{"673742":{"#nid":"673742","#data":{"type":"event","title":"Ph.D. Proposal Oral Exam - Haichuan Xu","body":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ETitle:\u0026nbsp; \u003C\/span\u003E\u003C\/strong\u003E\u003Cem\u003E\u003Cspan\u003EVictim and Evidence Recovery of Android a11y Abuse\u003C\/span\u003E\u003C\/em\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003ECommittee:\u0026nbsp; \u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003ESaltaformaggio\u003C\/span\u003E\u003Cspan\u003E, Advisor\u003C\/span\u003E\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; \u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003EZonouz\u003C\/span\u003E\u003Cspan\u003E, Chair\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. \u003C\/span\u003E\u003Cspan\u003ESpecter\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003EThe objective of the proposed research is to recover victim and abuse vectors of Android\u2019s accessibility (a11y) malware abuse. The Android a11y service is widely abused by malware to conduct on-device monetization fraud. Existing mitigation techniques focus on malware detection, but overlook providing users evidence of already occurred abuses and notifying victims of abuse vectors to facilitate defenses. I propose FARA, a forensics pipeline based on dynamic forced execution and symbolic analysis, to help investigators uncover a11y malware\u0027s targeting victims, victim-specific abuse vectors, and persistence mechanisms.\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Victim and Evidence Recovery of Android a11y Abuse"}],"uid":"28475","created_gmt":"2024-03-25 20:22:55","changed_gmt":"2024-03-25 20:24:24","author":"Daniela Staiculescu","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2024-04-10T11:00:30-04:00","event_time_end":"2024-04-10T13:00:30-04:00","event_time_end_last":"2024-04-10T13:00:30-04:00","gmt_time_start":"2024-04-10 15:00:30","gmt_time_end":"2024-04-10 17:00:30","gmt_time_end_last":"2024-04-10 17:00:30","rrule":null,"timezone":"America\/New_York"},"location":"Room 0903, CODA","extras":[],"groups":[{"id":"434371","name":"ECE Ph.D. Proposal Oral Exams"}],"categories":[],"keywords":[{"id":"102851","name":"Phd proposal"},{"id":"1808","name":"graduate students"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78771","name":"Public"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}