{"604912":{"#nid":"604912","#data":{"type":"news","title":"Students Compete for $125,000 in Funding for Cutting-Edge Cybersecurity Projects","body":[{"value":"\u003Cp\u003EFrom phishing scams to forensic cyberattack software, the next big security breakthrough will debut at the \u003Ca href=\u0022http:\/\/cyber.gatech.edu\/cyber-demo-day\u0022\u003ECybersecurity Demo Day Finale\u003C\/a\u003E on April 12.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ELast fall, Georgia Tech students brought ideas on the cutting-edge of cybersecurity research to the\u003Ca href=\u0022https:\/\/www.scs.gatech.edu\/news\/597034\/scs-students-kick-cybersecurity-demo-day\u0022\u003E Georgia Tech Cybersecurity Summit\u003C\/a\u003E. The most promising teams continued in the competition with entrepreneurial coaching from \u003Ca href=\u0022http:\/\/venturelab.gatech.edu\/\u0022\u003EVentureLab\u003C\/a\u003E.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ENow the top five Georgia Tech student teams will present their projects with a TED-esque talk in front of business leaders like entrepreneur \u003Cstrong\u003E\u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/people\/christopher-w-klaus\u0022\u003EChristopher Klaus\u003C\/a\u003E\u003C\/strong\u003E,\u003Cstrong\u003E\u0026nbsp;\u003C\/strong\u003Emanaging partner for Tech Square Ventures\u003Cstrong\u003E \u003Ca href=\u0022https:\/\/techsquareventures.com\/meet-the-team\/#member-58\u0022\u003EBlake Patton\u003C\/a\u003E\u003C\/strong\u003E, and\u0026nbsp;vice president of strategy and product design at IBM Security \u003Cstrong\u003E\u003Ca href=\u0022https:\/\/securityintelligence.com\/author\/kevin-skapinetz\/\u0022\u003EKevin Skapinetz\u003C\/a\u003E\u003C\/strong\u003E. These teams are competing for $125,000 prize pool that includes: $5,000 cash, a spot in the \u003Ca href=\u0022http:\/\/create-x.gatech.edu\/\u0022\u003ECreate-X\u003C\/a\u003E Startup LAUNCH incubator \u0026ndash;\u0026nbsp; with $20,000 toward a prototype, $50,000 in legal services, and 27-weeks of free business mentoring \u0026ndash; and eligibility for a $50,000 grant from the National Science Foundation.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EWe sat down the four School of Computer Science teams to learn more about their projects and what they hope to achieve at Demo Day.\u003C\/p\u003E\r\n\r\n\u003Ch2\u003E\u003Cstrong\u003E\u0026quot;Phish or Fish\u0026quot;\u003C\/strong\u003E\u003C\/h2\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022https:\/\/tonytan.io\/\u0022\u003E\u003Cstrong\u003ETony Zhaocheng Tan\u003C\/strong\u003E\u003C\/a\u003E, with\u003Cstrong\u003E Anisha Bandihari\u003C\/strong\u003E and \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/people\/pak-ho-simon-chung\u0022\u003E\u003Cstrong\u003ESimon Chung\u003C\/strong\u003E\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EWhat is your project?\u003C\/strong\u003E\u003Cbr \/\u003E\r\nPhishing, where an attacker sends an email under false pretenses to trick users into giving up their passwords, is the first step in many high-profile cyberattacks, such as the Democratic National Convention hack of 2016. Currently, the industry solution is to train users to hover over links and identify suspicious messages and websites. When this tedious and ineffective solution inevitably fails, users are often blamed for the fallout.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn this project, we propose to mitigate phishing by providing users with a more effective and usable interface. When a user clicks on an unknown link in an email, we automatically present them with a page that displays succinct and necessary information to help the user to make the right decision. By making critical security information easily accessible, but only when necessary, we can draw attention to anomalies and avoid user fatigue that often plagues typical security software.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EWhat made you interested in entering Demo Day?\u003C\/strong\u003E\u003Cbr \/\u003E\r\nWe entered Demo Day primarily to showcase our project and invite feedback from the public and industry.