<node id="677895">
  <nid>677895</nid>
  <type>news</type>
  <uid>
    <user id="36253"><![CDATA[36253]]></user>
  </uid>
  <created>1729784360</created>
  <changed>1729787344</changed>
  <title><![CDATA[Trio of Georgia Tech-Affiliated Research Projects Recognized at Top Cybersecurity Conference]]></title>
  <body><![CDATA[<div><div><p>Eight Georgia Tech researchers were honored with the ACM Distinguished Paper Award for their groundbreaking contributions to cybersecurity at the recent ACM Conference on Computer and Communications Security (CCS).</p><p>Three papers were recognized for addressing critical challenges in the field, spanning areas such as automotive cybersecurity, password security, and cryptographic testing.</p><p>“These three projects underscore Georgia Tech's leadership in advancing cybersecurity solutions that have real-world impact, from protecting critical infrastructure to ensuring the security of future computing systems and improving everyday digital practices,” said <a href="https://scp.cc.gatech.edu/">School of Cybersecurity and Privacy</a> (SCP) Chair <strong>Michael Bailey</strong>.</p><p>One of the papers, <em>ERACAN: Defending Against an Emerging CAN Threat Model</em>, was co-authored by Ph.D. student <strong>Zhaozhou Tang</strong>, Associate Professor <a href="https://sites.google.com/site/samanzonouz4n6/saman-zonouz"><strong>Saman Zonouz</strong></a>, and College of Engineering Dean and Professor <a href="https://rbeyah.ece.gatech.edu/"><strong>Raheem Beyah</strong></a>. This research focuses on securing the controller area network (CAN), a vital system used in modern vehicles that is increasingly targeted by cyber threats.&nbsp;</p><p>"This project is led by our Ph.D. student Zhaozhou Tang with the <a href="https://sites.gatech.edu/capcpsec/">Cyber-Physical Systems Security</a> (CPSec) Lab," said Zonouz. "Impressively, this was Zhaozhou's first paper in his Ph.D., and he deserves special recognition for this groundbreaking work on automotive cybersecurity."&nbsp;</p><p>The work introduces a comprehensive defense system to counter advanced threats to vehicular CAN networks, and the team is collaborating with the Hyundai America Technical Center to implement the research. The CPSec Lab is a collaborative effort between SCP and the <a href="https://ece.gatech.edu/">School of Electrical and Computer Engineering</a> (ECE).</p><p>In another paper, <em>Testing Side-Channel Security of Cryptographic Implementations Against Future Microarchitectures</em>, Assistant Professor <a href="https://faculty.cc.gatech.edu/~genkin/"><strong>Daniel Genkin </strong></a>collaborated with international researchers to define security threats in new computing technology. &nbsp;</p><p>"We appreciate ACM for recognizing our work," said Genkin. “Tools for early-stage testing of CPUs for emerging side-channel threats are crucial to ensuring the security of the next generation of computing devices.”</p><p>The third paper, <em>Unmasking the Security and Usability of Password Masking</em>, was authored by graduate students <strong>Yuqi Hu</strong>, <strong>Suood Al Roomi</strong>, <strong>Sena Sahin</strong>, and <a href="https://faculty.cc.gatech.edu/~frankli/"><strong>Frank Li</strong></a>, SCP and ECE assistant professor. This study investigated the effectiveness and provided recommendations for implementing password masking and the practice of hiding characters as they are typed and offered.</p><p>"Password masking is a widely deployed security mechanism that hasn't been extensively investigated in prior works," said Li.&nbsp;</p><p>The assistant professor credited the collaborative efforts of his students, particularly Yuqi Hu, for leading the project.</p><p>The <a href="https://www.sigsac.org/ccs/CCS2024/home.html">ACM Conference on Computer and Communications Security</a> (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference was held from Oct. 14-18 in Salt Lake City.</p></div></div>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2024-10-24T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Eight Georgia Tech researchers were honored with the ACM Distinguished Paper Award for their contributions to cybersecurity at the ACM Conference on Computer and Communications Security (CCS).]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Eight Georgia Tech researchers were honored with the ACM Distinguished Paper Award for their contributions to cybersecurity at the ACM Conference on Computer and Communications Security (CCS). The recognized papers tackled issues in automotive cybersecurity, password security, and cryptographic testing. One project, led by Ph.D. student Zhaozhou Tang, focuses on securing vehicle networks from cyber threats. Another paper addressed testing cryptographic implementations against future microarchitectures, while a third examined the effectiveness of password masking. These projects highlight Georgia Tech’s leadership in impactful cybersecurity solutions.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="675425">
