• <em id="gqsns"></em>

    <em id="gqsns"><strike id="gqsns"></strike></em>
    1. <dd id="gqsns"></dd>
      <tbody id="gqsns"></tbody>

    2. <em id="gqsns"><acronym id="gqsns"><u id="gqsns"></u></acronym></em>
    3. <th id="gqsns"><big id="gqsns"></big></th>
    4. <rp id="gqsns"></rp>
      您位于: 首頁 / Events / 4月24日學術報告:Prof. Limin Jia (CMU) - Protect Users' Data with Information Flow Control

      4月24日學術報告:Prof. Limin Jia (CMU) - Protect Users' Data with Information Flow Control

      時間:周五(4月24日)上午10:00,地點:1801 CMU的 Limin Jia教授會介紹利用程序分析技術保護用戶隱私的研究工作。Jia教授的研究方向是程序語言、形式化方法和軟件系統安全。

      事件詳細信息

      時間

      2015-04-24
      起始時間 10:00 結束時間 11:30

      地點

      1801

      把事件添加到日歷

      時間:周五(4月24日)上午10:00,地點:1801

      Title: Protect Users' Data with Information Flow Control

      ?

      Abstract: As more and more services are provided over the web and via mobile apps, users' sensitive data such as passwords and credit card numbers are at risk from malicious or buggy mobile phone apps, web scripts, and browser extensions.? In this talk, I will explain why the permission systems used on platforms like Android and Chrome are fundamentally unsuited for specifying security policies for the apps and extensions that run on them.? I'll show how previous work on information-flow control (IFC) can be adapted to provide a stronger alternative, and describe the IFC systems we've built to achieve this on both Android and Chromium.? Finally, I'll discuss the challenges---some that we've overcome and some that we continue to work on---in using IFC in this setting to achieve verifiable protection without sacrificing functionality.

      ?

      Bio: Limin Jia is an assistant Research Professor in ECE & INI at Carnegie Mellon University. She received her Bachelor's degree in Computer Science and Engineering department at the University of Science and Technology of China. She received her Ph.D. in Computer Science from Princeton University.

      Limin's research focuses on formal aspects of security. She is particularly interested in applying logic and language-based security techniques to model and verify security properties of software systems.

      环亚彩票计划