{"600815":{"#nid":"600815","#data":{"type":"event","title":"Cybersecurity Lecture Series with Kennon Bittick","body":[{"value":"\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003E\u003Cstrong\u003E\u003Cstrong\u003E\u0026quot;The Scalability of Vulnerability Analysis\u0026quot;\u003C\/strong\u003E\u003C\/strong\u003E\u003C\/strong\u003E\u003C\/strong\u003E\u003Cbr \/\u003E\r\nAnalyzing software for vulnerabilities is an important capability in ensuring the security of a computing system. As software has become more complex and ubiquitous, however, traditional vulnerability analysis techniques have failed to scale with the software. This talk will look through some of the history of vulnerability analysis, starting with manual analysis and simple fuzzing, and will move into modern intelligent fuzzing and symbolic execution. Trade-offs between analysis effectiveness and scalability will be discussed throughout, and the talk will conclude by looking at the potential future of hybrid human-computer vulnerability analysis.\u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\n\u003Cstrong\u003EKennon Bittick\u003C\/strong\u003E is a research scientist at the \u003Ca href=\u0022https:\/\/gtri.gatech.edu\/laboratories\/cybersecurity-information-protection-and-hardware-evaluation-research\u0022\u003EGeorgia Tech Research Institute\u0026#39;s CIPHER Lab\u003C\/a\u003E (Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory in Atlanta. Bittick contributes to the software assurance group within CIPHER. Past work includes Apiary, a community-focused threat intelligence tool developed by GTRI.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022\u003ECybersecurity Lecture Series at Georgia Tech\u003C\/a\u003E is a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.\u003C\/p\u003E\r\n\r\n\u003Ch6\u003E\u003Cem\u003E\u003Cstrong\u003EPresented by the \u003Ca href=\u0022http:\/\/cyber.gatech.edu\/\u0022\u003EInstitute for Information Security \u0026amp; Privacy\u003C\/a\u003E\u003C\/strong\u003E\u003C\/em\u003E\u003C\/h6\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EResearch Scientist Kennon Bittick, with the CIPHER Lab at GTRI, discusses methods used for vulnerability analysis and future approaches for better scalability.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Free, open-to-the public discussion about cybersecurity risks, trends, and techniques"}],"uid":"27490","created_gmt":"2018-01-12 22:31:39","changed_gmt":"2018-01-19 20:52:33","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2018-01-26T12:00:00-05:00","event_time_end":"2018-01-26T13:00:00-05:00","event_time_end_last":"2018-01-26T13:00:00-05:00","gmt_time_start":"2018-01-26 17:00:00","gmt_time_end":"2018-01-26 18:00:00","gmt_time_end_last":"2018-01-26 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"593723":{"id":"593723","type":"image","title":"Cybersecurity Lecture Series by IISP","body":null,"created":"1500996186","gmt_created":"2017-07-25 15:23:06","changed":"1500996186","gmt_changed":"2017-07-25 15:23:06","alt":"","file":{"fid":"226333","name":"CLS_logo_FY18 w tag.jpg","image_path":"\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","mime":"image\/jpeg","size":580256,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/CLS_logo_FY18%20w%20tag.jpg?itok=S8GXpa-Z"}}},"media_ids":["593723"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"2229","name":"Internet"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}