{"593547":{"#nid":"593547","#data":{"type":"event","title":"PhD Defense by Kangjie Lu","body":[{"value":"\u003Cpre\u003E\r\n\u003Cstrong\u003ETitle\u003C\/strong\u003E: Securing Modern Systems by Preventing Information Leaks\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\r\n\u0026nbsp;\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\r\n\u0026nbsp;\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nKangjie Lu\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nPh.D. Candidate\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nSchool of Computer Science\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nCollege of Computing\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nGeorgia Institute of Technology\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\r\n\u0026nbsp;\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\r\n\u0026nbsp;\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\u003Cstrong\u003EDate\u003C\/strong\u003E: Wednesday, July 19, 2017\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\u003Cstrong\u003ETime\u003C\/strong\u003E: 10AM-12PM EDT\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\u003Cstrong\u003ELocation\u003C\/strong\u003E: KACB 3100\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\r\n\u0026nbsp;\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\r\n\u0026nbsp;\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\u003Cstrong\u003ECommittee\u003C\/strong\u003E:\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n---------------\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\r\n\u0026nbsp;\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nDr. Wenke Lee (Advisor), School of Computer Science, Georgia Tech\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nDr. Taesoo Kim (Co-advisor), School of Computer Science, Georgia Tech\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nDr. Mustaque Ahamad,\u0026nbsp; School of Computer Science, Georgia Tech\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nDr. William R. Harris, School of Computer Science, Georgia Tech\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nDr. Debin Gao, Singapore Management University\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nDr. Michael Backes, Saarland University and MPI-SWS\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\r\n\u0026nbsp;\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\r\n\u0026nbsp;\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\u003Cstrong\u003EAbstract\u003C\/strong\u003E:\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n---------------\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\r\n\u0026nbsp;\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nFoundational software systems such as operating systems and web\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nservers are always implemented in unsafe programming languages for\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nefficiency, and system designers often prioritize performance over\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nsecurity. Hence, these systems inherently suffer from a variety of\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nvulnerabilities and insecure designs that have been exploited by\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nadversaries to launch critical system attacks. Two typical goals of\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nthese attacks are to leak sensitive data and to control victim\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nsystems.\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\r\n\u0026nbsp;\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nThis thesis work aims to defeat both data leaks and control attacks.\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nWe first identify that, in modern systems, preventing information\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nleaks can be a general defense that not only stops data leaks but\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nalso defeats control attacks. We then investigate three ways to\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nprevent information leaks: eliminating information-leak\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nvulnerabilities in code, re-designing system mechanisms against\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\ninformation leaks, and protecting certain sensitive data from\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\ninformation leaks. We develop multiple tools for each way. While\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nautomatically and reliably securing complex systems, all these tool\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nimpose negligible performance overhead. We conclude that preventing\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\ninformation leaks can be a general and practical approach to\u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\nsecuring complex modern systems. \u003C\/pre\u003E\r\n\r\n\u003Cpre\u003E\r\n\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; \u003C\/pre\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Securing Modern Systems by Preventing Information Leaks"}],"uid":"27707","created_gmt":"2017-07-17 18:16:13","changed_gmt":"2017-07-17 18:16:13","author":"Tatianna Richardson","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-07-19T11:00:00-04:00","event_time_end":"2017-07-19T13:00:00-04:00","event_time_end_last":"2017-07-19T13:00:00-04:00","gmt_time_start":"2017-07-19 15:00:00","gmt_time_end":"2017-07-19 17:00:00","gmt_time_end_last":"2017-07-19 17:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"groups":[{"id":"221981","name":"Graduate Studies"}],"categories":[],"keywords":[{"id":"100811","name":"Phd Defense"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}