Cybersecurity Lecture Series

 

Come face to face with real solutions

Meet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.

The Cybersecurity Lecture Series at Georgia Tech is a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Lectures are open to all -- students, faculty, industry, government, or simply the curious. Students may register for credit under seminar course CS-8001-INF.

 

Join us Fridays at Noon from Jan. 13 - Apr. 21

Complimentary lunch provided for registered guests. Please bring your own beverage.

Sign up to receive future announcements or RSVP below.

Spring '17 Schedule

 

Apr. 21 @Noon

Klaus Advanced Computing Building
Room KACB #1116W
266 Ferst Drive, Atlanta

 

Featuring  James Plusquellic of University of New Mexico
 
"Hardware-Based Security and Trust For IoT and Supply Chain Authentication"

New hardware architectures for Internet-of-Things (IoT) are emerging rapidly in response to consumer demands for improved situational awareness, instant access to widely distributed sources of news and information and remote, hand-held control over their personal assets.  The most important component of IoT relates to authentication, i.e., confirming the identities of communicating entities, but weak 'password' forms of authentication continue to dominate the IoT landscape. This presentation discusses the challenges associated with authentication in IoT environments and emerging hardware-based solutions based on physical unclonable functions (PUFs). PUFs are capable of generating unique identifiers for each chip by leveraging small performance differences introduced by manufacturing process variations. PUFs are particularly attractive for IoT because they are lightweight, eliminate the need for secure non-volatile memory, and for a special class of so-called strong PUFs, are able to generate virtually an unlimited number of unique, reproducible bitstrings. I will describe recent results and carry out a hardware demonstration of a Hardware-Embedded delay PUF called HELP using a set Xilinx SoC chips.

 

Dr. Jim Plusquellic is a professor of electrical and computer engineering at the University of New Mexico, chief technology officer for Enthentica Inc., and president and chief executive officer for Trusted and Secure Systems. His research interests are in the area of nano-scale VLSI and include security and trust in IC hardware, embedded system design, supply chain and IoT security and trust, silicon validation, design for manufacturability and delay test methods.

Plusquellic received an "Outstanding Contribution Award" from IEEE Computer Society in 2012 for co-founding and for his contributions to the Symposium on Hardware-Oriented Security and Trust (HOST). He served as General Chair for HOST in 2010, for the Defect-Based Testing Workshop in 2006 and as Associate Editor for Transactions on Computers. He received the "10 Years of Continuous Service Award" from the International Test Conference, a Best Paper Award from VTS, an ACM Distinguished Service Award from SIGDA and two Austin CAS Fellow Awards from IBM. He received the "Albuquerque lab-to-business accelerator" award in 2016, the "2014 Innovation Award" from the Science and Technology Center at the University of New Mexico, was a "Featured Entrepreneur" within the School of Engineering and has multiple patents and provisional applications filed with the US. Patent and Trademark Office. Professor Plusquellic is serving or has served on the Program Committees for HOST, Design and Test in Europe, International Test Conference, International Conference on Computer-Aided Design and VLSI Test Symposium.

He received both his M.S. and Ph.D. degrees in computer science from the University of Pittsburgh in 1995 and 1997, respectively, and has published more than 70 refereed conference and journal papers. He is a Golden Core Member of the IEEE Computer Society and a member of the IEEE.

 

Recent Video

 

Missed a Cybersecurity Lecture? Video is available for speakers who permitted their presentations to be recorded.

Shan Chen, Georgia Tech, School of Computer Science
"Human Computing for Handling Strong Corruptions in Authenticated Key Exchange"
Mar. 10, 2017

 

Mattia Fazzini, Georgia Tech, School of Computer Science
"Tagging and Tracking of Multi-level Host Events for Transparent Computing"
Feb. 24, 2017

 

Arvind Narayanan, Princeton University
"Online Tracking: A 1-million-site Measurement and Analysis"
Jan. 20, 2017

 

Phani Vadrevu, University of Georgia
"Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots"
Jan. 27, 2017

Thank You to Our Spring '17 Speakers!