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EIf you win Demo Day, what would you do with the funds?\u003C\/strong\u003E\u003Cbr \/\u003E\r\nIf we win Demo Day, we plan to use new resources to continue the development of our project in furtherance of cybersecurity.\u003C\/p\u003E\r\n\r\n\u003Ch2\u003E\u0026quot;\u003Ca href=\u0022https:\/\/www.scs.gatech.edu\/news\/602606\/real-time-captcha-technique-improves-biometric-authentication\u0022\u003ErtCaptcha\u003C\/a\u003E\u0026quot;\u003C\/h2\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022https:\/\/www.scs.gatech.edu\/content\/erkam-uzun\u0022\u003E\u003Cstrong\u003EErkam Uzun\u003C\/strong\u003E\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EWhat is your project?\u003C\/strong\u003E\u003Cbr \/\u003E\r\nToday, there is a new trend in replacing passwords with biometric authentication, and it seems it will be used widely in the future since it is easy to adopt. Major companies (e.g., Uber, Alipay and Mastercard) are using these services for biometric authentication. In our research, we found that many third-party, cloud-based services are providing audio and facial authentication to other large organizations, but their methods are prone to primitive spoofing attacks. The common mistake of current systems is that they still use simple challenges, such as smiling and blinking to prevent spoofing attacks. Any system that uses a fixed challenge like that is not secure. The challenge should always be randomized.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EWe are making the challenge harder by sending unpredictable requests in a Captcha image form and limiting the response time in order to rule out manipulation. The response time is a normal human response\/reflex time to start reading a text when presented one. In our user study, the overall response time of the participants is less than a second (we fix this time to two seconds to eliminate false rejections).\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn this way, rtCaptcha strengthens the computational challenge by forcing adversaries to figure out what the authentication tasks are and quickly combine them by synchronizing the voice, face, and personal knowledge of an individual in a way that appears lifelike. We force attackers to show, share, and say what only an individual could know \u0026nbsp;\u0026ndash; and do that in less than two seconds.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EWhat made you interested in entering in Demo Day?\u003C\/strong\u003E\u003Cbr \/\u003E\r\nWe want to improve and commercialize rtCaptcha and reach to companies that are using or have potential to use audio\/visual authentication.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EIf you win Demo Day, what would you do with the funds?\u003C\/strong\u003E\u003Cbr \/\u003E\r\nWe will possibly use the funds to advertise our technology. A spot in the Create-X Startup LAUNCH incubator is a great advantage to improve our technology by getting mentoring services from real business experts.\u003C\/p\u003E\r\n\r\n\u003Ch2\u003E\u0026quot;\u003Ca href=\u0022https:\/\/www.scs.gatech.edu\/news\/598310\/georgia-tech-researchers-introduce-osspolice-find-oss-vulnerabilities-and-license\u0022\u003EOSS Police\u003C\/a\u003E\u0026quot;\u003C\/h2\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/ashish-bijlani-7a59472\/\u0022\u003EAshish Bijlani\u003C\/a\u003E, \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/~rduan9\/\u0022\u003ERuian Duan\u003C\/a\u003E, \u003C\/strong\u003Eand\u003Cstrong\u003E \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/~mxu80\/\u0022\u003EMeng Xu\u003C\/a\u003E\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EWhat is your project?\u003C\/strong\u003E\u003Cbr \/\u003E\r\nWe are building a cloud-based audit platform for businesses that offers software under dual free\/commercial licenses terms. This system quickly detects mobile apps violating a businesses\u0026rsquo; licensing terms and creating new customers. Multiple companies have already expressed interest in using the technology.\u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n\u003Cstrong\u003EWhat made you interested in entering in Demo Day?