{"517561":{"#nid":"517561","#data":{"type":"news","title":"Students to Show Venture Capitalists Their Best Cybersecurity Work","body":[{"value":"\u003Cp\u003EA fraud detection system for healthcare claims\u2026 Ways to evaluate safer passwords\u2026. Technical fixes for truly private browsing\u2026 These are some of the ideas proposed by Georgia Tech students who will compete before a national panel of venture capitalists for cash in the inaugural \u201cDemo Day Finale\u201d on April 13.\u003C\/p\u003E\u003Cp\u003EThe event is hosted by the Institute for Information Security \u0026amp; Privacy (IISP) and aims to give students an early introduction to potential investors as they continue their research.\u003C\/p\u003E\u003Cp\u003E\u201cThe hardest part of moving great ideas out to market is finding a trustworthy partner,\u201d says \u003Cstrong\u003EWenke Lee\u003C\/strong\u003E, co-director of the IISP and a professor in the School of Computer Science who has successfully transferred research to private corporations. \u201cIt can be awkward to turn over your hard work to someone at the end of a long project. We hope to introduce students to potential investors earlier in the process to help them consider steps to take that could make their project more appealing to consumers. This is one way we think the Institute for Information Security \u0026amp; Privacy can help move solutions out to individuals who need better identity, data or hardware protection.\u201d\u003C\/p\u003E\u003Cp\u003EFive student teams representing the School of Computer Science and School of Electrical Computing and Engineering are polishing their presentations now to deliver TED-style talks before the elite panel of business leaders from Washington D.C, Philadelphia, and Atlanta. Research with the best chance of commercialization or demonstrating the most impact toward resolving an industry need receives a cash prize \u2013 up to $5,000 this year.\u003C\/p\u003E\u003Cp\u003EInitial cybersecurity research concepts were presented at the inaugural Fall Demo Day, held \u003Ca href=\u0022http:\/\/gtcybersecuritysummit.com\u0022 target=\u0022_blank\u0022\u003EOct. 28 at the Georgia Tech Cyber Security Summit\u003C\/a\u003E, where more than 300 attendees viewed and voted on the best research work from Georgia Tech and GTRI. The top five finalists now advance to the finale. All finalists represent graduate students \u2013 some of whom have been working on their projects for many years.\u003C\/p\u003E\u003Cp\u003E\u201cIt means a great deal for me to know that my research can have a huge positive impact outside of the lab,\u201d says \u003Cstrong\u003EMusheer Ahmed\u003C\/strong\u003E, a graduating PhD student (advised by Professor Mustaque Ahamad) whose patented, data analytics system assigns risk scores to healthcare providers and already has caught the eye of other incubator programs interested in its potential. \u201cAll students strive for this but never know if that will materialize with their work. I hope the momentum will continue and my work can be commercialized.\u201d\u003C\/p\u003E\u003Cp\u003EAnother team \u2013 \u201cIDforWeb\u201d -- hopes to gather validation from the Demo Day judges that they have an easy-to-use platform for secure transactions and communication authentication. IDforWeb seeks to create \u201ckiller apps\u201d that improve public key infrastructure (PKI) with new ease of use.\u003C\/p\u003E\u003Cp\u003E\u201cI\u0027m glad that people believe the 10+ year-old PKI usability problem is an important problem to solve,\u0026nbsp;and agree with us that new technologies like smartphones and\u0026nbsp;blockchains offer some new angle,\u201d said \u003Cstrong\u003EPak Ho Chung\u003C\/strong\u003E, a researcher in the School of Computer Science, referring to the Fall audience that voted them through to the Spring Finale.\u003C\/p\u003E\u003Cp\u003EAll projects that will be presented at Demo Day represent a broad range of solutions for healthcare, e-commerce, application development and more, says \u003Cstrong\u003EBo Rotoloni\u003C\/strong\u003E, co-director of the IISP who also leads the information and cyber sciences directorate for the Georgia Tech Research Institute (GTRI).\u003C\/p\u003E\u003Cp\u003E\u201cThe investors coming to judge our first Demo Day are going to see unique ideas by Georgia Tech and clever solutions to existing and emerging challenges. We believe one of academia\u2019s roles is to explore big ideas, prove the potential, and create new market spaces. Several of these finalists do that well.