<node id="52804">
  <nid>52804</nid>
  <type>event</type>
  <uid>
    <user id="27154"><![CDATA[27154]]></user>
  </uid>
  <created>1265903873</created>
  <changed>1475891409</changed>
  <title><![CDATA[CS Faculty Candidate Seminar - David Brumley]]></title>
  <body><![CDATA[<p><strong>David Brumley<br />Carnegie Mellon University</strong></p>
<p><strong>"Analysis and Defense of Vulnerabilities in Binary Code"</strong></p>
<p><strong>Abstract:</strong> New vulnerabilities are constantly discovered and exploited by<br />attackers. A major focus of my research is developing techniques for<br />protecting vulnerable applications when the program is only readily<br />available as binary (i.e., executable) code.  Since most programs are<br />available in binary form, and binary-only analysis does not require<br />cooperation of the source code vendor, this line of research is likely<br />to impact a wide audience.</p>
<p>In this talk, I show two new security applications of binary code<br />analysis: automatic patch-based exploit generation, and automatic<br />input filter generation. In this first part, I show how binary<br />analysis can be used to automatically generate exploits based upon<br />patches released from Windows Update.  An immediate consequence of<br />this line of research is that many current vendor patching practices<br />are insecure because they allow attackers to create new exploits<br />before all vulnerable hosts can receive a patch. All is not lost,<br />however. In the second part of this talk, I show how to defend against<br />exploits by automatically generating input filters. Input filters<br />remove exploits from the input stream, thus allowing the vulnerable<br />application to continue to operate normally even under attack. The<br />generated input filters are guaranteed to only filter out exploits,<br />thus safe to automatically deploy.</p>
<p><strong>Bio:</strong> David Brumley is a PhD student in Computer Science at Carnegie Mellon<br />University.  His current work focuses on software security. His<br />research and interests also include all areas of security, as well as<br />programming languages, compilers, formal methods, and systems. He is a<br />recipient of the Symantec Research Fellowship Award for 2007. His<br />research has won several awards, including 2 best paper awards at<br />top-tier security conferences.</p>
<p></p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2008-03-06T10:00:00-05:00]]></value>
      <value2><![CDATA[2008-03-06T11:00:00-05:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[Shanita Williams]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[shanita@cc.gatech.edu]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <field_keywords>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
