University of California, Santa Barbara

Slides:



Advertisements
Similar presentations
Stefan Geißler TEMIS Chief Innovation Officer, Managing Director TEMIS Deutschland The Luxid® Community – Collaboration in the Language Technology Industry.
Advertisements

1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
Aurasium: Practical Policy Enforcement for Android Applications R. Xu, H. Saidi and R. Anderson Presented By: Rajat Khandelwal – 2009CS10209 Parikshit.
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
NSF expects strict adherence to the rules of proper scholarship and attribution. The responsibility for proper attribution and citation rests with.
PRESENTED TOPRESENTED BY April 14, 2015 California Solar Initiative Public Reporting How timely information and data access helped transform California’s.
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
SNA.III.2 Can CI help do better SN research? User Interfaces & Collaboration Services C. Plaisant (lead), B. Paley, D. Cox, C. Mueller, E. Adar, M. Piasecki,
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Topic: Security / Privacy “Your Apps Are Watching You” Source: The Wall Street Journal Online Presented By: Corey Campbell.
CAPPS (CERN Apps forum) meeting #8 Sebastian Lopienski October 2014 Welcome CERN mobile.
Lightweight Mobile Applications Certification: Prepared By: Rahul Biswas.
An Answer to the EC Expert Group on CLOUD Computing Keith G Jeffery Scientific Coordinator.
Session Chair: Peter Doorn Director, Data Archiving and Networked Services (DANS), The Netherlands.
A complementary view from the DIGOIDUNA study Paolo Bouquet, University of Trento, Italy SMART 2010/0054.
INDUSTRY COMMITMENT TO INNOVATION IN NOTICE AND CHOICE AAAA, ANA, CBBB, DMA, IAB Convene Task-Force (April 2008) Coalition begins drafting industry principles.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Secure and Trustworthy Cyberspace (SaTC) “Top 10” Tips for SaTC Proposals One program director’s observations Sol Greenspan.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Title of Presentation DD/MM/YYYY © 2015 Skycure Why Are Hackers Winning the Mobile Malware Battle.
Monitoring commercial cloud service providers CERN openlab Summer Students Lightning Talk Sessions Lassi Kojo › 19/08/2015.
NCP Info DAY, Brussels, 23 June 2010 NCP Information Day: ICT WP Call 7 - Objective 1.3 Internet-connected Objects Alain Jaume, Deputy Head of Unit.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
“What the is That? Deception and Countermeasures in the Android User Interface” Presented by Luke Moors.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
NDN-Android: NDN Networking Stack for Android Platform
Deployment Planning Services
Transforming business
How To Deliver Apps Faster And Secure Them The Microsoft Way
Openlab Compute Provisioning Topics Tim Bell 1st March 2017
ASSET - Automotive Software cyber SEcuriTy
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management Zhengyang Qu1, Guanyu Guo2, Zhengyue Shao2, Vaibhav Rastogi3,
Dr. Konstantinos Komaitis
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Online platforms Brussels, September 2016.
1. What are the challenges that CI researchers and practitioners face when they aim to mobilize resources for the development of a CI for a specific community?
Evaluating Partnerships
Cybersecurity Education
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Are these Ads Safe: Detecting Hidden A4acks through Mobile App-Web Interfaces Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan Riley.
City platform Smart Cities & Communities Info Day Horizon 2020
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
Securing Cloud-Native Applications Jason Schmitt CEO
MESA UTAH CLEAN AIR SOLUTIONS COMPETION
Why the Multistakeholder Approach Works
گارگاه آموزشي مديريت راهبردي
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
MESA UTAH CLEAN AIR SOLUTIONS COMPETION
Collaborative Open Market to Place Objects at your Service
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
Securing Home IoT Environments with Attribute-Based Access Control
Scott Thorne & Chuck Shubert
Mobile App Advertisements
FUTURE PLANS NSF site visit October 19, 2015 Salil Vadhan
Project Overview Konstantinos Tserpes, ICCS/NTUA Final Review Meeting
Juan Gonzalez eGovernment & CIP operations
Bird of Feather Session
Defining the Grid Fabrizio Gagliardi EMEA Director Technical Computing
Enabling CISE Research and Education in the Cloud
NSA Security-Enhanced Linux (SELinux)
Microsoft Virtual Academy
Government of Canada Digital Standards
What's New in eCognition 9
Chapter 10. Mobile Device Security
Introduction to Mobile Apps
Libraries and Open Innovation:
Presentation transcript:

University of California, Santa Barbara Northwestern University Trustdroid Identifying and Mitigating Trust Violations in the Smartphone Ecosystem Challenge: Identifying and mitigating trust violations in the smartphone ecosystem User – UI User - Advertisement User – Market Apps – Network Apps – OS ... Scientific Impact: Study and mitigate trust violations currently exploited in the wild Identifying novel trust violations Developing and evaluating automatic detection and mitigation solutions Large scale measurement and analysis of apps and ad libraries Identification Solution: Identification Logic-bomb discovery Bare-metal analysis Java/native code interaction analysis Intelligent dynamic analysis of apps Mitigation App sandboxing Trustworthy GUI attribution Safe code downloading App instrumentation for policy enforcement Mitigation Broader Impact: Scientific publications Collaboration with vendors Malware reported to Google, Baidu Mobile ad analysis system adopted by Huawei Open source releases Android UI modifications Grab’n run Baredroid SaTC is a multi-disciplinary program, and PI Meeting attendees include academics, industry professionals, government representatives, and others with wide-ranging expertise. Building continuing support for the SaTC program and growing the security and privacy research community requires that we convey the essence and broader impacts of SaTC-funded research to diverse stakeholders in a clear, concise, and visual way, quantifying impacts where possible. The summary slide should be understandable by the broader security and privacy research community, including those researchers that don’t work in your specific research domain. Use this template as a guide to ensure your slide addresses the topics identified. This slide may be used to introduce your project and/or promote the SaTC program both within and outside NSF.