Cybersecurity Research Underway

Academic and Applied Research for Cybersecurity Challenges

Georgia Tech is at the forefront of creating the next, new cybersecurity solutions with immediate application in the real world -- working to strengthen national defense, ensure economic continuity, and protect individual freedom. Our aim is to anticipate, overcome and continually resist emerging cyberthreats through expert insight, innovative breakthroughs, and cutting-edge curriculum.

Cyber Research Thrusts


Policy

How should the private sector use personal data? Should the government be able to access communication in transit or at rest?



Consumer-Facing Privacy

How can consumers securely interact with technology? What are the best practices?



Attribution

How can we definitively know who is responsible for a cyber breach? What can be done when we cannot attribute the breach?



Risk

How do we quantify & assess in real time? Who do we watch? What do we look for?



Trust

How should people, machines, and networks establish trust in reliable ways? How does the trust relationship change over time?



Cyber Physical Systems

What inputs and outputs should be part of the most fortified embedded and physical systems?

 

Current Research Activity

A sampling of projects underway now is listed below. Cybersecurity research at Georgia Tech spans 12 labs and centers devoted to academic, applied, and classified work for military, government and private industry. More than $100 million of cybersecurity research was performed in FY17.

To inquire about these projects, contact the Principal Investigator.
To initiate a new, cybersecurity research project with Georgia Tech, contact:

Pen Testing

"Embedasploit": A "Pen-Test-In-a-Box" for Industrial Control Systems

 
Principal Investigator: Wenke Lee
Funded: $1.2 M
End Date: Apr. 2019

Intl' Data Policy

Cross-Border Requests for Data Project

 
Principal Investigator: Peter Swire
Co-PIs: multiple
Funded: $400 K
End Date: --

Big Data Privacy

"Sharesafe": A Framework for Researchers and Data Owners

 
Principal Investigator: Raheem Beyah
Funded: $500 K
End Date: Aug. 2018

Backscattering

Exploration of THZ Backscattering as a Side-Channel in Computer Systems

 
Principal Investigator: Alenka Zajic
Co-PIs: M. Prvulovic
Funded: $454 K
End Date: Jul. 2019

DDoS Attack Mitigation

"ROKI": Resource-Oriented Computation for Low-Volume DDoS Attacks

 
Principal Investigator: Taesoo Kim
Co-PIs: W. Lee, W. Harris
Funded: $2.6 M
End Date: Apr. 2019

Fortifying Machine Learning

Understanding and Fortifying Machine Learning-based Security Analytics

 
Principal Investigator: Polo Chau
Co-PIs: T. Kim, W. Lee, L. Song
Funded: $1.2 M
End Date: Jul. 2021

Threat Attribution

"Rhamnousia": Attributing Cyber Actors Through Tensor Decomposition and Novel Data Acquisition

 
Principal Investigator: Manos Antonakakis
Co-PIs: M. Farrell, M. Ahamad, R. Beyah, D. Blough, D. Dagon
Funded: $17.3 M
End Date: May 2021

Side-Channel Attacks

"CAMELIA": Computational Activity Monitoring by Externally Leveraging Involuntary Analog Signals
 
Principal Investigator: Alenka Zajic
Co-PIs: A. Orso, M. Prvulovic
Funded: $9.4 M
End Date: May 2020

 

Information Assurance

"THEIA": Tagging and Tracking of Multi-level Host Events for Transparent Computing and Information Assurance
 
Principal Investigator: Wenke Lee
Co-PIs: T. Kim, A. Orso
Funded: $4.3 M
End Date: Jun. 2019

 

