They have changed the schedule and are now talking about Android Malware instead:

Hi Everyone,

There is another change to the security seminar today: we are back to the seminar on Android Malware by Monirul Sharif. Apologies again for the last minute change. The title and abstract are inlined below.

Best Regards,
Ankur.

TITLE: Defending Android against Malware

SPEAKER: Monir Sharif, Google

ABSTRACT: Android has become one of the largest used mobile operating system with over 300 million activated android devices, 450k apps and over 13 billion downloads from the Android Market. With such a fast growing user base and Android’s open ecosystem comes the risk of users being the target of malware that may cause financial loss, loss of privacy as well as various annoyances. In this talk, we will present an overview of the Google’s Android Application Analysis Framework. Our system uses both dynamic and static analysis approaches to extract behavioral signals from an application. We combine these signals along with various other sources of information such as author or application reputation, code similarity, etc. to automatically identify applications as potentially malicious or suspicious providing concise information aiding quick manual reviews. We have been able to scale our infrastructure to provide high throughput, allowing us to quickly analyze new submissions, and also sweep through the entire corpus of applications on a regular basis. With the help of our detection framework, malicious apps are detected quickly, leading to prompt app removals. As a result, the risk of downloading malware from the market has significantly decreased. In this talk, we will present our high level design, as well as some insights and results of what we have achieved."

VENUE: Gates 463
DATE: April 10 (Tuesday)
TIME: 16:30
--++**==--++**==--++**==--++**==--++**==--++**==--++**==
security-seminar mailing list
security-semi...@lists.stanford.edu <mailto:security-semi...@lists.stanford.edu> https://mailman.stanford.edu/mailman/listinfo/security-seminar <https://mailman.stanford.edu/mailman/listinfo/security-seminar>

--++**==--++**==--++**==--++**==--++**==--++**==--++**==
security-seminar mailing list
security-semi...@lists.stanford.edu <mailto:security-semi...@lists.stanford.edu> https://mailman.stanford.edu/mailman/listinfo/security-seminar <https://mailman.stanford.edu/mailman/listinfo/security-seminar>


On 4/9/12 5:33 PM, Tanvi Vyas wrote:
Application Reputation is also on Mozilla's Security Roadmap:
https://wiki.mozilla.org/Security/Features/Application_Reputation

This might be a good talk to go to to learn how Chrome is tackling this problem.

~Tanvi

On 4/9/12 1:52 PM, Tanvi Vyas wrote:
Interesting talk at Stanford tomorrow.

Trying to see how this is integrated with Chrome (as is mentioned in the bottom of the extract). http://www.pcpro.co.uk/news/security/366577/chrome-targets-social-engineering-with-file-warnings


---------- Forwarded message ----------
From: *Ankur Taly* <at...@stanford.edu <mailto:at...@stanford.edu>>
Date: Mon, Apr 9, 2012 at 11:53 AM
Subject: TUESDAY - April 10 - Reputation Based Detection of Socially Engineered Malware - Moheeb Abu Rajab To: security-seminar <security-semi...@lists.stanford.edu <mailto:security-semi...@lists.stanford.edu>>


Hi Everyone,

Unfortunately tomorrow's seminar on Android malware has been changed.
The same group from Google will instead present their work on binary reputation in Chrome.
The new title and abstract are inlined below.

Apologies for the last minute change.

Best Regards,
Ankur.

Title: Reputation Based Detection of Socially Engineered Malware

Speaker: Moheeb Abu Rajab

Abstract:

Over the last two years, we saw the prevalence of drive-by downloads
declining. Browsers are generally becoming more secure making it
harder to deliver malware by exploiting vulnerabilities. Furthermore,
protection efforts such as Google’s Safe Browsing have successfully
detected and protected users from many of these attacks.

In response, adversaries have turned their attention to social
engineering as another major vector for distributing malware. Rather
than exploiting browser vulnerabilities, adversaries employ various
tricks to deceive users into downloading malware. Social engineering
poses different detection challenges as the lack of exploits makes it
harder to detect. Furthermore, adversaries use highly agile serving
infrastructure reducing the effectiveness of blacklist based defences.

In this talk, we present our recent effort to protect users from
socially engineered malware.  We provide an overview of a large scale
operational system that protects users from malware downloads using a
reputation-based approach. Rather than exporting a blacklist, we
developed a whitelist of domains that host the majority of benign
downloads. For downloads, not in the whitelist, we developed a
server-based reputation scheme that predicts the likelihood that a
binary is malicious without requiring access to the binary content.

This service currently protects millions of Google Chrome users
against malware downloads. We present some interesting insights about
the prominent strains of malware we are seeing in the wild.

DATE: April 10 (Tuesday)
TIME: 4:30PM
VENUE: Gates 463
--++**==--++**==--++**==--++**==--++**==--++**==--++**==
security-seminar mailing list
security-semi...@lists.stanford.edu <mailto:security-semi...@lists.stanford.edu>
https://mailman.stanford.edu/mailman/listinfo/security-seminar



_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security


_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to