<nodes> <node id="640215">  <title><![CDATA[Phase 2 of Endpoint Compliance Campaign Underway]]></title>  <uid>34822</uid>  <body><![CDATA[<p>Georgia Tech wrapped up Phase 1 of the Endpoint Management &amp; Protection Compliance Campaign in late July. Phase 2 of the campaign is now underway and&nbsp;requires full compliance of all GT-owned off-campus and on-campus/on-network devices by December 18, 2020.</p><p>Pursuant to&nbsp;<a href="https://www.usg.edu/information_technology_services/assets/information_technology_services/documents/2020_IT_Handbook.pdf">University System of Georgia (USG) policy, Section 5.8 (page 66)</a>, all USG organizations must implement endpoint security by &quot;deploying&nbsp;tools that add a layer of security to devices&nbsp;connecting to&nbsp;networks that may otherwise make them vulnerable to cyber attacks.&quot;&nbsp;Georgia Tech&#39;s Endpoint Management &amp; Protection Program&nbsp;ensures secure management of all Institute-owned endpoint devices, including desktops, laptops, tablets, and mobile phones.&nbsp;In early 2020, President Cabrera requested that campus leadership work&nbsp;with their respective teams to ensure full attention and participation in the endpoint compliance effort&nbsp;and other efforts&nbsp;related to data security and protection.</p><h4>Benefits of Endpoint Management &amp; Protection</h4><ul><li>Protection against cyber threats</li><li>Simple self service installation and updating of GT-licensed software</li><li>Centralized&nbsp;process for applying patches and making updates</li><li>Compliance with university system policy</li><li>Faster, and sometimes automated, issue resolution</li></ul><p>The knowledge article, <a href="https://gatech.service-now.com/home?id=kb_article_view&amp;sysparm_article=KB0023477" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://gatech.service-now.com/home?id=kb_article_view&amp;sysparm_article=kb0023477">How to Meet Endpoint Management Compliance for Endpoints</a>, shares additional information and resources regarding the compliance campaign as well as resources for installing the appropriate endpoint tools. <em>Please note that you must be logged into <a href="https://services.gatech.edu/" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://services.gatech.edu/">Services.gatech.edu</a> to view the knowledge article.</em></p><p>Additional information regarding the campaign is shared at&nbsp;<a href="https://oit.gatech.edu/endpointcompliance">https://oit.gatech.edu/endpointcompliance</a>.&nbsp;</p>]]></body>  <author>Malynda Dorsey</author>  <status>1</status>  <created>1602708094</created>  <gmt_created>2020-10-14 20:41:34</gmt_created>  <changed>1602760700</changed>  <gmt_changed>2020-10-15 11:18:20</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[ Phase 2 of the campaign is now underway and requires full compliance of all GT-owned off-campus and on-campus/on-network devices by December 18, 2020.]]></teaser>  <type>news</type>  <sentence><![CDATA[ Phase 2 of the campaign is now underway and requires full compliance of all GT-owned off-campus and on-campus/on-network devices by December 18, 2020.]]></sentence>  <summary><![CDATA[<p>Georgia Tech wrapped up Phase 1 of the Endpoint Management &amp; Protection Compliance Campaign in late July. Phase 2 of the campaign is now underway and&nbsp;requires full compliance of all GT-owned off-campus and on-campus/on-network devices by December 18, 2020.</p>]]></summary>  <dateline>2020-10-14T00:00:00-04:00</dateline>  <iso_dateline>2020-10-14T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-10-14 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>626044</item>      </media>  <hg_media>          <item>          <nid>626044</nid>          <type>image</type>          <title><![CDATA[Cybersecurity stock image]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Cybersecurity_stock_image.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Cybersecurity_stock_image.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/Cybersecurity_stock_image.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Cybersecurity_stock_image.jpg?itok=wkg46t70]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Stock photo of stylized padlock icons surrounded by a word cloud of information security terms.]]></image_alt>                    <created>1568223064</created>          <gmt_created>2019-09-11 17:31:04</gmt_created>          <changed>1568223064</changed>          <gmt_changed>2019-09-11 17:31:04</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="174291"><![CDATA[OIT]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>          <keyword tid="183656"><![CDATA[oit feature]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="639654">  <title><![CDATA[Virtual Assistant Stops Robocalls]]></title>  <uid>34541</uid>  <body><![CDATA[<p>Americans receive 4.8 million robocalls a year, but what if they didn&rsquo;t have to be interrupted by them? Georgia Tech researchers developed a virtual assistant that screens calls to block 97 percent of scammers.&nbsp;</p><p>Currently, people rely on blacklist apps to stop spam calls, but they are only up to 60 percent effective, according to School of Computer Science Ph.D. student <a href="https://www.linkedin.com/in/sharbani-pandit/"><strong>Sharbani Pandit</strong></a>. This is because of the prominence of neighbor spoofing, or numbers similar to person&rsquo;s own.</p><p>&ldquo;The caller number will look very similar to your own number, so you&rsquo;re more likely to pick up, and each time they call, they use a new number, so it doesn&rsquo;t show on the blacklist,&rdquo; said Pandit.</p><p>So Pandit and her team tried a more direct approach, a virtual assistant (VA). Like a smart home device or a secretary, the VA determines whether calls are from people before it passes the call off to the user.</p><p><strong>How It Works</strong></p><p>Whether a call is spam or not can be determined by a simple question: does the caller know the name of the person they&rsquo;re calling?</p><p>&ldquo;The idea is someone who is a wanted caller would know the full name of the person they&rsquo;re trying to reach,&rdquo; Pandit said.</p><p>If the caller can confirm the name, the VA would forward the call and a transcript of how the conversation went to the user. The entire interaction takes 10 seconds.</p><p>For callers who may not know the name but are not a bot, VA engages in a conversation and interrupts the caller as they are speaking to determine if the caller stops talking. This process takes a maximum of 30 seconds.</p><p>&ldquo;It&rsquo;s very natural in human conversation that you would stop to listen to what the other party is saying on the call, but a bot wouldn&rsquo;t do that,&rdquo; Pandit said.</p><p>For calls thought to be spam, the notification would be sent to the user with a label for each caller to indicate whether it was a human or a robot caller.</p><p><strong>How Many Calls It Stops</strong></p><p>The researchers did a user study with 21 people who determined they were comfortable talking to the VA. They also tested the VA on a database 8,000 robocall recordings, in which 97.8 percent of the robocalls were correctly labeled as such.</p><p>Pandit presented the research in <a href="https://arxiv.org/abs/2008.03554"><em>Fighting Voice Spam with a Virtual Assistant Prototype</em></a>. She co-wrote the paper with University of Georgia&rsquo;s <a href="https://www.linkedin.com/in/jienan-liu-144413157/"><strong>Jienan Liu</strong></a> and Associate Professor <a href="https://sites.google.com/site/robertoperdisci/Home"><strong>Roberto Perdisci</strong></a>, and SCS Professor <a href="https://www.cc.gatech.edu/people/mustaque-ahamad"><strong>Mustaque Ahamad</strong></a>.&nbsp; The work has already garnered media attention from <a href="https://www.newscientist.com/article/2251898-virtual-assistant-will-screen-your-phone-calls-to-block-spammers/"><em>New Scientist</em></a> and <a href="https://www.digitaltrends.com/news/ai-assistant-screen-robocallers/"><em>Digital Trends</em></a>.</p><p>The researchers are still making a few adjustments before they release the Android app. Robocalls are constantly evolving and getting more sophisticated, which introduces new challenges to researchers. Some robocalls even have lists of phone numbers and names, so the researchers are adding more questions in the screening conversation that only a human could answer.</p><p>They believe that anything that can slow down the efficacy of robocalls will be a benefit.</p><p>&ldquo;The goal of robocalls is to make as many calls as possible to target victims and make a profit from it, but as security researchers, if we can add hurdles in their step, then sometimes the cost isn&rsquo;t worth it for the attacker,&rdquo; said Pandit.</p>]]></body>  <author>Tess Malone</author>  <status>1</status>  <created>1601316253</created>  <gmt_created>2020-09-28 18:04:13</gmt_created>  <changed>1601492929</changed>  <gmt_changed>2020-09-30 19:08:49</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers developed a virtual assistant that screens calls to block 97 percent of scammers.  ]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers developed a virtual assistant that screens calls to block 97 percent of scammers.  ]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2020-09-28T00:00:00-04:00</dateline>  <iso_dateline>2020-09-28T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-09-28 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Tess Malone, Communications Officer</p><p><a href="mailto:tess.malone@cc.gatech.edu">tess.malone@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>639662</item>      </media>  <hg_media>          <item>          <nid>639662</nid>          <type>image</type>          <title><![CDATA[Robocall]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[telephone ringing.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/telephone%20ringing.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/telephone%20ringing.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/telephone%2520ringing.jpg?itok=XN_wc2hb]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Phone ringing]]></image_alt>                    <created>1601323064</created>          <gmt_created>2020-09-28 19:57:44</gmt_created>          <changed>1601323064</changed>          <gmt_changed>2020-09-28 19:57:44</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="639250">  <title><![CDATA[Ivan Allen College of Liberal Arts Provides Key Expertise to New School of Cybersecurity and Privacy]]></title>  <uid>34600</uid>  <body><![CDATA[<p>Drawing on its strengths in security studies and cybersecurity policy, the Ivan Allen College of Liberal Arts plays a prominent role in the newly launched School of Cybersecurity and Privacy.&nbsp;</p><p>The new School, announced Sept. 15, burnishes the Georgia Institute of Technology&#39;s No, 1 ranking in undergraduate cybersecurity programs by <em>U.S. News. &amp; World Report </em>and will&nbsp;bring&nbsp;together cybersecurity researchers from across campus to focus on protecting personal privacy and national security. Faculty from the School of Public Policy and the Sam Nunn School of International Affairs are among the School&rsquo;s inaugural key scholars.</p><p>&ldquo;Solving tomorrow&rsquo;s toughest cybersecurity problems will require not only a thorough understanding of the technologies and threats involved,&rdquo; said Ivan Allen College Dean Kaye Husbands Fealing. &ldquo;It also will require deep expertise in behavioral and policy considerations that must increasingly inform the development and use of new cybersecurity approaches and technologies.&rdquo;</p><p>&ldquo;By drawing on Georgia Tech&rsquo;s globally respected expertise in the technology and policy arenas, the <a href="https://scp.cc.gatech.edu/">School of Cybersecurity and Privacy</a> will extend our leadership in this area with exactly the kind of innovative, interdisciplinary, human-centered thinking and research we need to advance socially responsible and technically practical solutions to these critical issues.&rdquo;</p><p>The school builds on the Institute&rsquo;s &mdash; and Ivan Allen College&rsquo;s &mdash; deep expertise in cybersecurity issues. More than 500 researchers from across campus work on the issue. <em>U.S. News and World Report</em> ranks Georgia Tech <a href="https://b.gatech.edu/32qqUbL">No. 1 in undergraduate cybersecurity education. </a></p><p>Within Ivan Allen College, the <a href="https://spp.gatech.edu/">School of Public Policy</a> offers the Master of Science in Cybersecurity with a specialization in policy as well as the Online Master of Science in Cybersecurity with a policy focus. The school offers courses in issues such as information security policies and strategies; privacy, technology, policy, and law; and the internet and public policy.</p><p>&ldquo;As the current director of the policy track in Georgia Tech&rsquo;s Master of Science in Cybersecurity, I see the new School as a strengthening of our growing capabilities in cybersecurity research and education,&rdquo; said <a href="https://www.iac.gatech.edu/people/faculty/mueller">Milton Mueller</a>, professor in the School of Public Policy and co-founder and director of the <a href="https://www.internetgovernance.org/">Internet Governance Project</a>.</p><p>&ldquo;The new SCP recognizes the cybersecurity field as an intersection of public policy, international relations, computer science and management. My own research on the relationship between security and Internet governance will be greatly enhanced by the interdisciplinary approach.&rdquo;</p><p>Faculty from the <a href="https://inta.gatech.edu/">Nunn School</a> also are noted experts in cybersecurity related issues. The school teaches courses as part of the cybersecurity degree program including data analytics and security. The school also offers a Master of Science in International Security that includes cyberwarfare as one potential focus for students to explore.</p><p>&ldquo;I&rsquo;m excited to be affiliated with the new School to further build bridges across the Institute in approaching these complex problems,&rdquo; said&nbsp;Associate Professor <a href="https://www.iac.gatech.edu/people/faculty/kosal">Margaret E. Kosal</a>. &ldquo;Putting policy and social science at the forefront of the School is critical. Purely technical approaches aren&rsquo;t going to solve the current and emerging problems in cybersecurity. These are inherently global challenges.&rdquo;</p><p>Regents Professor <a href="https://www.iac.gatech.edu/people/faculty/goodman">Seymour Goodman</a>&nbsp;of the Nunn School and College of Computing, who has studied and written widely on cybersecurity issues, will also be affiliated with the new school.