Making Obsolete Malware Viable with Packing

Facultatea de Matematica si Informatica, sala 202

Speaker: Mihai Stancu Abstract: The security trend today is to stop security threats even before they arrive on the target machine or system. With that in mind we will explore, what packers are and what they do to transform original malicious code in into something that is much harder to confidently mark as a threat.

Verification of strategic properties for the Prêt-À-Voter protocol using Tamarin (joint work with Wojtek Jamroga and Damian Kurpiewski)

Facultatea de Matematica si Informatica, sala Google

Speaker:  Catalin Dima (Université Paris-Est Créteil) Abstract: We report on the verification of anonymity and coercion-freeness properties of the Prêt-À-Voter electronic voting protocol using the Tamarin tool for symbolic verification of security properties. Our approach is to generate many models corresponding with each choice of attacker actions (i.e. attacker strategies) and check, on each model, a "trace equivalence" lemma modeling the fact that the

Security aspects for blockchain

Facultatea de Matematica si Informatica, sala 202

Speaker: Andreea Elena Panait (University of Bucharest). Abstract: The presentation will include introductive notions about blockchain, the main types of attacks on the blockchain network and possible countermeasures, attack examples that occurred during the years, blockchain implementation examples and possible domains where blockchain can be used.

Security via user behavior

Facultatea de Matematica si Informatica, sala 202

Speaker: Cezara Benegui (University of Bucharest). Abstract: The presentation will be based on earlier research done on user behaviour understanding and detection, learning it using machine learning and artificial intelligence and further information about how user behaviour can be used to improve the security of software applications. Also, the presentation will include information about biometrics

Verifying security protocols using BAN logic

Facultatea de Matematica si Informatica, sala 202

Speaker: Alexandru Dragomir (University of Bucharest) Abstract: Epistemic logics - logics aimed at reasoning about knowledge and belief - are widely considered to be suitable for modelling, analyzing and predicting vulnerabilities of security protocols. One of the first and most discussed logical approaches to the problem of verifying security protocols is the one proposed in

Verifying security protocols using BAN logic – Part 2

Facultatea de Matematica si Informatica, sala 202

Speaker: Alexandru Dragomir (University of Bucharest) Abstract: Epistemic logics - logics aimed at reasoning about knowledge and belief - are widely considered to be suitable for modelling, analyzing and predicting vulnerabilities of security protocols. One of the first and most discussed logical approaches to the problem of verifying security protocols is the one proposed in

How to find bugs in your (x86) code: Applications that use RIVER

Facultatea de Matematica si Informatica, sala 202

Speaker: Bogdan Ghimiș (University of Bucharest) Abstract: From a security perspective, discovering bugs before shipping a product is crucial. This presentation will be about RIVER, a tool that can help us to inspect x86 binary code. This lecture will encompass two papers describing methods of finding problematic inputs: a genetic algorithm and a method using

Anti-Malware Machine Learning

Facultatea de Matematica si Informatica, sala 202

Speaker: Andra Băltoiu (University of Bucharest) Abstract: In a previous seminar, we introduced Dictionary Learning (DL), a machine learning method capable of handling the requirements of IoT-related tasks, motivated by its reduced computational complexity, theoretical guarantees and its applicability to continuous retraining contexts. We now discuss the task of training different machine learning and DL

Dynamic Code Analysis

Speaker:  Radu Velea (BitDefender) Abstract: Static code analysis methods have the advantage of providing deterministic and reliable results. Malware has evolved beyond the point where simple pattern matching algorithms or signatures can provide adequate levels of protection. To respond to new threats we have to look at other hidden aspects such as execution behavior and