Alexander Degitz, Exchange Research Scholar, Georgia Tech
"Secure Data Outsourcing: Access Pattern Confidentiality in Outsourced Databases"

Arvind Narayanan, assistant professor of computer science, Princeton University
"Online Tracking: A 1-million-site Measurement and Analysis" [Video]

Phani Vadrevu, Ph.D. student, University of Georgia
NDSS'17 Conference Preview: "Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots" [Video]

Kangjie Lu, Ph.D. candidate, Georgia Tech, School of Computer Science
"Defeating Advanced Memory-Error Exploits by Preventing Information Leaks"

Yeongjin Jang, Ph.D. candidate, Georgia Tech, School of Computer Science
"Protecting Computing Systems from Emerging Attacks"

Tianxin Tang, Ph.D. student, Georgia Tech, School of Computer Science
"Keyless Fuzzy Search for Data-based Access Control"

Mattia Fazzini, Ph.D. student, Georgia Tech, School of Computer Science
"Tagging and Tracking of Multi-level Host Events for Transparent Computing" [Video]

Shan Chen, Ph.D. student, Georgia Tech, School of Computer Science
"Human Computing for Handling Strong Corruptions in Authenticated Key Exchange" [Video]

David Formby, Ph.D candidate, Georgia Tech, School of Electrical & Computer Engineering
"Out of Control: Ransomware for Industrial Control Systems" 

Bharat Srinivasan, Ph.D. student, Georgia Tech, School of Computer Science
"Exposing Cross-Channel Abuse in Converged Communications Infrastructure with Text-Messaging Scams"

Yanick Fratantonio, Ph.D. candidate, University of California, Santa Barbara
"Cloak & Dagger: From Two Android Permissions to Complete Control of the UI Feedback Loop"

Brandon Eames, technical lead, Sandia National Laboratories
"On Trust Analysis for Microelectronics-Based Systems"

Thank you to our Fall '16 Speakers!

Nicolas Christin, associate research professor, Carnegie Mellon University CyLab
"Security Analytics: Bridging large-scale data collection and analysis with human factors to design better defenses" [Video]

Terry Nelms, Pindrop
"Towards Measuring and Mitigating Social Engineering Software Download Attacks" [Video]

Curtis Walker, Draper Laboratory
"Myths of Computer Security"

Milos Prvulovic, professor, Georgia Tech School of Computer Science
"Understanding, Alleviating and Exploiting Electro-Magnetic Side-Channel Signals" [Video]

Yeongjin Jang, PhD student, Georgia Tech School of Computer Science
"Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX" [Video]

Frank Wang, PhD student, MIT & Cybersecurity Factory
"Cryptographically Enforced Access Control for User Data in Untrusted Clouds" [Presentation Slides[Video]

Yousef Iskander, hardware security researcher, and Dmitry Kuchynski, security principal, Cisco Security Group
"Managing Product Security and Integrity in a Global Supply Chain" [Video]

Malachi G. Jones, embedded security researcher, Booz Allen Dark Labs
"Automating Analysis and Exploitation of Embedded Device Firmware"  [Presentation Slides]

Michalis Polychronakis, assistant professor, Stony Brook University
"Defending against Advanced Return-Oriented Programming Attacks"  [Video]

Patrick Schaumont, professor, Virginia Tech
"Fault Injection as an Attack Vector Against Trustworthy Embedded Systems"  [Video]

Chris Smoak, division chief, GTRI Cyber Technology & Information Security Laboratory
"The Evolution of Modern Malware: Technology Trends and Motivations” [Video]

Jeff Reava, CISSP, CISM, CISA; director of information security operations, Jackson National Life Insurance Company
"Leveraging Information Symmetry and Asymmetry for Effective Cyber Defense”  [Presentation Slides]

Maria Konte, post-doctoral fellow, Georgia Tech School of Computer Science
“ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes” [Video]

Ling Liu, professor, Georgia Tech School of Computer Science
"The Evolution of Data Privacy: From Concept to Execution"

Thank you to our Spring '16 speakers!

Wenke Lee, professor, College of Computing
Stephen Pair, CEO, BitPay  [Video]
Frank Wang, coordinator, The Cybersecurity Factory  [Video]
Sivakumar "Siva" Raghupathy, director, CREATE-X
Adam Wenchel, VP for Security & Tech Analytics, Capital One  [Video]
Kyle Grossman and Jim Schwoebel, co-founders, CyberLaunch
John Corliss, senior computer scientist, U.S. Department of Homeland Security  [Video]
Tim Junio, co-founder and CEO, Qadium Inc.

And Graduate Students:

Byoungyoung Lee  [Video]
Kangjie Liu
David Formby
Chengyu Song
and Ren Ding  [Video]