</p><p>&ldquo;I came to Georgia Tech 20 years ago with a view that cybersecurity should be defined to include protection against a wide range of cyber-enabled risks and vulnerabilities that threaten a huge number of people and institutions,&rdquo; Goodman said. &ldquo;By bringing together so many of us working on these issues across Georgia Tech, SCP will be a boon for research in this field, as well as in the kind of innovative cross-disciplinary education we need to prepare the workforce of tomorrow to do this work.&rdquo;</p><p>Other Ivan Allen College faculty who will do work in the school include <a href="https://www.iac.gatech.edu/people/faculty/brecke">Peter Brecke</a>, a Nunn School associate professor and assistant dean of information technology, Associate Professor&nbsp;<a href="https://www.iac.gatech.edu/people/faculty/jordan">Jenna Jordan</a>&nbsp;and Assistant Professor&nbsp;<a href="https://www.iac.gatech.edu/people/faculty/muchlinski">David Muchlinski</a> from the Nunn School; <a href="https://www.iac.gatech.edu/people/faculty/santesso">Aaron Santesso</a>, professor in the School of Literature, Media, and Communication; and Nadia Kostyuk, assistant professor in the School of Public Policy.</p><p>The School of Cybersecurity and Privacy will be led on an interim basis by&nbsp;Rich DeMillo&nbsp;(Ph.D. &rsquo;72), the Charlotte B. and Warren C. Chair of Computer Science and Professor of Management in the College of Computing.</p><p>The new school will launch a nationwide search this fall for multiple faculty members and for its founding permanent chair.</p>]]></body>  <author>mpearson34</author>  <status>1</status>  <created>1600374786</created>  <gmt_created>2020-09-17 20:33:06</gmt_created>  <changed>1600451264</changed>  <gmt_changed>2020-09-18 17:47:44</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Several Ivan Allen College faculty members will be affiliated with the new School of Cybersecurity and Privacy.]]></teaser>  <type>news</type>  <sentence><![CDATA[Several Ivan Allen College faculty members will be affiliated with the new School of Cybersecurity and Privacy.]]></sentence>  <summary><![CDATA[<p>Several Ivan Allen College faculty members will be affiliated with the new School of Cybersecurity and Privacy.</p>]]></summary>  <dateline>2020-09-17T00:00:00-04:00</dateline>  <iso_dateline>2020-09-17T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-09-17 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[michael.pearson@iac.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Michael Pearson<br />michael.pearson@iac.gatech.edu</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>639251</item>      </media>  <hg_media>          <item>          <nid>639251</nid>          <type>image</type>          <title><![CDATA[School of Cybersecurity and Privacy]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[scp_rotator5.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/scp_rotator5.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/scp_rotator5.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/scp_rotator5.jpg?itok=xqo_WGdV]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1600375154</created>          <gmt_created>2020-09-17 20:39:14</gmt_created>          <changed>1600375154</changed>          <gmt_changed>2020-09-17 20:39:14</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1281"><![CDATA[Ivan Allen College of Liberal Arts]]></group>          <group id="1285"><![CDATA[Sam Nunn School of International Affairs]]></group>          <group id="1283"><![CDATA[School of Literature, Media, and Communication]]></group>          <group id="1289"><![CDATA[School of Public Policy]]></group>      </groups>  <categories>          <category tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></category>      </categories>  <news_terms>          <term tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></term>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="767"><![CDATA[Policy]]></keyword>          <keyword tid="955"><![CDATA[ivan allen college]]></keyword>      </keywords>  <core_research_areas>          <term tid="39511"><![CDATA[Public Service, Leadership, and Policy]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="639099">  <title><![CDATA[New School Builds on Georgia Tech's Commitment to Advancing Cybersecurity and Privacy Education]]></title>  <uid>32045</uid>  <body><![CDATA[<p>Georgia Tech, which has been named No. 2 in undergraduate cybersecurity education by U.S. News and World Report, is building upon its success by launching a new School of Cybersecurity and Privacy. The new school is the first of its kind among top research universities.</p><p>The new School will build on Georgia Tech&rsquo;s considerable investments in cybersecurity and privacy education and research. The Institute already has three cybersecurity degree programs. The School will weave them together with other important interdisciplinary programs. &nbsp;</p><p>&ldquo;The new School of Cybersecurity and Privacy is a reflection of Georgia Tech&rsquo;s strengths and commitment to serving the needs of our society and our state,&rdquo; said Georgia Tech President <strong>&Aacute;ngel Cabrera</strong>.</p><p>&ldquo;Georgia Tech&rsquo;s new School of Cybersecurity and Privacy will focus on applied research collaborations with the fast-growing cybersecurity industry in Georgia and meeting a critical workforce need,&rdquo; Cabrera said. &ldquo;It will bring together Georgia Tech&rsquo;s expertise across disciplines to advance technology and find new solutions to protect our personal privacy and support our national security.&rdquo;</p><p>There are more than 500 cybersecurity researchers spread across Georgia Tech who bring in more than $180 million in research awards annually. Georgia Tech&rsquo;s faculty are ranked #2 in the world in publications in top security conferences.</p><p>The <a href="https://scp.cc.gatech.edu/">School of Cybersecurity and Privacy at Georgia Tech</a> is the first School of its kind at a top university, drawing together faculty and researchers across various disciplines from practically all six colleges at Georgia Tech and the Georgia Tech Research Institute.</p><p>The new School will be intercollegiate and interdisciplinary because cybersecurity and privacy problems typically play out across multiple dimensions.</p><p>&ldquo;Cybersecurity includes not only technology but the law, business processes, and cultural considerations,&rdquo; said <strong>Charles Isbell</strong>, dean and John P. Imlay, Jr. chair of the College of Computing. &ldquo;The School of Cybersecurity and Privacy will bring together thought leaders from all of those areas to push the envelope of technical innovation and produce the workforce of the future.&quot;</p><p>To that end, the School will bring in not only computer scientists and engineers but business experts and behaviorists.</p><p>&ldquo;Solving tomorrow&rsquo;s toughest cybersecurity problems will require not only a thorough understanding of the technologies and threats involved. It also will require deep expertise in behavioral and policy considerations that must increasingly inform the development and use of new cybersecurity approaches and technologies,&rdquo; said <strong>Kaye Husbands Fealing</strong>, dean of the Ivan Allen College of Liberal Arts.</p><p>&ldquo;By drawing on Georgia Tech&rsquo;s globally respected expertise in the technology and policy arenas, the School of Cybersecurity and Privacy will extend our leadership in this area with exactly the kind of innovative, interdisciplinary, human-centered thinking and research we need to advance socially responsible and technically practical solutions to these critical issues.&rdquo;</p><p>The solutions and the workforce produced by the new School will not only benefit business, but also protect every aspect of our online lives and our national infrastructure.</p><p>&ldquo;Cybersecurity is not just a personal issue &mdash; our credit cards or identities quickly come to mind &mdash; but it has an even larger impact on national security, financial markets, even power grids,&rdquo; said Provost and Executive Vice President for Academic Affairs <strong>Steve McLaughlin</strong>.&nbsp;&ldquo;That is why the new School of Cybersecurity and Privacy is so important at this time. Cybersecurity, privacy, and related policies dominate the priorities of many organizations, and the need for advanced research and talent is outpacing supply. Georgia Tech is already a leader in this area the new School will take us to even greater heights and impact.&rdquo;</p><p>The creation of the School has been welcomed by industry leaders in cybersecurity and privacy, both in Atlanta and nationwide. Atlanta in particular is a center of financial technology, an area that goes hand-in-hand with cybersecurity.</p><h5><a href="https://cyber.gatech.edu/">[RELATED: Georgia Tech Institute for Information Security and Privacy]</a></h5><p>&quot;Financial technology companies leverage technology and data to fuel innovation, which makes cybersecurity and privacy vital to their success&rdquo;, said <strong>Ryan Graciano</strong> (B.S. Computer Science &rsquo;04), co-founder and chief technology officer of Credit Karma. &ldquo;This means not only staying on the cutting-edge technologically but also building systems that work with multiple sets of privacy regulations in different jurisdictions. The School of Cybersecurity will be an&nbsp;essential&nbsp;resource for fintech companies in Atlanta and worldwide.&quot;</p><p>The new School will strengthen Atlanta&rsquo;s tech economy, said <strong>Alan Taetle</strong>, general partner at the venture-capital firm Noro-Moseley Partners.</p><p>&ldquo;The creation of a new School of Cybersecurity and Privacy will help the Atlanta tech ecosystem build on two of its greatest strengths: internet security and payment processing,&rdquo; Taetle said. &ldquo;Georgia Tech is a world-class university that creates world-class technology, and I expect the new school to both produce new companies and also provide vital support to existing ones both locally and nationally.&rdquo;</p><p>Of course, financial companies are not the only ones to benefit from new cybersecurity and privacy technologies.</p><p>&ldquo;Consumer demands for digital service are transforming business, forcing new innovations in cloud infrastructure and other areas&nbsp;for businesses to compete or remain relevant.&nbsp;Every one of these innovations must be accompanied by new cybersecurity technologies and policies in order to keep both corporations and consumers safe,&ldquo; said Tony Spinelli, chief information officer for Urban One, Inc. and former&nbsp;chief information officer for Capital One. &ldquo;The School of Cybersecurity and Privacy, in other words, is addressing a vast and growing demand from all sectors of the modern digital&nbsp;economy.&rdquo;</p><p>The School of Cybersecurity and Privacy will be led by interim chair <strong>Rich DeMillo</strong> (Ph.D. 72), the Charlotte B. and Warren C. Chair of Computer Science and Professor of Management. DeMillo has previously served as the founder and executive director of Georgia Tech&rsquo;s Center for 21<sup>st</sup> Century Universities, and as the dean of the College of Computing. He is the author of more than 100 articles, books, and patents, and is a fellow of the Association for the Advancement of Science and the Association of Computing Machinery. Prior to arriving at the Institute, DeMillo served as Hewlett-Packard&rsquo;s first chief technology officer.</p><p>&ldquo;Its roots are in computer science and engineering, mathematics, public policy, and national security, but the last twenty years has seen the birth of cybersecurity as a profession in its own right,&rdquo; DeMillo said. &ldquo;I am pleased that the Institute recognized this shift by launching an academic unit that will be home to a new generation of scholars.&nbsp; Building that culture will be challenging, but we will be judged by the success of our people and our ability to meet the growing demand for Georgia Tech-caliber experts with unique skills.&rdquo;</p><p>The new School will launch a nationwide search this fall for multiple faculty members and for its founding chair. For more information about the school, please <a href="https://scp.cc.gatech.edu/">visit its website</a>.</p>]]></body>  <author>Ben Snedeker</author>  <status>1</status>  <created>1600129736</created>  <gmt_created>2020-09-15 00:28:56</gmt_created>  <changed>1631735425</changed>  <gmt_changed>2021-09-15 19:50:25</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech’s newest school is the first of its kind at a major research university.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech’s newest school is the first of its kind at a major research university.]]></sentence>  <summary><![CDATA[<p>Georgia Tech&rsquo;s newest school is the first of its kind at a major research university.</p>]]></summary>  <dateline>2020-09-15T00:00:00-04:00</dateline>  <iso_dateline>2020-09-15T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-09-15 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[ann.claycombe@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Ann Claycombe, Communications Director<br /><a href="http://ann.claycombe@cc.gatech.edu">ann.claycombe@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>639105</item>          <item>639100</item>      </media>  <hg_media>          <item>          <nid>639105</nid>          <type>image</type>          <title><![CDATA[Source Code Closeup]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Source-code-closeup-By-Rob-Felt-h.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Source-code-closeup-By-Rob-Felt-h.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/Source-code-closeup-By-Rob-Felt-h.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Source-code-closeup-By-Rob-Felt-h.jpg?itok=Ryx4m_cL]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Computer source code. (Photo: Rob Felt)]]></image_alt>                    <created>1600177175</created>          <gmt_created>2020-09-15 13:39:35</gmt_created>          <changed>1600177175</changed>          <gmt_changed>2020-09-15 13:39:35</gmt_changed>      </item>          <item>          <nid>639100</nid>          <type>image</type>          <title><![CDATA[School of Cybersecurity & Privacy logo]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[School-Cybersecurity-Privacy-Tech-Gold-RGB.