GTCSS Research

Download full research papers, presentations, and audio from the 15th Annual Georgia Tech Cyber Security Summit, held Sept. 27, 2017 in Atlanta.



The Cyberlaw Podcast

Download or listen to an audio recording of the Summit's panel discussion, featuring Stewart A. Baker of Steptoe & Johnson LLP, Cristin Goodwin of Microsoft Corp., Chad Hunt of the Atlanta FBI, Robert Knake of The Council on Foreign Relations, Hannah Kuchler of the Financial Times, and Kim Zetter, investigative journalist and author.


Research Papers

A Lustrum of Malware Network Communication: Evolution and Insights

A Method for Finding Frequency-Modulated and Amplitude-Modulated Electromagnetic Emanations in Computer Systems

AVPASS: Leaking and Bypassing Antivirus Detection Models Automatically [PowerPoint]

Cloak & Dagger: From Two Permissions to Complete Control of the UI Feedback Loop

Data Attack Detection and Command Authentication via Cyber-Physical Co-Modeling

Hacking in Darkness: Return-oriented Programming Against Secure Enclaves

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse

Practical Attacks Against Graph-based Clustering

Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks

UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages

U.S. Surveillance Law, Safe Harbour and Reforms Since 2013

Available for purchase only via third-party

Internet Routing Registries, Data Governance, and Security


Presentation Slides

Untangling Attribution: Why It Has Failed and How It Should Be Done

Manos Antonakakis, Ph.D.
Associate Professor, School of Electrical & Computer Engineering, Georgia Tech


The Globalization of Criminal Evidence and the Importance of Attribution

Peter Swire, J.D.
Associate Director - Policy, Institute for Information Security & Privacy, Georgia Tech; Elizabeth & Tommy Holder Chair, Professor of Law and Ethics, Scheller College of Business; senior counsel, Alston & Bird LLP


A Lustrum of Malware Network Communication: Evolution and Insights

Chaz Lever
Ph.D. Candidate, School of Computer Science


When Combosquatting is the First Hook

Panagiotis Kintis
Ph.D. Candidate, School of Computer Science


Powering Insecurity: What to Do About Essential Infrastructure

David Formby, Ph.D.
Research Engineer, Georgia Tech