Dr. Damon Woodard
“Nowhere to Run, Nowhere to Hide: The Use of Behavioral and Cognitive Information to Establish Identity in Cyberspace”
Thursday, Sept. 2 at 1:00pm
Email firstname.lastname@example.org for Zoom info
Society relies on the internet for both commerce and easy communication. Establishing the identity of the parties involved is essential to both. The use of physiological-based biometrics such as face, iris, and fingerprints is accepted as an irrefutable means of establishing identity in the real world. Unfortunately, their use in cyberspace is limited. This talk discusses using two alternative sources of information, specifically mobile device usage data (behavioral) and online text (cognitive), to establish identity. The presentation includes a brief discussion of the challenges associated with the use of these information sources, as well as recent research advances. The presentation concludes with a brief discussion of future research directions.
The number of Internet of Things (IoT) devices has already exceeded 26 billion. A typical IoT ecosystem has a wide attack surface, in which software vulnerabilities play an important role. Despite recent advances in program analysis techniques and decision procedures, the complexity of system software creates challenges for vulnerability detection in terms of scalability and precision. In this talk, Dr. Yavuz will introduce model extraction and model-guided analysis as an effective approach for detecting vulnerabilities in the IoT ecosystem. She will present her experience in detecting vulnerabilities in Bluetooth firmware, device drivers, and cryptographic libraries and will then conclude with a roadmap for optimized model extraction and model-guided analysis.