{"485411":{"#nid":"485411","#data":{"type":"event","title":"Cybersecurity Lecture Series - Jan. 22","body":[{"value":"\u003Cp\u003ECANCELLED DUE TO INCLEMENT WEATHER. \u003C\/p\u003E\u003Cp\u003EMeet academic and industry leaders for intimate discussions about new threats, trends and technologies. Preview new cybersecurity research ahead of international conferences. Hear from exceptional Georgia Tech students about their body of work.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EJan. 22\u0026nbsp; Guest Speaker\u003C\/strong\u003E\u003C\/p\u003E\u003Ch4\u003E\u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/people\/milos-prvulovic\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003EMilos Prvulovic\u003C\/strong\u003E\u003C\/a\u003E\u003Cbr \/\u003EAssoc. Professor, College of Computing\u003C\/h4\u003E\u003Cp\u003E\u0022\u003Cstrong\u003EUnderstanding, Alleviating, and Exploiting Electro-Magnetic Side-Channel Signals\u0022\u003C\/strong\u003E\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EA \u003Ca href=\u0022http:\/\/www.news.gatech.edu\/2015\/01\/08\/researchers-work-counter-new-class-coffee-shop-hackers\u0022\u003Eside-channel attack\u003C\/a\u003E is an attack that exploits the low-power electronic signals a device emits even when it\u2019s not connected to the Internet or a network. Such signals can leak sensitive data used in a computational task. Among side channels, the electromagnetic emanations are particularly interesting because they do not require any contact with the target device in order to read potentially sensitive and private data. While side-channel attacks can be conducted without understanding the relationship between computation and electromagnetic emanations, prevention is usually cost-, overhead-, power- and\/or weight-intensive. In this talk, I will describe our work to understand the execution-emanations relationship, how this research can be used to \u0022surgically\u0022 alleviate side-channel vulnerabilities, and even how it enables new beneficial uses of side-channel information.\u003C\/p\u003E\u003Cp\u003ELunch provided. No registration necessary.\u003Cbr \/\u003E\u003Cbr \/\u003E\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003E\u003Cem\u003ESpring 2016 Schedule\u003C\/em\u003E\u003C\/strong\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EJan. 15\u003C\/strong\u003E \u2014 Opening discussion\u003Cbr \/\u003E \u003Cstrong\u003EJan. 22\u003C\/strong\u003E \u2014 Milos Prvulovic\u003Cbr \/\u003E \u003Cstrong\u003EJan. 29\u003C\/strong\u003E \u2014 PhD Candidate - Byoungyoung Lee\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 5\u003C\/strong\u003E \u2014 PhD Candidate - Chengyu Song\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 12\u003C\/strong\u003E \u2014 \u003Ca href=\u0022http:\/\/www.internetsociety.org\/events\/ndss-symposium-2016\u0022 target=\u0022_blank\u0022\u003ENDSS Conference\u003C\/a\u003E Preview -\u0026nbsp; Kangjie Lu, Teseoo Kim\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 19\u003C\/strong\u003E \u2014 NDSS Conference Preview -\u0026nbsp; Chengyu Song, Wei Meng\u003Cbr \/\u003E \u003Cstrong\u003EFeb. 26\u003C\/strong\u003E \u2014 Stephen Pair, co-founder and CEO, \u003Ca href=\u0022https:\/\/bitpay.com\/about\u0022 target=\u0022_blank\u0022\u003EBitPay\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMar. 4\u003C\/strong\u003E \u2014 Outtakes from NDSS conference\u003Cbr \/\u003E \u003Cstrong\u003EMar. 11\u003C\/strong\u003E \u2013 David Formby, Xiaojing Liao\u003Cbr \/\u003E \u003Cstrong\u003EMar. 18\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EMar. 25\u003C\/strong\u003E \u2013 Spring Break\u003Cbr \/\u003E \u003Cstrong\u003EApr. 1\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 8 \u003C\/strong\u003E\u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 15\u003C\/strong\u003E \u2013 TBD\u003Cbr \/\u003E \u003Cstrong\u003EApr. 22 \u003C\/strong\u003E\u2013 Closing session\u003C\/p\u003E\u003Cp\u003ESponsored by MailChimp\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"This event has been cancelled due to inclement weather."}],"uid":"27490","created_gmt":"2016-01-13 09:15:51","changed_gmt":"2017-04-13 21:17:10","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-01-22T11:00:00-05:00","event_time_end":"2016-01-22T12:00:00-05:00","event_time_end_last":"2016-01-22T12:00:00-05:00","gmt_time_start":"2016-01-22 16:00:00","gmt_time_end":"2016-01-22 17:00:00","gmt_time_end_last":"2016-01-22 17:00:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"349881":{"id":"349881","type":"image","title":"Milos Prvulovic compressed","body":null,"created":"1449245702","gmt_created":"2015-12-04 16:15:02","changed":"1475895075","gmt_changed":"2016-10-08 02:51:15","alt":"Milos Prvulovic compressed","file":{"fid":"201058","name":"milos-prvulovic.jpg","image_path":"\/sites\/default\/files\/images\/milos-prvulovic.jpg","image_full_path":"http:\/\/tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/milos-prvulovic.jpg","mime":"image\/jpeg","size":12081,"path_740":"http:\/\/tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/milos-prvulovic.jpg?itok=Nd33eVbg"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=JGV2BzFy"}}},"media_ids":["349881","451391"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"141341","name":"Institute for Information Security \u0026 Privacy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}