<node id="673742">
  <nid>673742</nid>
  <type>event</type>
  <uid>
    <user id="28475"><![CDATA[28475]]></user>
  </uid>
  <created>1711398175</created>
  <changed>1711398264</changed>
  <title><![CDATA[Ph.D. Proposal Oral Exam - Haichuan Xu]]></title>
  <body><![CDATA[<p><span><span><span><strong><span>Title:&nbsp; </span></strong><em><span>Victim and Evidence Recovery of Android a11y Abuse</span></em></span></span></span></p>

<p><span><span><strong><span>Committee:&nbsp; </span></strong></span></span></p>

<p><span><span><span>Dr. </span><span>Saltaformaggio</span><span>, Advisor</span>&nbsp;&nbsp;&nbsp;&nbsp; </span></span></p>

<p><span><span><span>Dr. </span><span>Zonouz</span><span>, Chair</span></span></span></p>

<p><span><span><span>Dr. </span><span>Specter</span></span></span></p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Victim and Evidence Recovery of Android a11y Abuse]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p><span><span>The objective of the proposed research is to recover victim and abuse vectors of Android’s accessibility (a11y) malware abuse. The Android a11y service is widely abused by malware to conduct on-device monetization fraud. Existing mitigation techniques focus on malware detection, but overlook providing users evidence of already occurred abuses and notifying victims of abuse vectors to facilitate defenses. I propose FARA, a forensics pipeline based on dynamic forced execution and symbolic analysis, to help investigators uncover a11y malware's targeting victims, victim-specific abuse vectors, and persistence mechanisms.</span></span></p>
]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2024-04-10T11:00:30-04:00]]></value>
      <value2><![CDATA[2024-04-10T13:00:30-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[Room 0903, CODA]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>434371</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[ECE Ph.D. Proposal Oral Exams]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>102851</tid>
        <value><![CDATA[Phd proposal]]></value>
      </item>
          <item>
        <tid>1808</tid>
        <value><![CDATA[graduate students]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