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/School-Cybersecurity-Privacy-Tech-Gold-RGB.png]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/School-Cybersecurity-Privacy-Tech-Gold-RGB.png]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/School-Cybersecurity-Privacy-Tech-Gold-RGB.png?itok=5PT1BRLQ]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Georgia Tech School of Cybersecurity and Privacy logo in Tech Gold]]></image_alt>                    <created>1600129997</created>          <gmt_created>2020-09-15 00:33:17</gmt_created>          <changed>1600129997</changed>          <gmt_changed>2020-09-15 00:33:17</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="114791"><![CDATA[Data Privacy]]></keyword>          <keyword tid="3221"><![CDATA[privacy]]></keyword>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="639044">  <title><![CDATA[Georgia Tech Continues to Lead Among Universities Nationwide in Engineering and Computing Programs; Reports Record Month in Research Awards]]></title>  <uid>35059</uid>  <body><![CDATA[<p>Twelve of Georgia Tech&rsquo;s academic programs rank among the best in the country, according to the recently released <em>U.S. News &amp; World Report</em> 2021 &ldquo;Best Colleges&rdquo; undergraduate rankings, with three programs &mdash; civil engineering, cybersecurity, and industrial and systems engineering &mdash; ranking No. 1.</p><p>All of Tech&rsquo;s engineering programs remained in the top five for universities offering the discipline, with the H. Milton Stewart School of Industrial and Systems Engineering and the undergraduate civil engineering program at the top. Tech&rsquo;s undergraduate programs in aerospace, biomedical, chemical, and mechanical engineering were all ranked No. 2 in their respective fields. Electrical, environmental, and materials engineering each ranked No. 4, and computer engineering ranked No. 5.</p><p>The College of Engineering remains ranked No. 4 for best undergraduate engineering disciplines overall.</p><p>New this year was the ranking for computer science programs. Georgia Tech&rsquo;s cybersecurity program ranked No. 1, and software engineering ranked No. 2 among national universities. The computer science program ranked No. 5 overall in a tie with California Institute of Technology, Cornell, Princeton, University of Illinois Urbana-Champaign and the University of Washington.</p><p>&ldquo;Thanks to our outstanding students, faculty, and staff, leaders in higher education continue to recognize Georgia Tech as one of the leading public research universities in the U.S.,&quot; said &Aacute;ngel Cabrera, president of Georgia Tech. &ldquo;I am also delighted the Institute is listed among the nation&#39;s most innovative schools &mdash; a fitting recognition of our efforts to enrich the student experience and expand access to working professionals through our innovative online graduate programs.&rdquo;</p><p>The Scheller College of Business climbed three spots this year to No. 19 in a tie with the University of Illinois Urbana-Champaign; University of Maryland, College Park; University of Minnesota Twin Cities; and the University of Washington. Three of Scheller&rsquo;s specialty programs ranked in the top five, with both management information systems and business analytics at No. 3, and quantitative analysis at No. 4.</p><p>This is the 36<sup>th</sup> year that <em>U.S. News</em> has released their Best College rankings. Georgia Tech was among 1,452 U.S. bachelor&#39;s degree-granting institutions ranked on 17 indicators, including student-faculty ratio, the average federal loan debt of graduates, tuition and financial aid policies, student body demographics, and campus life.</p><p>Overall, Georgia Tech ranked No. 8 in the best public university category, along with the University of California, Irvine and the University of California San Diego. Tech ranked No. 35 among top national universities, which includes public and private institutions, in a tie with Boston College; University of California, Irvine; and University of California San Diego.</p><p>Other highlights for the Institute this year included being ranked No. 3 for Co-op/Internship Programs, No. 4 for Most Innovative national university, No. 11 for Undergraduate Research/Creative Projects, and tying for No. 15 in Best for Veterans (University of California, Irvine and University of California San Diego).&nbsp;&nbsp;</p><p><strong>Tech Reports Record Amount in Research Awards </strong></p><p>Georgia Tech is also making major strides in its research activities. Tech&rsquo;s academic colleges recently recorded a total of $53.3 million in research and sponsored activities for July 2020, making it the highest month of award dollars in 10 years. The amount is an increase of $16.6 million from the same period in 2019. The total number of awards increased from 210 in July 2019 to 285 in July 2020 in academic units. The College of Engineering received 111 awards in July 2020. The College of Design notably had 45 more awards than in July 2019.&nbsp;</p><p>&nbsp;</p>]]></body>  <author>Denise Ward</author>  <status>1</status>  <created>1600092310</created>  <gmt_created>2020-09-14 14:05:10</gmt_created>  <changed>1600106859</changed>  <gmt_changed>2020-09-14 18:07:39</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[All of Tech’s engineering programs remained in the top five in the 2021 U.S. News undergraduate rankings]]></teaser>  <type>news</type>  <sentence><![CDATA[All of Tech’s engineering programs remained in the top five in the 2021 U.S. News undergraduate rankings]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2020-09-14T00:00:00-04:00</dateline>  <iso_dateline>2020-09-14T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-09-14 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[denise.ward@comm.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:denise.ward@comm.gatech.edu">Denise Ward</a></p><p>Institute Communications</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>625904</item>      </media>  <hg_media>          <item>          <nid>625904</nid>          <type>image</type>          <title><![CDATA[Tech Tower]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[original.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/original_8.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/original_8.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/original_8.jpg?itok=mwz2vbQX]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[photograph of Tech Tower]]></image_alt>                    <created>1568119621</created>          <gmt_created>2019-09-10 12:47:01</gmt_created>          <changed>1568119621</changed>          <gmt_changed>2019-09-10 12:47:01</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.usnews.com/best-colleges/georgia-institute-of-technology-1569/overall-rankings]]></url>        <title><![CDATA[Georgia Tech Rankings]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="1214"><![CDATA[News Room]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>      </news_terms>  <keywords>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="638698">  <title><![CDATA[Georgia Tech Scheller Professor Peter Swire Named to National Academies Study on Future of Encryption]]></title>  <uid>28082</uid>  <body><![CDATA[<p>The National Academies of Science and Engineering has named Georgia Tech Scheller College of Business Professor <a href="https://www.scheller.gatech.edu/directory/faculty/swire/index.html">Peter Swire</a> to a new study committee on &ldquo;<a href="https://www.nationalacademies.org/our-work/future-of-encryption#sectionCommittee">The Future of Encryption</a>.&rdquo; The committee will identify potential scenarios over the next 10 to 20 years for the balance between encryption and decryption. It will explore other data and communications protection and exploitation capabilities and then assess the national security and intelligence implications of the scenarios it deems most relevant and significant, based on criteria it develops. The committee will consider implications for applications of encryption such as cybersecurity, digital currency, cybercrime, surveillance, and covert communication. The project will produce a peer-reviewed consensus report.</p><p>&ldquo;I am honored to be named to this study committee. Because so much of modern life occurs online, encryption is a uniquely important tool for protecting privacy and cybersecurity.&nbsp; Evolving technology means that nations, including adversaries of the United States, are constantly seeking new ways to break encryption. This multi-disciplinary study will seek to prepare for the most important technical and policy scenarios for encryption in the next two decades,&rdquo; said Swire.</p><p>Professor Swire, Elizabeth and Thomas Holder Chair and Professor of Law and Ethics at Scheller College has both government and academic experience in the area of encryption. In 1999, while he was the chief counselor for privacy in the U.S. Office of Management and Budget, he chaired the White House Working Group on Encryption when the government <a href="https://peterswire.net/archive/privarchives/Press%20briefing%20Sept.%2016%201999.html">enabled </a>the export of strong encryption, to provide greater security and privacy on the Internet. In 2012, he published &ldquo;<a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1960602">Encryption and Globalization</a>,&rdquo; which coined the term the &ldquo;<a href="https://cdt.org/insights/‘going-dark’-versus-a-‘golden-age-for-surveillance’/">golden age of surveillance</a>,&rdquo; in contrast to assertions by some in government that encryption was causing intelligence agencies to &ldquo;go dark.&rdquo; He has testified before the <a href="https://www.judiciary.senate.gov/imo/media/doc/07-08-15%20Swire%20Testimony.pdf">Senate</a> on encryption issues, and in 2013 he was a member of the Director of National Intelligence&rsquo;s <a href="https://obamawhitehouse.archives.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf">Review Group on Intelligence and Communications Technology</a> when it made policy recommendations on encryption.</p>]]></body>  <author>Lorrie Burroughs</author>  <status>1</status>  <created>1599057837</created>  <gmt_created>2020-09-02 14:43:57</gmt_created>  <changed>1599058091</changed>  <gmt_changed>2020-09-02 14:48:11</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Scheller College faculty Peter Swire has been chosen by the National Academies of Science and Engineering as a member of a new study committee on “The Future of Encryption.”]]></teaser>  <type>news</type>  <sentence><![CDATA[Scheller College faculty Peter Swire has been chosen by the National Academies of Science and Engineering as a member of a new study committee on “The Future of Encryption.”]]></sentence>  <summary><![CDATA[<p>The National Academies of Science and Engineering has named Georgia Tech Scheller College of Business Professor Peter Swire to a new study committee on &ldquo;<a href="https://www.nationalacademies.org/our-work/future-of-encryption#sectionCommittee">The Future of Encryption</a>.&rdquo; The committee will identify potential scenarios over the next 10 to 20 years for the balance between encryption and decryption.</p>]]></summary>  <dateline>2020-09-02T00:00:00-04:00</dateline>  <iso_dateline>2020-09-02T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-09-02 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Lorrie Burroughs</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>638697</item>      </media>  <hg_media>          <item>          <nid>638697</nid>          <type>image</type>          <title><![CDATA[Peter Swire, professor of Law and Ethics, Scheller College of Business]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[peter-swirecrop.JPG]]></image_name>            <image_path><![CDATA[/sites/default/files/images/peter-swirecrop.JPG]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/peter-swirecrop.JPG]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/peter-swirecrop.JPG?itok=3U6ww3ii]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Peter Swire, professor of Law and Ethics, Scheller College of Business]]></image_alt>                    <created>1599057423</created>          <gmt_created>2020-09-02 14:37:03</gmt_created>          <changed>1599057423</changed>          <gmt_changed>2020-09-02 14:37:03</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1274"><![CDATA[Scheller College of Business]]></group>      </groups>  <categories>          <category tid="129"><![CDATA[Institute and Campus]]></category>          <category tid="131"><![CDATA[Economic Development and Policy]]></category>          <category tid="132"><![CDATA[Institute Leadership]]></category>          <category tid="139"><![CDATA[Business]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="129"><![CDATA[Institute and Campus]]></term>          <term tid="131"><![CDATA[Economic Development and Policy]]></term>          <term tid="132"><![CDATA[Institute Leadership]]></term>          <term tid="139"><![CDATA[Business]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="72451"><![CDATA[Peter Swire]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="185770"><![CDATA[data encryption]]></keyword>          <keyword tid="114791"><![CDATA[Data Privacy]]></keyword>      </keywords>  <core_research_areas>          <term tid="39511"><![CDATA[Public Service, Leadership, and Policy]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="637988">  <title><![CDATA[NOVID Exposure Notification App Enlists Smartphones in Coronavirus Battle ]]></title>  <uid>34528</uid>  <body><![CDATA[<p>The smartphones in everyone&rsquo;s purse or pocket could soon become powerful tools in the effort to control coronavirus in the campus community.</p><p>Georgia Tech has begun using NOVID, an exposure notification app that will help students, staff, and faculty be anonymously notified if they have potentially been exposed to Covid-19. Use of the app is voluntary, and it is available at no cost to members of the Georgia Tech community. A link to information about the app is available from the COVID Central portal: (<a href="https://covid-central.gatech.edu/app/welcome">covidcentral.gatech.edu</a>).</p><p>Developed by researchers at Carnegie Mellon University, NOVID captures no personally identifiable information from people using it. Instead, smartphones running the app exchange synthetic codes with other smartphones that are nearby for more than a brief period of time. If the owner of one of the phones tests positive for the virus, they can notify other app users with whom they have been in contact without identifying themselves or sharing any personal information.</p><p>That rapid notification can facilitate early testing, slowing spread of the virus from infected individuals who may not be showing symptoms yet &ndash; or who may be asymptomatic.</p><p>Manual contact tracing will continue to be done by the Georgia Department of Public Health with support from Georgia Tech. Contact tracing makes initial rapid notifications of close contacts in the Georgia Tech community based on information gathered from the individual who tests positive. For contact tracing purposes, a close contact is defined as anyone who, for 15 minutes or more, was within 6 feet of the person who tested positive, anyone who had physical contact with the person, or anyone who was coughed or sneezed on by the person.