{"id":473,"date":"2018-09-15T11:34:36","date_gmt":"2018-09-15T16:34:36","guid":{"rendered":"http:\/\/www.ece.iastate.edu\/kcsl\/?p=473"},"modified":"2018-10-14T11:39:12","modified_gmt":"2018-10-14T16:39:12","slug":"secdsm-recent-trends-in-program-analysis","status":"publish","type":"post","link":"https:\/\/www.ece.iastate.edu\/kcsl\/secdsm-recent-trends-in-program-analysis\/","title":{"rendered":"SecDSM &#8211; Recent Trends in Program Analysis for Bug Hunting and Exploitation"},"content":{"rendered":"<p><strong>Abstract:<\/strong><\/p>\n<p>Software is pervasive, and for better or worse, it now controls most of daily lives. Developing and maintaining secure software is of the upmost importance, but it seems that despite our best efforts we just haven\u2019t gotten it right yet. More importantly we should ask ourselves why haven\u2019t we solved this problem yet? This talk summarizes classical program analysis as well as recent program analysis techniques without all the fancy jargon. As case studies, we examine a few of DARPA\u2019s high-profile software security programs and read between the lines to see where the field is going. Is your job in computer security going to be replaced by machines armed with theorem provers or will humans always have a role to play? Come join in the discussion.<\/p>\n<p><strong>Venue: <\/strong><em><a href=\"https:\/\/secdsm.org\/\">SecDSM<\/a><\/em>, Des Moines, Iowa, September 2018<\/p>\n<p><strong>Slides:\u00a0<\/strong><a href=\"https:\/\/www.ece.iastate.edu\/kcsl\/files\/2018\/10\/BenHolland_RecentTrendsPA.pdf\">BenHolland_RecentTrendsPA.pdf<\/a><\/p>\n<p><strong>Video:\u00a0<\/strong><a href=\"https:\/\/www.youtube.com\/watch?v=bL0oJsinqP0\">https:\/\/www.youtube.com\/watch?v=bL0oJsinqP0<\/a><\/p>\n<p><strong>Authors:<\/strong>\u00a0Benjamin Holland<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abstract: Software is pervasive, and for better or worse, it now controls most of daily lives. Developing and maintaining secure software is of the upmost importance, but it seems that despite our best efforts we just haven\u2019t gotten it right yet. More importantly we should ask ourselves why haven\u2019t we solved this problem yet? This [&hellip;]<\/p>\n","protected":false},"author":410,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[10],"class_list":["post-473","post","type-post","status-publish","format-standard","hentry","category-talks","tag-benjamin-holland"],"_links":{"self":[{"href":"https:\/\/www.ece.iastate.edu\/kcsl\/wp-json\/wp\/v2\/posts\/473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ece.iastate.edu\/kcsl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ece.iastate.edu\/kcsl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ece.iastate.edu\/kcsl\/wp-json\/wp\/v2\/users\/410"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ece.iastate.edu\/kcsl\/wp-json\/wp\/v2\/comments?post=473"}],"version-history":[{"count":2,"href":"https:\/\/www.ece.iastate.edu\/kcsl\/wp-json\/wp\/v2\/posts\/473\/revisions"}],"predecessor-version":[{"id":476,"href":"https:\/\/www.ece.iastate.edu\/kcsl\/wp-json\/wp\/v2\/posts\/473\/revisions\/476"}],"wp:attachment":[{"href":"https:\/\/www.ece.iastate.edu\/kcsl\/wp-json\/wp\/v2\/media?parent=473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ece.iastate.edu\/kcsl\/wp-json\/wp\/v2\/categories?post=473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ece.iastate.edu\/kcsl\/wp-json\/wp\/v2\/tags?post=473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}