Cybersecurity Lecture Series

 

Come face to face with real solutions

Meet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.

The Cybersecurity Lecture Series at Georgia Tech is a free, open-to-the-public, one-hour presentation offered each Friday, featuring thought leaders who are advancing the field of cybersecurity. Meet executives from Fortune 500 companies, researchers from federal intelligence agencies, as well as university faculty and students sharing their latest discoveries. Lectures are open to all -- students, faculty, industry, government, or simply the curious. Students may register for credit under seminar course CS-8001-INF.

 

The series resumed Aug. 24, 2018

 


Fall '18 Schedule

Now accepting registrations 

Nov. 30

"Forward Leaning - Reshaping and Rethinking Cyber R&D"
Kevin Greene
Principal Software Assurance Engineer, The MITRE Corporation
Klaus Advanced Computing Building
266 Ferst Drive NW, Atlanta, GA 30332

Nov. 16

"Practical Software Hardening Against Code Reuse Attacks"
Hyungjoon Koo
Ph.D. candidate, Stony Brook University
Klaus Advanced Computing Building
266 Ferst Drive NW, Atlanta, GA 30332

Nov. 9

"Cryptoeconomics.Study and a Plasma Primer"
Karl Floersch

Researcher, Ethereum Foundation
Klaus Advanced Computing Building
266 Ferst Drive NW, Atlanta, GA 30332

Nov. 2

"The Insider's View of a Data Breach - how policy, forensics, and attribution apply in the real world"
Todd McClelland

Partner

Marcus Nanotechnology Building
345 Ferst Dr. NW
Room 1117-1118
Atlanta, GA 30318

Oct. 26

"Triaging and Debugging Failures in Deployed Software by Reverse Execution"
Weidong Cui

Principal Researcher
Microsoft Research Redmond Lab

Engineered Biosystems Building (EBB)
950 Atlanta Drive NW
CHOA Room
Atlanta, GA 30332

Oct. 19

"The Implications of Privacy-Aware Choices"
Rachel Cummings, Ph.D.

Assistant Professor in the H. Milton Stewart School of Industrial and Systems Engineering
Georgia Tech

Engineered Biosystems Building (EBB)
950 Atlanta Drive NW
CHOA Room
Atlanta, GA 30332

Oct. 12

"Beyond Snowden: Cybersecurity, Privacy, and Mass Surveillance"
Timothy Edgar

Senior fellow in international and public affairs
Brown University

Centergy One Building
Hodges Room (3rd Floor)
75 5th Street
Atlanta, GA 30308

This week's lecture is being held in partnership with the Advanced Technology Development Center (ATDC), as part of Atlanta Cyber Week.

Oct. 5

"Cyber Simulation and Threat Assessment"
Ambrose Kam

Cyber simulation product manager
Lockheed Martin

Klaus Advanced Computing Building
266 Ferst Drive NW, Atlanta, GA 30332

Sept. 28

"Open Source Intelligence Applications in Cybersecurity"
Thomas Shields

Research Scientist
Georgia Institute of Technology

Engineered Biosystems Building (EBB)
Room #1005 - Children's Healthcare of Atlanta (CHOA) Room

950 Atlantic Drive NW, Atlanta, GA 30332

Sept. 21

"New Perspectives on Control-Flow Hijacking Mitigation"
Nathan Burrow

Post-doctoral researcher
Purdue University

Engineered Biosystems Building (EBB)
Room #1005 - Children's Healthcare of Atlanta (CHOA) Room

950 Atlantic Drive NW, Atlanta, GA 30332

Sept. 14

"Emulytics at Sandia: Emulation-based Modeling and Analysis of Computer Systems"
Kasimir Gabert

Sandia National Laboratories

Klaus Advanced Computing Building - Room 1116W
266 Ferst Drive NW, Atlanta, GA 30332

Sept. 7

"Security Along the SoC Lifecycle: Current Practices and Challenges Ahead"
Mark Tehranipoor
I
ntel Charles E. Young Preeminence Endowed Chair Professor in Cybersecurity
University of Florida

Klaus Advanced Computing Building
266 Ferst Drive NW, Atlanta, GA 30332

Aug. 31

"Social Cybersecurity"
Sauvik Das

A
ssistant professor, School of Interactive Computing
Georgia Tech

Klaus Advanced Computing Building
266 Ferst Drive NW, Atlanta, GA 30332

Aug. 24

"Proving Anything, Quickly, Privately, and Elegantly with Secure Computation"
Vladimir Kolesnikov

Assistant professor, School of Computer Science

Georgia Tech

More

More to be announced...

