> by SCS Ph.D. student <a href="https://sites.google.com/site/yangji/"><strong>Yang Ji</strong></a>: Detecting advanced cyber attacks requires detailed and accurate investigation. The RAIN system is a precise and fine-grained way to analyze cybercrime because it goes down the instruction level while still maintaining runtime efficiency.</p>

<p>-<em>PrivacyZone: A High Performance and Light-Weight Location Privacy System in the Era of Internet of Things</em> by SCS Ph.D. student <a href="http://www.emreyigitoglu.com/"><strong>Emre Yigitoglu</strong></a>: &nbsp;Location data is sensitive and&nbsp;continuous location exposure opens the door for potential misuse such as&nbsp;inference about a user&rsquo;s medical conditions.&nbsp;For example, if a person visited the hospital a lot, location data could expose they might be ill. PrivacyZone provide a suite of algorithms for constructing personalized&nbsp;privacy zones and enforcing privacy&nbsp;protection for mobile users</p>

<p>-<em>Automating Open-Source Software Risk Management with OSSSanitizer</em>&nbsp;by SCS Ph.D. student&nbsp;<a href="https://www.cc.gatech.edu/~rduan9/"><strong>Ruian Duan</strong></a>: Open-source software eases development for thousands of mobile and desktop applications, but also increases security and legal risks. OSSSanitizer pulls open-source software together from public sources like GitHub or NVD and combs through for license violations or zero day vulnerabilities. The tool&rsquo;s unique hierarchical indexing makes it accurate and scalable.</p>

<p><strong>-</strong><em>Phish or Fish: Tackling Phishing as a Usability Problem</em> by undergraduate Tony Zhaocheng Tan: Phishing is often the start of many big breaches, like the Democratic National Convention hack. This project is working with the Office for Information Technology&nbsp;to prevent users from falling for phishing scams by replacing external links with an interstitial page containing site-specific information. This empowers users to make an informed decision about whether a website is safe to visit.</p>

<p>-<em>rtCaptcha: A Real-Time Captcha Based Liveness Detection System</em> by SCS Ph.D. <a href="https://www.scs.gatech.edu/content/erkam-uzun"><strong>Erkam Uzun</strong></a>: Facial and voice recognition are the future of security but can still be easy to evade using deep learning. rtCaptcha introduces the common screening feature of Captchas to this process, which stalls machines from breaching.</p>

<p>&nbsp;</p>

<p>&nbsp;</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2017-10-06T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Students competed in Demo Day to share their cybersecurity research.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="597039">
            <nid>597039</nid>
            <type>image</type>
            <title><![CDATA[Demo Day kick-off]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>227550</fid>
                  <filename><![CDATA[demodaycss17.JPG]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/demodaycss17.JPG]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/demodaycss17.JPG]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[An SCS student presents his Demo Day poster.]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[tess.malone@cc.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Tess Malone, Communications Offier</p>

<p><a href="mailto:tess.malone@cc.gatech.edu">tess.malone@cc.gatech.edu</a></p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computer Science]]></item>
      </og_groups_both>
  <field_keywords>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
