Title:
GT Cybersecurity Students Preview Research Appearing at ACM Computer and Communications Security Conference (CCS) 1) Jonathan Fuller: c3pO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration 2) Sena Sahin: Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication 3) Carter Yagemann: Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis

dc.contributor.author Fuller, Jonathan
dc.contributor.author Sahin, Sena
dc.contributor.author Yagemann, Carter
dc.contributor.corporatename Georgia Institute of Technology. Institute for Information Security & Privacy en_US
dc.contributor.corporatename Georgia Institute of Technology. School of Electrical and Computer Engineering en_US
dc.contributor.corporatename Georgia Institute of Technology. School of Cybersecurity and Privacy en_US
dc.date.accessioned 2021-11-18T15:53:38Z
dc.date.available 2021-11-18T15:53:38Z
dc.date.issued 2021-10-22
dc.description Presented in-person and onlne via Bluejeans Events on October 22, 2021 at 12:30 p.m in the CODA 9th floor atrium. en_US
dc.description Jonathan Fuller is a Ph.D. Student in the School of Electrical and Computer Engineering (ECE) at the Georgia Institute of Technology, advised by Dr. Brendan Saltaformaagio in the Cyber Forensics Innovation (CyFi) Lab. My research interests lie in cyber attack forensics, web and IoT security, and malware analysis. His current research aims to combine advanced program analysis techniques and large-scale measurements to explore new methods that target counteractions against botnets. en_US
dc.description Sena Sahin is a Ph.D. candidate in the School of Cybersecurity and Privacy at Georgia Tech. en_US
dc.description Carter Yagemann is a Ph.D. candidate in the Institute for Information Security and Privacy at the Georgia Institute of Technology, where I am advised by Prof. Wenke Lee and Prof. Brendan Saltaformaggio. My research interests are in systems and software security, spanning vulnerability discovery via combined program analysis and machine learning, root cause analysis and exploit prevention, and simulation of attacks targeting financial markets. en_US
dc.description Runtime: 58:48 minutes en_US
dc.description.abstract "c3pO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration", Current techniques to monitor botnets towards disruption or takedown are easily detected and insufficient. Seeking a covert and scalable solution, we look to an evolving pattern in malware that integrates standardized over-permissioned protocols, exposing privileged access to C&C servers. We implement techniques to detect and exploit these protocols from over-permissioned bots. Our findings suggest the over-permissioned protocol weakness provides a scalable approach to covertly monitor C&C servers, which is a fundamental enabler of botnet disruptions and takedowns. en_US
dc.description.abstract "Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication", To enhance the usability of password authentication, typo-tolerant password authentication schemes permit certain deviations in the user-supplied password, to account for common typographical errors yet still allow the user to successfully log in. In prior work, analysis by Chatterjee et al. demonstrated that typo-tolerance indeed notably improves password usability, yet (surprisingly) does not appear to significantly degrade authentication security. In practice, major web services such as Facebook have employed typo-tolerant password authentication systems
dc.description.abstract "Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis", The increasing cost of successful cyberattacks has caused a mindset shift, whereby defenders now employ proactive defenses, namely software bug hunting, alongside existing reactive measures (firewalls, IDS, IPS) to protect systems. Unfortunately, bug hunting remains laborious and analysts struggle to communicate their discoveries to developers effectively for patching. In this talk, I will present my latest work on a technique I define as symbolic root cause analysis and demonstrate how it can be used to discover and explain novel vulnerabilities in real-world software.
dc.format.extent 58:48 minutes
dc.identifier.uri http://hdl.handle.net/1853/65499
dc.language.iso en_US en_US
dc.publisher Georgia Institute of Technology en_US
dc.relation.ispartofseries Cybersecurity Lecture Series
dc.subject Botnets en_US
dc.subject Infiltration en_US
dc.subject Machine Learning en_US
dc.subject Monitoring en_US
dc.subject Password Authentication en_US
dc.subject Program analysis en_US
dc.subject Root cause en_US
dc.subject Security Analysis en_US
dc.subject Vulnerability discovery en_US
dc.title GT Cybersecurity Students Preview Research Appearing at ACM Computer and Communications Security Conference (CCS) en_US
dc.title 1) Jonathan Fuller: c3pO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration
dc.title 2) Sena Sahin: Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication
dc.title 3) Carter Yagemann: Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis
dc.type Moving Image
dc.type.genre Lecture
dspace.entity.type Publication
local.contributor.corporatename School of Cybersecurity and Privacy
local.contributor.corporatename College of Computing
local.relation.ispartofseries Institute for Information Security & Privacy Cybersecurity Lecture Series
relation.isOrgUnitOfPublication f6d1765b-8d68-42f4-97a7-fe5e2e2aefdf
relation.isOrgUnitOfPublication c8892b3c-8db6-4b7b-a33a-1b67f7db2021
relation.isSeriesOfPublication 2b4a3c7a-f972-4a82-aeaa-818747ae18a7
Files
Original bundle
Now showing 1 - 4 of 4
No Thumbnail Available
Name:
fuller_yagemann_sahin.mp4
Size:
274.01 MB
Format:
MP4 Video file
Description:
Download video
No Thumbnail Available
Name:
fuller_yagemann_sahin_videostream.html
Size:
1.32 KB
Format:
Hypertext Markup Language
Description:
Streaming video
No Thumbnail Available
Name:
transcript.txt
Size:
52 KB
Format:
Plain Text
Description:
Transcription
Thumbnail Image
Name:
thumbnail.jpg
Size:
60.31 KB
Format:
Joint Photographic Experts Group/JPEG File Interchange Format (JFIF)
Description:
Thumbnail
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
3.13 KB
Format:
Item-specific license agreed upon to submission
Description:
Collections