\u201d\u003C\/p\u003E\u003Cp\u003EDue to limited space, \u003Ca href=\u0022http:\/\/tiny.cc\/demoday16\u0022\u003Eregistration is encouraged\u003C\/a\u003E for the event.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EThe IISP Demo Day Spring \u201916 Finalists are\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003E\u003Cem\u003E\u0022Cybersecurity Inspired Health Insurance Fraud Detector\u0022\u003C\/em\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMusheer Ahmed\u003C\/strong\u003E\u003Cbr \/\u003E Advisor: Mustaque Ahamad\u003C\/p\u003E\u003Cp\u003E\u003Cbr \/\u003E\u003Ca href=\u0022http:\/\/www2.ece.gatech.edu\/cap\/PARS\/\u0022 target=\u0022_blank\u0022\u003E \u003Cem\u003E\u0022PARS: A Uniform and Open-source Password Analysis and Research System\u0022\u003C\/em\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EShukun Yang\u003C\/strong\u003E\u003Cbr \/\u003E Advisor: Raheem Beyah\u003C\/p\u003E\u003Cp\u003E\u003Cbr \/\u003E\u003Ca href=\u0022http:\/\/wenke.gtisc.gatech.edu\/papers\/dangnull.pdf\u0022 target=\u0022_blank\u0022\u003E \u003Cem\u003E\u0022Preventing Use-after-free with Dangling Pointers Nullification\u0022\u003C\/em\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EByoungyoung Lee \u003C\/strong\u003Eand\u003Cstrong\u003E Chengyu Song\u003C\/strong\u003E\u003Cbr \/\u003E Advisor: Taesoo Kim\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u0022Tying Public Key to Person with \u2018idforweb\u2019 \u0022\u003C\/em\u003E\u003Cbr \/\u003E \u003Cstrong\u003EPak Ho Chung, Yeongjin Jang \u003C\/strong\u003Eand\u003Cstrong\u003E Mark Wisneski\u003C\/strong\u003E\u003Cbr \/\u003E Advisor: Wenke Lee\u003C\/p\u003E\u003Cp\u003E\u003Cbr \/\u003E\u003Ca href=\u0022http:\/\/wenke.gtisc.gatech.edu\/papers\/ucognito.pdf\u0022 target=\u0022_blank\u0022\u003E \u003Cem\u003E\u0022UCognito: Private Browsing without Tears\u0022\u003C\/em\u003E\u003C\/a\u003E\u003Cbr \/\u003E \u003Cstrong\u003EMeng Xu \u003C\/strong\u003Eand\u003Cstrong\u003E Yeongjin Jang \u003C\/strong\u003E\u003Cbr \/\u003E Advisor:\u0026nbsp; Taesoo Kim and Wenke Lee\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EJudges are\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003E\u003Cstrong\u003ERobin Bienfait\u003C\/strong\u003E, chief enterprise innovation officer, Samsung\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EPaul Conley\u003C\/strong\u003E, managing director, Paladin Capital Group\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EJohn Lee\u003C\/strong\u003E, senior associate, Osage Partners\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EGlenn McGonnigle\u003C\/strong\u003E, general partner, TechOperators\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003ESig Mosley\u003C\/strong\u003E, managing partner, Mosley Ventures\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003E\u003Cem\u003EA fraud detection system for healthcare claims\u2026 Ways to evaluate safer passwords\u2026. Technical fixes for truly private browsing\u2026\u003C\/em\u003E These are some of the ideas proposed by Georgia Tech students who will compete before a national panel of venture capitalists for cash in the inaugural \u201cDemo Day Finale\u201d on April 13, hosted by the Institute for Information Security \u0026amp; Privacy.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Information security students will compete before a national panel of venture capitalists for cash in the inaugural \u201cDemo Day Finale\u201d on April 13."}],"uid":"27490","created_gmt":"2016-03-25 12:26:46","changed_gmt":"2016-10-08 03:21:09","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-03-29T00:00:00-04:00","iso_date":"2016-03-29T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"518341":{"id":"518341","type":"image","title":"Demo Day Spring \u002716","body":null,"created":"1459274540","gmt_created":"2016-03-29 18:02:20","changed":"1475895284","gmt_changed":"2016-10-08 02:54:44","alt":"Demo Day Spring \u002716","file":{"fid":"205200","name":"security-poster-web.jpg","image_path":"\/sites\/default\/files\/images\/security-poster-web_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/security-poster-web_0.jpg","mime":"image\/jpeg","size":112810,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/security-poster-web_0.jpg?itok=KY64J3JN"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=WFxLCVBe"}}},"media_ids":["518341","451391"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"3652","name":"Demo Day"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, 404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":["tlabouff@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}