GTCSS Research

Download full research papers, presentations, and audio from the 15th Annual Georgia Tech Cyber Security Summit, held Sept. 27, 2017 in Atlanta.

 

Panel


The Cyberlaw Podcast

Download or listen to an audio recording of the Summit's panel discussion, featuring Stewart A. Baker of Steptoe & Johnson LLP, Cristin Goodwin of Microsoft Corp., Chad Hunt of the Atlanta FBI, Robert Knake of The Council on Foreign Relations, Hannah Kuchler of the Financial Times, and Kim Zetter, investigative journalist and author.

 

Research Papers


A Lustrum of Malware Network Communication: Evolution and Insights

A Method for Finding Frequency-Modulated and Amplitude-Modulated Electromagnetic Emanations in Computer Systems

AVPASS: Leaking and Bypassing Antivirus Detection Models Automatically [PowerPoint]

Cloak & Dagger: From Two Permissions to Complete Control of the UI Feedback Loop

Data Attack Detection and Command Authentication via Cyber-Physical Co-Modeling

Hacking in Darkness: Return-oriented Programming Against Secure Enclaves

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse

Practical Attacks Against Graph-based Clustering

Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks

UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages

U.S. Surveillance Law, Safe Harbour and Reforms Since 2013

 
Available for purchase only via third-party

Internet Routing Registries, Data Governance, and Security

 

Presentation Slides


Untangling Attribution: Why It Has Failed and How It Should Be Done

Manos Antonakakis, Ph.D.
Associate Professor, School of Electrical & Computer Engineering, Georgia Tech

 

The Globalization of Criminal Evidence and the Importance of Attribution

Peter Swire, J.D.
Associate Director - Policy, Institute for Information Security & Privacy, Georgia Tech; Elizabeth & Tommy Holder Chair, Professor of Law and Ethics, Scheller College of Business; senior counsel, Alston & Bird LLP

 

A Lustrum of Malware Network Communication: Evolution and Insights

Chaz Lever
Ph.D. Candidate, School of Computer Science

 

When Combosquatting is the First Hook

Panagiotis Kintis
Ph.D. Candidate, School of Computer Science

 

Powering Insecurity: What to Do About Essential Infrastructure

David Formby, Ph.D.
Research Engineer, Georgia Tech