Past Lectures

 

Video and slides are available from speakers who permitted their presentations to be shared. Recordings are provided as a courtesy of the Georgia Tech Library System.

 

 

 

Thank You to Our Spring '18 Speakers

 
Authentication

"rtCaptcha: Video, Voice, and Smarts for Secure Authentication" [Video]
Erkam Uzun, School of Computer Science, Georgia Tech

 

Consumers & Privacy

"Clash of Cultures" Privacy and the Internet" [Video]
Ted Claypoole, Womble Bond Dickinson LLP

"Insight from an Alumnus"
Paul Everton, MailControl

 

Enterprise Security

"What Do CISOs Do All Day?" [Video]
Jerry Perullo, InterContinental Exchange, Inc.

"Enterprise Security at Georgia Tech" [Video]
Kyle Koza, Office of Information Technology, Georgia Tech

 

Forensics

"Convicted by Memory: Recovering Spatial-Temporal Digital Evidence from Memory Images" [Video]
Brendan Saltaformaggio, School of Electrical & Computer Engineering, Georgia Tech

 

Internet & Infrastructure

"Revocations Are Dead, Long Live Revocations" [Video]
Dave Levin, University of Maryland

"Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC"
Shan Chen, School of Computer Science, Georgia Tech

 

Software, Systems & Hardware

"I made the very model, but the model was too general: Modeling every cyber vegetable, animal, and mineral"
David Jakob Fritz, Sandia National Laboratories

 

Threat & Fraud Detection

"Automated In-memory Malware/rootkit Detection via Binary Analysis and Machine Learning" [Video]
Malachi Jones, Booz Allen Dark Labs

"Towards Measuring the Effectiveness of Telephony Blacklists" [Video]
Sharbani Pandit, School of Computer Science, Georgia Tech

"The Scalability of Vulnerability Analysis" [Video]
Kennon Bittick, CIPHER Lab, Georgia Tech Research Institute

"Hacking Data-Flow for Turing-Complete Attacks" [Video]
Hong Hu, School of Computer Science, Georgia Tech

 

Transportation

"Solving the Biggest Problems" [Video]
Joshua C. Sorenson, Delta Air Lines

 

Thank You to Our Fall '17 Speakers

 
Energy & Cybersecurity

"Energy System Cybersecurity and Operational Reliability"
Sakis Meliopoulos, Institute for Information Security & Privacy

“Out of Control: the expanded attack surface of control systems” [Video]
Raheem Beyah, Georgia Tech School of Electrical & Computer Engineering

 

Internet & Infrastructure

"Multi-stakeholder Network Security Concerns" [Article]
Tony Tauber, Comcast

"Security and Privacy Issues of Modern Web Browsers" [Video]
Nick Nikiforakis, Stony Brook University

 

Public Policy

“The Domestic Benefits of Subversive Foreign Propaganda: The RT (Russia Today) News Network and Geopolitical Muckraking” [Video]
Hans Klein, Georgia Tech School of Public Policy

“The Non-Code Aspects of Cybersecurity and the Globalization of Criminal Evidence” [Slides] [Video]
Peter Swire, Institute for Information Security & Privacy

“What Can Social Science Contribute to Cybersecurity Attribution Research?”
Milton Mueller, Georgia Tech School of Public Policy

"What Constitutes an Act of War in Cyberspace?" [Video]
Holly Dragoo, CIPHER Laboratory, Georgia Tech Research Institute

 

Software, Systems & Hardware

"Why Memory Corruption is Hard" [Video]
Mathias Payer, Purdue University

"Can Trust Be Delivered As a Service?"
Margaret Loper, Institute for Information Security & Privacy

"Tracing the Arc of Smartphone Application Security" [Video]
Patrick McDaniel, professor and director, Institute for Network and Security Research, The Pennsylvania State University

 

Threat and Fraud Detection

"Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud" [Video]
Terry Nelms, Pindrop Security

“Modern Malware and Secure Techniques for Better Software” [Video]
Joel Odom, CIPHER Lab, Georgia Tech Research Institute

"Automatic Feature Engineering: Learning to Detect Malware by Mining the Scientific Literature" [Video]
Tudor Dumitras, assistant professor, University of Maryland

 

Thank You to Our Spring '17 Speakers

Alexander Degitz, Exchange Research Scholar, Georgia Tech
"Secure Data Outsourcing: Access Pattern Confidentiality in Outsourced Databases"

Arvind Narayanan, assistant professor of computer science, Princeton University
"Online Tracking: A 1-million-site Measurement and Analysis" [Video]

