IS focuses on advancing and assuring the security of our vital social, political, and financial networks while balancing the crucial needs and expectations of privacy and governmental oversight. This mission cuts across four other destination areas and strategic growth areas, intersecting at key points of national interest where Virginia Tech has demonstrated expertise and capability: Security for the Internet of Everything: The interconnection of the digital world, the physical world, and humans interacting with both worlds. Governance and Ethics for Security: Questions and concerns about the adoption, use, and audit of security and privacy practices as they affect citizens and their government, consumers and business, and humans and their environment. Analytics for National Security and Preparedness: Using the capabilities of big data to improve security, forecasting, awareness, and resilience in response to disasters and for national defense.

Recent Submissions

  • The Cyber Deterrence Problem 

    Brantly, AF (NATO CCD COE, 2018-05-30)
    What is the role of deterrence in an age where adept hackers can credibly hold strategic assets at risk? Do conventional frameworks of deterrence maintain their applicability and meaning against state actors in cyberspace? ...
  • Bitcoin and Cryptocurrencies 

    Vasek, Marie; Jardine, Eric; Brantly, Aaron (Virginia Tech, 2018-05-18)
    This panel includes three presentations: “Cryptocurrencies and Financial Crimes” by Marie Vasek; “Cryptocurrencies and Specific Drug Types” by Eric Jardine; and “Bitcoin and OPSEC for Terrorists” by Aaron Brantly. (Please ...
  • Extremism, Malware Markets, and Public Use of Tor 

    Lindner, Andrew M.; Hawdon, James; Nunes, Eric (Virginia Tech, 2018-05-18)
    This panel includes three presentations: “When the Public Seeks Anonymity Online” by Andrew M. Lindner; “Online Extremism in the U.S.” by James Hawdon; and “Malicious Markets and Forums: An Overview” by Eric Nunes. The ...
  • Measuring and Analyzing Online Anonymous Marketplaces 

    Christin, Nicolas (Virginia Tech, 2018-05-18)
    This presentation was given as part of the conference "Understanding the Dark Web and Its Implications for Policy" held on May 18, 2018 at the Virginia Tech Executive Briefing Center in Arlington, Virginia.
  • Deep/Dark Web & Higher Education 

    Moore, Kathleen (Virginia Tech, 2018-05-18)
    This presentation was given as part of the conference "Understanding the Dark Web and Its Implications for Policy" held on May 18, 2018 at the Virginia Tech Executive Briefing Center in Arlington, Virginia.
  • Indexing the Darknet 

    Owenson, Gareth (Virginia Tech, 2018-05-18)
    This presentation was given as part of the conference "Understanding the Dark Web and Its Implications for Policy" held on May 18, 2018 at the Virginia Tech Executive Briefing Center in Arlington, Virginia.
  • Understanding the Dark Web and its Implications for Policy (program) 

    Jardine, Eric (Virginia Tech, 2018-05-18)
    The program includes the agenda, speakers, and sponsors.
  • Rapporteur Report: Understanding the Dark Web and its Implications for Policy 

    Jardine, Eric (Virginia Tech, 2018-05)
    The Understanding the Dark Web and Its Implications for Policy conference focused on addressing the challenging dilemmas posed by the anonymity created by the “Dark Web” (the unindexed portion of the Internet only accessible ...
  • Understanding the Dark Web and its Implications for Policy (flyer) 

    Jardine, Eric (Virginia Tech, 2018-05-18)
    How to deal with the negative excesses of the Dark Web and other anonymity-granting technologies without harming those who use these tools for benign activities is one of today’s most pressing policy challenges. This ...
  • Detecting Malicious Landing Pages in Malware Distribution Networks 

    Wang, Gang; Stokes, Jack W.; Herley, Cormac; Felstead, David (IEEE, 2013-06)
    Drive-by download attacks attempt to compromise a victim’s computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, ...
  • Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers 

    Gang, Wang; Wang, Tianyi; Zheng, Haitao; Zhao, Ben Y. (USENIX, 2014-08)
    Recent work in security and systems has embraced the use of machine learning (ML) techniques for identifying misbehavior, e.g. email spam and fake (Sybil) users in social networks. However, ML models are typically derived ...
  • Social Turing Tests: Crowdsourcing Sybil Detection 

    Wang, Gang; Mohanlal, Manish; Wilson, Christo; Wang, Xiao; Metzger, Miriam; Zheng, Haitao; Zhao, Ben Y. (Internet Society, 2013-02)
    As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks (OSNs). Today, sophisticated attackers are creating realistic Sybils ...
  • An Early Event in Adipogenesis, the Nuclear Selection of the CCAAT Enhancer-binding Protein ß (C/EBP ß ) mRNA by HuR and its Translocation to the Cytosol2006 

    Gantt, Kira (American Society for Biochemistry and Molecular Biology, 2006-07)
    HuR is a ligand for nuclear mRNAs containing adenylate-uridylate-rich elements in the 3_-untranslated region. Once bound to the mRNA, HuR is recognized by adapter proteins that then facilitate nuclear export of the complex. ...
  • Countering the Cyber Threat 

    Brantly, AF; Henry, S (The Army Cyber Institute, 2018-05-09)
  • Measuring the Insecurity of Mobile Deep Links of Android 

    Lui, Fang; Wang, Chun; Pico, Andres; Yao, Danfeng; Wang, Gang (USENIX, 2017-08)
    Mobile deep links are URIs that point to specific locations within apps, which are instrumental to web-to-app communications. Existing “scheme URLs” are known to have hijacking vulnerabilities where one app can freely ...
  • CCS 2017- Women in Cyber Security (CyberW) Workshop 

    Yao, Danfeng (Daphne); Bertino, Elisa (ACM, 2017)
    The CyberW workshop is motivated by the significant gender imbalance in all security conferences, in terms of the number of publishing authors, PC members, organizers, and attendees. What causes this gender imbalance remains ...
  • Physical layer orthogonal frequency-division multiplexing acquisition and timing synchronization security 

    La Pan, Matthew J.; Clancy, Charles T.; McGwier, Robert W. (Wiley, 2014-08-18)
    Orthogonal frequency-division multiplexing (OFDM) has become the manifest modulation choice for 4G standards. Timing acquisition and carrier frequency offset synchronization are prerequisite to OFDM demodulation and must ...
  • Framework for Evaluating the Severity of Cybervulnerability of a Traffic Cabinet 

    Ernst, Joseph M.; Michaels, Alan J. (National Academy of Sciences, 2017)
    The increasing connectivity in transportation infrastructure is driving a need for additional security in transportation systems. For security decisions in a budget-constrained environment, the possible effect of a cyberattack ...
  • Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems 

    Bélanger, France; Crossler, Robert E. (University of Minnesota, Management Information Systems Research Center, 2011-12)
    Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and ...

View more