McCamant      Dr. Stephen McCamant
Assistant Professor
Department of Computer Science and Engineering
University of Minnesota
"Recovering structure from binary executables for security analysis"
Thursday, April 30, 3:00 PM
STEPS 101

Abstract: Buggy software is a major source of security problems, and finding and fixing security vulnerabilities currently depends on human experts who cannot keep up with the volume of new vulnerable software being produced. A natural approach is to apply computers to the task of analyzing their own software, but many additional challenges arise when performing program analysis for security, including the fact that software is often only available in its final executable ("binary") form. In this talk I'll describe how we can recover some source-code-like structure from binaries, such finding jump tables (used to implement C switch statements) and determining type information for integer values. A common technical theme is symbolic execution, a program analysis technique which can be used for many purposes in binary analysis and security.

Bio: Stephen McCamant has been an assistant professor in the Department of Computer Science and Engineering at the University of Minnesota since 2012. His primary research interest is applications of program analysis techniques for software security and correctness. This includes binary analysis and transformation, hybrids of dynamic and static analysis including symbolic execution, information flow and taint analysis, instruction-level hardening and isolation, and applications of decision procedures and proof-assistant tools. Before joining Minnesota, he spent 2008-2012 as a postdoc at the University of California, Berkeley, and received his Ph.D. in 2008 from MIT.

© 2014-2016 Computer Science and Engineering, P.C. Rossin College of Engineering & Applied Science, Lehigh University, Bethlehem PA 18015.