• Making Obsolete Malware Viable with Packing

    Facultatea de Matematica si Informatica, sala 202

    Speaker: Mihai Stancu Abstract: The security trend today is to stop security threats even before they arrive on the target machine or system. With that in mind we will explore, what packers are and what they do to transform original malicious code in into something that is much harder to confidently mark as a threat.

  • Verification of strategic properties for the Prêt-À-Voter protocol using Tamarin (joint work with Wojtek Jamroga and Damian Kurpiewski)

    Facultatea de Matematica si Informatica, sala Google

    Speaker:  Catalin Dima (Université Paris-Est Créteil) Abstract: We report on the verification of anonymity and coercion-freeness properties of the Prêt-À-Voter electronic voting protocol using the Tamarin tool for symbolic verification of security properties. Our approach is to generate many models corresponding with each choice of attacker actions (i.e. attacker strategies) and check, on each model, a "trace equivalence" lemma modeling the fact that the

  • Security aspects for blockchain

    Facultatea de Matematica si Informatica, sala 202

    Speaker: Andreea Elena Panait (University of Bucharest). Abstract: The presentation will include introductive notions about blockchain, the main types of attacks on the blockchain network and possible countermeasures, attack examples that occurred during the years, blockchain implementation examples and possible domains where blockchain can be used.

  • Security via user behavior

    Facultatea de Matematica si Informatica, sala 202

    Speaker: Cezara Benegui (University of Bucharest). Abstract: The presentation will be based on earlier research done on user behaviour understanding and detection, learning it using machine learning and artificial intelligence and further information about how user behaviour can be used to improve the security of software applications. Also, the presentation will include information about biometrics

  • Verifying security protocols using BAN logic

    Facultatea de Matematica si Informatica, sala 202

    Speaker: Alexandru Dragomir (University of Bucharest) Abstract: Epistemic logics - logics aimed at reasoning about knowledge and belief - are widely considered to be suitable for modelling, analyzing and predicting vulnerabilities of security protocols. One of the first and most discussed logical approaches to the problem of verifying security protocols is the one proposed in

  • Verifying security protocols using BAN logic – Part 2

    Facultatea de Matematica si Informatica, sala 202

    Speaker: Alexandru Dragomir (University of Bucharest) Abstract: Epistemic logics - logics aimed at reasoning about knowledge and belief - are widely considered to be suitable for modelling, analyzing and predicting vulnerabilities of security protocols. One of the first and most discussed logical approaches to the problem of verifying security protocols is the one proposed in

  • How to find bugs in your (x86) code: Applications that use RIVER

    Facultatea de Matematica si Informatica, sala 202

    Speaker: Bogdan Ghimiș (University of Bucharest) Abstract: From a security perspective, discovering bugs before shipping a product is crucial. This presentation will be about RIVER, a tool that can help us to inspect x86 binary code. This lecture will encompass two papers describing methods of finding problematic inputs: a genetic algorithm and a method using

  • Anti-Malware Machine Learning

    Facultatea de Matematica si Informatica, sala 202

    Speaker: Andra Băltoiu (University of Bucharest) Abstract: In a previous seminar, we introduced Dictionary Learning (DL), a machine learning method capable of handling the requirements of IoT-related tasks, motivated by its reduced computational complexity, theoretical guarantees and its applicability to continuous retraining contexts. We now discuss the task of training different machine learning and DL

  • Dynamic Code Analysis

    Speaker:  Radu Velea (BitDefender) Abstract: Static code analysis methods have the advantage of providing deterministic and reliable results. Malware has evolved beyond the point where simple pattern matching algorithms or signatures can provide adequate levels of protection. To respond to new threats we have to look at other hidden aspects such as execution behavior and