Thursday, April 14, 2016

IST Graduation Survey


ATTENTION MAY GRADUATES: REMINDER
In order to confirm your May graduation, please take 10 minutes to complete your IST post-graduation survey using the link below to complete the process.


As in the past, if you are going into a role that is confidential within the government, please simply reply as “employed” when asked about your post-graduation plans.  Indicate “government” as the employer. Additionally if you have not found a full time job, we ask that you still complete the survey and make changes at a later date.

Please contact the Office of Career Solutions (careers@ist.psu.edu) if you have trouble logging in or completing the PSU Post Graduation survey for IST students.

Talk on Crowdsourcing


Designing with Online Crowds
Dr. Brian Bailey

Monday, April 18
1:15 - 2:15pm
IST Cybertorium (room 113)

Abstract
Feedback is critical for design innovation processes but receiving effective feedback can be surprisingly hard. In this talk, I will describe the design and implementation of a new genre of crowd-based technology that enables designers to receive personalized, timely, and affordable feedback for in-progress visual designs. I will also present results from two studies that tackle fundamental questions about the quality, use cases, and interpretation of crowd-based design feedback.

Bio
Dr. Brian Bailey is an Associate Professor of Computer Science at the University of Illinois. His research passion is to enable and study new forms of interaction between people and technology. Dr. Bailey is currently studying the intersection of computing, crowds, and design innovation. His work has been supported by the NSF, Microsoft, Google, and Ricoh Innovations. He earned his M.S. and PhD in Computer Science from the University of Minnesota.

Boeing Uplift IT Case Competition

The Boeing Company is looking for enthusiastic students to compete in a technology-focused case competition. Students can apply their technical skills, think strategically and put their creativity to the test for a chance to win great prizes, including a job interview at Boeing and a trip to Seattle. Students from universities across the United States are eligible to participate and represent their schools in this company-sponsored event.

Deadline extended! Registrations are now being accepted through May 9, 2016.

For more information:

http://www.boeing.com/specialty/uplift/index.page

Tuesday, April 12, 2016

IST Startup Week

What does it take to move an idea into action as a company?  A number of IST graduates have succeeded in developing startups into viable companies.  IST Startup week is intended to share their stories, and to help students understand all of the work that goes into a successful startup.

Who knows, you could be the next Steve Jobs or Bill Gates.

More info at:

http://news.psu.edu/story/402158/2016/04/06/student-success/ist-startup-week-celebrates-five-years-penn-state


Tuesday, April 5, 2016

Seminar - Exploiting Memory Errors on the Data Plane

Seminar
 Tuesday, April 12, 10am 222 IST Building

By: Zhenkai Liang National University of Singapore

 “Exploiting Memory Errors on the Data Plane” As defense solutions against control-flow hijacking attacks gain wide deployment, controloriented exploits from memory errors become difficult. As an alternative, attacks targeting noncontrol data do not require diverting the application’s control flow during an attack. Although it is known that such data-oriented attacks can mount significant damage, no systematic methods to automatically construct them from memory errors have been developed. In this work, we study exploits of memory errors from the data angle. We have developed a new technique, called data-flow stitching, which systematically finds ways to join data flows in the program to generate data-oriented exploits. We have constructed new attacks on the data plane from known vulnerabilities. The constructed exploits can cause significant damage, such as disclosure of sensitive information (e.g., passwords and encryption keys) and escalation of privilege. We further study the expressiveness of such data-oriented exploits. By identifying data-oriented gadgets and gadget dispatchers, we demonstrate that data-oriented exploits can be used to construct Turing complete computations.