CERIAS Weekly Security Seminar – Purdue University

Xiangyu Zhang, How Program Analysis can be Used in Security Applications

55 min • 10 december 2014

This presentation will discuss how program analysis can be used in security applications. Three sample applications will be discussed:binary transformation that can mutate and instrument off-the-shelf commodity binary executables, memory forensics that can extract critical information from memory images, and reverse engineering technique that can expose hidden behaivor of software. All these applications are driven by program analysis.

Senaste avsnitt

Podcastbild

00:00 -00:00
00:00 -00:00