Welcome to the 2006-2007 Tiger Team site!
This year marks the second annual Tiger Teams Student Design Competition. The GVU and GTISC Centers host this competition to spur grassroots research in the area of usable security research: the practice of designing secure systems that are usable and useful to ordinary people.
Two-person student teams prepare project proposals that address research topics in usable security. A faculty and industry panel then reviews these proposals, and winning teams receive two semesters of GRA funding, including tuition waver.
This year’s competition is sponsored by Symantec, Internet Security Systems (ISS) and Google. We expect to have industry visitors advise the teams, so this is an excellent way to participate in a visible research project of your own choosing, and make connections with industry leaders.
Last year we selected three teams (six students total) for GRA support, so the Tiger Teams process is a great way to get paid (and get free tuition!) to work on a compelling project that you define! You also get to put your ideas in front of sponsoring companies and get free publicity for your work!
2006-2007 Winning Teams Announced!
We are pleased to announce the winners of the 2006-2007 Tiger Teams competition! With the help of our industry sponsors, we have selected three teams to receive funding to advance their research ideas. Please check back at this page for more details as these projects progress throughout 2007.
Letterhead
Travis Little and Amit Tambe
-
Phishing is a huge and rising danger for home Internet users. The Letterhead project is pursuing an innovative strategy to mitigate phishing attacks. Letterhead integrates into users’ existing email tools, and uses data derived from the structure of the Internet itself to determine whether an email links to a potential phishing site. The system uses a visual metaphor to communicate to users the legitimacy of links contained in email communication.
Worm Mug Shots
Shiva Jaini and Amit Khanna
-
Most existing worm-containment systems produce many false alarms, meaning that network administrators have to manually determine whether or not a on their network is infected machine is infected and reverse the quarantine. The Mug Shots project takes a different approach to worm identification and containment, by analyzing worm behavior and then creating a unique visual “mug shot” of the worm based on its behavior. Just like police officials draw a sketch of the culprits by taking into account their physical characteristics, the Mug Shots tool represents the current network state in the form of a visualization that can be easily understood by network administrators.
Firefly
Frank Park and Jennifer Stoll
-
Despite the increase in security automation for end-users, critical security decisions that can be made only by end-users continue to persist. For example, although some such firewalls “automate security” by connecting to a trusted server for default settings, all are designed to rely on user decisions in order to function properly. The Firefly project is creating a 2nd generation visual firewall that can support better decision making on the part of users. Firefly frames security decisions in terms of risk of actual potential losses they could incur as a result of poor security decision-making; the tool provides a visual presentation of systems-related details that are necessary for good decision-making on the part of users.
How do I participate?
The Tiger Team competition starts fresh each Fall. If you are interested in participating, please register for CS 8001 UST in the Fall semester. This is a one-hour pass/fail seminar, which serves as the kick-off for the competition. Then, at the end of the Fall semester, student teams will submit their project ideas. See the process page on this website for more details.
How do I get more information?
Contact Keith Edwards: keith AT cc DOT gatech DOT edu, +1 (404) 385-6783, TSRB 345.