<node id="670869">
  <nid>670869</nid>
  <type>event</type>
  <uid>
    <user id="27707"><![CDATA[27707]]></user>
  </uid>
  <created>1699018600</created>
  <changed>1699018600</changed>
  <title><![CDATA[PhD Defense by Feng Xiao]]></title>
  <body><![CDATA[<p><span><span><strong><span><span><span>Title</span></span></span></strong></span></span></p>

<p><span><span><span><span><span>Understanding and Mitigating Security Threats in Software Supply Chain</span></span></span></span></span></p>

<p>&nbsp;</p>

<p><span><span><strong><span><span><span>Feng Xiao</span></span></span></strong></span></span></p>

<p><span><span><span><span><span>Ph.D. Candidate in Computer Science</span></span></span></span></span></p>

<p><span><span><span><span><span><span>School of Cybersecurity and Privacy</span></span></span></span> </span></span></p>

<p><span><span><span><span><span><span>Georgia Institute of Technology</span></span></span></span></span></span></p>

<p>&nbsp;</p>

<p><span><span><strong><span><span><span>Date/Time</span></span></span></strong><span><span><span>: Nov 17, 2023, 2:00 PM to 4:00 PM Eastern Time (US and Canada)</span></span></span></span></span></p>

<p><span><span><strong><span><span><span>Location</span></span></span></strong><span><span><span>: Coda C0915 Atlantic or join with <a href="https://gatech.zoom.us/j/95692998645?pwd=QWgzY2kxSWJTYnNmMEVIMUVJREprdz09" title="https://gatech.zoom.us/j/95692998645?pwd=QWgzY2kxSWJTYnNmMEVIMUVJREprdz09">zoom</a></span></span></span></span></span></p>

<p>&nbsp;</p>

<p>&nbsp;</p>

<p><span><span><strong><span><span><span>Committee</span></span></span></strong><span><span><span>:</span></span></span></span></span></p>

<p><span><span><span><span><span>Dr. Wenke Lee (advisor), School of Cybersecurity and Privacy, Georgia Institute of Technology</span></span></span></span></span></p>

<p><span><span><span><span><span>Dr. Brendan Saltaformaggio, School of Cybersecurity and Privacy, Georgia Institute of Technology</span></span></span></span></span></p>

<p><span><span><span><span><span>Dr. Saman Zonouz,&nbsp;<span>&nbsp;School of Cybersecurity and Privacy, Georgia Institute of Technology</span></span></span></span></span></span></p>

<p><span><span><span><span><span>Dr. Frank Li, School of Cybersecurity and Privacy, Georgia Institute of Technology</span></span></span></span></span></p>

<p><span><span><span><span><span><span>Dr. Guangliang Yang, School of Computer Science, Fudan University</span></span></span></span></span></span></p>

<p>&nbsp;</p>

<p>&nbsp;</p>

<p><span><span><strong><span><span><span><span>Abstract</span></span></span></span></strong><span><span><span><span>:</span></span></span></span></span></span></p>

<p><span><span><span><span><span><span>Modern software heavily relies on the software supply chain ecosystem to boost development efficiency and reduce costs. Unfortunately, &nbsp;the inherent vastness, complexity, and interdependence of the software supply chain often render existing security techniques inadequate. Traditional methods often fall short in thoroughly understanding and validating the software supply chain. They also tend to overlook new risks that emerge. </span></span></span></span></span></span></p>

<p>&nbsp;</p>

<p><span><span><span><span><span><span>To tackle the rising threats, I propose novel and efficient program analysis abstractions for the software supply chain, and implement these abstractions into a robust, end-to-end program analysis framework. In the defense, I first present LYNX and JASMINE, which are automatic tools to assist developers in understanding the security-related properties of complex supply chain software. Next, I will present XGuard, a tool designed for developers to implement robust and efficient security protection. This tool utilizes the comprehensive security properties identified by LYNX and JASMINE to automatically generate detailed protection policies. With the policy, XGuard ensures the integrity of data and control flow within the supply chain software.</span></span></span></span></span></span></p>

<p>&nbsp;</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Understanding and Mitigating Security Threats in Software Supply Chain]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p><span><span><span><span><span>Understanding and Mitigating Security Threats in Software Supply Chain</span></span></span></span></span></p>
]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2023-11-17T14:00:00-05:00]]></value>
      <value2><![CDATA[2023-11-17T16:00:00-05:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[Coda C0915 Atlantic or join with zoom]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>221981</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Graduate Studies]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>100811</tid>
        <value><![CDATA[Phd Defense]]></value>
      </item>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