&nbsp;</p><p>In a large community, exposure notification apps can fill in the gaps by finding individuals who might have been close enough to be exposed to the virus but not known to the individual with a positive test result. These could include, for instance, someone working nearby in a makerspace or lab &ndash; or working out on nearby equipment at the gym.</p><p>&ldquo;Manual contact tracing has been proven over time to be extremely useful for tracking all of the contacts that you know about,&rdquo; said Alexa Harter, director of the <a href="https://www.gtri.gatech.edu">Georgia Tech Research Institute&rsquo;s</a> (GTRI) <a href="https://www.gtri.gatech.edu/laboratories/cybersecurity-information-protection-and-hardware-evaluation-research">Cybersecurity, Information Protection, and Hardware Evaluation Research </a>(CIPHER) Lab. &ldquo;An exposure notification app is useful when you are in contact with someone you don&rsquo;t know. It&rsquo;s very good at the kinds of interactions that manual contract tracing doesn&rsquo;t do as well.&rdquo;</p><p>Installed on an iOS or Android smartphone, the app exchanges information with other phones also running the app. It records a frequently changing code to other devices so they can be alerted if necessary, but without sharing any personally identifiable information. Pairs of code interactions are stored on the NOVID server for a limited period of time.</p><p>On a college campus, faculty, staff, and students may walk past hundreds of people on sidewalks and hallways, but those brief encounters are not used for exposure notification because evidence suggests that such interactions have a very low risk of disease transmission.&nbsp;</p><p>NOVID leverages a combination of ultrasound and Bluetooth technology to note other devices that are within 6 feet, and only if they remain that close for 15 minutes or more. By briefly using the device&rsquo;s microphone and measuring the time sound takes to travel, ultrasound can accurately measure the distance between devices. The benefit of this combined method is avoiding false positives that would be generated from Bluetooth alone, such as contacts that may be on the other side of a wall &ndash; nearby, but not creating a risk of exposure.</p><p>If a student receives a positive Covid-19 test at Stamps Health Services, they will be given a one-time code that they can enter into the app, which will send a notification to other phones the app has recorded as potential exposures. Community members who have received positive tests elsewhere on campus or off campus are required, as part of public health regulations, to report their positive Covid-19 status to Stamps Health Services. They will receive an app notification code at that time.</p><p>Persons being warned through NOVID of a potential exposure will be encouraged to isolate themselves, monitor for symptoms, and be tested for the virus. The app will provide directions for how to contact relevant campus services when alerting a user that they have potentially been exposed.</p><p>Researchers from the GTRI CIPHER Lab&rsquo;s Software Assurance Branch <a href="https://covid-central.gatech.edu/app/privacy-evaluation">have evaluated NOVID</a> for privacy protections to make sure it doesn&rsquo;t record personal information that could identify users &ndash; and for cybersecurity issues to make sure it protects the device. &ldquo;They found it was not collecting anything it shouldn&rsquo;t be collecting or transmitting anything it shouldn&rsquo;t be transmitting,&rdquo; said Harter.</p><p>When launched for the first time, the app will ask users of iOS phones to give it permission to use the device&rsquo;s microphone. That allows the ultrasound system to determine distance from other phones. The GTRI researchers found that the app did not store or transmit sound received via the device&#39;s microphone, and did not send sound via the device&#39;s speaker other than what is necessary for detecting potential contacts. On iOS devices, the app must be operating in standby mode to detect contacts.</p><p>Android users will be asked to allow the app to access location information. That&rsquo;s necessary to use the device&rsquo;s Bluetooth radio, which is part of the distance-finding process.</p><p>Because NOVID sends out signals only intermittently, it has minimal effect on battery life. Battery usage is slightly higher on Android than iOS because of Android&#39;s background mode.</p><p>The effectiveness of exposure notification apps grows with the percentage of community members using it. The app can also be helpful to smaller groups, such as fraternities or sororities that may be able to encourage a high percentage of members to use it.</p><p>&ldquo;The more members of the Georgia Tech community that are using this, the more effective it will be in helping us stop the spread of infection,&rdquo; said Jon Duke, director of Georgia Tech&rsquo;s Center for Health Analytics and Informatics who led adoption of the software with Harter. &ldquo;Addressing the pandemic will take a community-wide effort involving testing, wearing masks, maintaining distance from others, and frequent handwashing. NOVID is another part of that effort.&rdquo;&nbsp;&nbsp;</p><p>As of Aug. 17, more than 2,000 users had joined the Georgia Tech NOVID community.</p><p>NOVID can be downloaded from Apple&rsquo;s App Store or Android&rsquo;s Google Play Store. Georgia Tech staff, faculty and students should enter the community code JACKETS on the NOVID settings page to join the Georgia Tech NOVID community. Additional information about using the system is available at <a href="https://covid-central.gatech.edu/app/welcome">covidcentral.gatech.edu</a>.</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>jhunt7</author>  <status>1</status>  <created>1597699237</created>  <gmt_created>2020-08-17 21:20:37</gmt_created>  <changed>1598304961</changed>  <gmt_changed>2020-08-24 21:36:01</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[An new app made available to Georgia Tech faculty, staff and students uses smartphones to help control the coronavirus.]]></teaser>  <type>news</type>  <sentence><![CDATA[An new app made available to Georgia Tech faculty, staff and students uses smartphones to help control the coronavirus.]]></sentence>  <summary><![CDATA[<p>The smartphones in everyone&rsquo;s purse or pocket could soon become powerful tools in the effort to control coronavirus in the campus community.</p>]]></summary>  <dateline>2020-08-17T00:00:00-04:00</dateline>  <iso_dateline>2020-08-17T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-08-17 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>637982</item>          <item>637983</item>      </media>  <hg_media>          <item>          <nid>637982</nid>          <type>image</type>          <title><![CDATA[Georgia Tech campus community]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Facial Coverings020-lg.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Facial%20Coverings020-lg.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/Facial%20Coverings020-lg.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Facial%2520Coverings020-lg.jpg?itok=UjEzg-2j]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Students on the Georgia Tech campus]]></image_alt>                    <created>1597697271</created>          <gmt_created>2020-08-17 20:47:51</gmt_created>          <changed>1597697271</changed>          <gmt_changed>2020-08-17 20:47:51</gmt_changed>      </item>          <item>          <nid>637983</nid>          <type>image</type>          <title><![CDATA[Using the NOVID exposure notification app]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[novid-steps.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/novid-steps.png]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/novid-steps.png]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/novid-steps.png?itok=bZsA2RDg]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[NOVID exposure app]]></image_alt>                    <created>1597697455</created>          <gmt_created>2020-08-17 20:50:55</gmt_created>          <changed>1597697455</changed>          <gmt_changed>2020-08-17 20:50:55</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1278"><![CDATA[College of Sciences]]></group>          <group id="364801"><![CDATA[School of Earth and Atmospheric Sciences (EAS)]]></group>          <group id="1275"><![CDATA[School of Biological Sciences]]></group>          <group id="85951"><![CDATA[School of Chemistry and Biochemistry]]></group>          <group id="1279"><![CDATA[School of Mathematics]]></group>          <group id="126011"><![CDATA[School of Physics]]></group>          <group id="443951"><![CDATA[School of Psychology]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>      </news_terms>  <keywords>          <keyword tid="185579"><![CDATA[NOVID]]></keyword>          <keyword tid="185580"><![CDATA[exposure notification]]></keyword>          <keyword tid="184289"><![CDATA[covid-19]]></keyword>          <keyword tid="10553"><![CDATA[app]]></keyword>          <keyword tid="183843"><![CDATA[coronavirus]]></keyword>          <keyword tid="166882"><![CDATA[School of Biological Sciences]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="637853">  <title><![CDATA[New Tool Brings Fuzzing Approach to Memory System Security]]></title>  <uid>34541</uid>  <body><![CDATA[<p>Heap allocators manage one of the most common types of memory. Georgia Tech researchers have created an automated tool that reveals how exploitable they are, though.</p><p>Unlike other heap exploitation techniques that require considerable effort from the researcher, ArcHeap can autonomously explore the system.</p><p>&ldquo;Many heap exploitation techniques have been discovered by researchers; however, this task always relies on manual efforts,&rdquo; said School of Computer Science (SCS) Ph.D. student <strong><a href="https://jakkdu.github.io/">Insu Yun</a></strong>. &ldquo;We wanted to automate this process.&rdquo;</p><p>&nbsp;</p><p><strong>[RELATED CONTENT: <a href="https://www.scs.gatech.edu/news/634115/team-ids-real-world-vulnerabilities-popular-browser-during-premier-hackathon">Team IDs Real-world Vulnerabilities In Popular Browser During Premier Hackathon</a>]</strong></p><p><strong>Heap exploitation techniques</strong></p><p>Heap is dynamically allocated memory, or memory that&rsquo;s size is determined during program execution. Heap allocators manage it efficiently, yet they are also very susceptible to attack.</p><p>Exploitation techniques abuse underlying heap allocator mechanisms to exploit vulnerabilities. Popular systems software is plagued by heap-related vulnerabilities. Microsoft <a href="https://twitter.com/epakskape/status/984481101937651713">said</a> heap vulnerabilities led to more than half of their security problems in 2017. Heap vulnerability &nbsp;attacks have also been seen in popular software such as WhatsApp, VMware, and Eximail in 2019.</p><p>Since each exploit is specific to the allocator, previous research was specialized and manually done. This created a barrier to understanding security issues with various heap allocators and led to even more attacks. &nbsp;</p><p><strong>How ArcHeap works</strong></p><p>ArcHeap introduces operations and attack capabilities to see if these trigger an exploitation. The approach is comparable to fuzzing, an automatic software testing technique that inputs random data to expose vulnerabilities.</p><p>&ldquo;We found that fuzzing is very useful for finding software vulnerabilities, so we extended this idea into discovering heap exploitation techniques,&rdquo; Yun said. &ldquo;However, classical fuzzing cannot be naively applied to this new problem, so ArcHeap employs several new ideas.&rdquo;</p><p>The researchers determined heap allocators share common design components that allowed them to abstract enough so that the tool can be applied to any allocator. ArcHeap also synthesizes its finding as it moves through the allocator to reduce redundancies.</p><p><strong>ArcHeap&rsquo;s findings</strong></p><p>Researchers evaluated ArcHeap on 11 allocators and found five new exploitation techniques in Linux&#39;s default allocator, ptmalloc2. Despite decades of research in this area, ArcHeap successfully discovered heap exploitation techniques in ptmalloc2.</p><p>&ldquo;Our results show that their manual security analysis was insufficient to cover a large space of heap exploitation techniques,&rdquo; Yun said. &ldquo;As a result of&nbsp;this insufficient manual testing, these allocators were actually not secure as their claims.&rdquo;</p><p>They also found vulnerabilities in seven of the 10 other popular allocators.</p><p>Although right now ArcHeap can determine if a heap allocator is vulnerable or not, the researchers hope to put a quantitative value on that security in the future.</p><p>They presented the research in the paper, <a href="https://www.usenix.org/conference/usenixsecurity20/presentation/yun"><em>Automatic Techniques to Systematically Discover New Heap Exploitation Primitives</em></a>, at <a href="https://www.usenix.org/conference/usenixsecurity20">Usenix&rsquo;s 29<sup>th</sup> Security Symposium</a> from August 12 to 14. Yun co-wrote the paper with SCS Associate Professor <a href="https://taesoo.kim/">Taesoo Kim</a> and Facebook&rsquo;s Dhaval Kapil.</p><p>&nbsp;</p>]]></body>  <author>Tess Malone</author>  <status>1</status>  <created>1597340903</created>  <gmt_created>2020-08-13 17:48:23</gmt_created>  <changed>1597341697</changed>  <gmt_changed>2020-08-13 18:01:37</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Unlike other heap exploitation techniques that require considerable effort from the researcher, ArcHeap can autonomously explore the system. ]]></teaser>  <type>news</type>  <sentence><![CDATA[Unlike other heap exploitation techniques that require considerable effort from the researcher, ArcHeap can autonomously explore the system. ]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2020-08-13T00:00:00-04:00</dateline>  <iso_dateline>2020-08-13T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-08-13 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Tess Malone, Communications Officer</p><p><a href="mailto:tess.malone@cc.gatech.edu">tess.malone@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>637856</item>      </media>  <hg_media>          <item>          <nid>637856</nid>          <type>image</type>          <title><![CDATA[ArcHeap]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Screen Shot 2020-08-13 at 2.00.20 PM.