CERIAS Weekly Security Seminar – Purdue University
This presentation will discuss how program analysis can be used in security applications. Three sample applications will be discussed:binary transformation that can mutate and instrument off-the-shelf commodity binary executables, memory forensics that can extract critical information from memory images, and reverse engineering technique that can expose hidden behaivor of software. All these applications are driven by program analysis.
En liten tjänst av I'm With Friends. Finns även på engelska.