YoVDO

Identifying Ubiquitous Third Party Libraries in Compiled Executables Using Annotated and Translated

Offered By: IEEE via YouTube

Tags

Vulnerability Assessment Courses Cybersecurity Courses Machine Learning Courses Classification Courses Feature Engineering Courses

Course Description

Overview

Explore the process of identifying ubiquitous third-party libraries in compiled executables through a comprehensive IEEE conference talk. Delve into firmware indicator translation, system layer taxonomy, and vulnerabilities across different layers. Examine the OpenNTPD case study as an example of ubiquitous library vulnerability. Learn about Disco, a feature engineering tool for machine learning, and its application in identifying ubiquitous libraries. Gain insights into classification and similarity ranking techniques used in this field. Conclude with an overview of current research and future directions in this critical area of cybersecurity.

Syllabus

Intro
Firmware indicator Translation FIT
Taxonomy of System Layers
Vulnerabilities at Every Layer
Ubiquitous Library Vulnerability - OpenNTPD
Disco - Feature Engineering for Machine Learning
Identifying Ubiquitous Libraries
Classification and Similarity Ranking
Present and Future Research


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Introduction to Artificial Intelligence
Stanford University via Udacity
Natural Language Processing
Columbia University via Coursera
Probabilistic Graphical Models 1: Representation
Stanford University via Coursera
Computer Vision: The Fundamentals
University of California, Berkeley via Coursera
Learning from Data (Introductory Machine Learning course)
California Institute of Technology via Independent