Phani Vadrevu, Ph.D. student, University of Georgia
NDSS'17 Conference Preview: "Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots" [Video]

Kangjie Lu, Ph.D. candidate, Georgia Tech, School of Computer Science
"Defeating Advanced Memory-Error Exploits by Preventing Information Leaks"

Yeongjin Jang, Ph.D. candidate, Georgia Tech, School of Computer Science
"Protecting Computing Systems from Emerging Attacks"

Tianxin Tang, Ph.D. student, Georgia Tech, School of Computer Science
"Keyless Fuzzy Search for Data-based Access Control"

Mattia Fazzini, Ph.D. student, Georgia Tech, School of Computer Science
"Tagging and Tracking of Multi-level Host Events for Transparent Computing" [Video]

Shan Chen, Ph.D. student, Georgia Tech, School of Computer Science
"Human Computing for Handling Strong Corruptions in Authenticated Key Exchange" [Video]

David Formby, Ph.D candidate, Georgia Tech, School of Electrical & Computer Engineering
"Out of Control: Ransomware for Industrial Control Systems" 

Bharat Srinivasan, Ph.D. student, Georgia Tech, School of Computer Science
"Exposing Cross-Channel Abuse in Converged Communications Infrastructure with Text-Messaging Scams" [Video]

Yanick Fratantonio, Ph.D. candidate, University of California, Santa Barbara
"Cloak & Dagger: From Two Android Permissions to Complete Control of the UI Feedback Loop"

Brandon Eames, technical lead, Sandia National Laboratories
"On Trust Analysis for Microelectronics-Based Systems"

James Plusquellic, professor of electrical engineering, University of New Mexico
"Hardware-Based Security and Trust For IoT and Supply Chain Authentication" [Video]

Thank you to our Fall '16 Speakers

Nicolas Christin, associate research professor, Carnegie Mellon University CyLab
"Security Analytics: Bridging large-scale data collection and analysis with human factors to design better defenses" [Video]

Terry Nelms, Pindrop
"Towards Measuring and Mitigating Social Engineering Software Download Attacks" [Video]

Curtis Walker, Draper Laboratory
"Myths of Computer Security"

Milos Prvulovic, professor, Georgia Tech School of Computer Science
"Understanding, Alleviating and Exploiting Electro-Magnetic Side-Channel Signals" [Video]

Yeongjin Jang, PhD student, Georgia Tech School of Computer Science
"Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX" [Video]

Frank Wang, PhD student, MIT & Cybersecurity Factory
"Cryptographically Enforced Access Control for User Data in Untrusted Clouds" [Presentation Slides[Video]

Yousef Iskander, hardware security researcher, and Dmitry Kuchynski, security principal, Cisco Security Group
"Managing Product Security and Integrity in a Global Supply Chain" [Video]

Malachi G. Jones, embedded security researcher, Booz Allen Dark Labs
"Automating Analysis and Exploitation of Embedded Device Firmware"  [Presentation Slides]

Michalis Polychronakis, assistant professor, Stony Brook University
"Defending against Advanced Return-Oriented Programming Attacks"  [Video]

Patrick Schaumont, professor, Virginia Tech
"Fault Injection as an Attack Vector Against Trustworthy Embedded Systems"  [Video]

Chris Smoak, division chief, GTRI Cyber Technology & Information Security Laboratory
"The Evolution of Modern Malware: Technology Trends and Motivations” [Video]

Jeff Reava, CISSP, CISM, CISA; director of information security operations, Jackson National Life Insurance Company
"Leveraging Information Symmetry and Asymmetry for Effective Cyber Defense”  [Presentation Slides]

Maria Konte, post-doctoral fellow, Georgia Tech School of Computer Science
“ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes” [Video]

Ling Liu, professor, Georgia Tech School of Computer Science
"The Evolution of Data Privacy: From Concept to Execution"

Thank you to our Spring '16 speakers

Wenke Lee, professor, College of Computing
Stephen Pair, CEO, BitPay  [Video]
Frank Wang, coordinator, The Cybersecurity Factory  [Video]
Sivakumar "Siva" Raghupathy, director, CREATE-X
Adam Wenchel, VP for Security & Tech Analytics, Capital One  [Video]
Kyle Grossman and Jim Schwoebel, co-founders, CyberLaunch
John Corliss, senior computer scientist, U.S. Department of Homeland Security  [Video]
Tim Junio, co-founder and CEO, Qadium Inc.

And Graduate Students:

Byoungyoung Lee  [Video]
Kangjie Liu
David Formby
Chengyu Song
and Ren Ding  [Video]