Institute for Information Security and Privacy

Group content

Title Type Status Created Namesort descending
2016 Holiday Gift Guide External news Published Tue, Dec 20, 2016 - 10:47am Ben Snedeker
White Hats, Black Hats, and Grey Matter: Tackling Cybersecurity External news Published Wed, Sep 27, 2017 - 10:32am Ben Snedeker
Isbell Begins Term as Dean of Computing News Published Fri, Jun 28, 2019 - 3:20pm Ben Snedeker
May the May update be with you: OpenSSL key sniffed from radio signal External news Published Wed, Aug 15, 2018 - 1:17pm Ben Snedeker
Once Overlooked, Uninitialized-Use ‘Bugs’ May Provide Portal for Hacker Attacks News Published Wed, Mar 1, 2017 - 11:12am Ben Snedeker
Peter Swire Named Andrew Carnegie Fellow News Published Wed, Apr 25, 2018 - 9:56am Ben Snedeker
Paper Earns Accolades from Security and Privacy Research Community News Published Thu, Jun 1, 2017 - 9:41am Ben Snedeker
College of Computing Rises to No. 8 in U.S. News Rankings News Published Mon, Mar 19, 2018 - 1:27pm Ben Snedeker
GT Computing Welcomes New Faculty Members to its Ranks News Published Thu, Aug 31, 2017 - 4:24pm Ben Snedeker
We Can Hack That: Georgia Tech Takes First Place in North American Competition News Published Wed, Nov 29, 2017 - 11:30am Ben Snedeker
New Ph.D. Program Highlights Growing Importance of Machine Learning News Published Wed, Jun 14, 2017 - 3:22pm Ben Snedeker
Meet 2020 ICPC NAC Sponsors Event Published Fri, Feb 14, 2020 - 11:54am Ben Snedeker
Attacks Increase Atlanta’s Demand For Cybersecurity Experts External news Draft Mon, Sep 19, 2016 - 12:20pm Ben Snedeker
College's Skyrocketing Stature, Global Impact Highlights of Galil's Legacy as Dean of Computing News Published Tue, Apr 16, 2019 - 10:37am Ben Snedeker
Hungry, Hungry Hackers 2016 Event Published Fri, Feb 26, 2016 - 7:51am Birney Robert
College of Computing's Taesoo Kim Has a Passion For the 'Nitty-Gritty Details' of Internet Security News Published Thu, Dec 15, 2016 - 3:00pm David Mitchell
Turing Award Winner to Discuss Mind-Based Computation at ARC-IISP Distinguished Lecture News Published Wed, Oct 19, 2016 - 3:16pm Devin Young
ARC & IISP Distinguished Lecture by Manuel Blum Event Published Wed, Sep 28, 2016 - 12:34pm Eric Vigoda
ECE Programs Remain Strong in Latest U.S. News & World Report Rankings News Published Thu, Sep 10, 2015 - 6:05am Jackie Nemeth
Real-Time Captcha Technique Improves Biometric Authentication News Published Mon, Feb 19, 2018 - 2:58pm John Toon


Group feeds

Title Type Created Updated Namesort descending
News: IISP Homepage Automated feed Thursday, August 27, 2015 - 2:58pm Wednesday, August 12, 2020 - 10:43am Adelle Frank
IISP Cyber Events Automated feed Sunday, September 6, 2015 - 11:35am Wednesday, September 23, 2015 - 9:06pm Tara La Bouff
IISP Cyber Events 2 Manual feed Sunday, September 6, 2015 - 7:45am Wednesday, September 23, 2015 - 9:02pm Tara La Bouff
Video: IISP Manual feed Tuesday, September 29, 2015 - 7:52am Tuesday, September 29, 2015 - 11:52am Tara La Bouff
News: IISP Manual feed Tuesday, September 29, 2015 - 8:11am Tuesday, September 27, 2016 - 7:48am Tara La Bouff
Upcoming Events - Homepage Manual feed Thursday, January 21, 2016 - 6:09am Wednesday, January 27, 2016 - 11:44pm Tara La Bouff
Events: IISP Manual feed Tuesday, September 29, 2015 - 8:32am Thursday, September 22, 2016 - 8:12pm Tara La Bouff

Group media

Image Title Type Created Name
Linux Image Wednesday, March 1, 2017 - 11:13am Ben Snedeker
Chad Ramey Image Wednesday, November 9, 2016 - 2:18pm Ben Snedeker
Georgia Tech researchers have identified a new Android security vulnerability. Cloak and Dagger screen grab Image Friday, May 26, 2017 - 9:38am Ben Snedeker
IEEE SSP paper award Image Thursday, June 1, 2017 - 9:49am Ben Snedeker
Bo Xie Image Thursday, March 30, 2017 - 8:56am Ben Snedeker
DARPA logo Image Monday, July 10, 2017 - 11:41am Ben Snedeker
A man with a white hat in a crowd of black hats. White hats, Blacks hats, grey matter thumbnail Image Wednesday, September 27, 2017 - 10:42am Jennifer Tomasino
Cloak and Dagger vulnerability on Android devices Video Sunday, May 21, 2017 - 1:30pm John Toon
Chart showing sources of malware Domains queried by malware samples Image Sunday, May 21, 2017 - 12:59pm John Toon
Difference between network traces and blacklisting Time difference between network traces and blacklisting Image Sunday, May 21, 2017 - 1:02pm John Toon
Network cables plugged into servers Tracing malware network traffic Image Sunday, May 21, 2017 - 1:05pm John Toon
Bad repositories map Image Wednesday, October 19, 2016 - 9:22am John Toon
Using an Android device Using an Android mobile device Image Sunday, May 21, 2017 - 1:24pm John Toon
Using an Android mobile device Using an Android mobile device2 Image Sunday, May 21, 2017 - 1:25pm John Toon
Checking permissions on Android device Checking permission on Android device Image Sunday, May 21, 2017 - 1:28pm John Toon
Michael Brown Image Friday, February 15, 2019 - 4:08pm lpanetta3
Sam King Image Tuesday, January 15, 2019 - 12:26pm lpanetta3
Hanjun Dai Image Monday, March 4, 2019 - 3:26pm lpanetta3
Joshua C. Sorenson Image Thursday, March 22, 2018 - 2:25pm lpanetta3
Shelby Allen Image Thursday, January 24, 2019 - 1:09pm lpanetta3