            <nid>675425</nid>
            <type>image</type>
            <title><![CDATA[Research Paper Stock Image.jpg]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>259047</fid>
                  <filename><![CDATA[iStock_000000118825Small.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/2024/10/24/iStock_000000118825Small.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2024/10/24/iStock_000000118825Small.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[a pair of glasses and a pencil lay on a paper]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[jpopham3@gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>John Popham</p><p>Communications Officer II</p><p>College of Computing | School of Cybersecurity and Privacy</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
          <item>660373</item>
          <item>660367</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
          <item>
        <![CDATA[Engineering]]>
      </item>
          <item>
        <![CDATA[Institute Leadership]]>
      </item>
          <item>
        <![CDATA[Research]]>
      </item>
          <item>
        <![CDATA[Student and Faculty]]>
      </item>
          <item>
        <![CDATA[Student Competition Winners (academic, innovation, and research)]]>
      </item>
          <item>
        <![CDATA[Student Honors and Achievements]]>
      </item>
          <item>
        <![CDATA[Student Research]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
          <item>
        <tid>145</tid>
        <value><![CDATA[Engineering]]></value>
      </item>
          <item>
        <tid>132</tid>
        <value><![CDATA[Institute Leadership]]></value>
      </item>
          <item>
        <tid>135</tid>
        <value><![CDATA[Research]]></value>
      </item>
          <item>
        <tid>134</tid>
        <value><![CDATA[Student and Faculty]]></value>
      </item>
          <item>
        <tid>193158</tid>
        <value><![CDATA[Student Competition Winners (academic, innovation, and research)]]></value>
      </item>
          <item>
        <tid>193157</tid>
        <value><![CDATA[Student Honors and Achievements]]></value>
      </item>
          <item>
        <tid>8862</tid>
        <value><![CDATA[Student Research]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>
          <term tid="39501"><![CDATA[People and Technology]]></term>
          <term tid="39541"><![CDATA[Systems]]></term>
      </core_research_areas>
  <field_news_room_topics>
          <item>
        <tid>71881</tid>
        <value><![CDATA[Science and Technology]]></value>
      </item>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>660373</item>
          <item>660367</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Cybersecurity &amp; Privacy (Do not use)]]></item>
          <item><![CDATA[School of Cybersecurity and Privacy]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>97611</tid>
        <value><![CDATA[research news]]></value>
      </item>
          <item>
        <tid>188776</tid>
        <value><![CDATA[go-research]]></value>
      </item>
          <item>
        <tid>107031</tid>
        <value><![CDATA[College of Engineering; School of Electrical and Computer Engineering]]></value>
      </item>
          <item>
        <tid>168414</tid>
        <value><![CDATA[College of Engineering; School of Electrical and Computer Engineering; College of Computing]]></value>
      </item>
          <item>
        <tid>177495</tid>
        <value><![CDATA[Raheem A. Beyah]]></value>
      </item>
          <item>
        <tid>213</tid>
        <value><![CDATA[energy]]></value>
      </item>
          <item>
        <tid>188515</tid>
        <value><![CDATA[advanced technology vehicles]]></value>
      </item>
          <item>
        <tid>208</tid>
        <value><![CDATA[computing]]></value>
      </item>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>182941</tid>
        <value><![CDATA[cc-research; ic-cybersecurity; ic-hcc]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
