Forensics and Attribution

Often the question of "who used it?" is just as salient as "who made it?" when dealing with attribution of malicious activity. Georgia Tech researchers are developing new techniques for forensic analysis and attribution to identify the sources of cyber espionage, cyber-attack, and cyber influence using malware code using Internet metadata and other system and network logs.

Lee headshot

Lee Lerner, Ph.D. 

Milton -headshot

Milton Mueller, Ph.D. 

Alessandro headshot

Alessandro Orso

Brendan headshot

Brendan Saltaformaggio, Ph.D.