CS Faculty Candidate Seminar - David Brumley

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
  • Date/Time:
    • Thursday March 6, 2008 - Friday March 7, 2008
      10:00 am - 10:59 am
  • Location: KACB 1116E
  • Phone:
  • URL:
  • Email: shanita@cc.gatech.edu
  • Fee(s):
    N/A
  • Extras:
Contact
Shanita Williams
Summaries

Summary Sentence: No summary sentence submitted.

Full Summary: No summary paragraph submitted.

David Brumley
Carnegie Mellon University

"Analysis and Defense of Vulnerabilities in Binary Code"

Abstract: New vulnerabilities are constantly discovered and exploited by
attackers. A major focus of my research is developing techniques for
protecting vulnerable applications when the program is only readily
available as binary (i.e., executable) code.  Since most programs are
available in binary form, and binary-only analysis does not require
cooperation of the source code vendor, this line of research is likely
to impact a wide audience.

In this talk, I show two new security applications of binary code
analysis: automatic patch-based exploit generation, and automatic
input filter generation. In this first part, I show how binary
analysis can be used to automatically generate exploits based upon
patches released from Windows Update.  An immediate consequence of
this line of research is that many current vendor patching practices
are insecure because they allow attackers to create new exploits
before all vulnerable hosts can receive a patch. All is not lost,
however. In the second part of this talk, I show how to defend against
exploits by automatically generating input filters. Input filters
remove exploits from the input stream, thus allowing the vulnerable
application to continue to operate normally even under attack. The
generated input filters are guaranteed to only filter out exploits,
thus safe to automatically deploy.

Bio: David Brumley is a PhD student in Computer Science at Carnegie Mellon
University.  His current work focuses on software security. His
research and interests also include all areas of security, as well as
programming languages, compilers, formal methods, and systems. He is a
recipient of the Symantec Research Fellowship Award for 2007. His
research has won several awards, including 2 best paper awards at
top-tier security conferences.

Additional Information

In Campus Calendar
No
Groups

College of Computing

Invited Audience
No audiences were selected.
Categories
No categories were selected.
Keywords
No keywords were submitted.
Status
  • Created By: Louise Russo
  • Workflow Status: Published
  • Created On: Feb 11, 2010 - 10:57am
  • Last Updated: Oct 7, 2016 - 9:50pm