PISA AGM cum Feature Talk: Road to Defcon (25 Aug 2018)

PISA AGM cum Feature Talk: Road to Defcon (25 Aug 2018)

PISA AGM cum Feature Talk: Road to Defcon (25 Aug 2018) Date: 25 Aug 2018 (Sat)Time: 14:00 -...

Information Security Summit 2018 (4-5 Sep 2018)

Information Security Summit 2018 (4-5 Sep 2018)

Information Security Summit 2018 Date: 4-5 Sep, 2018Time: 8:30am - 6:00pmVenue: Hong Kong...

Supporting Event: IoT Security Forum (29 Aug 2018)

IoT Security Forum Date :  29 August 2018, WednesdayTime : 2:00 pm - 5:00 pm (Registration start...

  • PISA AGM cum Feature Talk: Road to Defcon (25 Aug 2018)

    PISA AGM cum Feature Talk: Road to Defcon (25 Aug 2018)

  • Information Security Summit 2018 (4-5 Sep 2018)

    Information Security Summit 2018 (4-5 Sep 2018)

  • Supporting Event: IoT Security Forum (29 Aug 2018)

CopperDroid: Automatic Android Malware Analysis and Classification

Date: 4-March

Time: 7:30pm - 8:30pm

Venue: Room PQ703, The Hong Kong Polytechnic University

Speaker : Dr. Lorenzo Cavallaro (http://www.isg.rhul.ac.uk/sullivan/)

Language: English

Registrationhttps://goo.gl/Hgyzuz (FREE)

 

Dr. Lorenzo Cavallaro currently a Senior Lecturer (something similar to Associate Professor in the USA) in the Information Security Group (ISG) at Royal Holloway, University of London.

From Jan 2010 to Dec 2011, Dr. Lorenzo Cavallaro was a Post-Doctorate researcher in the Systems & Security group of the Computer Systems Section at Vrije Universiteit Amsterdam, The Netherlands, where he joined Prof. Andrew S. Tanenbaum, and his team, working on (operating) systems security. In particular, Dr. Lorenzo Cavallaro currently focusing on making OSes more reliable and secure.

Dr. Lorenzo Cavallaro is interested in several areas of operating system and systems security. The following highlight some areas in which he is active and whichhe would like to keep or start doing research in.

  • (Android) malware analysis and detection
  • Operating systems reliability and security
  • Botnet analysis and mitigation techniques
  • Memory corruption attacks and countermeasures
  • Taint analysis
  • Exploitation techniques
  • Reverse engineering

 

One CPE can be claimed for the (ISC2) Credential Holder.

For any questions, please contact us at This email address is being protected from spambots. You need JavaScript enabled to view it.