Title:
Protecting Computer Systems through Eliminating Vulnerabilities
Protecting Computer Systems through Eliminating Vulnerabilities
dc.contributor.author | Lee, Byoungyoung | |
dc.contributor.corporatename | Georgia Institute of Technology. Institute for Information Security & Privacy | en_US |
dc.contributor.corporatename | Georgia Institute of Technology. College of Computing | en_US |
dc.date.accessioned | 2016-02-22T19:42:25Z | |
dc.date.available | 2016-02-22T19:42:25Z | |
dc.date.issued | 2016-01-29 | |
dc.description | Presented on January 29, 2016 at 12:00 in the Scheller College of Business, room 102, Georgia Tech. | en_US |
dc.description | Byoungyoung Lee is a PhD Candidate in the Georgia Institute of Technology, College of Computing. | |
dc.description | Runtime: 43:29 minutes | |
dc.description.abstract | Many system components and network applications are written in unsafe programming languages that are prone to memory corruption vulnerabilities. To combat countless catastrophes from these vulnerabilities, there have been many defense research efforts. However, these were largely limited because their techniques focused on certain negative side effects from those vulnerabilities. As a result, there have been many unfortunate cases when security holes in these mitigation solutions are later uncovered, and significantly thwart the security of underlying systems. In this talk, I'll present a protection system which completely eliminates the root cause of those vulnerabilities. Specifically, I have targeted two popular and emerging vulnerabilities, use-after-free and bad-casting, each of which can be addressed with protection systems that I developed as a student at Georgia Tech: DangNull and caver, respectively. Since DangNull and caver directly fix the origin of such issues, they do not leave any security holes that attackers could abuse in the future. DangNull and caver have been recognized by both academia and industry for their highly practical impacts: Facebook and USENIX awarded the Internet Defense Prize, and CSAW awarded the "best applied security research paper." Meanwhile, Google and Mozilla deployed DangNull and Caver, respectively, in their development infrastructures. | en_US |
dc.description.sponsorship | MailChimp | en_US |
dc.embargo.terms | null | en_US |
dc.format.extent | 43:29 minutes | |
dc.identifier.uri | http://hdl.handle.net/1853/54538 | |
dc.language.iso | en_US | en_US |
dc.publisher | Georgia Institute of Technology | en_US |
dc.relation.ispartofseries | Cybersecurity Lecture Series | |
dc.subject | Computer security | en_US |
dc.title | Protecting Computer Systems through Eliminating Vulnerabilities | en_US |
dc.type | Moving Image | |
dc.type.genre | Lecture | |
dspace.entity.type | Publication | |
local.contributor.corporatename | School of Cybersecurity and Privacy | |
local.contributor.corporatename | College of Computing | |
local.relation.ispartofseries | Institute for Information Security & Privacy Cybersecurity Lecture Series | |
relation.isOrgUnitOfPublication | f6d1765b-8d68-42f4-97a7-fe5e2e2aefdf | |
relation.isOrgUnitOfPublication | c8892b3c-8db6-4b7b-a33a-1b67f7db2021 | |
relation.isSeriesOfPublication | 2b4a3c7a-f972-4a82-aeaa-818747ae18a7 |
Files
Original bundle
1 - 3 of 3
No Thumbnail Available
- Name:
- lee.mp4
- Size:
- 300.07 MB
- Format:
- MP4 Video file
- Description:
- Download Video
No Thumbnail Available
- Name:
- lee_videostream.html
- Size:
- 985 B
- Format:
- Hypertext Markup Language
- Description:
- Streaming Video
No Thumbnail Available
- Name:
- Transcription.txt
- Size:
- 31.93 KB
- Format:
- Plain Text
- Description:
- Transcription
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 3.13 KB
- Format:
- Item-specific license agreed upon to submission
- Description: