PPT-Elix Path-selective taint analysis for extracting mobile app links
Author : ryotheasy | Published Date : 2020-11-06
Yongjian Hu Two Sigma Investments Oriana Riva Microsoft Research Suman Nath Microsoft Research Iulian Neamtiu New Jersey Institute of Technology myelpcom biz sushi
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Elix Path-selective taint analysis for e..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Elix Path-selective taint analysis for extracting mobile app links: Transcript
Yongjian Hu Two Sigma Investments Oriana Riva Microsoft Research Suman Nath Microsoft Research Iulian Neamtiu New Jersey Institute of Technology myelpcom biz sushi yasaka new york. Paper by: James Newsome and Dawn Song. Network and Distributed Systems Security Symposium (NDSS), Feb 2005.. . CS451 Spring 2011. Instructor: Christos Papadopoulos. Original slides by . Devendra. . with Dynamic Information Flow Analysis. Mona Attariyan. Jason . Flinn. University of Michigan. Mona Attariyan - University of Michigan. 2. Configuration Troubleshooting Is Difficult. Software systems . About Dynamic . Taint . Analysis & Forward . Symbolic . Execution (. but might have been afraid to ask. ). Edward J. Schwartz, . ThanassisAvgerinos. , David . Brumley. Presented by: . Vaibhav . Rastogi. (but might have been afraid to ask). IEEE S&P 2010. Overview. Two Main Contributions. Precisely describe the algorithms for dynamic taint analysis and forward symbolic execution as extensions to the run-time semantics of a general language. Yinzhi Cao. Reference: . http. ://www.cs.tau.ac.il/~. omertrip/pldi09/TAJ.ppt. www.cs.cmu.edu/~. soonhok/talks/20110301.pdf. 2. Motivating Example. *. * Inspired by . Refl1. in. SecuriBench Micro. Taint Flow #1. SPSS/AMOS. Theory of Planned Behavior. Zero-Order Correlations. PATH-. INGRAM.sav. . data file from . SPSS . data . page. .. . Attitude. SubNorm. PBC. Intent. Behavior. Attitude. 1.000. .472. .665. Edward J. Schwartz, . Thanassis. Avgerinos, David . Brumley. Presented by: . Haitao Xu. 1. The Root of All Evil. Humans write programs. This Talk:. Computers Analyzing Programs Dynamically at Runtime. Suman Jana. Dynamic Taint Analysis. Track information flow through a program at runtime. Identify sources of taint – . “. TaintSeed. ”. What are you tracking?. Untrusted input. Sensitive data. Taint Policy – . Yinzhi Cao. Reference: . http. ://www.cs.tau.ac.il/~. omertrip/pldi09/TAJ.ppt. www.cs.cmu.edu/~. soonhok/talks/20110301.pdf. 2. Motivating Example. *. * Inspired by . Refl1. in. SecuriBench Micro. Taint Flow #1. About Dynamic . Taint . Analysis & Forward . Symbolic . Execution (. but might have been afraid to ask. ). Edward J. Schwartz, . ThanassisAvgerinos. , David . Brumley. Presented by: . Vaibhav . Rastogi. Roadmap. Background. TaintDroid. JavaScript. Conclusion. Background. In smartphone, we. . use third-party applications such as . - Google map, Angry bird … . etc. More than 10Billion Apps. Because it’s useful.. Dynamic Taint Analysis. Track information flow through a program at runtime. Identify sources of taint – . “. TaintSeed. ”. What are you tracking?. Untrusted input. Sensitive data. Taint Policy – . App Sets. Will Klieber*, Lori Flynn, . Amar Bhosale , Limin Jia, and Lujo Bauer . Carnegie Mellon University. *presenting. Motivation. Detect malicious apps that leak sensitive data.. F elix Trembled Acts 24:25 Why Did F elix Tremble ? Righteousness Psalm 119:172; 1 Corinthians 6:9-10; Luke 13:3 Why Did F elix Tremble ? Righteousness Psalm 119:172; 1 Corinthians 6:9-10; Luke 13:3
Download Document
Here is the link to download the presentation.
"Elix Path-selective taint analysis for extracting mobile app links"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents