{"596396":{"#nid":"596396","#data":{"type":"news","title":" Grant Supports Hardware Security Research to Combat Malware","body":[{"value":"\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003EAtlanta\u0026nbsp; |\u0026nbsp; Sept. 24, 2017\u003C\/strong\u003E\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EResearchers in the \u003Ca href=\u0022https:\/\/www.ece.gatech.edu\/\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003ESchool of Electrical and Computer Engineering\u003C\/strong\u003E\u003C\/a\u003E (ECE) at the Georgia Institute of Technology have been awarded a $100,000 grant to detect runtime errors using hardware-assisted signature generation. The year-long research project is supported by the Cisco University Research Program Fund, a corporate-advised fund of the Silicon Valley Community Foundation.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/vincent-mooney\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003EVincent John Mooney\u003C\/strong\u003E\u003C\/a\u003E, an associate professor in the School of ECE, leads the Hardware\/Software Co-design for Security group which carries out research in embedded systems security and will conduct the investigation based on their proposal, \u0026ldquo;Runtime Detection of Code Integrity Attacks.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe project has been identified by Cisco Systems, Inc., as a unique methodology for protecting systems from potentially malicious runtime code modifications. \u0026nbsp;When software processes are executed on an operating system, the technique will provide a high level of assurance of process integrity and will detect if those processes have been maliciously altered. \u0026nbsp;Hardware will be introduced to check hash-based signatures at runtime compared to pre-generated signatures found in a locally secure database in order to verify the reliability of the processes running on the system.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDiscussions of the research initially took place at the 2015 Cyber Security Summit hosted by the Institute for Information Security \u0026amp; Privacy at Georgia Tech.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;We are pleased to be able to expand our research into process integrity with this gift from Cisco and the Silicon Valley Community Foundation,\u0026quot; said Mooney. \u0026quot;We are also very thankful for financial support from the Georgia Tech Research Institute, which enabled our team to create the momentum needed to launch into this next phase of hardware security research.\u0026quot;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe \u003Ca href=\u0022https:\/\/www.ece.gatech.edu\/\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003ESchool of Electrical and Computer Engineering\u003C\/strong\u003E\u003C\/a\u003E (ECE) will begin a year-long project -- under the direction of Associate Professor Vincent John Mooney --\u0026nbsp; to detect runtime errors, following discussions that began more than a year ago at the 14th Annual Georgia Tech Cyber Security Summit.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Researchers will begin a $100,000 project for Cisco to detect runtime errors using hardware-assisted signature generation. "}],"uid":"27490","created_gmt":"2017-09-24 21:20:51","changed_gmt":"2017-09-24 21:26:39","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2017-09-24T00:00:00-04:00","iso_date":"2017-09-24T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"596395":{"id":"596395","type":"image","title":"Cicso Code Integrity","body":null,"created":"1506287662","gmt_created":"2017-09-24 21:14:22","changed":"1506287662","gmt_changed":"2017-09-24 21:14:22","alt":"","file":{"fid":"227293","name":"Cisco_Mooney_malware-hardware-research.jpg","image_path":"\/sites\/default\/files\/images\/Cisco_Mooney_malware-hardware-research.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/Cisco_Mooney_malware-hardware-research.jpg","mime":"image\/jpeg","size":422890,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Cisco_Mooney_malware-hardware-research.jpg?itok=v8dsOITW"}},"596397":{"id":"596397","type":"image","title":"Vincent John Mooney","body":null,"created":"1506288162","gmt_created":"2017-09-24 21:22:42","changed":"1506288162","gmt_changed":"2017-09-24 21:22:42","alt":"","file":{"fid":"227294","name":"Unknown-2.jpeg","image_path":"\/sites\/default\/files\/images\/Unknown-2.jpeg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/Unknown-2.jpeg","mime":"image\/jpeg","size":535263,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Unknown-2.jpeg?itok=lhQnp37C"}}},"media_ids":["596395","596397"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}