Jim Alves-Foss - University of Idaho
Students: Spring 2025, unless noted otherwise, sessions will be virtual on Zoom.
Automated Function Boundary Detection in Stripped Binaries
Apr 06, 2022
Download: MP4 Video Size: 710.1MBWatch on YouTube
Abstract
Automated cyber defense tools require the ability to analyze binary applications, detect vulnerabilities and automatically patch or mitigate those vulnerabilities. The insertion of security mechanisms that operate at function boundaries (e.g, control flow mitigation, stack guards)require automated detection of those boundaries. This talk discusses the problem, related research and a new technique that is more accurate than other reported approaches. The presentation also discusses some of the limitations and ramifications of typical approaches compare and present these types of experimental results.
About the Speaker
Dr. Jim Alves-Foss joined the University of Idaho (UI) in Fall of 1991 after receiving his PhD in Computer Science at the University of California, Davis. He taught UIs first cybersecurity course in Spring of 1992. He is Director of the University of Idaho's Center for Secure and Dependable Systems. During his tenure he has published over 125 peer reviewed conference and journal papers, primarily in the cybersecurity area. He has mentored 22 PhD students, over 40 MS students and numerous undergraduates to completion. His research has been sponsored by federal agencies including NSF, DoD, and industry. In 2014-2015 he led UIs2-person team in a DARPA sponsored cybersecurity competition, as the smallest team they placed 2nd in the qualification round, outperforming 100 teams including larger teams from defense contractors and other notable universities.For his efforts he was named a Distinguished Professor, the university's highest faculty rank.