{"600543":{"#nid":"600543","#data":{"type":"event","title":"Cybersecurity Lecture Series with Dave Levin","body":[{"value":"\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003E\u0026quot;Revocations Are Dead, Long Live Revocations\u0026quot;\u003C\/em\u003E\u003C\/strong\u003E\u003Cbr \/\u003E\r\n\u003Cem\u003EThe importance of the web\u0026rsquo;s public key infrastructure (PKI) cannot be overstated: it is what allows users to know with whom they are communicating online. Central to its correct operation is the ability to \u0026ldquo;revoke\u0026rdquo; certificates in the wake of a compromised key. For revocations to work: (1) website administrators must request to have their certificates revoked, (2) browser manufacturers must regularly check for revocations, and (3) above all, no one should share their private keys.\u0026nbsp;Using Internet-wide measurements, I will show that all of these are violated on a regular basis, largely due to perverse economic incentives.\u0026nbsp; I will also present a promising path forward: a new system, CRLite, that compactly represents all revocations in only tens of kilobytes per day.\u0026nbsp; CRLite shows that, at last, it is feasible for every client to download every revocation everyday.\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n\u003Cstrong\u003E\u003Ca href=\u0022https:\/\/www.cs.umd.edu\/~dml\/\u0022\u003EDave Levin\u003C\/a\u003E\u0026nbsp;\u003C\/strong\u003Eis an\u0026nbsp;assistant professor in the School of Computer Science at the University of Maryland. His research\u0026nbsp;empirically measures security on the Internet to understand how security breaks down, and he applies economics and cryptography to design and build new systems with\u0026nbsp;\u003Cem\u003Eprovable\u003C\/em\u003E\u0026nbsp;and\u0026nbsp;\u003Cem\u003Eusable\u003C\/em\u003E\u0026nbsp;security. Levin studies\u0026nbsp;the web\u0026#39;s PKI,\u0026nbsp;censorship avoidance,\u0026nbsp;DNS root servers, and\u0026nbsp;more.\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022\u003ECybersecurity Lecture Series at Georgia Tech\u003C\/a\u003E is a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.\u003C\/p\u003E\r\n\r\n\u003Ch6\u003E\u003Cem\u003E\u003Cstrong\u003EPresented by the \u003Ca href=\u0022http:\/\/cyber.gatech.edu\/\u0022\u003EInstitute for Information Security \u0026amp; Privacy\u003C\/a\u003E\u003C\/strong\u003E\u003C\/em\u003E\u003C\/h6\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EVisting guest Dave Levin, assistant professor at the University of Maryland, will explain his proposed system to help track revocations of digital certificates.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Free, open-to-the public discussion about cybersecurity risks, trends, and techniques"}],"uid":"27490","created_gmt":"2018-01-08 19:32:39","changed_gmt":"2018-01-08 19:39:49","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2018-01-12T12:20:00-05:00","event_time_end":"2018-01-12T13:10:00-05:00","event_time_end_last":"2018-01-12T13:10:00-05:00","gmt_time_start":"2018-01-12 17:20:00","gmt_time_end":"2018-01-12 18:10:00","gmt_time_end_last":"2018-01-12 18:10:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"600545":{"id":"600545","type":"image","title":"Dave Levin","body":null,"created":"1515440321","gmt_created":"2018-01-08 19:38:41","changed":"1515440321","gmt_changed":"2018-01-08 19:38:41","alt":"Dave Levin","file":{"fid":"228931","name":"dml-cropped5.png","image_path":"\/sites\/default\/files\/images\/dml-cropped5.png","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/dml-cropped5.png","mime":"image\/png","size":78518,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/dml-cropped5.png?itok=-Q85YC1d"}},"593723":{"id":"593723","type":"image","title":"Cybersecurity Lecture Series by IISP","body":null,"created":"1500996186","gmt_created":"2017-07-25 15:23:06","changed":"1500996186","gmt_changed":"2017-07-25 15:23:06","alt":"","file":{"fid":"226333","name":"CLS_logo_FY18 w tag.jpg","image_path":"\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","mime":"image\/jpeg","size":580256,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/CLS_logo_FY18%20w%20tag.jpg?itok=S8GXpa-Z"}}},"media_ids":["600545","593723"],"groups":[{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"2229","name":"Internet"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}