<node id="429511">
  <nid>429511</nid>
  <type>news</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1438242908</created>
  <changed>1475896759</changed>
  <title><![CDATA[Georgia Tech Receives $4.2 Million for Military Research to Better Secure Data Transfer]]></title>
  <body><![CDATA[<p>Researchers from the College of Computing at the Georgia Institute of Technology were awarded $4.2 million from the Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory (AFRL) to improve how data is tracked between computers, Internet hosts, and browsers for better cyber security.</p><p>The four-year project, titled “THEIA” after the Greek goddess of shining light, attempts to shed light on exactly where data moves as it is routed from one Internet host to another and whether any malicious code, for example, is attached to data during transfer.</p><p>“The project has wide implications for any industry and anyone who needs to send secure information, make sure it is not manipulated during transfer, and that it arrives securely in tact – but especially for those banking, shopping or trading online,” says Dr. Wenke Lee, primary investigator and professor in the College of Computing. “If we have the ability to fully track how data is processed until it reaches the intended recipient, then we can better detect and stop advanced persistent threats (APT).”</p><p>For example, currently it is not possible for a network intrusion detection system to determine whether data sent from an end-host was modified by a malicious browser extension after a user completed a web form. State-of-the-art information flow tracking today typically applies only to a single layer (such as the program level), or does not utilize the full semantics at all layers (to verify if input was entered by the original user, for example).</p><p>THEIA will track and record information at three layers: user interaction with a program, program processing of data input, and program and network interactions with an operating system. Together, THEIA will monitor secure data flow from user to program, from program to file system storage, and storage to network output, and back again. Such completeness is critical to APT detection.</p><p>“Our ultimate goal is to provide complete transparency, or full visibility, into host events and data so that APT activities cannot evade detection,” Lee says. “THEIA represents what could be a significant advance over state-of-the-art approaches, which typically are forced to make arbitrary trade-offs between verifying accuracy and maintaining total computational efficiency.”</p><p>THEIA would make no such compromise. THEIA will record the sufficient amount of data at runtime, replay and analyze recorded events in semi-real-time when suspicious alerts are triggered, or analyze data completely offline.</p><p>Lee, a co-director of the Institute for Information Security and Privacy at Georgia Tech, has conducted cyber security research from Atlanta since 2001. Lee’s research interests include systems and network security, applied cryptography, and data mining. Most recently, he has focused on botnet detection and malware analysis, security of mobile systems and apps, and detection and mitigation of information manipulation on the Internet.&nbsp;Lee has published over 140 articles. In 2006, Lee co-founded Damballa, Inc., a spin-off from his lab that focuses on botnet detection and mitigation.</p><p>The DARPA-AFRL project is funded with $4,253,126 over 48 months. Participating in the work will be Dr. Taesoo Kim, assistant professor; Dr. Alessandro Orso, associate chair; Dr. Simon Chung, research scientist, all with the School of Computer Science, College of Computing; and Dr. Albert Brzeczko, research engineer at Georgia Tech Research Institute (GTRI).</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2015-07-30T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory (AFRL) seek better cyber security between computers, Internet hosts, and browsers.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory (AFRL) seek better cyber security between computers, Internet hosts, and browsers with the help of Georgia Tech's College of Computing.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="429521">
            <nid>429521</nid>
            <type>image</type>
            <title><![CDATA[Wenke Lee 2015 headshot]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid></fid>
                  <filename><![CDATA[]]></filename>
                  <filepath><![CDATA[]]></filepath>
                  <file_full_path><![CDATA[]]></file_full_path>
                  <filemime></filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[tlabouff@cc.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p><a href="mailto:tlabouff@cc.gatech.edu" target="_blank">Tara La Bouff</a></p><p>Marketing Communications Manager</p><p>404.769.5408</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
          <item>
        <![CDATA[Military Technology]]>
      </item>
          <item>
        <![CDATA[Research]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
          <item>
        <tid>147</tid>
        <value><![CDATA[Military Technology]]></value>
      </item>
          <item>
        <tid>135</tid>
        <value><![CDATA[Research]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="39481"><![CDATA[National Security]]></term>
      </core_research_areas>
  <field_news_room_topics>
          <item>
        <tid>71881</tid>
        <value><![CDATA[Science and Technology]]></value>
      </item>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>208</tid>
        <value><![CDATA[computing]]></value>
      </item>
          <item>
        <tid>345</tid>
        <value><![CDATA[cyber security]]></value>
      </item>
          <item>
        <tid>136881</tid>
        <value><![CDATA[data transfer]]></value>
      </item>
          <item>
        <tid>2678</tid>
        <value><![CDATA[information security]]></value>
      </item>
          <item>
        <tid>136871</tid>
        <value><![CDATA[Internet host]]></value>
      </item>
          <item>
        <tid>525</tid>
        <value><![CDATA[military]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