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Screen%20Shot%202020-08-13%20at%202.00.20%20PM.png]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/Screen%20Shot%202020-08-13%20at%202.00.20%20PM.png]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Screen%2520Shot%25202020-08-13%2520at%25202.00.20%2520PM.png?itok=cwOouoDj]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[ArcHeap]]></image_alt>                    <created>1597341678</created>          <gmt_created>2020-08-13 18:01:18</gmt_created>          <changed>1597341678</changed>          <gmt_changed>2020-08-13 18:01:18</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="637497">  <title><![CDATA[Baking and Boiling Botnets Could Drive Energy Market Swings and Damage]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Evil armies of internet-connected EV chargers, ovens, hot-water heaters, air-conditioners, and other high-wattage appliances could be hijacked to slightly manipulate energy demand, potentially driving price swings and creating financial damage to deregulated energy markets, warns a new report scheduled to be presented Aug. 5 at the Black Hat USA 2020 conference.</p><p>By turning the compromised equipment on or off to artificially increase or decrease power demand, botnets made up of these energy-consuming devices might help an unscrupulous energy supplier or retailer (electric utility) alter prices to create a business advantage, or give a nation-state a way to remotely harm the economy of another country by causing financial damage to its electricity market. If done within the bounds of normal power demand variation, such an attack would be difficult to detect, the researchers said.</p><p>&ldquo;If an attacker can slightly affect electricity market prices in their favor, it would be like knowing today what&rsquo;s going to happen in tomorrow&rsquo;s stock market,&rdquo; said Tohid Shekari, a graduate research assistant in the <a href="http://www.ece.gatech.edu">School of Electrical and Computer Engineering</a> at the Georgia Institute of Technology. &ldquo;If the manipulation stays within a certain range, it would be stealthy and difficult to differentiate from a typical load forecasting error.&rdquo;</p><p>Believed to be the first proposed energy market manipulation cyberattack, the operation would depend on botnets composed of thousands of appliances that could be controlled centrally by attackers who had taken over their Internet of Things (IoT) controllers. Malicious actors have already demonstrated IoT botnet attacks such as Mirai, which used a network of compromised internet-connected cameras and routers to launch attacks on key internet infrastructure.</p><p>The attack, dubbed &ldquo;IoT Skimmer,&rdquo; would be made possible by the deregulation of energy markets, which has created a system to efficiently supply electrical power. To meet the demand for electrical energy, utility companies must predict future demand and purchase power from the day-ahead wholesale energy market at competitive prices. If the predictions turn out to be wrong, the utilities may have to pay more or less for the energy they need to meet the demands of their customers by participating in the real-time market, which has more volatile prices in general. Creating erroneous demand data to manipulate forecasts could be profitable to the suppliers selling energy to meet the unexpected demand, or the retailers or utilities buying cheaper energy from the real-time market.</p><p>The researchers weren&rsquo;t able to determine whether such an attack might have already taken place because IoT devices &ndash; beyond being insecure &ndash; also lack the kind of monitoring that would be necessary to detect such hijacking. But they used real data sets from two of the largest U.S. energy markets &ndash; New York and California &ndash; to evaluate the feasibility of their proposed attack.</p><p>&ldquo;We did a lot of simulation and mathematical analysis to show that this kind of transfer could occur,&rdquo; said <a href="https://www.ece.gatech.edu/faculty-staff-directory/raheem-a-beyah">Raheem Beyah</a>, the Motorola Foundation Professor in the School of Electrical and Computer Engineering who is also Georgia Tech&rsquo;s vice president for Interdisciplinary Research and co-founder of the company Fortiphyd Logic. &ldquo;We also did a feasibility analysis of the supporting areas to show that this would be possible from various perspectives.&rdquo;</p><p>The researchers assume that such botnets already exist, and that attackers could simply rent their use on the dark web. More than 20 million smart thermostats already exist in the North American market, and they are connected to at least one high-wattage device &ndash; a heating and air-conditioning system that could be controlled by attackers on an intermittent basis.</p><p>&ldquo;If you consider all of the smart thermostats and internet-connected electric ovens, water heaters, and electric vehicle chargers that are already in use, there are plenty of devices to be compromised,&rdquo; Shekari said. &ldquo;Homeowners would likely never notice if the EV charger turns on when electricity demand is highest, or if the air conditioning cools a little more than they expected when they are not home.&rdquo;</p><p>To counter the potential attack, researchers suggest both detection and prevention steps. Through integrated monitoring of the normal power use of high-wattage IoT-connected devices, unexpected peaks or valleys in power consumption triggered by an attacker could be detected. And access to data on expected energy demand &ndash; which is now made available publicly &ndash; could be restricted to those who actually need it.</p><p>The primary factor that makes this attack possible is the detailed online data sharing of electricity market information, which is usually updated every five minutes.&nbsp;</p><p>&ldquo;This energy demand information is really a data privacy issue, and we need to think long and hard about the balance between transparency and security,&rdquo; Beyah said. &ldquo;There&rsquo;s always a tension there, but limiting the amount of detail could make it more difficult for attackers who want to hide their manipulations to know what the normal variations are.&rdquo;</p><p>The potential attack highlights the need for considering cybersecurity threats in technology areas where they had perhaps never been possible before.&nbsp;&nbsp;</p><p>&ldquo;This is an interesting intersection between the IoT security world and energy markets,&rdquo; said Beyah. &ldquo;Right now, it seems that there is a large gap between the two worlds. Our point is that there are implications for combining IoT technology and high-wattage devices that can compromise markets in ways we would never have thought of before.&rdquo;</p><p>The presentation, &ldquo;IoT Skimmer: Energy Market Manipulation Through High-Wattage IoT Botnets,&rdquo; will be presented on Wednesday, Aug. 5, at 2:30 p.m. as part of the Black Hat USA 2020 conference.</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu)</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1596550697</created>  <gmt_created>2020-08-04 14:18:17</gmt_created>  <changed>1596550911</changed>  <gmt_changed>2020-08-04 14:21:51</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Evil armies of internet-connected appliances could be hijacked to slightly manipulate energy demand, potentially driving price swings.]]></teaser>  <type>news</type>  <sentence><![CDATA[Evil armies of internet-connected appliances could be hijacked to slightly manipulate energy demand, potentially driving price swings.]]></sentence>  <summary><![CDATA[<p>Evil armies of internet-connected EV chargers, ovens, hot-water heaters, air-conditioners, and other high-wattage appliances could be hijacked to slightly manipulate energy demand, potentially driving price swings and creating financial damage to deregulated energy markets, warns a new report scheduled to be presented Aug. 5 at the Black Hat USA 2020 conference.</p>]]></summary>  <dateline>2020-08-04T00:00:00-04:00</dateline>  <iso_dateline>2020-08-04T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-08-04 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>637494</item>          <item>637495</item>      </media>  <hg_media>          <item>          <nid>637494</nid>          <type>image</type>          <title><![CDATA[Hijacked oven]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[oven.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/oven.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/oven.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/oven.jpg?itok=n4ZHQ6AB]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Oven with open door]]></image_alt>                    <created>1596550050</created>          <gmt_created>2020-08-04 14:07:30</gmt_created>          <changed>1596550188</changed>          <gmt_changed>2020-08-04 14:09:48</gmt_changed>      </item>          <item>          <nid>637495</nid>          <type>image</type>          <title><![CDATA[Electric substation]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[substation.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/substation.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/substation.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/substation.jpg?itok=48Ztiahm]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Electrical substation]]></image_alt>                    <created>1596550128</created>          <gmt_created>2020-08-04 14:08:48</gmt_created>          <changed>1596550169</changed>          <gmt_changed>2020-08-04 14:09:29</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="139"><![CDATA[Business]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="144"><![CDATA[Energy]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="139"><![CDATA[Business]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="144"><![CDATA[Energy]]></term>      </news_terms>  <keywords>          <keyword tid="185457"><![CDATA[botnet]]></keyword>          <keyword tid="213"><![CDATA[energy]]></keyword>          <keyword tid="185458"><![CDATA[energy markets]]></keyword>          <keyword tid="97401"><![CDATA[IoT]]></keyword>          <keyword tid="68951"><![CDATA[Internet of Things]]></keyword>          <keyword tid="175687"><![CDATA[black hat]]></keyword>          <keyword tid="185459"><![CDATA[IoT Skimmer]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="636410">  <title><![CDATA[School of Computer Science Professor Wins Award for Influential Cryptography Research]]></title>  <uid>34541</uid>  <body><![CDATA[<p>Professor <a href="https://www.cc.gatech.edu/~aboldyre/"><strong>Alexandra Boldyreva</strong></a> has won a <a href="https://www.iacr.org/meetings/pkc/test_of_time_award/">Test of Time Award</a> from the <a href="https://www.iacr.org/meetings/pkc/">International Conference on Practice and Theory in Public Key Cryptography (PKC)</a> for her work on new multi-user digital signatures.</p><p>Boldyreva, who is a professor and associate chair in the School of Computer Science, wrote the single-author winning paper, <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;ved=2ahUKEwipo6mT4ZPqAhXSUt8KHSePBbsQFjAAegQIAxAB&amp;url=https%3A%2F%2Fwww.iacr.org%2Farchive%2Fpkc2003%2F25670031%2F25670031.pdf&amp;usg=AOvVaw0hwXaSsUfFBrkf7bHvHyWu"><em>Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme</em></a>, in 2003 as a Ph.D. student at the University of California San Diego.</p><p>&ldquo;My advisor had to convince me to write the paper because I thought the results were too simple to deserve a publication,&rdquo; Boldyreva said. &ldquo;Of course, back then I would have never believed that the paper would do so well.&rdquo;</p><p>Her new multi-user digital signature schemes were simpler and more efficient than existing schemes at the time. One of the most useful was a multisignature that allows a number of users to jointly digitally sign the same message while keeping the final signature as short and computationally efficient as a single signature. In effect, the length of the multisignature doesn&rsquo;t grow as more users sign.</p><p>Secure networking protocols as well as blockchains and cryptocurrencies commonly rely on efficient multi-user signatures. Yet, at the same time, the schemes Boldyreva created are still simple enough that introductory cryptography courses teach them.</p><p>Boldyreva gave a <a href="https://www.youtube.com/watch?v=pZlvzGwC7rU">five-minute presentation</a> on the paper at this year&rsquo;s virtually held PKC.</p><p>&ldquo;Now, I&rsquo;m certain that simplicity is a big advantage as long as the result is useful or interesting.&rdquo;</p><p>&nbsp;</p>]]></body>  <author>Tess Malone</author>  <status>1</status>  <created>1592856256</created>  <gmt_created>2020-06-22 20:04:16</gmt_created>  <changed>1592856256</changed>  <gmt_changed>2020-06-22 20:04:16</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Professor Alexandra Boldyreva has won a Test of Time Award from the International Conference on Practice and Theory in Public Key Cryptography (PKC) for her work on new multi-user digital signatures. ]]></teaser>  <type>news</type>  <sentence><![CDATA[Professor Alexandra Boldyreva has won a Test of Time Award from the International Conference on Practice and Theory in Public Key Cryptography (PKC) for her work on new multi-user digital signatures. ]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2020-06-22T00:00:00-04:00</dateline>  <iso_dateline>2020-06-22T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-06-22 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Tess Malone, Communications Officer</p><p><a href="mailto:tess.malone@cc.gatech.edu">tess.malone@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>357351</item>      </media>  <hg_media>          <item>          <nid>357351</nid>          <type>image</type>          <title><![CDATA[Sasha Boldyreva compressed]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[sasha-boldyreva.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/sasha-boldyreva_0.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/sasha-boldyreva_0.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/sasha-boldyreva_0.jpg?itok=zaWRiuRQ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Sasha Boldyreva compressed]]></image_alt>                    <created>1449245767</created>          <gmt_created>2015-12-04 16:16:07</gmt_created>          <changed>1475895091</changed>          <gmt_changed>2016-10-08 02:51:31</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="635700">  <title><![CDATA[Researchers Use Machine Learning to Fight COVID-19 Disinformation]]></title>  <uid>34541</uid>  <body><![CDATA[<p>Disinformation on COVID-19 spreads almost faster than the disease.</p><p>To ensure Americans can find the most accurate information, College of Computing researchers are creating machine-learning (ML) and data science tools to help fact-checkers be more efficient.</p><p><strong>The Disinformation Dilemma </strong></p><p>Although having high-quality news is important any time, the ever-changing nature of COVID-19 makes it even more vital that users have access to vetted information. Many Americans receive their news from social media, where rumors can be shared as much as memes.