<node id="671430">
  <nid>671430</nid>
  <type>event</type>
  <uid>
    <user id="28475"><![CDATA[28475]]></user>
  </uid>
  <created>1701817881</created>
  <changed>1701817900</changed>
  <title><![CDATA[Ph.D. Proposal Oral Exam - Runze Zhang]]></title>
  <body><![CDATA[<p><span><span><span><strong><span>Title:&nbsp; </span></strong><em><span>Hunter and Gatherer: Gearing Rapid Malware Forensics Towards More Effective Botnet Attack Remediation</span></em></span></span></span></p>

<p><span><span><strong><span>Committee:&nbsp; </span></strong></span></span></p>

<p><span><span><span>Dr. </span><span>Saltaformaggio</span><span>, Advisor</span>&nbsp;&nbsp;&nbsp;&nbsp; </span></span></p>

<p><span><span><span>Dr. </span><span>Specter</span><span>, Chair</span></span></span></p>

<p><span><span><span>Dr. </span><span>Frank Li</span></span></span></p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Hunter and Gatherer: Gearing Rapid Malware Forensics Towards More Effective Botnet Attack Remediation]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p><span><span>The objective of the proposed research is to help incident responders mitigate the attacks from advanced botnets with automatic frontend bot forensics pipelines. For decades, law enforcement and commercial entities have attempted botnet takedowns with mixed success. These efforts, relying on DNS sink-holing or seizing C&amp;C infrastructure, require months of preparation and often omit the cleanup of left-over infected machines. This allows botnet operators to push updates to the bots and re-establish their control. Besides, the advanced botnets also empower similar infrastructure to frequently update their frontend bots to perform new attacks and improve attack strategies. In my proposed study, firstly,&nbsp; I expand the goal of botnet takedowns to include the covert and timely removal of frontend bots from infected devices. Specifically, this work proposes seizing the bot's built-in update mechanism to distribute crafted remediation payloads. Besides, focusing on ad-click attacks stemming out of botnet, I also propose to extract attacking strategies from the frontend bots to defend upcoming attacks from the ad platforms’ perspectives actively. In the preliminary studies, I developed GLEAN, an automated malware forensics pipeline that extracts frontend bot payload deployment routines and generates remediation payloads to disable or remove the frontend bots on infected devices. The study of 702 Android bots shows that 523 bots can be remediated via GLEAN's takedown approach, ranging from covertly warning users about bot infection to uninstalling the bot.</span></span></p>
]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2023-12-08T11:00:00-05:00]]></value>
      <value2><![CDATA[2023-12-08T13:00:00-05:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[Room C0915 Atlantic, CODA]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>434371</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[ECE Ph.D. Proposal Oral Exams]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>102851</tid>
        <value><![CDATA[Phd proposal]]></value>
      </item>
          <item>
        <tid>1808</tid>
        <value><![CDATA[graduate students]]></value>
      </item>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