\u003C\/strong\u003E\u003Cbr \/\u003E\r\nWe see Demo Day as a great opportunity to present our technology, share progress, and get valuable feedback. It will help us to be seen under a spotlight. We are very excited about it.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cbr \/\u003E\r\n\u003Cstrong\u003EIf you win Demo Day, what would you do with the funds?\u003C\/strong\u003E\u003Cbr \/\u003E\r\nWe plan to invest the funds to further our engineering and customer discovery process.\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Ch2\u003E\u0026quot;\u003Ca href=\u0022http:\/\/www.scs.gatech.edu\/news\/598030\/instant-replay-computer-systems-shows-cyber-attack-details\u0022\u003ERAIN: Refinable Attack Investigation with On-demand Inter-process Information Flow Tracking\u003C\/a\u003E\u0026quot;\u003C\/h2\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Ca href=\u0022https:\/\/sites.google.com\/site\/yangji\/\u0022\u003EYang Ji\u003C\/a\u003E\u003C\/strong\u003E,\u003Cstrong\u003E \u003C\/strong\u003Ewith\u003Cstrong\u003E \u003Ca href=\u0022https:\/\/www.scs.gatech.edu\/content\/evan-downing\u0022\u003EEvan Downing\u003C\/a\u003E\u003C\/strong\u003E,\u003Cstrong\u003E \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/~mfazzini\/\u0022\u003EMattia Fazzini\u003C\/a\u003E\u003C\/strong\u003E,\u003Cstrong\u003E \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/~slee3036\/\u0022\u003ESangho Lee\u003C\/a\u003E\u003C\/strong\u003E,\u003Cstrong\u003E \u003C\/strong\u003Eand\u003Cstrong\u003E \u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/weirenwang\/\u0022\u003EWeiren Wang\u003C\/a\u003E\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EWhat is your project?\u003C\/strong\u003E\u003Cbr \/\u003E\r\nRAIN pushes the granularity of cyber forensic analysis to a new level. It is able to reproduce any previous program state to recover the data causal relations at the lowest instruction level. Notably, RAIN incurs a low runtime overhead (less than 5 percent) to the program by using a record replay technique. We believe RAIN can help improve the analysis accuracy of many data breach incidents, such as Equifax and Yahoo!, by reporting which piece of data were exactly leaked without false positive.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EWhat made you interested in entering in Demo Day?\u003C\/strong\u003E\u003Cbr \/\u003E\r\nDemo Day is a great platform for us to showcase recent research results to other interested people such as peer researchers and industries. It builds a channel for us to receive feedback to further improve our work. Also, it gives us a chance to earn more support to future research.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EIf you win Demo Day, what would you do with the funds?\u003C\/strong\u003E\u003Cbr \/\u003E\r\nWe would like to extend the current prototype to a full commercial level and try deploying it in real systems.\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"The Cybersecurity Demo Day Finale is April 12."}],"uid":"34541","created_gmt":"2018-04-10 16:39:59","changed_gmt":"2018-04-10 17:03:06","author":"Tess Malone","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2018-04-10T00:00:00-04:00","iso_date":"2018-04-10T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"604913":{"id":"604913","type":"image","title":"Demo Day OSS","body":null,"created":"1523378796","gmt_created":"2018-04-10 16:46:36","changed":"1523378796","gmt_changed":"2018-04-10 16:46:36","alt":"Demo Day presentation","file":{"fid":"230624","name":"cyber_demo_day-105.jpg","image_path":"\/sites\/default\/files\/images\/cyber_demo_day-105.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/cyber_demo_day-105.jpg","mime":"image\/jpeg","size":570177,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cyber_demo_day-105.jpg?itok=yHJbuMPq"}}},"media_ids":["604913"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETess Malone, Communications Officer\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022mailto:tess.malone@cc.gatech.edu\u0022\u003Etess.malone@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":["tess.malone@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}