BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Department of Computer Science - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Department of Computer Science
X-ORIGINAL-URL:https://www.cs.jhu.edu
X-WR-CALDESC:Events for Department of Computer Science
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20190310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20191103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20200326T104500
DTEND;TZID=America/New_York:20200326T114500
DTSTAMP:20260422T161254
CREATED:20210629T210723Z
LAST-MODIFIED:20210629T210723Z
UID:1962445-1585219500-1585223100@www.cs.jhu.edu
SUMMARY:Aravind Machiry\, University of California\, Santa Barbara – “Securing Modern Systems”
DESCRIPTION:LocationHackerman B-17AbstractModern systems are mainly composed of IoT devices and Smartphones.Most of these devices use ARM processors\, which\, along with flexible licensing\, have new security architecture features\, such as ARM TrustZone\, that enables execution of secure applications in an entrusted environment. Furthermore\, well-supported\, extensible\,open-source embedded operating systems like Android allow themanufactures to quickly customize their operating system with device drivers\, thus reducing the time-to-market.Unfortunately\, the proliferation of device vendors and race to themarket has resulted in poor quality low-level system softwarecontaining critical security vulnerabilities. Furthermore\, the patches for these vulnerabilities get merged into the end-products with a significant delay resulting in the Patch Gap\, which causes the privacy and security of billions of users to be at risk.In this talk\, I will show that the existing techniques are inadequate to find the security issues and how\, with certainwell-defined optimizations\, we can precisely find security issues.Second\, I will present my solution to the problem of Patch Gap byshowing a principled approach to port patches to vendor productrepositories automatically. Finally\, I will present my ongoing work to automatically port C to Checked C\, which provides a low overhead\, backward-compatible\, and memory-safe C alternative that could be used on modern systems to prevent security vulnerabilities.BioAravind Machiry is a Ph.D. candidate in Computer Science at theUniversity of California\, Santa Barbara. He is a recipient of various awards\, such as the Symantec Research Labs Fellowship and UCSB Graduate Division Dissertation Fellowship. His work spans across various aspects of System security and Program analysis. His research resulted in various Open-source security tools andseveral Common Vulnerability Exposures (CVEs) in critical systemsoftware such as kernel drivers\, Trusted Execution Environments\, and bootloaders. His research is also academically recognized with awards such as Distinguished Paper Award\, Internet Defense Prize\, an invitation to present at CSAW Applied Research Competition.Previously\, Aravind received his Master’s degree in InformationSecurity from the Georgia Institute of Technology.HostAvi Rubin
URL:https://www.cs.jhu.edu/event/aravind-machiry-university-of-california-santa-barbara-securing-modern-systems/
END:VEVENT
END:VCALENDAR