Title:
Protecting Computer Systems through Eliminating Vulnerabilities

dc.contributor.author Lee, Byoungyoung
dc.contributor.corporatename Georgia Institute of Technology. Institute for Information Security & Privacy en_US
dc.contributor.corporatename Georgia Institute of Technology. College of Computing en_US
dc.date.accessioned 2016-02-22T19:42:25Z
dc.date.available 2016-02-22T19:42:25Z
dc.date.issued 2016-01-29
dc.description Presented on January 29, 2016 at 12:00 in the Scheller College of Business, room 102, Georgia Tech. en_US
dc.description Byoungyoung Lee is a PhD Candidate in the Georgia Institute of Technology, College of Computing.
dc.description Runtime: 43:29 minutes
dc.description.abstract Many system components and network applications are written in unsafe programming languages that are prone to memory corruption vulnerabilities. To combat countless catastrophes from these vulnerabilities, there have been many defense research efforts. However, these were largely limited because their techniques focused on certain negative side effects from those vulnerabilities. As a result, there have been many unfortunate cases when security holes in these mitigation solutions are later uncovered, and significantly thwart the security of underlying systems. In this talk, I'll present a protection system which completely eliminates the root cause of those vulnerabilities. Specifically, I have targeted two popular and emerging vulnerabilities, use-after-free and bad-casting, each of which can be addressed with protection systems that I developed as a student at Georgia Tech: DangNull and caver, respectively. Since DangNull and caver directly fix the origin of such issues, they do not leave any security holes that attackers could abuse in the future. DangNull and caver have been recognized by both academia and industry for their highly practical impacts: Facebook and USENIX awarded the Internet Defense Prize, and CSAW awarded the "best applied security research paper." Meanwhile, Google and Mozilla deployed DangNull and Caver, respectively, in their development infrastructures. en_US
dc.description.sponsorship MailChimp en_US
dc.embargo.terms null en_US
dc.format.extent 43:29 minutes
dc.identifier.uri http://hdl.handle.net/1853/54538
dc.language.iso en_US en_US
dc.publisher Georgia Institute of Technology en_US
dc.relation.ispartofseries Cybersecurity Lecture Series
dc.subject Computer security en_US
dc.title Protecting Computer Systems through Eliminating Vulnerabilities en_US
dc.type Moving Image
dc.type.genre Lecture
dspace.entity.type Publication
local.contributor.corporatename School of Cybersecurity and Privacy
local.contributor.corporatename College of Computing
local.relation.ispartofseries Institute for Information Security & Privacy Cybersecurity Lecture Series
relation.isOrgUnitOfPublication f6d1765b-8d68-42f4-97a7-fe5e2e2aefdf
relation.isOrgUnitOfPublication c8892b3c-8db6-4b7b-a33a-1b67f7db2021
relation.isSeriesOfPublication 2b4a3c7a-f972-4a82-aeaa-818747ae18a7
Files
Original bundle
Now showing 1 - 3 of 3
No Thumbnail Available
Name:
lee.mp4
Size:
300.07 MB
Format:
MP4 Video file
Description:
Download Video
No Thumbnail Available
Name:
lee_videostream.html
Size:
985 B
Format:
Hypertext Markup Language
Description:
Streaming Video
No Thumbnail Available
Name:
Transcription.txt
Size:
31.93 KB
Format:
Plain Text
Description:
Transcription
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
3.13 KB
Format:
Item-specific license agreed upon to submission
Description:
Collections