{"602504":{"#nid":"602504","#data":{"type":"event","title":"Cybersecurity Lecture Series with Hong Hu","body":[{"value":"\u003Cp\u003EThe \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022\u003ECybersecurity Lecture Series at Georgia Tech\u003C\/a\u003E is a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/attend.com\/Hu\u0022\u003ERSVP\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EOn Friday, Feb. 23\u003C\/strong\u003E\u0026nbsp;guest speaker Hong Hu Ph.D. will give a lecture titled \u003Cem\u003E\u0026quot;\u003Cstrong\u003EHacking Data-Flow for Turing-Complete Attacks\u0026quot;.\u003C\/strong\u003E\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003EControl-flow hijacking attacks from memory errors become more and more difficult\u0026nbsp;as targeted defense mechanisms gain wide deployment. As an alternative, non-control\u0026nbsp;data attacks do not require diverting the application\u0026rsquo;s control flow, and thus can bypass\u0026nbsp;existing advanced defense mechanisms. Although it is known that such data-oriented\u0026nbsp;attacks can mount significant damage, we are not clear about their real expressiveness. In this talk, Dr. Hu will first present data-flow stitching, a systematic method to build data-oriented\u0026nbsp;attacks. Instead of corrupting individual data inside the program, data-flow stitching breaks existing data-flows and connects the fragments in a malicious manner, thus enabling\u0026nbsp;systematic construction. Then I will propose data-oriented programming, a novel method\u0026nbsp;to build expressive data-oriented attacks, even Turing-complete attacks. Finally, Dr.Hu will show\u0026nbsp;data-oriented attacks against Chromium that bypass the fundamental SOP policy.\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/~hhu86\/\u0022\u003EDr. Hong Hu \u003C\/a\u003Eis a postdoctoral fellow in School of Computer Science, College of Computing, the Georgia Institute of Technology. His research interest focuses on system security. Currently, he is working on the memory error detection, exploitation and defense. His\u0026nbsp;research work has been published on Oakland, Usenix, CCS, ESORICS, ICECCS. He\u0026nbsp;has received the Best Paper Award from ICECCS\u0026#39;2014. Before joining Georgia Tech,\u0026nbsp;he obtained his PhD degree from National University of Singapore.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EOn Friday, Feb. 23 guest speaker Hong Hu Ph.D. will present his lecture titled, \u003Cem\u003E\u0026quot;Hacking Data-Flow for Turing-Complete Attacks\u0026quot;.\u003C\/em\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Free, open-to-the public discussion about cybersecurity risks, trends, and techniques."}],"uid":"34659","created_gmt":"2018-02-16 21:24:07","changed_gmt":"2018-02-16 21:24:07","author":"lpanetta3","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2018-02-23T12:00:00-05:00","event_time_end":"2018-02-23T13:00:00-05:00","event_time_end_last":"2018-02-23T13:00:00-05:00","gmt_time_start":"2018-02-23 17:00:00","gmt_time_end":"2018-02-23 18:00:00","gmt_time_end_last":"2018-02-23 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"602501":{"id":"602501","type":"image","title":"Hong Hu","body":null,"created":"1518815489","gmt_created":"2018-02-16 21:11:29","changed":"1518815489","gmt_changed":"2018-02-16 21:11:29","alt":"","file":{"fid":"229630","name":"photo.jpg","image_path":"\/sites\/default\/files\/images\/photo_5.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/photo_5.jpg","mime":"image\/jpeg","size":87999,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/photo_5.jpg?itok=FRjv0n3S"}},"593723":{"id":"593723","type":"image","title":"Cybersecurity Lecture Series by IISP","body":null,"created":"1500996186","gmt_created":"2017-07-25 15:23:06","changed":"1500996186","gmt_changed":"2017-07-25 15:23:06","alt":"","file":{"fid":"226333","name":"CLS_logo_FY18 w tag.jpg","image_path":"\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","mime":"image\/jpeg","size":580256,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/CLS_logo_FY18%20w%20tag.jpg?itok=S8GXpa-Z"}}},"media_ids":["602501","593723"],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"98601","name":"hacking"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}