<node id="601721">
  <nid>601721</nid>
  <type>news</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1517514767</created>
  <changed>1517515394</changed>
  <title><![CDATA[ Two Ph.D. Students Named IISP Cybersecurity Fellows]]></title>
  <body><![CDATA[<p>Two Ph.D. students, <strong>Celine Irvene</strong> and <strong>Jenna McGrath</strong>, received funding from the <a href="http://cyber.gatech.edu/cybersecurity-fellowship-program">IISP Cybersecurity Fellowship program</a> to support their research&nbsp;during Spring&nbsp;&#39;18. The selection of Irvene&nbsp;as the first Cybersecurity&nbsp;Fellow who focuses on robotic systems demonstrates&nbsp;the increasing demand for protecting robotic systems, as robots become prevalent&nbsp;in our factories, hospitals&nbsp;and homes. The support for McGrath&#39;s research on cyberattacks on electric grids, a second project on this&nbsp;topic&nbsp;funded&nbsp;by the&nbsp;IISP&nbsp;Cybersecurity&nbsp;Fellowship&nbsp;(see Fall &#39;17 Fellow <a href="http://cyber.gatech.edu/cybersecurity-fellowship-fall-17">Leilei Xiong&#39;s research</a> last semester), reflects the growing importance of protecting the electricity infrastructure against cyber-enabled attacks, and identifying vulnerabilities unaddressed by current policies.</p>

<p>The&nbsp;Cybersecurity&nbsp;Fellowship program&nbsp;supports unfunded and under-funded, emerging research so that outstanding Ph.D. students may do what they do best &ndash; take exceptional ideas from concept to proof. The Fellowship serves to motivate students with an advanced understanding of information assurance and&nbsp;cyberthreats&nbsp;to pursue innovative research without undue concern for lack of funds.</p>

<p>Irvene&nbsp;is a Ph.D. student in the School of Electrical and Computer Engineering with a concentration in cyber-physical systems security. She received both her M.S. in Electrical and Computer Engineering and B.S. in Computer&nbsp;Engineering from Georgia Tech. Irvene&nbsp;was selected as a <a href="http://ceed.gatech.edu/rise" target="_blank">CEED RISE&nbsp;Scholar</a> as an undergraduate, and received the National Physical Science Consortium Fellowship as a graduate student. She is advised by <a href="https://iisp.gatech.edu/raheem-beyah" target="_blank">Raheem&nbsp;Beyah</a>, associate chair for strategic initiatives and innovation, and interim chair of the School of Electrical and Computer Engineering.&nbsp;</p>

<p>McGrath is a Ph.D. student in the School of Public Policy, with a focus on energy and environmental policy. She received her bachelor&#39;s degree in environmental policy and analysis in 2011 and her master&#39;s degree in energy analysis in 2012, both from Boston University. Upon graduation, she became&nbsp;a fellow at the Massachusetts Clean Energy Center, and then worked in research and business development at an energy storage start-up at Boston. She began her studies at Georgia Tech in 2013, and was selected as a fellow for the&nbsp;National Science Foundation Integrative Graduate Education and Research Traineeship Program (IGERT). There, she focused on nanomaterials for energy storage and conversion for two years. She was then selected as a Sam Nunn Security Program Fellow from 2015 to 2016. McGrath is currently advised by <a href="https://www.isye.gatech.edu/users/valerie-thomas" target="_blank">Valerie Thomas</a>&nbsp;in the H.Milton Stewart School of Industrial &amp; Systems Engineering.</p>

<p>&nbsp;</p>

<h3><strong>About Their Research</strong></h3>

<h4><strong><em>Understanding and Addressing the Privacy Challenges of the IoT Era</em></strong></h4>

<p><br />
Irvene&#39;s present research focuses on the security of robotics systems.</p>

<p>&quot;I am building a HoneyBot, the first honeypot for robotic systems,&quot; said Irvene.&nbsp;&quot;As the prevalence of remotely accessible robots grows for telesurgery, cyberwarfare, [and] home automation,&nbsp;so do the threats associated with their use.&quot;</p>

<p>According to Irvene, attacks on cyber-physical systems have already begun.&nbsp;Stuxnet, for example, was&nbsp;a malicious computer worm that famously damaged Iran&#39;s nuclear program. It targets the same&nbsp;programmable logic controllers that are used to control systems such as machinery&nbsp;on factory assembly lines, amusement park rides, or power plants.&nbsp;As robotic&nbsp;systems become more prevalent, the consequence&nbsp;of such attacks becomes increasingly severe.&nbsp;</p>

