Identifying Ubiquitous Third Party Libraries in Compiled Executables Using Annotated and Translated
Offered By: IEEE via YouTube
Course Description
Overview
Explore the process of identifying ubiquitous third-party libraries in compiled executables through a comprehensive IEEE conference talk. Delve into firmware indicator translation, system layer taxonomy, and vulnerabilities across different layers. Examine the OpenNTPD case study as an example of ubiquitous library vulnerability. Learn about Disco, a feature engineering tool for machine learning, and its application in identifying ubiquitous libraries. Gain insights into classification and similarity ranking techniques used in this field. Conclude with an overview of current research and future directions in this critical area of cybersecurity.
Syllabus
Intro
Firmware indicator Translation FIT
Taxonomy of System Layers
Vulnerabilities at Every Layer
Ubiquitous Library Vulnerability - OpenNTPD
Disco - Feature Engineering for Machine Learning
Identifying Ubiquitous Libraries
Classification and Similarity Ranking
Present and Future Research
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network