Xiangyu Zhang - Purdue University
Students: Spring 2025, unless noted otherwise, sessions will be virtual on Zoom.
How Program Analysis can be Used in Security Applications
Dec 10, 2014
Download:![Video Icon](/assets/images/icons/file-video.png)
![Watch on Youtube](/news_and_events/events/security_seminar/images/youtube_32x32.png)
Abstract
This presentation will discuss how program analysis can be used in security applications. Three sample applications will be discussed:binary transformation that can mutate and instrument off-the-shelf commodity binary executables, memory forensics that can extract critical information from memory images, and reverse engineering technique that can expose hidden behaivor of software. All these applications are driven by program analysis.
About the Speaker
Ways to Watch
![YouTube](/assets/images/youtube_200.png)