<node id="678712">
  <nid>678712</nid>
  <type>news</type>
  <uid>
    <user id="36253"><![CDATA[36253]]></user>
  </uid>
  <created>1733154592</created>
  <changed>1733156529</changed>
  <title><![CDATA[Unveiling METALLIC: A Multi-Million Dollar Investment into Cybersecurity]]></title>
  <body><![CDATA[<div><div><p>Researchers are receiving more than $4 million from DARPA to develop a new framework to analyze and model sophisticated attacks on software.</p><p>A common tactic cybercriminals use is an exploit chain, a series of interconnected steps or vulnerabilities that attackers exploit to breach software systems. Each step leverages the capability achieved in the preceding step, forming a systematic pathway to compromise.</p><p>Recognizing the severity of this threat, researchers at the <a href="https://scp.cc.gatech.edu/">School of Cybersecurity and Privacy</a> (SCP) at Georgia Tech will work with Trusted Science and Technology Inc. to turn Metrology for Assessing the Leverage of and Liability for Compromises (METALLIC) into a working prototype of a security modeling and assessment framework.&nbsp;</p><p>“We are developing a foundation framework to analyze and reason about cyber chains of exploits,” said <a href="https://www.cc.gatech.edu/people/sukarno-mertoguno"><strong>Sukarno Mertoguno</strong></a>, SCP research professor and project lead.</p><p>“The structure we will implement in this project enables characterization and evaluation of exploit components, semi-automated repair, and adaptation of the chain to the changes in operating environment.”</p><p>The METALLIC project holds significant promise for advancing cybersecurity practices. For instance, METALLIC could help organizations detect and neutralize exploit chains faster, reducing the average time to identify and mitigate a breach from days to hours.&nbsp;</p><p>By providing a comprehensive framework for modeling, analyzing, and mitigating exploit chains, METALLIC has the potential to empower security professionals with the tools and knowledge needed to better protect software systems from sophisticated cyberattacks.</p><p>This project represents an important step towards a more secure digital future, where individuals and organizations can confidently engage in online activities without fear of compromise.</p><p>Researchers and engineers with extensive expertise in various cybersecurity domains will spearhead the METALLIC project.</p><p>Mertoguno will lead the Georgia Tech team and be responsible for system security, systems-centric models, and scalable analysis. <a href="http://wenke.gtisc.gatech.edu/"><strong>Wenke Lee</strong></a>, a professor at SCP, is responsible for vulnerability research, especially on mobile devices. <a href="https://taesoo.kim/"><strong>Taesoo Kim</strong></a>, a professor at SCP, is responsible for exploit discovery and chaining. <a href="https://saltaformaggio.ece.gatech.edu/"><strong>Brendan Saltaformaggio</strong></a>, an associate professor at SCP, will focus on root cause analysis.</p></div></div>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2024-11-20T00:00:00-05:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Researchers at Georgia Tech, funded by a $4 million DARPA grant, are developing METALLIC, a framework to analyze and mitigate exploit chains—complex, multi-step cyberattacks. ]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Researchers at Georgia Tech, funded by a $4 million DARPA grant, are developing METALLIC, a framework to analyze and mitigate exploit chains—complex, multi-step cyberattacks. The project aims to reduce detection and response times from days to hours by characterizing vulnerabilities, enabling semi-automated repairs, and adapting systems to changes. Led by cybersecurity experts, METALLIC promises to enhance software security and advance defenses against sophisticated attacks.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="478131">
            <nid>478131</nid>
            <type>image</type>
            <title><![CDATA[Cybersecurity Binary Code]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>204126</fid>
                  <filename><![CDATA[istock_000002879463_large.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/istock_000002879463_large_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/istock_000002879463_large_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Cybersecurity Binary Code]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[jpopham3@gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>John Popham</p><p>Communications Officer II</p><p>School of Cybersecurity and Privacy</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
          <item>1188</item>
          <item>660373</item>
          <item>660367</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
          <item>
        <![CDATA[Research]]>
      </item>
          <item>
        <![CDATA[Student and Faculty]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
          <item>
        <tid>135</tid>
        <value><![CDATA[Research]]></value>
      </item>
          <item>
        <tid>134</tid>
        <value><![CDATA[Student and Faculty]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>1188</item>
          <item>660373</item>
          <item>660367</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[Research Horizons]]></item>
          <item><![CDATA[School of Cybersecurity &amp; Privacy (Do not use)]]></item>
          <item><![CDATA[School of Cybersecurity and Privacy]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>188776</tid>
        <value><![CDATA[go-research]]></value>
      </item>
          <item>
        <tid>187915</tid>
        <value><![CDATA[go-researchnews]]></value>
      </item>
          <item>
        <tid>73381</tid>
        <value><![CDATA[projects]]></value>
      </item>
          <item>
        <tid>186861</tid>
        <value><![CDATA[go-cyber]]></value>
      </item>
          <item>
        <tid>344</tid>
        <value><![CDATA[cyber]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
