Programme
Live Event: Nov 19th, 2021, 7:00am ~ 11:30am KST - All times are in KST (Korean Standard Time) (UTC+9)
- 7:00 am - Opening Remarks (Sebastian Banescu)
7:15 am - Tutorial: Analyzing Virtualization-based Obfuscation Schemes
- Speaker: Tim Bazytko
-
Abstract: VM-based obfuscation is one of the most potent code transformations used to impede reverse engineering. In this tutorial, we learn the inner workings of virtual machines and how to break them. To this end, we use symbolic execution to automate the analysis and reconstruct the underlying code.
- 8:30 am - Break (10 mins)
8:40 am - Session 1: Watermark and Hardware Security
-
8:40 am – LLWM & IR-Mark: Integrating Software Watermarks into an LLVM-based Framework – Daniela Novac (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)), Christian Eichler (Ruhr-Universität Bochum (RUB)), Michael Philippsen (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU))
-
9:05 am – Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM’s TrustZone - Davide Quarta (EURECOM), Michele Ianni (Università della Calabria), Aravind Machiry (Purdue University), Yanick Fratantonio (Cisco Talos), Eric Gustafson (UC Santa Barbara), Davide Balzarotti (EURECOM), Martina Lindorfer (TU Wien), Giovanni Vigna (UC Santa Barbara), Christopher Kruegel (UC Santa Barbara)
-
9:30 am – A DCA-resistant implementation of SM4 for the white-box context – Tingting Lin (Irdeto Canada Corp.), Manfred von Willich (Irdeto Canada Corp.), Dafu Lou (Irdeto Canada Corp.), Phil Eisen (Irdeto Canada Corp.)
-
9:55 am - Break (15 mins)
10:10 am - Session 2: Binary Analysis and Compilers
-
10:10 am – PERFUME: Programmatic Extraction and Refinement For Usability of Mathematical Expression – Nicolaas Weideman (Information Sciences Institute, University of Southern California), Virginia K. Felkner (Information Sciences Institute, University of Southern California), Wei-Cheng Wu (Information Sciences Institute, University of Southern California), Jonathan May (Information Sciences Institute, University of Southern California), Christophe Hauser (Information Sciences Institute, University of Southern California), Luis Garcia (University of Southern California, Information Sciences Institute)
-
10:35 am – Optimization to the Rescue: Evading Binary Code Stylometry with Adversarial Use of Code Optimizations – Ben Jacobsen (University of Arizona), Sazzadur Rahaman (University of Arizona), Saumya Debray (University of Arizona)
-
11:00 am – A Framework for Automatic Exploit Generation for JIT Compilers – Xiyu Kang( The University of Arizona), Saumya Debray (The University of Arizona)
-
11:20 am - Closing Remarks (Yonghwi Kwon)