<node id="593547">
  <nid>593547</nid>
  <type>event</type>
  <uid>
    <user id="27707"><![CDATA[27707]]></user>
  </uid>
  <created>1500315373</created>
  <changed>1500315373</changed>
  <title><![CDATA[PhD Defense by Kangjie Lu]]></title>
  <body><![CDATA[<pre>
<strong>Title</strong>: Securing Modern Systems by Preventing Information Leaks</pre>

<pre>

&nbsp;</pre>

<pre>

&nbsp;</pre>

<pre>
Kangjie Lu</pre>

<pre>
Ph.D. Candidate</pre>

<pre>
School of Computer Science</pre>

<pre>
College of Computing</pre>

<pre>
Georgia Institute of Technology</pre>

<pre>

&nbsp;</pre>

<pre>

&nbsp;</pre>

<pre>
<strong>Date</strong>: Wednesday, July 19, 2017</pre>

<pre>
<strong>Time</strong>: 10AM-12PM EDT</pre>

<pre>
<strong>Location</strong>: KACB 3100</pre>

<pre>

&nbsp;</pre>

<pre>

&nbsp;</pre>

<pre>
<strong>Committee</strong>:</pre>

<pre>
---------------</pre>

<pre>

&nbsp;</pre>

<pre>
Dr. Wenke Lee (Advisor), School of Computer Science, Georgia Tech</pre>

<pre>
Dr. Taesoo Kim (Co-advisor), School of Computer Science, Georgia Tech</pre>

<pre>
Dr. Mustaque Ahamad,&nbsp; School of Computer Science, Georgia Tech</pre>

<pre>
Dr. William R. Harris, School of Computer Science, Georgia Tech</pre>

<pre>
Dr. Debin Gao, Singapore Management University</pre>

<pre>
Dr. Michael Backes, Saarland University and MPI-SWS</pre>

<pre>

&nbsp;</pre>

<pre>

&nbsp;</pre>

<pre>
<strong>Abstract</strong>:</pre>

<pre>
---------------</pre>

<pre>

&nbsp;</pre>

<pre>
Foundational software systems such as operating systems and web</pre>

<pre>
servers are always implemented in unsafe programming languages for</pre>

<pre>
efficiency, and system designers often prioritize performance over</pre>

<pre>
security. Hence, these systems inherently suffer from a variety of</pre>

<pre>
vulnerabilities and insecure designs that have been exploited by</pre>

<pre>
adversaries to launch critical system attacks. Two typical goals of</pre>

<pre>
these attacks are to leak sensitive data and to control victim</pre>

<pre>
systems.</pre>

<pre>

&nbsp;</pre>

<pre>
This thesis work aims to defeat both data leaks and control attacks.</pre>

<pre>
We first identify that, in modern systems, preventing information</pre>

<pre>
leaks can be a general defense that not only stops data leaks but</pre>

<pre>
also defeats control attacks. We then investigate three ways to</pre>

<pre>
prevent information leaks: eliminating information-leak</pre>

<pre>
vulnerabilities in code, re-designing system mechanisms against</pre>

<pre>
information leaks, and protecting certain sensitive data from</pre>

<pre>
information leaks. We develop multiple tools for each way. While</pre>

<pre>
automatically and reliably securing complex systems, all these tool</pre>

<pre>
impose negligible performance overhead. We conclude that preventing</pre>

<pre>
information leaks can be a general and practical approach to</pre>

<pre>
securing complex modern systems. </pre>

<pre>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </pre>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Securing Modern Systems by Preventing Information Leaks]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2017-07-19T11:00:00-04:00]]></value>
      <value2><![CDATA[2017-07-19T13:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>221981</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Graduate Studies]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>100811</tid>
        <value><![CDATA[Phd Defense]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
