15 Sep 2016
Exploit Kits: How a Single Click Can Lead to Malware (1:10-1:50 pm ET)
and
Protecting Critical Integrated Circuit Intellectual Property from Theft and Counterfeiting (2:00-2:40 pm ET)
Mark your calendars and come join your friends in the CAE community for a Tech Talk. We are a warm group that shares technical knowledge. CAE Tech Talks are free and conducted live in real-time over the Internet, so no travel is required. You can attend from just about anywhere (office, home, etc.) Capitol Technology University (CTU) hosts the presentations using their online delivery platform (Adobe Connect) which employs slides, VOIP, and chat for live interaction. Just log in as “Guest” and enjoy the presentation(s).
Below is a description of the presentation(s) and logistics of attendance:
Date: Thursday 15 Sep 2016
Time: 1:10-1:50 pm ET
Location: https://capitol.adobeconnect.com/cae_tech_talk/
Just log in as “Guest” and enter your name. No password required.
Title/Topic: Exploit Kits: How a Single Click Can Lead to Malware
Audience Skill Level: Beginner to Intermediate
Presenter: Josh Stroschein (Dakota State University)
Description:
Malware authors are constantly striving to develop new methods to deliver malware and bypass organizational defenses. In this talk we’ll explore exploit kits, which are being utilized to distribute malware to its victims by them simply visiting a site on the internet. We’ll look at how a site may be compromised, how the malware authors obfuscate their code, how the browser is typically exploited and what type of malware is being delivered. This is intended to be a technical talk and users should come away with a better understanding of EKs and the tools and techniques that can be leveraged to analyze them.
Date: Thursday 15 Sep 2016
Time: 2:00-2:40 pm ET
Location: https://capitol.adobeconnect.com/cae_tech_talk/
Just log in as “Guest” and enter your name. No password required.
Title/Topic: Protecting Critical Integrated Circuit Intellectual Property from Theft and Counterfeiting
Audience Skill Level: All levels
Presenter: Ioannis Savidis (Drexel University)
Description:
The growing complexity of integrated circuit (IC) designs and the cost of manufacturing such devices has introduced untrusted third-parties into the IC design flow. As ICs form the backbone of many electronic devices ranging from smart phones and computers to the systems that control our banking, energy distribution, and defense infrastructure it is vital that these devices are secure. The challenge in this assertion is that there are a multitude of threats to secure against. Intellectual property (IP) theft, IC counterfeiting and overproduction, and the insertion of hardware Trojans are all serious concerns. A promising research area that aims to reduce the mentioned threats is logic encryption which adds key gates to an IC design to allow for dynamic control of the operation of an IC. However, the overhead of logic encryption is often prohibitive. The goal of my research effort is therefore to 1) create a low-cost implementation of logic encryption 2) develop novel gate selection methodologies to efficiently implement logic encryption into the electronic design automation (EDA) flow, and 3) quantify the efficacy of logic encryption techniques in terms of gains in IC security.
CAE Tech Talks are also recorded
CTU will post a recording of the live presentations on its website:
https://capitol.instructure.com/courses/510/external_tools/66
Contact
Announcements for CAE Tech Talk events can be found in the news and calendar section of the CAE community website: www.caecommunity.org
For questions on CAE Tech Talk, please send email to CAETechTalk@nsa.gov