[PAST EVENT] Securing ARM platform: From software-based to hardware-based approaches
Access & Features
- Open to the public
Title: Securing ARM platform: From software-based to hardware-based approaches
Zhenyu Ning, Wayne State University,
McGlothlin-Street Hall 020
8:00AM, Feb. 10, 2020
With the rapid proliferation of the ARM architecture on smart mobile phones and Internet of Things (IoT) devices, the security of ARM platform becomes an emerging problem. In recent years, the number of malware identified on ARM platforms, especially on Android, shows explosive growth. Evasion techniques are also used in the malware to escape from being detected by existing analysis systems. In this talk, we first present a software-based mechanism to increase the accuracy of existing static analysis tools on Android by reassembleable bytecode extraction. Next, we introduce a hardware-based transparent malware analysis framework for general ARM platforms to defend against the traditional evasion techniques. Further, to learn the security of the involved hardware debugging features, we perform a comprehensive study on the ARM debugging features and summarize the security implications.
Zhenyu Ning is a Ph.D. candidate in the Department of Computer Science at Wayne State University. He received his M.S. degree and B.S. in Computer Science from Tongji University in 2011 and 2008, respectively. Before starting the Ph.D. program, he had spent more than 4 years in industry as software engineer. His current research focuses on different areas of security and privacy, including system security, mobile security, IoT security, transportation security, trusted execution environment, and hardware-assisted security.