{"682139":{"#nid":"682139","#data":{"type":"event","title":"PhD Proposal by Grant Williams","body":[{"value":"\u003Cp\u003E\u003Cstrong\u003ETitle: \u003C\/strong\u003EMethods and Systems for IPv6 Security Measurement\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EDate: Wednesday\u003C\/strong\u003E, May 7, 2025\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003ETime:\u003C\/strong\u003E\u0026nbsp;9:00 AM \u2013 10:30 AM ET\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003ELocation \u003C\/strong\u003E(Hybrid):\u003C\/p\u003E\u003Cp\u003ECoda C1015 Vinings\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/gatech.zoom.us\/j\/92554061158?pwd=HEJ9eUHQPgFTIgqXTpy2nIR2xt42wT.1\u0022\u003Ehttps:\/\/gatech.zoom.us\/j\/92554061158?pwd=HEJ9eUHQPgFTIgqXTpy2nIR2xt42wT.1\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E(Meeting ID: 925 5406 1158; Passcode: 584880)\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EGrant Williams\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EComputer Science Ph.D. Student\u003C\/p\u003E\u003Cp\u003ESchool of Cybersecurity and Privacy\u003C\/p\u003E\u003Cp\u003ECollege of Computing\u003C\/p\u003E\u003Cp\u003EGeorgia Institute of Technology\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003ECommittee:\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EDr. Paul Pearce (Advisor) \u2013 School of Cybersecurity and Privacy, Georgia Institute of Technology\u003C\/p\u003E\u003Cp\u003EDr. Frank Li - School of Cybersecurity and Privacy, Georgia Institute of Technology\u003C\/p\u003E\u003Cp\u003EDr. Cecilia Testart - School of Cybersecurity and Privacy, Georgia Institute of Technology\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EAbstract:\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EIPv4 Internet scanning transformed Internet Security, enabling a diverse set of tasks ranging from tracking botnets to analyzing cryptographic vulnerabilities. Such advances did not directly extend to IPv6 given the vast scale of its address space. Security scanning measurements routinely ignored IPv6 as researchers lacked the ability to exhaustively scan the IPv6 address space. Target Generation Algorithms (TGAs) were proposed for enabling IPv6 scanning-based measurement, but such methods have significant limitations and have not been extensively evaluated or applied broadly to Internet security scans. Our work addresses these challenges by building and evaluating multiple IPv6 scanning systems, exploring metrics and seed datasets for use in evaluating these systems, and deploying these artifacts for use in security evaluations.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EFirst, we develop 6Sense, an online deep-learning approach for finding responsive IPv6 addresses based on domain knowledge of address structure. We then propose a set of metrics for evaluating IPv6 scanning approaches and show 6Sense is able to identify more than 3.6x more hosts and 4x more end-site assignments than prior approaches. We deploy 6Sense for IPv6 security measurements across the Internet: exploring TLS certificates, surveying open ports, and quantifying security-sensitive services. Second, we explore how input datasets affect what IPv6 scanning systems are able to find. We determine how to optimize the number and quality of discovered addresses by filtering these datasets for responsiveness and network characteristics.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EUnfortunately, simply exploring based on known IPv6 datasets is not enough to get a comprehensive picture of IPv6 security. As current and future work, we discuss deploying multiple approaches, including enhanced ICMP error message-based discovery, to collect a larger dataset of \u0026gt;200M IPv6 addresses across multiple ports and protocols. We will then explore security applications using these new datasets and methods. Finally, we will discuss additional future work in determining the longevity of responsive IPv6 addresses, as there has yet been no large-scale study of IPv6 responsiveness over time.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EAll told, we build methods and systems for enabling IPv6 Internet scanning and allowing comparable security measurements on IPv6 to those deployed on IPv4.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EMethods and Systems for IPv6 Security Measurement\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Methods and Systems for IPv6 Security Measurement"}],"uid":"27707","created_gmt":"2025-05-01 14:45:59","changed_gmt":"2025-05-01 14:46:49","author":"Tatianna Richardson","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2025-05-07T09:00:09-04:00","event_time_end":"2025-05-07T11:00:00-04:00","event_time_end_last":"2025-05-07T11:00:00-04:00","gmt_time_start":"2025-05-07 13:00:09","gmt_time_end":"2025-05-07 15:00:00","gmt_time_end_last":"2025-05-07 15:00:00","rrule":null,"timezone":"America\/New_York"},"location":"(Hybrid): Coda C1015 Vinings","extras":[],"groups":[{"id":"221981","name":"Graduate Studies"}],"categories":[],"keywords":[{"id":"102851","name":"Phd proposal"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78771","name":"Public"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}