学 术

分享到微信 ×
打开微信“扫一扫”
即可将网页分享至朋友圈
学术沙龙:Automated Symbolic Security Analysis of Malicious Binary Code
文:教师发展中心 来源:党委教师工作部、人力资源部(教师发展中心) 时间:2017-06-01 3354

  本次活动教师发展中心联合计算机学院网络空间安全研究中心特别邀请德州大学阿灵顿分校助理教授明江,与我校师生分享其在软件安全和恶意软件防御方面的研究。具体安排如下,欢迎感兴趣的教师和研究生参加。

  一、主 题:Automated Symbolic Security Analysis of Malicious Binary Code

  二、主讲人:美国德州大学阿灵顿分校 助理教授 明江

  三、时 间:2017年6月5日(周一)14:30-16:00

  四、地 点:清水河校区图书馆天韵厅

  五、主持人:计算机科学与工程学院 陈厅 副教授

  六、交流内容

  Malware, or malicious software with harmful intents to compromise computer systems, is one of the major challenges to the Internet. Driven by the rich profit, there has been a consistent growth in the number and diversity of malware. Automatically investigating malicious intents and designing corresponding defensive solutions are critical to protecting computer systems. An inherent challenge of malware analysis is the source code of malware is typically absent. The binary executable itself becomes the only available resource to be analyzed. Recently, symbolic execution has emerged as a fundamental technique for automatically reasoning security queries. Many laborious security analysis tasks, such as software vulnerability detection and exploit generation, have been recast as a set of constraint satisfaction problems, and advanced Satisfiability Modulo Theories solvers are utilized to solve these constraints efficiently. In this talk, I will present our work in Automated Symbolic Security Analysis of Malicious Binary Code, including control flow de-obfuscation (CCS'15), cryptographic function detection (S&P'17), and identifying malware relationships (Usenix Security'17).

  七、主讲人简介

  Jiang Ming, an assistant professor of Department of Computer Science and Engineering at the University of Texas at Arlington. His research focuses on security, especially software security and malware defense, including secure information flow analysis, software plagiarism detection, malicious binary code analysis, and software analysis for security issues. Jiang Ming has extensive academic and industry experience in computer security. His work has been published in prestigious security and software engineering conferences (USENIX Security, CCS, Euro S&P, FSE, and ASE). He is among the first to work on symbolic execution based methods for semantics-based binary code diffing. More recently he has been working on automated symbolic security analysis.

  八、主办单位:人力资源部教师发展中心

    承办单位:计算机科学与工程学院 网络空间安全研究中心


                 人力资源部教师发展中心

                   2017年5月24日

 

编辑:林坤  / 审核:罗莎  / 发布:一戈

"