Questions? Please email: ssss20@cerias.purdue.edu
10:00AM - 10:55AM (ET)
10:55AM - 11:00AM (ET)
11:00AM - 12:00PM (ET)
4:00PM - 5:00PM (ET)
10:00AM - 1:00PM (ET)
9:50AM - 10:00AM (ET)
10:00AM - 1:00PM (ET)
2:30PM - 5:30PM (ET)
9:55AM-10:00AM (ET)
10:00AM - 1:00PM (ET)
2:30PM - 5:30PM (ET)
9:55AM - 10:00AM (ET)
10:00AM - 1:00PM (ET)
2:30PM - 5:30PM (ET)
EPFL and Purdue University
Tues. Aug. 4th, 2020 10:00AM - 1:00PM
Georgia Tech
Tue. Aug. 4th, 2020 2:30PM – 5:30PM
In this tutorial, attendees will have the opportunity to use Razor to debloat post-deployment software. We will explore dynamic tracing techniques to trace software’s execution efficiently, use different heuristics to infer non-executed code with similar functionalities, and rewrite software without source code. We will walk through widely used benchmarks and real-world programs to evaluate Razor’s code reduction and robustness.
Stony Brook University
Wed. Aug. 5th, 2020 10:00AM - 1:00PM
In this tutorial, attendees will have the opportunity to learn and experiment with our “Less is More” debloating pipeline for web applications. Like binary software, web applications are becoming ever more complicated and their attack surface is constantly expanding. The attendees will get a chance to use our pipeline to debloat a popular web application, experience how the debloated web application functions as expected, and observe how an exploit that worked before debloating, stops working after debloating.
UCLA
Wed. Aug. 5th, 2020 2:30PM – 5:30PM
In this tutorial, attendees will have the opportunity to use JDebloat, a tool that reduces Java program size by half (on average). We will cover using our tool from beginning to end on an example project. Throughout the tutorial you will learn how our tool works, and how to use it.
Galois, Inc.
Thurs. Aug. 6th, 2020 10:00AM – 1:00PM
This tutorial covers tools for adding defense-in-depth protections against cyber vulnerabilities for legacy embedded systems. The tools (which support x86_64, PowerPC, and ARM) create artificial binary diversity with minimal overhead to significantly increase the effort required to develop attacks. Attendees will have the opportunity to 1) apply the tools to a demonstration system, and 2) explore an example workflow for integrating binary diversification as a defensive mechanism.
Draper Laboratory
Thurs. Aug. 6th, 2020 2:30PM – 5:30PM
This tutorial will introduce CBAT: a Comparative Binary Analysis Tool. CBAT is used to analyze binary programs and automatically find bugs or prove program correctness. It can also compare the behavior of programs to check that patches or binary transformations do not introduce unintended changes. Attendees will have the opportunity to find bugs in real programs with CBAT, and will learn about the BAP binary analysis platform it is built on.
Stony Brook University
Fri. Aug. 7th, 2020 10:00:AM – 1:00PM
Container technologies rely on weaker isolation mechanisms compared to virtual machines, allowing adversaries to exploit kernel vulnerabilities to escalate their privileges and fully compromise the host (and all the other containers running on it). To reduce this risk, we have developed Confine, an automated system that generates restrictive system call policies for arbitrary Docker containers. Reducing the number of available system calls limits the exposed interface of the underlying kernel, minimizing this way its attack surface. In this tutorial, attendees will have the opportunity to use Confine for hardening publicly available Docker images of popular applications (e.g., Nginx), take an in-depth look into the filtered system calls and the respective neutralized kernel vulnerabilities, and experiment with real-world exploits that are rendered ineffective by the applied system call policies.
George Washington University
Fri. Aug. 7th, 2020 2:30PM – 5:30PM
This tutorial introduces tools that perform protocol binary tainting and stateful protocol fuzzing. In this tutorial, attendees will have the opportunity to trace binary instructions relevant to specific protocol packets/fields, and detect vulnerabilities in stateful protocol communications.