<p>&quot;The HoneyBot will assist in the creation of threat models in the untouched domain of robotics security as well as monitor attacker&rsquo;s actions &#39;inside&#39;&nbsp;of a system in order to study their behavior, understand their capabilities, and provide behavioral fingerprints that can be used for attribution of future attacks,&quot; she says.</p>

<p>Irvene&nbsp;first worked under&nbsp;Beyah&#39;s&nbsp;supervision&nbsp;in a Georgia Tech summer research experience program, after earning the highest overall average in Beyah&#39;s class, Introduction to Computer Security. &quot;[Irvene] has distinguished herself as an extremely bright student and a creative, thorough and capable researcher,&quot; said Beyah. &quot;Specifically, [Irvene]&#39;s summer research project involved the development of a novel, robust, and effective method to passively fingerprint IoT devices using traffic characterization techniques. This effort required a diverse spectrum of talents, ranging from having a solid networking and security background to having excellent programming skills.&quot; Irvene&nbsp;now continues her research as a Ph.D. student in Beyah&#39;s&nbsp;research group.&nbsp;&nbsp;</p>

<p>&quot;Receiving this award is exciting because it will enable me to focus on my research, expanding the prototype HoneyBot system to make it more robust as well as pursue other interesting projects as they arise,&quot; said Irvene.</p>

<p>&nbsp;</p>

<h4>&nbsp;</h4>

<h4><strong><em>Cyber-Physical Security Policy for the Electric Grid: What Has Been the Policy Response, and How Effective Is It?</em></strong></h4>

<p>McGrath&#39;s dissertation research focuses on the evolution of targeted physical and cyber attacks against U.S. electricity infrastructure, and how federal funding and policies react to improve grid resiliency and security.</p>

<p>&quot;My research considers significant outages and unusual incidents on the grid caused by weather events, technical failures, and malicious physical and cyberattacks,&quot; said McGrath.&nbsp;&quot;I then evaluate how the characteristics of these incidents affect policy interventions and funding allocations at the federal level. In particular, is there a difference in policy response and subsequent funding when the incident is related to a confirmed or suspected attack versus a weather-related outage? Furthermore, I seek to determine whether these policy improvements will actually help prevent and deter future physical and cyber attacks, especially as methods and motivations for attacks are becoming more sophisticated. I am particularly interested in researching the risk of cyber-enabled physical attacks given past physical and cyber attacks and the ensuing policy responses.&quot;&nbsp;</p>

<p>According to McGrath, her research can help better assess the metrics of attacks on electricity infrastructure in the U.S. and the policy response.&nbsp;It can further explore the vulnerable aspects left unaddressed and potential targets in more complex future attacks.</p>

<p>&quot;[McGrath] is able to address a type of question that others are not,&quot; said Valerie Thomas, McGrath&#39;s academic advisor. &quot;The vulnerability of the electric grid to cyberattacks has significant public policy applications, with potential for identifying a range of local to national scale measures that could improve the security of the grid, as well as to identify gaps or mismatches between utility or regulator security actions and the risk profile.&quot;</p>

<p>&quot;Receiving this award allows me to focus more of my research on the risk of cyber-enabled physical attacks on the electric grid. Additionally, inclusion in the Cybersecurity Fellowship program will allow me to communicate, collaborate, and learn from the program&rsquo;s participating faculty, excelling my policy-based research further and adding novel computing, cybersecurity, and other interdisciplinary perspectives and techniques to my work,&quot; said McGrath.</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2018-01-29T00:00:00-05:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Celine Irvene and Jenna McGrath were named IISP Cybersecurity Fellows for Spring '18.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="601723">
            <nid>601723</nid>
            <type>image</type>
            <title><![CDATA[Spring '18 IISP Cybersecurity Fellows]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>229360</fid>
                  <filename><![CDATA[CS_Fellows_1200x600_01.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/CS_Fellows_1200x600_01.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/CS_Fellows_1200x600_01.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Education]]>
      </item>
          <item>
        <![CDATA[Student and Faculty]]>
      </item>
          <item>
        <![CDATA[Student Research]]>
      </item>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>42911</tid>
        <value><![CDATA[Education]]></value>
      </item>
          <item>
        <tid>134</tid>
        <value><![CDATA[Student and Faculty]]></value>
      </item>
          <item>
        <tid>8862</tid>
        <value><![CDATA[Student Research]]></value>
      </item>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
