Posts


Research Group Applicants

Last updated

If you want to start a Ph.D. to solve real security problems and are thinking about applying to our group, we would love to talk to you! To get the ball rolling, here is some information on our group and what we are looking for in an applicant.

Read More »

Advice to (Cybersecurity) Undergrads

Posted

Since I frequently get questions from people just setting out on the path (or even some ways along the path) to becoming future cybersecurity experts, here is some quick advice on making the best of your all-too-brief undergraduate years.

Read More »

VolgaCTF 2017 Writeup: Transformer

Posted

VolgaCTF qualifiers were held last weekend, and this time around I sat in on 0xBU’s team. I managed to solve Transformer, a 400 point reverse engineering challenge, and so here is the requisite writeup.

Read More »

iCTF 2017 Writeup: Turing Award

Posted

This year’s edition of the iCTF took place last Friday, and Northeastern fielded a team this year that placed respectably. (At least, we beat BU – sorry Manuel!) I spent most of the day helping out with turing_award, so – as is tradition – here is a writeup on our solution.

Read More »

UNVEIL at USENIX Security 2016

Posted

Amin will be presenting his latest work on fighting ransomware at USENIX Security this summer. The system he’ll be talking about is called UNVEIL, which enhances dynamic sandboxes to accurately recognize ransomware-like behavior.

Read More »

Overhaul at DSN 2016

Posted

Kaan will be presenting a paper describing Overhaul, a technique for inferring user intent for resource authorization in traditional operating systems, at DSN 2016 this summer.

Read More »

TriggerScope and LAVA at Oakland 2016

Posted

We have two papers at Oakland this year: TriggerScope, a technique for static detection of triggered malicious behavior in Android applications, and LAVA, a large-scale technique for injecting bugs into programs.

Read More »

Excision and CuriousDroid at FC 2016

Posted

The lab has two papers at Financial Crypto this year: Excision, our system for in-browser detection of malware using inclusion sequence analysis, and CuriousDroid, our system for intelligently exercising mobile applications to improve dynamic analysis.

Read More »

Presenting CrossFire at Black Hat Asia 2016

Posted

Ahmet and I will be presenting CrossFire at Black Hat Asia in Singapore in March. CrossFire is a new attack against Firefox that leverages extension reuse to bypass the extension vetting process, which is the main line of defense against malicious Firefox extensions.

Read More »