资源预览内容
第1页 / 共8页
第2页 / 共8页
第3页 / 共8页
第4页 / 共8页
第5页 / 共8页
第6页 / 共8页
第7页 / 共8页
第8页 / 共8页
亲,该文档总共8页全部预览完了,如果喜欢就下载吧!
资源描述
软件安全主要研究成果程序安全性分析技术软件保护与反保护软件漏洞分析恶意代码分析综合的自动化逆向分析平台协议和算法的自动化识别运行时信息的自动化提取移动智能终端安全评估平台Android综合安全分析系统DIASiOS数据安全审计工具主要承担研究项目国家科技重大专项2012ZX03002011-002国家863、科技支撑计划SafeNet东北亚高校合作计划支持Software SecurityMain ResearchProgram Security AnalysisSoftware protection and anti-protectionVulerability analysismalicious code detection and analysisComprehensive Automatic Reverse-engineering SystemAutomatic extraction of algorithms and protocolsAutomatic extraction of sensitive runtime dataMobile Security Analysis PlatformAndroid Security introspector - DIASiOS data storage auditor - iForensicsProjectsNational Science and Technology Major Projects 2012ZX03002011-002National High Technology Research and Development Program of ChinaKey Project of the National Twelfth-Five Year Research Program of China程序安全性分析主要论文Digital Forensic Analysis on Runtime Instruction Flow一种精简二进制代码的程序理解方法一种基于全系统仿真和指令流分析的二进制代码分析方法二进制代码隐秘功能的安全性验证动态指令流差分分析在恶意软件分析中的应用PyXhon: Dynamic Detection of Security Vulnerabilities in Python研究项目与内容国家科技支撑计划课题-基于程序仿真的自动化算法识别SafeNet东北亚高校合作项目-基于全系统仿真和指令流分析的二进制代码分析方法二进制代码的运行时信息挖掘动态指令流差分分析Python语言的底层插桩分析算法自动化识别主要论文Detection and Analysis of Cryptographic Data Inside Software, ISC 2011Detecting Encryption Functions via Process Emulation and IL-based Program Analysis, ICICS 2012研发的系统LochsEmu: A lightweight Process Emulator能够自动化识别密码算法相比当前其它类似系统(数小时的识别时间),我们的系统具有最好的效率(数分钟的识别时间)研究内容国家科技重大专项-移动智能终端安全评估技术研究针对Android和iOS系统,在操作系统、应用程序、硬件和数据四个方面进行安全分析和评估研发了Dalvik Introspection OS安全分析系统和iBackup安全审计系统Honeynet Mobile Malware Forensics Challenge 全球亚军论文Android Malware Forensics: Reconstruction of malicious events. ICDCS-NFSP 2012Analysis on Privacy Threats in iOS Backup Mechanism移动智能安全Program Security AnalysisPapersDigital Forensic Analysis on Runtime Instruction FlowA program understanding approach for stripped binary codeApproach of binary code analysis based on full-system emulation and instruction-flow analysisDifferential analysis on dynamic binary and its application in malicious code analysisPyXhon: Dynamic Detection of Security Vulnerabilities in PythonResearchKey Projects in the National Science & Technology Pillar Program - Emulation Based Automatic Algorithm IdentificationSafeNet Northeast Grants - Design and analysis of key extraction technology based on VM DebuggingRuntime-data extraction of binary codeDynamic Differential Information Flow AnalysisLow-level Instrumentation of Python LanguageAutomatic Idenfication of AlgorithmsProposed SystemLochsEmu: A lightweight Process EmulatorAutomatic identification of cryptographic algorithmsCompared with related system(Kerckhoff, Aligot), our system is of best efficiencyPapersDetection and Analysis of Cryptographic Data Inside Software, ISC 2011Detecting Encryption Functions via Process Emulation and IL-based Program Analysis, ICICS 2012ResearchNational Science and Technology Major Projects 2012ZX03002011-002Aiming at the security evaluation of the Android OS and iOSProposed Dalvik Introspection OS and iBackup Audit SystemHoneynet Mobile Malware Forensics Challenge Winner - Second PrizePapersAndroid Malware Forensics: Reconstruction of malicious events. ICDCS-NFSP 2012Analysis on Privacy Threats in iOS Backup MechanismMobile Security
收藏 下载该资源
网站客服QQ:2055934822
金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号