</p><p>&ldquo;Rumors, hoaxes, fake cures, bioweapon claims, and disinformation campaigns about COVID-19 are prevalent on social media,&rdquo; said School of Computational Science and Engineering Assistant Professor <a href="https://cs.stanford.edu/~srijan/"><strong>Srijan Kumar</strong></a>. &ldquo;These induce anger, anxiety, and stress in readers, and in many cases, have even led to fatalities, such as hydroxychloroquine overdose.&rdquo;</p><p>Newsroom fact-checkers are at forefront of fighting against false information, but manually verifying every fact is time-consuming at best and nearly impossible in the age of COVID-19. So Kumar and School of Computer Science Professor <a href="https://www.cc.gatech.edu/~mustaq/#biography"><strong>Mustque Ahamad</strong></a> are building data-driven, secure solutions for fact checking.</p><p><strong>A Next-Generation Solution</strong></p><p>Kumar and Ahamad are a well-matched team. In his past cybersecurity research, Ahamad has worked with professional fact-checkers to determine what they need to complete their work at news organizations. Kumar, for his part, has been building ML and data-driven tools to detect disinformation. COVID-19 seemed like a natural pairing for the two.</p><p>&ldquo;Together, we started collaborating to build the next generation of data-driven and security-minded solutions for effective fact checking,&rdquo; Kumar said.</p><p>Their solution is to do early detection of disinformation before it even gets to the fact-checkers. With this in mind, they plan to develop ML techniques to remove deliberately misleading information from the news.</p><p>Their ML models will be able to learn the difference between true versus false information with only a few training data points.</p><p>&ldquo;Our models will triage the cases that are most likely to be false in order of their impact on the readers,&rdquo; Kumar said.</p><p>The models will also be customizable to the individual fact-checker&rsquo;s topical, geographical, and language preferences. As the project develops, Kumar and Ahamad will collaborate with professional fact-checkers to ensure the models are effective throughout the research.</p><p>&ldquo;Our framework will bring together a one-stop-shop for group of fact checkers to collaboratively identify false information,&rdquo; Kumar said. &ldquo;This information can then be shipped to appropriate stakeholders, so that the readers can be appropriately alerted when they view it and the hoaxes can be&nbsp;removed from social media circulation.&rdquo;</p><p>For more coverage of Georgia Tech&rsquo;s response to the coronavirus pandemic, please visit our <a href="https://helpingstories.gatech.edu/">Responding to COVID-19 page</a>.</p>]]></body>  <author>Tess Malone</author>  <status>1</status>  <created>1590525592</created>  <gmt_created>2020-05-26 20:39:52</gmt_created>  <changed>1591276100</changed>  <gmt_changed>2020-06-04 13:08:20</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[To ensure Americans can find the most accurate information, College of Computing researchers are creating machine-learning (ML) and data science tools to help fact-checkers be more efficient.]]></teaser>  <type>news</type>  <sentence><![CDATA[To ensure Americans can find the most accurate information, College of Computing researchers are creating machine-learning (ML) and data science tools to help fact-checkers be more efficient.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2020-05-26T00:00:00-04:00</dateline>  <iso_dateline>2020-05-26T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-05-26 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Tess Malone, Communications Officer</p><p><a href="mailto:tess.malone@cc.gatech.edu">tess.malone@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>635701</item>      </media>  <hg_media>          <item>          <nid>635701</nid>          <type>image</type>          <title><![CDATA[Disinformation]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[magnifier-424566_1280.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/magnifier-424566_1280.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/magnifier-424566_1280.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/magnifier-424566_1280.jpg?itok=Zp0ivAaZ]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[]]></image_alt>                    <created>1590526655</created>          <gmt_created>2020-05-26 20:57:35</gmt_created>          <changed>1590526655</changed>          <gmt_changed>2020-05-26 20:57:35</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="635207">  <title><![CDATA[Considering Cybersecurity When Social Circles Share Digital Resources]]></title>  <uid>33939</uid>  <body><![CDATA[<p>Everyone who has ever shared an apartment in college has experienced some form of this challenge: You move in with a group of three other people. You think you set proper boundaries and rules for the house, but everyone swears they&rsquo;re laid back and not too worried about any of the others getting out of line. After a while, everyone settles in, and next thing you know one roommate is taking a little too much advantage of your goodwill.</p><p>Their boyfriend starts showing up at the apartment all the time, whether you know he is coming or not. Sometimes, he&rsquo;s even there when your roommate isn&rsquo;t. He has a key to the front door, and helps himself to what&rsquo;s in the fridge. All of a sudden, you essentially have a new roommate that you never approved and don&rsquo;t know a whole lot about.</p><p>Sure, it&rsquo;s annoying, but consider some of the bigger implications: Shared resources are becoming vulnerable to people outside of the intended group of users. Privacy is being compromised by one member of the group who is practicing poor security behavior. There is a disconnect amongst members of the group about what should and should not be acceptable. As the world becomes more computing intensive, this type of behavior has even larger implications in the context of technology.</p><p>New research by members of Georgia Tech&rsquo;s <a href="http://ic.gatech.edu">School of Interactive Computing</a> has found that existing technical controls for shared digital resources fall short in facilitating collaborative governance and decision making. The paper, which was accepted and awarded a Best Paper Honorable Mention at the <a href="http://chi.gatech.edu/">2020 CHI Conference on Human Factors</a> in Computing Systems, examines why they fall short and offers guidance on ways to improve them.</p><p>&ldquo;The idea here is that as computing infiltrates more and more of our social lives, we are lacking in ability for groups of people to come together and collaboratively think about the access control policies, the threat models we share, and decide together,&rdquo; said&nbsp;<strong>Sauvik Das</strong>, an assistant professor in the school and the lead on the research. &ldquo;What&rsquo;s a fair way to control access to this resource?&rdquo;</p><p>To examine these factors, Das and his team &ndash; which includes co-authors&nbsp;<strong>Hue Watson</strong>,&nbsp;<strong>Eyitemi Moju-Igbene</strong>, and&nbsp;<strong>Akanksha Kumari</strong>&nbsp;&ndash; spoke with a number of types of groups about their behaviors and processes. Roommates, long-term friends, work colleagues &ndash; any group of 3-5 people that is socially connected for about 3-6 months. They looked at the resources that they collectively own and share that they would rather not have people outside of the group have access to &ndash; a smart fridge, a conference room, or a Google Doc, for example &ndash; and asked the threat models they each had.</p><p>&ldquo;What are they afraid of?&rdquo; Das said. &ldquo;Who might they be against having access? How do they jointly come up with strategies? What conversations do they have about security and privacy? How does that impact their behaviors inside and outside of the group setting?&rdquo;</p><p>They also had subjects fill out a diary to probe deeper individually &ndash; has something come up about security and privacy since they spoke as a group? What are the pain points and emergent threats on a day-to-day basis?</p><p>The research uncovered that the existing controls for digital resources drop the ball.</p><p>&ldquo;They&rsquo;re all designed under the understanding that people either don&rsquo;t care enough or that only one person should handle the privacy,&rdquo; Das said. &ldquo;Most of these strategies were socially construed, but implicit because technical controls didn&rsquo;t allow them to do it differently.&rdquo;</p><p>One conclusion Das reached is that there need to be tools of shared governance, a tangible way for each member of the group to engage constructively with the shared privacy structure.</p><p>&ldquo;What it looks like now is sort of a dictatorship,&rdquo; Das explained. &ldquo;Or, it can be egalitarian where anybody can adjust anything, and that causes problems too. There&rsquo;s nuance of how different groups would like to control different resources. People are concerned about outsider threats, the types of information you share with people within your group, and with the reliability of people within the group to practice good behavior.</p><p>&ldquo;We need a simple, fun, and easy way for people to come together and approach security and privacy as a group.&rdquo;</p>]]></body>  <author>David Mitchell</author>  <status>1</status>  <created>1588926771</created>  <gmt_created>2020-05-08 08:32:51</gmt_created>  <changed>1588926771</changed>  <gmt_changed>2020-05-08 08:32:51</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[New research by members of Georgia Tech’s School of Interactive Computing has found that existing technical controls for shared digital resources fall short in facilitating collaborative governance and decision making.]]></teaser>  <type>news</type>  <sentence><![CDATA[New research by members of Georgia Tech’s School of Interactive Computing has found that existing technical controls for shared digital resources fall short in facilitating collaborative governance and decision making.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2020-05-08T00:00:00-04:00</dateline>  <iso_dateline>2020-05-08T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-05-08 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>David Mitchell</p><p>Communications Officer</p><p><a href="mailto:david.mitchell@cc.gatech.edu">david.mitchell@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>626044</item>      </media>  <hg_media>          <item>          <nid>626044</nid>          <type>image</type>          <title><![CDATA[Cybersecurity stock image]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Cybersecurity_stock_image.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Cybersecurity_stock_image.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/Cybersecurity_stock_image.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Cybersecurity_stock_image.jpg?itok=wkg46t70]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Stock photo of stylized padlock icons surrounded by a word cloud of information security terms.]]></image_alt>                    <created>1568223064</created>          <gmt_created>2019-09-11 17:31:04</gmt_created>          <changed>1568223064</changed>          <gmt_changed>2019-09-11 17:31:04</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[http://chi.gatech.edu]]></url>        <title><![CDATA[CHI 2020 at Georgia Tech]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>      </groups>  <categories>      </categories>  <news_terms>      </news_terms>  <keywords>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="634631">  <title><![CDATA[Georgia Tech Produces Key Components for Governor’s Coronavirus Test Initiative]]></title>  <uid>31759</uid>  <body><![CDATA[<p>Gaps in the supply of coronavirus tests are propelling initiatives to fill them across the country. At the Georgia Institute of Technology, bioscience researchers are burning the midnight oil to produce key components for tests in the state of Georgia.</p><p>The goal is to supply a broad&nbsp;<a href="https://gov.georgia.gov/press-releases/2020-03-31/gov-kemp-university-system-georgia-announce-covid-19-testing-ramp" target="_blank">initiative by the governor&rsquo;s office</a>&nbsp;involving multiple universities and partners to rapidly produce and administer more tests. At least 35 volunteers at Georgia Tech, while adhering to social distancing, are reorienting labs normally used for scientific discovery to do larger-scale production of biochemical components.</p><p>&ldquo;We are inventing new ways of doing things like an electronic buddy system so people can be alone &ndash; but not alone &ndash; while they work in the lab. The technical part is actually the easiest. The logistics of testing, data security, and regulatory considerations &ndash; those things are more challenging,&rdquo; said Loren Williams, a&nbsp;<a href="https://ww2.chemistry.gatech.edu/~lw26/" target="_blank">professor in Georgia Tech&rsquo;s School of Chemistry and Biochemistry</a>.</p><p>Williams and the researchers are supporting Georgia Governor Brian Kemp&rsquo;s COVID-19 State Lab Surge Capacity Task Force, which is a project managed through the Georgia Tech Research Institute (GTRI). GTRI is also leading the coordination and integration of data management across the lab surge effort.</p><p>&ldquo;We are providing technical and project management of the effort which is focused on increasing the state&rsquo;s ability to expand testing beyond current limitations,&rdquo; said Mike Shannon, GTRI&rsquo;s lead in the project and a principal research engineer at GTRI.</p><h3><strong>Exoplanets and coronavirus</strong></h3><p>The science behind coronavirus testing is complementary to the researchers&rsquo; usual work. That includes understanding proteins associated with glaucoma, figuring out how RNA and DNA evolved in the first place, or whether ribosomes &ndash; lumps of RNA and protein key to translating&nbsp;genetic code into life &ndash; may exist on exoplanets.</p><p>Williams&rsquo; research team studies the last topic, and some of their work is related to the core of coronavirus testing, a chemical reaction that amplifies the virus&rsquo; genetic fingerprint. It is called a reverse transcription polymerase chain reaction (RT-PCR), and it transcribes trace amounts of coronavirus&rsquo; RNA code into ample amounts of corresponding DNA in the lab for easy analysis.</p><p>&ldquo;His lab members are very familiar with RT-PCR, and when the lack of tests became apparent, they swung into action. The group grew from there, based on the technical needs for the project,&rdquo; said Raquel Lieberman, another leading scientist in the effort and also a&nbsp;<a href="https://ww2.chemistry.gatech.edu/lieberman/" target="_blank">professor in Georgia Tech&rsquo;s School of Chemistry and Biochemistry</a>.</p><p>&ldquo;Every day, very talented, hardworking people with perfect skill sets come out of the woodwork and ask to help,&rdquo; Williams said.