{"484731":{"#nid":"484731","#data":{"type":"event","title":"Cybersecurity Lecture Series - Feb. 5","body":[{"value":"\u003Cp\u003EMeet academic and industry leaders for intimate discussions about new threats, trends and technologies. Preview new cybersecurity research ahead of international conferences. Hear from exceptional Georgia Tech students about their body of work.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch3\u003E\u003Cstrong\u003ENDSS Conference Preview\u003C\/strong\u003E\u003C\/h3\u003E\u003Ch3\u003E\u003Cstrong\u003E\u0022The Price of Free: Privacy Leakage in Personalized Mobile Apps\u0022\u003Cbr \/\u003E\u003C\/strong\u003E\u003C\/h3\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003EFeaturing Ren Ding\u003C\/strong\u003E\u003Cem\u003E, graduate teaching assistant, School of Computer Science\u003C\/em\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Cem\u003ERen Ding is a Ph.D. student in the School of Computer Science, College of Computing, at the Georgia Institute of Technology, where he is advised by Professor Wenke Lee. He is a member of the Georgia Tech Information Security Center, affiliated with the Institute for Information Security \u0026amp; Privacy. He received his B.S. from Bowdoin College in 2012, double majoring in computer science and psychology. His research interests include system security, malware analysis, and user privacy. Most recently, Ding\u0027s research focuses on malware detection and neutralization, as well as software security in terms of memory safety and defense against advanced ROP attacks.\u003C\/em\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003EAbstract\u003C\/strong\u003E\u003C\/em\u003E: In-app advertising is an essential part of the ecosystem of free mobile applications. On the surface, this creates a win-win situation where app developers can profit from their work without charging the users. Meanwhile, ad networks employ personalization to improve the effectiveness\/profitability of their ad placement. This need for serving personalized advertisements in turn motivates ad networks to collect profile data about users. As such, \u201cfree\u201d apps are only free in monetary terms; they come with the price of potential privacy concerns. \u003Cem\u003EThe question is, how much data are users giving away in exchange for \u201cfree apps\u201d?\u003C\/em\u003E In this paper, we study how much of the user\u2019s interest and demographic information is known to major ad networks on the mobile platform. We also study whether personalized ads can be used by the hosting apps to reconstruct some of the user information collected by the ad network. By collecting more than 200 real user profiles and the ads seen by surveyed users, we found that\u0026nbsp; in-app advertising can leak potentially sensitive user information to any app that hosts personalized ads, and ad networks\u2019 current protection mechanisms are not sufficient for safe-guarding users\u2019 sensitive personal information.\u003C\/p\u003E\u003Cp\u003ELunch provided. No registration necessary.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003E\u003Cem\u003ESpring 2016 Schedule\u003C\/em\u003E\u003C\/strong\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EJan. 15\u003C\/strong\u003E \u2014 Opening discussion\u003Cbr \/\u003E \u003Cstrong\u003EJan. 22\u003C\/strong\u003E \u2014 Milos Prvulovic\u003Cbr \/\u003E \u003Cstrong\u003EJan. 29\u003C\/strong\u003E \u2014 PhD Candidate - Byoungyoung Lee\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 5\u003C\/strong\u003E \u2014 NDSS Conference Preview\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 12\u003C\/strong\u003E \u2014 NDSS Conference Preview\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 19\u003C\/strong\u003E \u2014 NDSS Conference Preview \u003Cbr \/\u003E \u003Cstrong\u003EFeb. 26\u003C\/strong\u003E \u2014 Stephen Pair, co-founder and CEO, \u003Ca href=\u0022https:\/\/bitpay.com\/about\u0022 target=\u0022_blank\u0022\u003EBitPay\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 4\u003C\/strong\u003E \u2014 Frank Wang, coordinator, \u003Ca href=\u0022http:\/\/cybersecurityfactory.com\/\u0022 target=\u0022_blank\u0022\u003EThe Cybersecurity Factory\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 11\u003C\/strong\u003E \u2013 David Formby, Xiaojing Liao\u003Cbr \/\u003E \u003Cstrong\u003EMar. 18\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EMar. 25\u003C\/strong\u003E \u2013 Spring Break\u003Cbr \/\u003E \u003Cstrong\u003EApr. 1\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 8 \u003C\/strong\u003E\u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 15\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 22 \u003C\/strong\u003E\u2013 Closing session\u003C\/p\u003E\u003Cp\u003ESponsored by MailChimp\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Anyone interested in cybersecurity intelligence and skill development is invited to a free lecture series, held each Friday at Georgia Tech."}],"uid":"27490","created_gmt":"2016-01-11 21:22:11","changed_gmt":"2017-04-13 21:17:11","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-02-05T11:00:00-05:00","event_time_end":"2016-02-05T12:00:00-05:00","event_time_end_last":"2016-02-05T12:00:00-05:00","gmt_time_start":"2016-02-05 16:00:00","gmt_time_end":"2016-02-05 17:00:00","gmt_time_end_last":"2016-02-05 17:00:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}}},"media_ids":["451391"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"141341","name":"Institute for Information Security \u0026 Privacy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}