Cybersecurity Lecture Series - Yeongjin Jang

Primary tabs

Meet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.

The Cybersecurity Lecture Series is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.

Held weekly each Friday at Noon through Apr. 21, lectures are open to all -- students, faculty, industry, government, or simply the curious. Graduate students may register for credit under seminar course CS-8001-INF.

Complimentary lunch provided for registered guests. Please bring your own beverage.

Sign up to receive future lecture announcements.


Featuring Yeongjin Jang on Feb. 10, 2017

"Protecting Computing Systems from Emerging Attacks"


ABSTRACT   |   Computing platforms are shifting from traditional desktops and mobile devices to the Internet of things (IoT) devices, and computer systems have started embedding an amazing variety of emerging technologies in both software and hardware forms. While such changes have made everyday life easier, protecting the security of these systems has become much more difficult. This is not only because system complexity has increased with the integration of more features and often conflicts with the existing security mechanisms, but also because improper security practices or incomplete security checks result from the diversity of platforms and faster production cycles that generally lead to more security holes.

In this talk, I will first present how to build a system that fundamentally blocks attack pathways by reflecting user intentions to network monitoring in order to protect user-driven network transactions such as sending money online. I will then introduce three cases of attack, which results from conflicts between system features and security mechanisms. These cases are found in popular operating systems such as Windows, Linux, iOS, and Android as well as in a computing hardware, the Intel processor. I will also discuss countermeasures to prevent such attacks and to make system secure.


BIO   |   Yeongjin Jang is a Ph.D. candidate in the School of Computer Science at the Georgia Institute of Technology. His research focuses on security and privacy problems of computer systems, which include operating systems, mobile systems, and computing hardware. He is particularly interested in analyzing how a system component interacts with other components, for example, how an application interacts with user input, with network I/O, or with hardware components, in order to discover and eliminate security problems on these interactions.
His research results are recognized for their highly practical impact, as noted by one award and two nominations for the CSAW best applied research paper. Moreover, his research on discovering new attacks and devising their countermeasures in popular operating systems has been widely covered in popular media including Forbes, Wired, MIT Technology Review, and more.


  • Workflow Status: Published
  • Created By: Tara La Bouff
  • Created: 02/02/2017
  • Modified By: Fletcher Moore
  • Modified: 04/13/2017


Target Audience

No target audience selected.