<node id="602504">
  <nid>602504</nid>
  <type>event</type>
  <uid>
    <user id="34659"><![CDATA[34659]]></user>
  </uid>
  <created>1518816247</created>
  <changed>1518816247</changed>
  <title><![CDATA[Cybersecurity Lecture Series with Hong Hu]]></title>
  <body><![CDATA[<p>The <a href="http://www.iisp.gatech.edu/cyber-lecture">Cybersecurity Lecture Series at Georgia Tech</a> is a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.</p>

<p><a href="http://attend.com/Hu">RSVP</a></p>

<p><strong>On Friday, Feb. 23</strong>&nbsp;guest speaker Hong Hu Ph.D. will give a lecture titled <em>&quot;<strong>Hacking Data-Flow for Turing-Complete Attacks&quot;.</strong></em></p>

<p><em>Control-flow hijacking attacks from memory errors become more and more difficult&nbsp;as targeted defense mechanisms gain wide deployment. As an alternative, non-control&nbsp;data attacks do not require diverting the application&rsquo;s control flow, and thus can bypass&nbsp;existing advanced defense mechanisms. Although it is known that such data-oriented&nbsp;attacks can mount significant damage, we are not clear about their real expressiveness. In this talk, Dr. Hu will first present data-flow stitching, a systematic method to build data-oriented&nbsp;attacks. Instead of corrupting individual data inside the program, data-flow stitching breaks existing data-flows and connects the fragments in a malicious manner, thus enabling&nbsp;systematic construction. Then I will propose data-oriented programming, a novel method&nbsp;to build expressive data-oriented attacks, even Turing-complete attacks. Finally, Dr.Hu will show&nbsp;data-oriented attacks against Chromium that bypass the fundamental SOP policy.</em></p>

<p><a href="https://www.cc.gatech.edu/~hhu86/">Dr. Hong Hu </a>is a postdoctoral fellow in School of Computer Science, College of Computing, the Georgia Institute of Technology. His research interest focuses on system security. Currently, he is working on the memory error detection, exploitation and defense. His&nbsp;research work has been published on Oakland, Usenix, CCS, ESORICS, ICECCS. He&nbsp;has received the Best Paper Award from ICECCS&#39;2014. Before joining Georgia Tech,&nbsp;he obtained his PhD degree from National University of Singapore.</p>

<p>&nbsp;</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Free, open-to-the public discussion about cybersecurity risks, trends, and techniques.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>On Friday, Feb. 23 guest speaker Hong Hu Ph.D. will present his lecture titled, <em>&quot;Hacking Data-Flow for Turing-Complete Attacks&quot;.</em></p>
]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2018-02-23T12:00:00-05:00]]></value>
      <value2><![CDATA[2018-02-23T13:00:00-05:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
      </field_audience>
  <field_media>
          <item>
        <nid>
          <node id="602501">
            <nid>602501</nid>
            <type>image</type>
            <title><![CDATA[Hong Hu]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>229630</fid>
                  <filename><![CDATA[photo.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/photo_5.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/photo_5.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="593723">
            <nid>593723</nid>
            <type>image</type>
            <title><![CDATA[Cybersecurity Lecture Series by IISP]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>226333</fid>
                  <filename><![CDATA[CLS_logo_FY18 w tag.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/CLS_logo_FY18%20w%20tag.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/CLS_logo_FY18%20w%20tag.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[<p><a href="mailto:lindsey.panetta@gtri.gatech.edu">lindsey.panetta@gtri.gatech.edu</a></p>
]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[http://attend.com/Hu]]></url>
      <title><![CDATA[RSVP]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>98601</tid>
        <value><![CDATA[hacking]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
