{"563421":{"#nid":"563421","#data":{"type":"event","title":"Cybersecurity Lecture Series - Sept. 2","body":[{"value":"\u003Ch4\u003EMeet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.\u003C\/h4\u003E\u003Cp\u003EThe weekly \u003Cstrong\u003ECybersecurity Lecture Series\u003C\/strong\u003E is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.\u003C\/p\u003E\u003Cp\u003EHeld \u003Cstrong\u003Eweekly each Friday at Noon\u003C\/strong\u003E \u003Cstrong\u003Ethrough Dec. 2\u003C\/strong\u003E, lectures are open to all -- students, faculty, industry, government, or simply the curious. Students may register for credit under seminar course CS-8001-INF.\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/register-cybersecurity-lecture-series-sept-2\u0022 target=\u0022_blank\u0022\u003EComplimentary lunch provided for registered guests.\u003C\/a\u003E Please bring your own beverage.\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003ESign up to receive future lecture announcements.\u003C\/a\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Ch4\u003E\u003Cem\u003E\u0026nbsp;\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h4\u003E\u003Ch4\u003EFeaturing Terry Nelms on Sept. 2\u003Cem\u003E\u003Cbr \/\u003E\u003C\/em\u003E\u003C\/h4\u003E\u003Ch5\u003E\u0022Towards Measuring and Mitigating Social Engineering Software Download Attacks\u0022\u003C\/h5\u003E\u003Cp\u003EMost modern malware infections happen through the browser, typically as the result of a drive-by or social engineering attack. While there have been numerous studies on measuring and defending against drive-by downloads, little attention has been dedicated to studying social engineering attacks. In this talk, we present the first systematic study of web-based social engineering (SE) attacks that successfully lured users into downloading malicious and unwanted software. To conduct this study, we collected and reconstructed more than 2,000 examples of in-the- wild SE download attacks from live network traffic. Via a detailed analysis of these attacks, we attained the following results: (i) a categorization system to identify and organize the tactics typically employed by attackers to gain the user\u2019s attention and deceive or persuade them into downloading malicious and unwanted applications; (ii) reconstruction of the web path followed by the victims and observation that a large fraction of SE download attacks are delivered via online advertisement, typically served from \u201clow tier\u201d ad networks; (iii) measurement of the characteristics of the network infrastructure used to deliver such attacks and uncover a number of features that can be leveraged to distinguish between SE and benign (or non-SE) software downloads.\u003Cbr \/\u003E\u003Cbr \/\u003E\u003Cstrong\u003EBIO\u003C\/strong\u003E\u003Cbr \/\u003ETerry Nelms is a Director of Research at Pindrop, where he leads a team of applied researchers solving challenging problems in fraud detection and authentication.\u0026nbsp; Prior joining Pindrop, he spent over a decade inventing, designing and developing protection technologies at ISS, IBM and Damballa. His research has produced new security products, patents and publications in top industry and academic conferences. Nelms holds a B.S. and M.S. in Information Systems and a Ph.D. in Computer Science from the Georgia Institute of Technology. \u003Cbr \/\u003E\u003Cbr \/\u003E\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003ETerry Nelms, director of research at Pindrop, presents a study of social-engineering attacks that he conducted with professors at Georgia Tech and Georgia State University.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Meet students, academic and industry leaders for intimate discussions about new cyber threats, trends and technologies."}],"uid":"27490","created_gmt":"2016-08-16 13:24:37","changed_gmt":"2017-04-13 21:15:06","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-09-02T13:00:00-04:00","event_time_end":"2016-09-02T14:00:00-04:00","event_time_end_last":"2016-09-02T14:00:00-04:00","gmt_time_start":"2016-09-02 17:00:00","gmt_time_end":"2016-09-02 18:00:00","gmt_time_end_last":"2016-09-02 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"538461":{"id":"538461","type":"image","title":"Cybersecurity Lecture Series","body":null,"created":"1464703200","gmt_created":"2016-05-31 14:00:00","changed":"1475895326","gmt_changed":"2016-10-08 02:55:26","alt":"Cybersecurity Lecture Series","file":{"fid":"89506","name":"cls_email_header.jpg","image_path":"\/sites\/default\/files\/images\/cls_email_header.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/cls_email_header.jpg","mime":"image\/jpeg","size":461835,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cls_email_header.jpg?itok=tTPdUlNC"}},"451391":{"id":"451391","type":"image","title":"IISP logo","body":null,"created":"1449256280","gmt_created":"2015-12-04 19:11:20","changed":"1475895192","gmt_changed":"2016-10-08 02:53:12","alt":"IISP logo","file":{"fid":"203339","name":"instituteforinformationsecurityprivacy-outline-black874.jpg","image_path":"\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg","mime":"image\/jpeg","size":88082,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/instituteforinformationsecurityprivacy-outline-black874_0.jpg?itok=WFxLCVBe"}},"570741":{"id":"570741","type":"image","title":"Terry Nelms","body":null,"created":"1472579954","gmt_created":"2016-08-30 17:59:14","changed":"1475895379","gmt_changed":"2016-10-08 02:56:19","alt":"Terry Nelms","file":{"fid":"207073","name":"terry_nelms.jpg","image_path":"\/sites\/default\/files\/images\/terry_nelms.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/terry_nelms.jpg","mime":"image\/jpeg","size":58074,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/terry_nelms.jpg?itok=NiQfmet9"}}},"media_ids":["538461","451391","570741"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"168599","name":"smartphone security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, \u003Ca href=\u0022mailto:tara.labouff@iisp.gatech.edu\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E, 404.769.5408\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}