Title:
GT Cybersecurity Students Preview Research Appearing at ACM Computer and Communications Security Conference (CCS)
1) Jonathan Fuller: c3pO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration
2) Sena Sahin: Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication
3) Carter Yagemann: Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis
GT Cybersecurity Students Preview Research Appearing at ACM Computer and Communications Security Conference (CCS)
1) Jonathan Fuller: c3pO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration
2) Sena Sahin: Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication
3) Carter Yagemann: Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis
dc.contributor.author | Fuller, Jonathan | |
dc.contributor.author | Sahin, Sena | |
dc.contributor.author | Yagemann, Carter | |
dc.contributor.corporatename | Georgia Institute of Technology. Institute for Information Security & Privacy | en_US |
dc.contributor.corporatename | Georgia Institute of Technology. School of Electrical and Computer Engineering | en_US |
dc.contributor.corporatename | Georgia Institute of Technology. School of Cybersecurity and Privacy | en_US |
dc.date.accessioned | 2021-11-18T15:53:38Z | |
dc.date.available | 2021-11-18T15:53:38Z | |
dc.date.issued | 2021-10-22 | |
dc.description | Presented in-person and onlne via Bluejeans Events on October 22, 2021 at 12:30 p.m in the CODA 9th floor atrium. | en_US |
dc.description | Jonathan Fuller is a Ph.D. Student in the School of Electrical and Computer Engineering (ECE) at the Georgia Institute of Technology, advised by Dr. Brendan Saltaformaagio in the Cyber Forensics Innovation (CyFi) Lab. My research interests lie in cyber attack forensics, web and IoT security, and malware analysis. His current research aims to combine advanced program analysis techniques and large-scale measurements to explore new methods that target counteractions against botnets. | en_US |
dc.description | Sena Sahin is a Ph.D. candidate in the School of Cybersecurity and Privacy at Georgia Tech. | en_US |
dc.description | Carter Yagemann is a Ph.D. candidate in the Institute for Information Security and Privacy at the Georgia Institute of Technology, where I am advised by Prof. Wenke Lee and Prof. Brendan Saltaformaggio. My research interests are in systems and software security, spanning vulnerability discovery via combined program analysis and machine learning, root cause analysis and exploit prevention, and simulation of attacks targeting financial markets. | en_US |
dc.description | Runtime: 58:48 minutes | en_US |
dc.description.abstract | "c3pO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration", Current techniques to monitor botnets towards disruption or takedown are easily detected and insufficient. Seeking a covert and scalable solution, we look to an evolving pattern in malware that integrates standardized over-permissioned protocols, exposing privileged access to C&C servers. We implement techniques to detect and exploit these protocols from over-permissioned bots. Our findings suggest the over-permissioned protocol weakness provides a scalable approach to covertly monitor C&C servers, which is a fundamental enabler of botnet disruptions and takedowns. | en_US |
dc.description.abstract | "Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication", To enhance the usability of password authentication, typo-tolerant password authentication schemes permit certain deviations in the user-supplied password, to account for common typographical errors yet still allow the user to successfully log in. In prior work, analysis by Chatterjee et al. demonstrated that typo-tolerance indeed notably improves password usability, yet (surprisingly) does not appear to significantly degrade authentication security. In practice, major web services such as Facebook have employed typo-tolerant password authentication systems | |
dc.description.abstract | "Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis", The increasing cost of successful cyberattacks has caused a mindset shift, whereby defenders now employ proactive defenses, namely software bug hunting, alongside existing reactive measures (firewalls, IDS, IPS) to protect systems. Unfortunately, bug hunting remains laborious and analysts struggle to communicate their discoveries to developers effectively for patching. In this talk, I will present my latest work on a technique I define as symbolic root cause analysis and demonstrate how it can be used to discover and explain novel vulnerabilities in real-world software. | |
dc.format.extent | 58:48 minutes | |
dc.identifier.uri | http://hdl.handle.net/1853/65499 | |
dc.language.iso | en_US | en_US |
dc.publisher | Georgia Institute of Technology | en_US |
dc.relation.ispartofseries | Cybersecurity Lecture Series | |
dc.subject | Botnets | en_US |
dc.subject | Infiltration | en_US |
dc.subject | Machine Learning | en_US |
dc.subject | Monitoring | en_US |
dc.subject | Password Authentication | en_US |
dc.subject | Program analysis | en_US |
dc.subject | Root cause | en_US |
dc.subject | Security Analysis | en_US |
dc.subject | Vulnerability discovery | en_US |
dc.title | GT Cybersecurity Students Preview Research Appearing at ACM Computer and Communications Security Conference (CCS) | en_US |
dc.title | 1) Jonathan Fuller: c3pO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration | |
dc.title | 2) Sena Sahin: Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication | |
dc.title | 3) Carter Yagemann: Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis | |
dc.type | Moving Image | |
dc.type.genre | Lecture | |
dspace.entity.type | Publication | |
local.contributor.corporatename | School of Cybersecurity and Privacy | |
local.contributor.corporatename | College of Computing | |
local.relation.ispartofseries | Institute for Information Security & Privacy Cybersecurity Lecture Series | |
relation.isOrgUnitOfPublication | f6d1765b-8d68-42f4-97a7-fe5e2e2aefdf | |
relation.isOrgUnitOfPublication | c8892b3c-8db6-4b7b-a33a-1b67f7db2021 | |
relation.isSeriesOfPublication | 2b4a3c7a-f972-4a82-aeaa-818747ae18a7 |
Files
Original bundle
1 - 4 of 4
No Thumbnail Available
- Name:
- fuller_yagemann_sahin.mp4
- Size:
- 274.01 MB
- Format:
- MP4 Video file
- Description:
- Download video
No Thumbnail Available
- Name:
- fuller_yagemann_sahin_videostream.html
- Size:
- 1.32 KB
- Format:
- Hypertext Markup Language
- Description:
- Streaming video
No Thumbnail Available
- Name:
- transcript.txt
- Size:
- 52 KB
- Format:
- Plain Text
- Description:
- Transcription
- Name:
- thumbnail.jpg
- Size:
- 60.31 KB
- Format:
- Joint Photographic Experts Group/JPEG File Interchange Format (JFIF)
- Description:
- Thumbnail
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 3.13 KB
- Format:
- Item-specific license agreed upon to submission
- Description: