Cybersecurity Lecture Series - Jan. 29

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
  • Date/Time:
    • Friday January 29, 2016 - Saturday January 30, 2016
      11:00 am - 11:59 am
  • Location: Scheller College of Business, Room 102, 800 W Peachtree NW, Atlanta 30308
  • Phone:
  • URL: http://map.gatech.edu/
  • Email: info@iisp.gatech.edu
  • Fee(s):
    $0.00
  • Extras:
Contact
No contact information submitted.
Summaries

Summary Sentence: Anyone interested in cybersecurity intelligence and skill development is invited to a free lecture series, held each Friday at Georgia Tech.

Full Summary: No summary paragraph submitted.

Media
  • IISP logo IISP logo
    (image/jpeg)

Meet academic and industry leaders for intimate discussions about new threats, trends and technologies. Preview new cybersecurity research ahead of international conferences. Hear from exceptional Georgia Tech students about their body of work.

 

Jan. 29  Guest Speaker

Byoungyoung Lee
PhD Candidate, College of Computing


PhD Candidate Byoungyoung Lee presents a summary of cybersecurity research results and accomplishments while at Georgia Tech.

Abstract: Many system components and network applications are written in unsafe programming languages that are prone to memory corruption vulnerabilities. To combat countless catastrophes from these vulnerabilities, there have been many defense research efforts. However, these were largely limited because their techniques focused on certain negative side effects from those vulnerabilities. As a result, there have been many unfortunate cases when security holes in these mitigation solutions are later uncovered, and significantly thwart the security of underlying systems. In this talk, I'll present a protection system which completely eliminates the root cause of those vulnerabilities. Specifically, I have targeted two popular and emerging vulnerabilities, use-after-free and bad-casting, each of which can be addressed with protection systems that I developed as a student at Georgia Tech: DangNull and CaVer, respectively. Since DangNull and CaVer directly fix the origin of such issues, they do not leave any security holes that attackers could abuse in the future.
DangNull and CaVer have been recognized by both academia and industry for their highly practical impacts: Facebook and USENIX awarded the Internet Defense Prize, and CSAW awarded the "best applied security research paper." Meanwhile, Google and Mozilla deployed DangNull and CaVer, respectively, in their development infrastructures.

Lunch provided. No registration necessary.

Spring 2016 Schedule
Jan. 15 — Opening discussion
Jan. 22 — Milos Prvulovic
Jan. 29 — PhD Candidate - Byoungyoung Lee
Feb. 5 — TBD
Feb. 12 — TBD
Feb. 19 — NDSS Conference Preview -  Chengyu Song, Wei Meng
Feb. 26 — Stephen Pair, co-founder and CEO, BitPay
Mar. 4 — Frank Wang, coordinator, The Cybersecurity Factory
Mar. 11 – David Formby, Xiaojing Liao
Mar. 18 – TBD
Mar. 25 – Spring Break
Apr. 1 – TBD
Apr. 8 – TBD
Apr. 15 – TBD
Apr. 22 – Closing session

Sponsored by MailChimp

Additional Information

In Campus Calendar
Yes
Groups

College of Computing, School of Computer Science, College of Computing Events, Institute for Information Security and Privacy

Invited Audience
Undergraduate students, Faculty/Staff, Public, Graduate students
Categories
Seminar/Lecture/Colloquium
Keywords
Cybersecurity, Institute for Information Security & Privacy
Status
  • Created By: Tara La Bouff
  • Workflow Status: Published
  • Created On: Jan 11, 2016 - 4:17pm
  • Last Updated: Apr 13, 2017 - 5:17pm