They have changed the schedule and are now talking about Android Malware
instead:
Hi Everyone,
There is another change to the security seminar today: we are back to
the seminar on Android Malware by Monirul Sharif.
Apologies again for the last minute change. The title and abstract are
inlined below.
Best Regards,
Ankur.
TITLE: Defending Android against Malware
SPEAKER: Monir Sharif, Google
ABSTRACT: Android has become one of the largest used mobile operating
system with over 300 million activated android devices, 450k apps and
over 13 billion downloads from the Android Market. With such a fast
growing user base and Android’s open ecosystem comes the risk of users
being the target of malware that may cause financial loss, loss of
privacy as well as various annoyances. In this talk, we will present an
overview of the Google’s Android Application Analysis Framework. Our
system uses both dynamic and static analysis approaches to extract
behavioral signals from an application. We combine these signals along
with various other sources of information such as author or application
reputation, code similarity, etc. to automatically identify applications
as potentially malicious or suspicious providing concise information
aiding quick manual reviews. We have been able to scale our
infrastructure to provide high throughput, allowing us to quickly
analyze new submissions, and also sweep through the entire corpus of
applications on a regular basis. With the help of our detection
framework, malicious apps are detected quickly, leading to prompt app
removals. As a result, the risk of downloading malware from the market
has significantly decreased. In this talk, we will present our high
level design, as well as some insights and results of what we have
achieved."
VENUE: Gates 463
DATE: April 10 (Tuesday)
TIME: 16:30
--++**==--++**==--++**==--++**==--++**==--++**==--++**==
security-seminar mailing list
security-semi...@lists.stanford.edu
<mailto:security-semi...@lists.stanford.edu>
https://mailman.stanford.edu/mailman/listinfo/security-seminar
<https://mailman.stanford.edu/mailman/listinfo/security-seminar>
--++**==--++**==--++**==--++**==--++**==--++**==--++**==
security-seminar mailing list
security-semi...@lists.stanford.edu
<mailto:security-semi...@lists.stanford.edu>
https://mailman.stanford.edu/mailman/listinfo/security-seminar
<https://mailman.stanford.edu/mailman/listinfo/security-seminar>
On 4/9/12 5:33 PM, Tanvi Vyas wrote:
Application Reputation is also on Mozilla's Security Roadmap:
https://wiki.mozilla.org/Security/Features/Application_Reputation
This might be a good talk to go to to learn how Chrome is tackling
this problem.
~Tanvi
On 4/9/12 1:52 PM, Tanvi Vyas wrote:
Interesting talk at Stanford tomorrow.
Trying to see how this is integrated with Chrome (as is mentioned in
the bottom of the extract).
http://www.pcpro.co.uk/news/security/366577/chrome-targets-social-engineering-with-file-warnings
---------- Forwarded message ----------
From: *Ankur Taly* <at...@stanford.edu <mailto:at...@stanford.edu>>
Date: Mon, Apr 9, 2012 at 11:53 AM
Subject: TUESDAY - April 10 - Reputation Based Detection of Socially
Engineered Malware - Moheeb Abu Rajab
To: security-seminar <security-semi...@lists.stanford.edu
<mailto:security-semi...@lists.stanford.edu>>
Hi Everyone,
Unfortunately tomorrow's seminar on Android malware has been changed.
The same group from Google will instead present their work on binary
reputation in Chrome.
The new title and abstract are inlined below.
Apologies for the last minute change.
Best Regards,
Ankur.
Title: Reputation Based Detection of Socially Engineered Malware
Speaker: Moheeb Abu Rajab
Abstract:
Over the last two years, we saw the prevalence of drive-by downloads
declining. Browsers are generally becoming more secure making it
harder to deliver malware by exploiting vulnerabilities. Furthermore,
protection efforts such as Google’s Safe Browsing have successfully
detected and protected users from many of these attacks.
In response, adversaries have turned their attention to social
engineering as another major vector for distributing malware. Rather
than exploiting browser vulnerabilities, adversaries employ various
tricks to deceive users into downloading malware. Social engineering
poses different detection challenges as the lack of exploits makes it
harder to detect. Furthermore, adversaries use highly agile serving
infrastructure reducing the effectiveness of blacklist based defences.
In this talk, we present our recent effort to protect users from
socially engineered malware. We provide an overview of a large scale
operational system that protects users from malware downloads using a
reputation-based approach. Rather than exporting a blacklist, we
developed a whitelist of domains that host the majority of benign
downloads. For downloads, not in the whitelist, we developed a
server-based reputation scheme that predicts the likelihood that a
binary is malicious without requiring access to the binary content.
This service currently protects millions of Google Chrome users
against malware downloads. We present some interesting insights about
the prominent strains of malware we are seeing in the wild.
DATE: April 10 (Tuesday)
TIME: 4:30PM
VENUE: Gates 463
--++**==--++**==--++**==--++**==--++**==--++**==--++**==
security-seminar mailing list
security-semi...@lists.stanford.edu
<mailto:security-semi...@lists.stanford.edu>
https://mailman.stanford.edu/mailman/listinfo/security-seminar
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security