</p><p>The group has teams that engineer the production of enzymes or other chemicals needed for RT-PCR to work: Two central enzymes are reverse transcriptase, which converts RNA to DNA and&nbsp;<a href="https://en.wikipedia.org/wiki/Taq_polymerase" target="_blank"><em>Taq</em>&nbsp;polymerase</a>, which rapidly replicates DNA. Another important component is ribonuclease inhibitor, which slows coronavirus RNA decay.</p><h3><strong>Global COVID allies</strong></h3><p>Other researchers develop processes for mass production or implementation of COVID-19 safety procedures; the list goes on. Some colleagues telework; others work in labs but spaced far from each other while they wear masks.</p><p>&ldquo;The group is planning to produce enough enzyme components for hundreds of tests per day,&rdquo; said Vinayah Agarwal,&nbsp;<a href="https://www.agarwallab.com/team.html" target="_blank">an assistant professor in Georgia Tech&rsquo;s School of Chemistry and Biochemistry and School of Biological Sciences</a>. &ldquo;Using these components, we will also build cheaper and more robust testing kits going forward.&rdquo;</p><p>Instructions already exist for some of the ingredients for the test, but they are not readily available because the rights to them are exclusive.</p><p>&ldquo;Intellectual property and other proprietary issues hinder our effort,&rdquo; Lieberman said. &ldquo;But we have received help from scientists all over the world to piece together protocols on how to make what we need.&rdquo;</p><p>The state wants to increase current testing capacities by 3,000 more tests per day. The task force also includes teams from Augusta University Health System, Georgia State University, Emory University, University of Georgia, and the Georgia Public Health Laboratory. The task force lead is Captain Kevin Caspary who is with the Georgia National Guard.</p><p><strong>Raw footage and images as press handouts for journalists. (No commercial or personal use)</strong>:&nbsp;</p><p><a href="https://www.dropbox.com/sh/f2wc2i74lz1lffl/AADLJ8dQnZMr4uEDxAiIMusoa?dl=0" target="_blank">https://www.dropbox.com/sh/f2wc2i74lz1lffl/AADLJ8dQnZMr4uEDxAiIMusoa?dl=0</a></p><p><strong>Also read this: <a href="https://rh.gatech.edu/news/634615/interactive-tool-helps-people-see-why-staying-home-matters-during-pandemic" target="_blank">Interactive COVID-19 tool shows the importance of staying at home</a></strong></p><p><strong>External News Coverage:&nbsp;</strong></p><p>NPR -&nbsp;<a href="https://www.npr.org/2020/04/24/843463707/sun-rays-disinfectants-and-false-hopes-misinformation-litters-the-road-to-reopen">Sun Rays, Disinfectants And False Hopes: Misinformation Litters The Road To Reopening</a><br />News-Medical.Net -&nbsp;<a href="https://www.news-medical.net/news/20200423/Georgia-Tech-researchers-create-key-components-for-COVID-19-tests.aspx">Georgia Tech researchers create key components for COVID-19 tests</a><br />Georgia Tech News Center-&nbsp;<a href="http://news.gatech.edu/2020/04/23/new-normal-researchers-across-georgia-tech-rally-fight-covid-19">A New Normal: Researchers Across Georgia Tech Rally to Fight COVID-19&nbsp;</a></p><p><strong>Here&#39;s how to&nbsp;<a href="https://rh.gatech.edu/subscribe" target="_blank">subscribe to our free science and technology email&nbsp;newsletter</a></strong></p><p><strong>Writer &amp;&nbsp;Media Representative</strong>: Ben Brumfield (404-272-2780), email:&nbsp;<a href="mailto:ben.brumfield@comm.gatech.edu">ben.brumfield@comm.gatech.edu</a></p><p><strong>Georgia Institute of Technology</strong></p>]]></body>  <author>Ben Brumfield</author>  <status>1</status>  <created>1587559205</created>  <gmt_created>2020-04-22 12:40:05</gmt_created>  <changed>1588081854</changed>  <gmt_changed>2020-04-28 13:50:54</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Volunteer Georgia Tech researchers burn midnight oil to produce important enzymes that make coronavirus test kits work.]]></teaser>  <type>news</type>  <sentence><![CDATA[Volunteer Georgia Tech researchers burn midnight oil to produce important enzymes that make coronavirus test kits work.]]></sentence>  <summary><![CDATA[]]></summary>  <dateline>2020-04-22T00:00:00-04:00</dateline>  <iso_dateline>2020-04-22T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-04-22 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>633641</item>      </media>  <hg_media>          <item>          <nid>633641</nid>          <type>image</type>          <title><![CDATA[Coping with COVID]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Steven 1-18.png]]></image_name>            <image_path><![CDATA[/sites/default/files/images/Steven%201-18.png]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/Steven%201-18.png]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/Steven%25201-18.png?itok=Ig6HFGkA]]></image_740>            <image_mime>image/png</image_mime>            <image_alt><![CDATA[Workers in a university lab]]></image_alt>                    <created>1584493388</created>          <gmt_created>2020-03-18 01:03:08</gmt_created>          <changed>1584561934</changed>          <gmt_changed>2020-03-18 20:05:34</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1278"><![CDATA[College of Sciences]]></group>          <group id="1214"><![CDATA[News Room]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="141"><![CDATA[Chemistry and Chemical Engineering]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>      </categories>  <news_terms>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="141"><![CDATA[Chemistry and Chemical Engineering]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>      </news_terms>  <keywords>          <keyword tid="184593"><![CDATA[Covid 19]]></keyword>          <keyword tid="184594"><![CDATA[COVID Recovery]]></keyword>          <keyword tid="184595"><![CDATA[Covid Test]]></keyword>          <keyword tid="184596"><![CDATA[COVID – 19]]></keyword>          <keyword tid="184597"><![CDATA[COVID-19 Crisis]]></keyword>          <keyword tid="184598"><![CDATA[COVID-19 Pandemic]]></keyword>          <keyword tid="184599"><![CDATA[Test Kits]]></keyword>          <keyword tid="184453"><![CDATA[coronavirus testing]]></keyword>          <keyword tid="184600"><![CDATA[Coronavirus Testing Supply Shortages]]></keyword>          <keyword tid="184601"><![CDATA[Coronavirus Testing Supplies]]></keyword>          <keyword tid="184602"><![CDATA[Transcription Polymerase]]></keyword>          <keyword tid="184603"><![CDATA[Reverse Transcription Polymerase Chain Reaction]]></keyword>          <keyword tid="184604"><![CDATA[Rt-Pcr]]></keyword>          <keyword tid="184605"><![CDATA[Reverse Transcriptase]]></keyword>          <keyword tid="184606"><![CDATA[Taq Polymerase]]></keyword>          <keyword tid="184607"><![CDATA[Ribonuclease Inhibitor]]></keyword>          <keyword tid="184608"><![CDATA[Government Programs]]></keyword>          <keyword tid="184609"><![CDATA[Governor Brian Kemp]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39461"><![CDATA[Manufacturing, Trade, and Logistics]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="634366">  <title><![CDATA[Will Smartphones Help Us Keep COVID-19 Under Control?]]></title>  <uid>27303</uid>  <body><![CDATA[<p>The smartphones carried in so many pockets and purses could play a key role in keeping COVID-19 under control as the nation cautiously reopens the economy.</p><p>That goal received support April 10 with an announcement by Google and Apple that they are collaborating on standards and tools to make it easier for software developers to build apps that can help fight the pandemic.&nbsp;</p><p>For the past month, a team of researchers at the <a href="http://www.gtri.gatech.edu">Georgia Tech Research Institute</a> (GTRI) has been working with a community-driven open source project on a &ldquo;privacy first&rdquo; open-source app that can take advantage of these tools to do something known as &ldquo;contact tracing.&rdquo; Contact tracing software, running on smartphones of persons who&rsquo;ve chosen to participate, records the kind of person-to-person interactions that have the potential for transmitting contagious illnesses. If any of the other participants the user has interacted with becomes ill and chooses to share information about their symptoms, the software then alerts the impacted user anonymously. During this process, all shared information remains completely anonymous &ndash; to other users, to the government, to technology companies, and even to the database that makes the exposure matching possible.&nbsp;</p><p>Individuals notified of a potential exposure could then receive information and guidance about steps they might take, including suggestions to get tested for COVID-19, to self-quarantine, or to closely monitor for symptoms. The notification would be one part of a larger effort to control virus clusters before they become outbreaks. To be most successful, a software-based contact tracing system will have to be coupled with broad-based testing able to quickly determine who&rsquo;s infected with the virus.</p><p>Similar approaches have proven effective in countries such as Singapore and South Korea, though these systems have weaker privacy guarantees in place. A key feature of this new approach is that it would not exchange or publish any personally identifiable information and does not disclose any information at all unless someone voluntarily chooses to share their symptoms or diagnosis. This approach accomplishes this using Bluetooth signal strength to assess proximity rather than GPS data, which is difficult to anonymize and could be used to identify individual users based on frequently visited locations.</p><p>&ldquo;We really need a better early warning network to guard against the re-emergence of COVID-19 in the general population,&rdquo; said J. True Merrill, a GTRI senior research scientist who is working on the project. &ldquo;In the early part of this outbreak, COVID-19 was spreading easily across the United States without an early warning of it. After the current shelter-in-place period is over, we are going to need tools to help people determine when they need to self-quarantine in order to stop outbreaks before they can grow.&rdquo;</p><p>Manual contact tracing to identify who&rsquo;s been infected has long been part of public health strategies to contain serious communicable diseases, but the speed at which COVID-19 has spread outpaced traditional methods, said Alexa Harter, director of GTRI&rsquo;s Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory.</p><p><strong>Privacy First, for the Common Good</strong></p><p>&ldquo;Smartphone contact tracing is a way of using technology to automate and augment some of the techniques that public health agencies have used,&rdquo; she said. &ldquo;Technology can enable us to do this, but for people in the United States to adopt it, privacy will really have to be locked down. Everything we&rsquo;re doing in this project aims at providing privacy first. Manual contact tracing is still critically important, but digital contact tracing and alerting can significantly assist these efforts.&rdquo;&nbsp;</p><p>Beyond protecting privacy, large-scale adoption of smartphone contact tracing will need a social component that appeals to supporting the common good.</p><p>&ldquo;To be successful, we&rsquo;ll need to turn participation in this into a socially good thing, perhaps like the Ice Bucket Challenge,&rdquo; Merrill said. &ldquo;We&rsquo;ll need people to voluntarily opt-in, and to get that, users would need to have full knowledge and control over where their data is stored and with whom they choose to share it.&rdquo;</p><p><strong>An Open-Source Global Effort</strong></p><p>GTRI researchers are working with an open source community-driven project known as CoEpi (which stands for Community Epidemiology in Action), which envisions an app of the same name that could be installed on phones running Apple&rsquo;s iOS or Google&rsquo;s Android systems. CoEpi focuses on anonymous symptom sharing and alerting to stop the spread of transmissible illnesses like COVID-19.&nbsp;</p><p>Other organizations are also working on contact tracing apps, and these organizations have recently joined together to form the TCN Coalition to support privacy-preserving digital contact tracing protocols to flatten the curve and stop the spread of COVID-19 while reopening the economy. TCN, the core component of the effort, stands for &ldquo;temporary contact number,&rdquo; which is an anonymous number generated to privately record interactions between mobile devices without allowing the devices themselves (or their users) to be tracked.</p><p>The TCN Coalition developed a common, shared protocol so that all of the different apps in the entire digital contact tracing network can cross-communicate, no matter which app is used. The TCN Coalition also developed a &quot;Digital Contact Tracing Bill of Rights&quot; that outlines requirements to minimize data collection, restricts what can be done with the collected data, and establishes security guidelines to protect civil liberties.&nbsp;&nbsp;</p><p><strong>The Path Forward, Group Benefits</strong></p><p>&ldquo;A symptom-sharing app such as CoEpi would allow us to relax stay-at-home orders so that we can increasingly return to work and public spaces, while providing a way for individuals to get early alerts about potential exposures to symptoms,&rdquo; said Dana Lewis, one of the founders of CoEpi. &ldquo;CoEpi can provide early detection of exposure risks for individuals, and an early warning system for the communities they interact in to detect and slow the transmission of illness like COVID-19, influenza, and even the common cold.&rdquo;</p><p>Convincing a hundred million U.S. citizens to install a new app on their phones could be a significant challenge, but the CoEpi focus on symptom sharing and alerting could yield benefits to smaller groups even before being widely adopted.</p><p>&ldquo;The good thing about this is that it could help protect small groups without needing the buy-in of the whole population,&rdquo; said Harter. &ldquo;An example would be a retirement community that is largely self-contained. If someone there got sick, it would be important to alert everybody that person had interacted with so they could self-quarantine and protect other people in the community.&rdquo;</p><p>Other groups might include organizations performing critical services, such as factories, warehouses, or package delivery companies. &ldquo;If you had a group where people really needed to work together, you could get early alerts to stop outbreaks from happening,&rdquo; she said. It could also be used among small clusters of high-risk individuals and their family and friends, or at universities and schools as they emerge from self-isolation.