Cyber Forensics through Program Analysis

نویسنده

  • Brendan D. Saltaformaggio
چکیده

My research interests lie in cyber forensics, systems security, and the vetting of untrusted software. More specifically, I have developed novel capabilities for the investigation of advanced cyber crimes and the analysis and prevention of next-generation malware attacks, particularly in mobile and cloud computing environments. Underpinning this research is the development of fundamental techniques for binary program analysis and instrumentation, modeling of temporal and spatial forensic evidence, and virtualization-based defenses. In addition, I have been involved in many highly successful research collaborations in the design of efficient and reliable cloud computing systems. In recognition of my research contributions, I have been honored with two prestigious fellowships: the 2016 Symantec Research Labs Graduate Fellowship and the inaugural Emil Stefanov Memorial Fellowship in Computer Science. In the field of cyber forensics, my research has introduced new paradigms in evidence acquisition via memory image analysis [1, 2, 3, 4] and execution projection investigation [5, 6]. My research in this area has received a Best Paper Award from the ACM Conference on Computer and Communications Security (CCS’15) [3] and a Best Student Paper Award from the 2014 USENIX Security Symposium [1], both toptier cyber security conferences. My work is widely regarded as breaking from traditional data-recoveryoriented forensics and instead proposing innovative techniques, based on retargeting program executions, for recovering spatial-temporal evidence. Further, the practical impact of this work has garnered acclaim from highly regarded media outlets such as the Stanford Cyber Initiative, The Register, NSF News, ACM TechNews, IEEE Electronics360, and Homeland Preparedness News (a full list is available on my webpage). In the field of software and systems security, my work develops new program analysis techniques for the vetting and hardening of untrusted software [7, 8, 9] and virtualization-based technologies for the detection, monitoring, and prevention of attacks against cloud platforms [10, 11]. My work in mobile app vetting [7] has led to the identification and removal of hundreds of privacy-violating iOS apps from the Apple App Store. Further, the practical solutions built from this research have led to a number of tech-transfers and real world deployments with industry partners (e.g., Intelligent Automation Inc., Cisco Systems, and Vencore Labs).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Computer Forensics : An Essential Ingredient for Cyber Security

Computer forensics uses computer investigation and analysis techniques to collect evidence regarding what happened on a computer that is admissible in a court of law. Computer forensics requires a wellbalanced combination of technical skills, legal acumen, and ethical conduct. Computer forensics specialists use powerful software tools to uncover data to be sorted through, and then must figure o...

متن کامل

Cyber Forensics Ontology for Cyber Criminal Investigation

We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber sp...

متن کامل

Digital Forensics in a Cyber Warfare Context

The paper explores the application of digital forensics techniques to cyber warfare scenarios. A common accepted taxonomy for digital forensics (and antiforensics) activities, techniques, procedures and work flows does not yet exist but guidelines and even international standards have given the field a framework: this paper explores how digital forensics can be logically framed in the context o...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016