Research & Development World

  • R&D World Home
  • Topics
    • Aerospace
    • Automotive
    • Biotech
    • Careers
    • Chemistry
    • Environment
    • Energy
    • Life Science
    • Material Science
    • R&D Management
    • Physics
  • Technology
    • 3D Printing
    • A.I./Robotics
    • Software
    • Battery Technology
    • Controlled Environments
      • Cleanrooms
      • Graphene
      • Lasers
      • Regulations/Standards
      • Sensors
    • Imaging
    • Nanotechnology
    • Scientific Computing
      • Big Data
      • HPC/Supercomputing
      • Informatics
      • Security
    • Semiconductors
  • R&D Market Pulse
  • R&D 100
    • 2025 R&D 100 Award Winners
    • 2025 Professional Award Winners
    • 2025 Special Recognition Winners
    • R&D 100 Awards Event
    • R&D 100 Submissions
    • Winner Archive
  • Resources
    • Research Reports
    • Digital Issues
    • Educational Assets
    • R&D Index
    • Subscribe
    • Video
    • Webinars
    • Content submission guidelines for R&D World
  • Global Funding Forecast
  • Top Labs
  • Advertise
  • SUBSCRIBE

Project to ensure “what you see is what you send”

By R&D Editors | February 25, 2014

Imagine a user who intends to send $2 to a friend through PayPal. Embedded malware in the user’s laptop, however, converts the $2 transaction into a $2,000 transfer to the account of the malware author instead.

Researchers at Georgia Tech have created a prototype software, Gyrus, that takes extra steps to prevent malware from sending spam emails and instant messages, and blocking unauthorized commands such as money transfers.

Current protection programs might recognize the original user’s intent to send email, transfer money or engage in other transactions but cannot verify the specifics such as email contents or amount of money. Without context, it is impossible to properly verify the user’s full intent, regardless of whether the software is protecting a financial transfer, an industrial control system or a wide range of other user-driven applications.

“Gyrus is a transparent layer on top of the window of an application. The user experience with the application will be exactly the same as when Gyrus is not installed or activated. Of course, if Gyrus detects that user-intended data has tampered with, it will block the traffic and also notify the user,” explained Wenke Lee, director of the Georgia Tech Information Security Center (GTISC).   

The Georgia Tech research is based on the observation that for most text-based applications, the user’s intent will be displayed entirely on screen, as text, and the user will make modifications if what is on screen is not what he or she wants. Users help Gyrus do its job by establishing pre-defined rules that help the software determine whether commands—authorized or not—fit with established user intentions In the researchers’ words, Gyrus implements a “What You See Is What You Send” (WYSIWYS) policy.

“The idea of defining correct behavior of an application by capturing user intent is not entirely new, but previous attempts in this space use an overly simplistic model of the user’s behavior,” said Yeongjin Jang, the Georgia Tech Ph.D. student who led the study.

“For example, they might infer a user’s intent based on a single mouse click without capturing any associated context so the attackers can easily disguise attacks as a benign behavior,” Jang added. “Instead, Gyrus captures richer semantics including both user actions and text contents, along with applications semantics, to make the system send only user-intended network traffic. Gyrus indirectly but correctly determines user intent from the screen that is displayed to the user. ”

There are two key components to Gyrus’ approach. First, it captures the user’s intent and interactions with an application. Second, it verifies that the resulting output can be mapped back to the user’s intention.  As a result, the application ensures accurate transactions even in the presence of malware.

Jang, along with Simon Chung, a postdoctoral researcher at Georgia Tech and Bryan Payne, a Georgia Tech Ph.D. graduate, presented the study in February during the 2014 Network and Distributed System Security Symposium (NDSS) in San Diego, Calif. Their advisor is Wenke Lee, director of the Georgia Tech Information Security Center (GTISC).  

Gyrus: A Framework for User-Intent Monitoring of Text-Based Networked Applications

Source: Georgia Institute of Technology

 

Related Articles Read More >

FDA approves first non-drug depression treatment
These R&D 100 Finalists are improving pharmaceutical research with their award-winning CyroProbe
Lab automation is “vaporizing”: Why the hottest innovation is invisible
Maryland set for first subsea internet cable: AWS’s 320+ Tbps “Fastnet” to Ireland
rd newsletter
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, trends, and strategies in Research & Development.
RD 25 Power Index

R&D World Digital Issues

Fall 2025 issue

Browse the most current issue of R&D World and back issues in an easy to use high quality format. Clip, share and download with the leading R&D magazine today.

R&D 100 Awards
Research & Development World
  • Subscribe to R&D World Magazine
  • Sign up for R&D World’s newsletter
  • Contact Us
  • About Us
  • Drug Discovery & Development
  • Pharmaceutical Processing
  • Global Funding Forecast

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search R&D World

  • R&D World Home
  • Topics
    • Aerospace
    • Automotive
    • Biotech
    • Careers
    • Chemistry
    • Environment
    • Energy
    • Life Science
    • Material Science
    • R&D Management
    • Physics
  • Technology
    • 3D Printing
    • A.I./Robotics
    • Software
    • Battery Technology
    • Controlled Environments
      • Cleanrooms
      • Graphene
      • Lasers
      • Regulations/Standards
      • Sensors
    • Imaging
    • Nanotechnology
    • Scientific Computing
      • Big Data
      • HPC/Supercomputing
      • Informatics
      • Security
    • Semiconductors
  • R&D Market Pulse
  • R&D 100
    • 2025 R&D 100 Award Winners
    • 2025 Professional Award Winners
    • 2025 Special Recognition Winners
    • R&D 100 Awards Event
    • R&D 100 Submissions
    • Winner Archive
  • Resources
    • Research Reports
    • Digital Issues
    • Educational Assets
    • R&D Index
    • Subscribe
    • Video
    • Webinars
    • Content submission guidelines for R&D World
  • Global Funding Forecast
  • Top Labs
  • Advertise
  • SUBSCRIBE