</p><p><strong>How Contact Tracing Would Work</strong></p><p>The contact tracing component of the system would work something like this.</p><p>Each user opting into the service would install an app that would generate personal keys &ndash; long strings of letters and numbers unique to that specific smartphone, which are in turn used to generate randomized temporary contact numbers. The phones of users opting in would then communicate those temporary numbers with each other when they were nearby, using low-energy Bluetooth, a short-distance protocol widely used on mobile devices. Signal strength could provide a measure of how close the phones are to assess the risk of virus transmission when those people crossed paths.</p><p>&ldquo;The idea is to log close interactions,&rdquo; said Michael Brown, a GTRI research scientist who is the Georgia Tech technical lead of the project. &ldquo;We&rsquo;ll want to eliminate as many false positives as possible. For example, it&rsquo;s highly unlikely that person-to-person transmission would occur across a large room.&rdquo; For each interaction, the system could also record the duration of proximity, another factor in assessing potential risk.</p><p>Each phone would periodically generate new anonymous unique keys, and use those to generate new temporary contact numbers each time it crossed paths with another phone running similar apps. It would record those keys in a database that would be kept on the phone for a short period of time determined by the incubation period of the virus.&nbsp;</p><p>If a CoEpi user developed symptoms, they would share their symptoms in their app. In future versions, the CoEpi developers envision that the sick user would be presented with a series of options such as anonymously notifying public health authorities. For now, the symptoms are sent to the CoEpi system, which would add the anonymous key and symptom report from the sick user&rsquo;s phone.&nbsp;</p><p>Each user&rsquo;s phone would periodically download the list of keys associated with known symptom reports and check the temporary numbers generated by those keys against those of the phones it had been near. A match between each phone&rsquo;s database and the numbers generated from the server&rsquo;s key list would generate a notification of the exposure, and the app would then help the user decide whether the match likely represented a real exposure, and if so, decide what to do: self-quarantine, be tested, and/or notify public health authorities.</p><p>&ldquo;Everyone would be pinged when they get tied to a known case, but only over a time range that really could have created a risk of transmission,&rdquo; Merrill said. &ldquo;There would be no identification information exchanged between the phones or the phones and the server.&rdquo;</p><p><strong>Other Potential Epidemiological Uses</strong></p><p>Beyond advice on illness and notification of potential contacts, the system could also generate anonymized epidemiological information useful to researchers tracking pandemics. Users of the system would decide if they want to opt into the database and share their anonymized information with public health authorities.</p><p>&ldquo;The CoEpi project will help provide earlier detection and testing of potential cases, and that information would be helpful for our predictive models,&rdquo; said Pinar Keskinocak, who is William W. George Chair and Professor in Georgia Tech&rsquo;s H. Milton Stewart School of Industrial and Systems Engineering.</p><p>Beyond programming support, GTRI will assist the effort through security analysis and potentially testing in its Atlanta facilities, Brown said. The testing will need to include many different environments and handset types, including multiple variations in operating systems.</p><p>The GTRI researchers have been racing to help CoEpi roll out software for beta and on-site testing, which should occur over the next several weeks. &ldquo;The time line for this is super aggressive,&rdquo; Harter said. &ldquo;There is an urgency to this because we know it will be very useful in helping people stop social distancing, return to work and school, and try to get back to a more normal life.&rdquo;</p><p>If you&#39;re interested in helping CoEpi as a mobile developer who can help at #WeAreNotWaiting speed (e.g. today or this week), please reach out to CoEpi: <a href="https://forms.gle/MLeKz9nerPvX8fwC8">https://forms.gle/MLeKz9nerPvX8fwC8</a>&nbsp;</p><p>Similarly, individuals who are interested in becoming early testers of CoEpi can sign up via the same form: <a href="https://forms.gle/MLeKz9nerPvX8fwC8">https://forms.gle/MLeKz9nerPvX8fwC8</a>.&nbsp;</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p><strong>Writer</strong>: John Toon</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1586891488</created>  <gmt_created>2020-04-14 19:11:28</gmt_created>  <changed>1586891571</changed>  <gmt_changed>2020-04-14 19:12:51</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Smartphones could provide a critical service of automating contact tracing to control future COVID-19 outbreaks.]]></teaser>  <type>news</type>  <sentence><![CDATA[Smartphones could provide a critical service of automating contact tracing to control future COVID-19 outbreaks.]]></sentence>  <summary><![CDATA[<p>Automated contact tracing using smartphone apps could help control future COVID-19 outbreaks by allowing rapid notification of people who may have been exposed to the coronavirus.&nbsp;</p>]]></summary>  <dateline>2020-04-14T00:00:00-04:00</dateline>  <iso_dateline>2020-04-14T00:00:00-04:00</iso_dateline>  <gmt_dateline>2020-04-14 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>634363</item>          <item>634364</item>      </media>  <hg_media>          <item>          <nid>634363</nid>          <type>image</type>          <title><![CDATA[New Smartphone App Will Record Interactions]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[EDIT 13C2310-P2-116 crop.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/EDIT%2013C2310-P2-116%20crop.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/EDIT%2013C2310-P2-116%20crop.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/EDIT%252013C2310-P2-116%2520crop.jpg?itok=MhAFj-6_]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[People walking on a sidewalk]]></image_alt>                    <created>1586890647</created>          <gmt_created>2020-04-14 18:57:27</gmt_created>          <changed>1586890647</changed>          <gmt_changed>2020-04-14 18:57:27</gmt_changed>      </item>          <item>          <nid>634364</nid>          <type>image</type>          <title><![CDATA[New Smartphone App Will Record Interactions - 2]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[green-crowd.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/green-crowd.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/green-crowd.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/green-crowd.jpg?itok=GhW8hdsB]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Crowd of students on campus]]></image_alt>                    <created>1586890775</created>          <gmt_created>2020-04-14 18:59:35</gmt_created>          <changed>1586890775</changed>          <gmt_changed>2020-04-14 18:59:35</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>      </news_terms>  <keywords>          <keyword tid="168908"><![CDATA[smartphone]]></keyword>          <keyword tid="184289"><![CDATA[covid-19]]></keyword>          <keyword tid="729"><![CDATA[pandemic]]></keyword>          <keyword tid="184478"><![CDATA[contact tracing]]></keyword>          <keyword tid="416"><![CDATA[GTRI]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39451"><![CDATA[Electronics and Nanotechnology]]></term>          <term tid="39481"><![CDATA[National Security]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="632637">  <title><![CDATA[$2 Million “Small Bets” Seed Grant Initiative Fosters Research Collaboration]]></title>  <uid>27303</uid>  <body><![CDATA[<p>Georgia Tech has launched a new &ldquo;Small Bets&rdquo; Seed Grant Program that will award up to $75,000 for a year&rsquo;s work aimed at addressing some of society&rsquo;s most difficult challenges. The aim is to catalyze new research collaborations and fuel high-risk, high-reward approaches.</p><p>Unlike traditional competitive peer-reviewed grant processes, the &ldquo;Small Bets&rdquo; initiative will make awards randomly from among interdisciplinary proposals that meet basic qualifications. As much as $2 million will be provided by the Office of the Executive Vice President for Research to teams interested in taking first steps toward solving the world&rsquo;s most intractable problems.</p><p>&ldquo;Small Bets is intended to seed the first steps of problem-solving that will change the world,&rdquo; said <a href="http://www.research.gatech.edu/leadership/robert-butera">Robert Butera</a>, Georgia Tech&rsquo;s vice president for research development and operations. &ldquo;Through this, we hope to foster new collaborations and new activities without institutional or implicit bias toward any specific programs or initiatives. This is intentionally independent of efforts we already have to support strategic efforts in emerging high-profile areas.&rdquo;</p><p>As traditional federal funding has become more competitive, it has become more difficult for researchers to find support for high-risk projects even if they have a high return, he noted.&nbsp;&nbsp;</p><p>&ldquo;This program will be an experiment, our bet is that Georgia Tech researchers can provide the key to addressing our biggest local, national and global issues,&rdquo; Butera said. &ldquo;We want to challenge researchers to dream about what is possible and propose solutions that other funding sources might consider too risky. This is also the first year of an annual effort, and our focus next year will be to provide fewer but larger awards that support more ambitious team-based efforts.&rdquo;</p><p>Each proposal must have at least two eligible principal investigators (PIs), and faculty members can be a PI or co-PI on only one proposal. Proposals with a PI from the <a href="http://www.gtri.gatech.edu">Georgia Tech Research Institute </a>(GTRI) must have a non-GTRI PI. Otherwise, any pairing of two or more PIs will be eligible.&nbsp;</p><p>The initiative will consider proposals from three&nbsp;categories: (1) <strong>GTRI Collaborations</strong>, which require at least one PI from GTRI and one PI from outside GTRI; (2) <strong>Broad Interdisciplinary Collaborations</strong>, which require at least one PI from the College of Computing, College of Sciences or College of Engineering and one from the Ivan Allen College, College of Design&nbsp;or Scheller College of Business, and (3) <strong>Open Pool</strong>, which is open to all proposals regardless of the affiliation of the PIs.</p><p>Proposals will be pre-screened for eligibility and program requirements. Following eligibility screening, a randomly selected ordered list will be created of all eligible projects. Each selected project will be matched to an available funding pool until funds are fully allocated. Proposals satisfying the criteria for more than one funding pool will therefore have increased chances of being funded because they can draw on more than one source of support.</p><p>Applications for Small Bets funding are due by March 13, and awards will be announced in April. Additional information, FAQs and the application are available at <a href="http://research.gatech.edu/gt-community/funding-opportunities/gt-annual-seed-grant">http://research.gatech.edu/gt-community/funding-opportunities/gt-annual-seed-grant</a> An online form will be made available.</p><p>Georgia Tech will be hosting two public forums designed to help faculty members learn more about the program and develop collaborations. The events will consist of a public information session, Q&amp;A session, and collaboration teaming event.&nbsp;&nbsp;</p><p>The first event, to be held at the GTRI Conference Center (250 14th Street, N.W.) on March 2 from 4 to 6 p.m., will focus on building collaborations between GTRI and academic researchers. The second, to be held at the Dalney Building Meeting Room (926 Dalney Street, N.W.) on March 3 from 11 a.m. to 1 p.m., will focus on building broadly interdisciplinary interaction among faculty from the humanities and social sciences with faculty from the STEM disciplines and GTRI.&nbsp;&nbsp;</p><p>Additional information will be made available on the seed program website.</p><p><strong>Research News<br />Georgia Institute of Technology<br />177 North Avenue<br />Atlanta, Georgia&nbsp; 30332-0181&nbsp; USA</strong></p><p><strong>Media Relations Contact</strong>: John Toon (404-894-6986) (jtoon@gatech.edu).</p><p>&nbsp;</p>]]></body>  <author>John Toon</author>  <status>1</status>  <created>1582064581</created>  <gmt_created>2020-02-18 22:23:01</gmt_created>  <changed>1582147468</changed>  <gmt_changed>2020-02-19 21:24:28</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A new "Small Bets" seed grant program has been launched to encourage research collaboration.]]></teaser>  <type>news</type>  <sentence><![CDATA[A new "Small Bets" seed grant program has been launched to encourage research collaboration.]]></sentence>  <summary><![CDATA[<p>Georgia Tech has launched a new &ldquo;Small Bets&rdquo; Seed Grant Program that will award up to $75,000 for a year&rsquo;s work aimed at addressing some of society&rsquo;s most difficult challenges. The aim is to catalyze new research collaborations and fuel high-risk, high-reward approaches.</p>]]></summary>  <dateline>2020-02-18T00:00:00-05:00</dateline>  <iso_dateline>2020-02-18T00:00:00-05:00</iso_dateline>  <gmt_dateline>2020-02-18 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jtoon@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Toon</p><p>Research News</p><p>(404) 894-6986</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>632636</item>          <item>632636</item>      </media>  <hg_media>          <item>          <nid>632636</nid>          <type>image</type>          <title><![CDATA[Coda Building in Technology Square]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[coda.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/images/coda_0.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/coda_0.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/images/coda_0.jpg?itok=5hBHXI-X]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Daytime image of Coda Building.]]></image_alt>                    <created>1582063891</created>          <gmt_created>2020-02-18 22:11:31</gmt_created>          <changed>1582063891</changed>          <gmt_changed>2020-02-18 22:11:31</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="167679"><![CDATA[Seed Grant]]></keyword>          <keyword tid="184003"><![CDATA[Small Bets]]></keyword>      </keywords>  <core_research_areas>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node></nodes>