Search Rank Fraud

Cracking Down Online Deception Ecosystems

 
Principal Investigator: Polo Chau
Funded: $260 K
End Date: Aug. 2019

Cisco Code Integrity

Runtime Detection of Code Integrity Attacks

 
Principal Investigator: Vincent John Mooney
Funded: $100 K
End Date: Sept. 2018

Interdomain Modeling

Economics of Contractual Arrangements for Internet Interconnections

 
Principal Investigator: Constantine Dovrolis
Funded: $590 K
End Date: Sept. 2019

Big Data Mining

Human-Computer Graph Exploration and Tele-Discovery

 
Principal Investigator: Polo Chau
Funded: $600 K
End Date: Jul. 2020

Smart Cities

Adaptive Management and Use of Resilient Infrastructure in Smart Cities

 
Principal Investigator: Calton Pu
Funded: $375 K
End Date: Aug. 2018

Network Protocol Analysis

A Unifying Framework for Theoretical & Empirical Analysis

 
Principal Investigator: Sasha Boldyreva
Funded: $280 K
End Date: Jul. 2018

Intel Machine Learning

Intel Science & Technology Center for Adversary-Resilient Security Analytics         

 
Principal Investigator: Wenke Lee
Co-PIs: P. Chau, T. Kim, , L. Song
Funded: $1.5 M
End Date: --

Models for Privacy

A Mathematical Model of Privacy Decisions: A Behavioral Economic Perspective

 
Principal Investigator: Fariborz Farahmand
Co-PI: Dana Randall
Funded: $275 K
End Date: Aug. 2018

System Profiling

Spectral Profiling: Understanding Software Performance without Code Instrumentation

 
Principal Investigator: Alessandro Orso
Co-PIs: M. Prvulovic, A. Zajic
Funded: $850 K
End Date: Jun. 2019

Mobile Fraud

Exposing and Mitigating Cross-Channel Attacks
 
Principal Investigator: Mustaque Ahamad
Co-PI: Manos Antonakakis
Funded: $900 K
End Date: Jul. 2019

Memory Forensics

GEMINI: Guided Execution ASED Mobile Advanced Persistent Threat Investigation
 
Principal Investigator: Brendan Saltaformaggio
Funded: $175 K
End Date: Jan. 2020

Privacy in the Cloud

Privacy Preserving Computation in Big Data Clouds
 
Principal Investigator: Ling Liu
Co-PI: Calton Pu
Funded: $1.2 M
End Date: Apr. 2020

Analysis & Modeling

12P Security Analysis & Modeling

 
Principal Investigator: Manos Antonakakis
Funded: $300 K
End Date: Jun. 2018

Mission Planning

"Grendel": Geospatial Rendering Library

 
Primary Investigator: John Pyles
Funded: $1.1 M
End Date: Feb. 2018

Fuzzing Performance

System Techniques to Improve Fuzzing Performance

Principal Investigator: Taesoo Kim
Funded: $500 K
End Date: Feb. 2023

SGX Security

Systems, Tools, and Techniques for Executing, Managing and Securing SGX Programs

Principal Investigator: Taesoo Kim
Funded: $671 K
End Date: May 2020

Actionable Defense

ADAPT: An Analytical Framework fro Actionable Defense

Principal Investigator: Wenke Lee
Funded: $600 K
End Date: May 2019

Pollution Attacks

"EPICA": Empowering People to Overcome Information Controls and Attacks

Principal Investigator: Wenke Lee
Co-PIs: N. Feamster, H. Klein, H. Zha
Funded: $1.1 M
End Date: Jun. 2019

Debloating the Stack

Interactive Editing Techniques for Subsetting and Dielecting Network Protocols

Principal Investigator: Taesoo Kim
Co-PIs: W. Harris, W. Lee, A. Orso, S. Pande, B. Saltaformaggio
Funded: $2.9M
End Date: Aug. 2021

IoT Security

Hardware-Oriented Secure Edge Analytics for IoT

Principal Investigator: Taesoo Kim
Funded: $100 K
End Date: Oct. 2018

Funding for these projects and others is made possible by the Air Force Research Labs, Cisco University Research Program Fund, U.S. Department of Defense, Defense Advanced Research Projects Agency,  Georgia Research Alliance, Intel Corp., Office of Naval Research, National Science Foundation, Samsung, and more.