Xiangyu Zhang - Purdue University
Dec 10, 2014
Download: MP4 Video
Watch in your Browser
Watch on YouTube
"How Program Analysis can be Used in Security Applications"
This presentation will discuss how program analysis can be used in security applications. Three sample applications will be discussed:
binary transformation that can mutate and instrument off-the-shelf commodity binary executables, memory forensics that can extract critical information from memory images, and reverse engineering technique that can expose hidden behaivor of software. All these applications are driven by program analysis.
Unless otherwise noted, the security seminar is held on Wednesdays at 4:30P.M.
STEW G52 (Suite 050B), West Lafayette Campus. More information...