Come face to face with real solutions
Meet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.
The Cybersecurity Lecture Series at Georgia Tech is a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious. Students may register for credit under seminar course CS-8001-INF.
Inquire about speaking.
Sponsor the series.
Join us Fridays at Noon at Georgia Tech
Sign up to receive the Spring '18 schedule and future alerts.
Klaus Advanced Computing Building
Room KACB #2447
266 Ferst Drive
unless otherwise noted.
Next event: Jan. 19
Brendan Saltaformaggio, CyFi Lab, Georgia Tech
"Convicted by Memory: Recovering Spatial-Temporal Digital Evidence from Memory Images"
Memory forensics is becoming a crucial capability in modern cyber forensic investigations. In particular, memory forensics can reveal "up to the minute" evidence of a device's usage, often without requiring a suspect's password to unlock the device, and it is oblivious to any persistent storage encryption schemes. Prior to my work, researchers and investigators alike considered raw data-structure recovery the ultimate goal of memory forensics. This, however, was far from sufficient as investigators were still largely unable to understand the content of the recovered evidence; hence, unlocking the true potential of such evidence in memory images remained an open research challenge.
In this talk, I will focus on my research efforts which break from traditional data-recovery-oriented forensics and instead leverage program analysis to automatically locate, reconstruct, and render spatial-temporal evidence from memory images. I will describe the evolution of this work, starting with the reuse of binary program components to overcome the burden of recovering and understanding highly probative data structures, e.g., photos, chat contents, and edited documents. Then, shifting away from the recovery of data structures, I will introduce spatial-temporal evidence recovery, culminating in the instrumentation of program executions to recreate full sequences of previous smartphone app screens, all from only a single snapshot of a device's memory. Finally, to highlight the role of memory forensics in my overall research agenda, I will briefly present my ongoing and future work in integrated cyber/cyber-physical attack defense and forensics.
Jan. 26 - Kennon Bittick, CIPHER Lab, Georgia Tech Research Institute
Feb. 2 - Jerry Perullo, CISO, Intercontinental Exchange
Dave Levin, of the University of Maryland, presented "Revocations Are Dead. Long Live Revocations" on Jan. 12.
Energy & Cybersecurity
"Energy System Cybersecurity and Operational Reliability"
Sakis Meliopoulos, Institute for Information Security & Privacy
“Out of Control: the expanded attack surface of control systems” [Video]
Raheem Beyah, Georgia Tech School of Electrical & Computer Engineering
Internet & Infrastructure
"Multi-stakeholder Network Security Concerns" [Article]
Tony Tauber, Comcast
"Security and Privacy Issues of Modern Web Browsers" [Video]
Nick Nikiforakis, Stony Brook University
“The Domestic Benefits of Subversive Foreign Propaganda: The RT (Russia Today) News Network and Geopolitical Muckraking” [Video]
Hans Klein, Georgia Tech School of Public Policy
“What Can Social Science Contribute to Cybersecurity Attribution Research?”
Milton Mueller, Georgia Tech School of Public Policy
"What Constitutes an Act of War in Cyberspace?" [Video]
Holly Dragoo, CIPHER Laboratory, Georgia Tech Research Institute
Software, Systems & Hardware
"Why Memory Corruption is Hard" [Video]
Mathias Payer, Purdue University
"Can Trust Be Delivered As a Service?"
Margaret Loper, Institute for Information Security & Privacy
"Tracing the Arc of Smartphone Application Security" [Video]
Patrick McDaniel, professor and director, Institute for Network and Security Research, The Pennsylvania State University
Threat and Fraud Detection
"Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud" [Video]
Terry Nelms, Pindrop Security
“Modern Malware and Secure Techniques for Better Software” [Video]
Joel Odom, CIPHER Lab, Georgia Tech Research Institute
"Automatic Feature Engineering: Learning to Detect Malware by Mining the Scientific Literature" [Video]
Tudor Dumitras, assistant professor, University of Maryland