{"590503":{"#nid":"590503","#data":{"type":"news","title":"Method for Detecting Malware with Electromagnetic Emanations Wins $5,000","body":[{"value":"\u003Cp\u003EConsumer electronics and IoT devices are challenging to secure because they rely on low-power processors with limited options for security software. A lack of standardization across hardware, software, and development environments makes it difficult to deploy or update security software.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EGeorgia Tech\u0026#39;s \u003Cstrong\u003ERob Callan\u003C\/strong\u003E, a post-doctoral researcher, and Ph.D. Student \u003Cstrong\u003EFarnaz Behrang\u003C\/strong\u003E brought the winning cybersecurity solution with a new approach for detecting malware in embedded devices. The pair landed 1st Place and $5,000 toward commercialization at the Institute for Information Security \u0026amp; Privacy\u0026#39;s \u0026quot;Demo Day Finale\u0026quot; with a method to monitor radio frequency emissions (\u0026quot;electromagnetic emanations\u0026quot;) and help detect unwanted code or hijacks.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe method first characterizes electromagnetic emanations generated by software running on an uncompromised device. To protect another device against intrusions, Callan and Behrang continually monitor its EM emanations, and when those differ from the uncompromised device, they examine for a possible hack. This approach separates (or \u0026quot;air-gaps\u0026quot;) the monitor from the device being monitored.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EJudges at Demo Day Finale immediately saw numerous applications for commercialization.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026quot;Healthcare is a dream problem set for this method because countless devices roll in and each from its own maker,\u0026quot; says \u003Cstrong\u003EJeff Garbers\u003C\/strong\u003E, a Demo Day Finale judge and principal at VentureLabs. \u0026quot;These types of devices are rarely updated or known when they are out of compliance, and there is no sensor smart enough to tell if the software inside is failing.\u0026quot;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe method by Callan and Behrang is an evolution of work that began under the direction of Georgia Tech faculty \u003Cstrong\u003EMilos Prvulovic\u003C\/strong\u003E and \u003Cstrong\u003EAlenka Zajic\u003C\/strong\u003E, who co-advise Callan in the School of Electrical \u0026amp; Computer Engineering. Knowing that \u003Ca href=\u0022http:\/\/www.news.gatech.edu\/2015\/01\/08\/researchers-work-counter-new-class-coffee-shop-hackers\u0022 target=\u0022_blank\u0022\u003E\u0026quot;side channel\u0026quot; emanations could be read\u003C\/a\u003E from a nearby device, the researchers further explored what the technique might reveal as a preventative measure for nuanced IoT, personal or embedded devices.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026quot;We\u0026#39;re grateful for the recognition and feedback, and we look forward to commercializing this research to solve tough cybersecurity problems in the near future,\u0026quot; Callan said on behalf of his team.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EAlso winning $5,000 at Demo Day Finale was Ph.D. Candidate \u003Cstrong\u003EDavid Formby\u003C\/strong\u003E from the School of Electrical \u0026amp; Computer Engineering for another approach to preventing malware \u0026ndash; this time in industrial control systems, such as water plants or utilities. Formby\u0026rsquo;s software suite won the 2\u003Csup\u003End\u003C\/sup\u003E Place prize of $3,000 from judges, plus a surprise nab as the audience favorite for the $2,000 People\u0026rsquo;s Choice Award.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;I was optimistic, but I didn\u0026rsquo;t expect to win both,\u0026rdquo; Formby cheerfully said after the event, posing with two prize checks and encircled by congratulatory students.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EFormby is expected to graduate in Summer 2017 and already has formed a company, Fortiphyd Logic, to begin commercializing his invention. Callan graduated from Georgia Tech in December 2016 with a Ph.D. in electrical and computer engineering. Behrang is a Ph.D. student in the School of Computer Science, studying software evolution and testing. She is advised by \u003Cstrong\u003EAlessandro Orso\u003C\/strong\u003E.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003EAbout Demo Day\u003C\/strong\u003E\u003C\/em\u003E\u003Cbr \/\u003E\r\nEach year, students are invited to compete before venture capitalists and industry leaders at the Institute for Information Security \u0026amp; Privacy\u0026#39;s \u0026quot;Demo Day.\u0026quot; Students bring initial research ideas to the fall Georgia Tech Cyber Security Summit, where public vote determines which projects are invited back in the Spring. Students return six months later at the Demo Day Finale for a TED-style talk about their developing project. A panel of business leaders and investors from across the United States advise students about future considerations for commercialization. Student research with the best chance of commercialization or demonstrating the most impact toward resolving an information security need receives a cash prize.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026quot;The Institute for Information Security \u0026amp; Privacy wants to move good ideas to market,\u0026quot; says \u003Cstrong\u003EWenke Lee\u003C\/strong\u003E, co-director. \u0026quot;We know industry leans on academic researchers to raise new ideas and we lean on industry to take solutions to the public. Our hope is that by introducing students to business mentors early in the research timeline that we can help them naturally build productive relationships and reduce time to market. All students participating in Demo Day will benefit from the insight and critique of those closest to industry needs today.\u0026quot;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Two cybersecurity research projects by students in the School of Electrical \u0026 Computer Engineering each won $5,000 for commercialization potential at the \u0022Demo Day Finale\u0022 held April 13, 2017."}],"uid":"27490","created_gmt":"2017-04-17 15:54:27","changed_gmt":"2017-04-17 16:08:46","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2017-04-17T00:00:00-04:00","iso_date":"2017-04-17T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"590504":{"id":"590504","type":"image","title":"Demo Day Finale S\u002717","body":null,"created":"1492444599","gmt_created":"2017-04-17 15:56:39","changed":"1492444599","gmt_changed":"2017-04-17 15:56:39","alt":"","file":{"fid":"224974","name":"dsc_5193.jpg","image_path":"\/sites\/default\/files\/images\/dsc_5193.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/dsc_5193.jpg","mime":"image\/jpeg","size":557906,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/dsc_5193.jpg?itok=9uDBhlCz"}}},"media_ids":["590504"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39531","name":"Energy and Sustainable Infrastructure"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETara La Bouff, (404) 769-5408, \u003Ca href=\u0022mailto:tara.labouff@iisp.gatech.edu?subject=Demo%20Day%20Finale%20winners\u0022\u003Etara.labouff@iisp.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EJackie Nemeth, (404) 894-2906, \u003Ca href=\u0022mailto:jackie.nemeth@ece.gatech.edu?subject=Demo%20Day%20Finale%20winners\u0022\u003Ejackie.nemeth@ece.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":["tara.labouff@iisp.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}