BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:US/Eastern
BEGIN:DAYLIGHT
DTSTART:20260308T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20261101T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20260409T165220Z
UID:7BB962B7-C69B-42DC-BE69-2F73B7308E07
DTSTART;TZID=US/Eastern:20260408T133000
DTEND;TZID=US/Eastern:20260408T143000
DESCRIPTION:Cyber-attacks come in many different shapes and forms. In order
  to combat modern cyber-attacks\, cyber-security researchers have to play 
 the game of “cat and mouse” in analyzing and discovering the vulnerabi
 lities of the system to come out on top against the malicious attackers. H
 owever\, the traditional static detection systems are not able to differen
 tiate between benign and malicious behaviors effectively. In this talk\, I
  will share our thoughts on the detection of different attacks through mod
 eling the execution behavior of an application using low-level hardware in
 formation. Our approaches can provide more flexibility for detection schem
 es by performing dynamic behavioral analysis at run-time. With anomaly det
 ection methods\, the abnormal behaviors that deviate from benign behaviors
  at run-time can be flagged and captured.\n\nCo-sponsored by: Fairleigh Di
 ckinson University\n\nSpeaker(s): Chen Liu\, \n\nAgenda: \nIEEE North Jers
 ey Section Computer Chapter and Signal Processing Chapter Seminar\n\nTitle
 : Low-Level Hardware Information Assisted Approach Towards System Security
 \n\nSpeaker: Prof. Chen Liu\, Department of Electrical and Computer Engine
 ering\, Clarkson University\n\nTime: 1:30pm-2:30pm\n\nFairleigh Dickinson 
 University\n\n1000 River Road\, Building: Muscarelle Center\, Room Number:
  105\n\nTeaneck\, New Jersey\, United States 07666\n\nFor additional infor
 mation about the venue and parking\, please contact\n\nDr. Hong Zhao\n\nzh
 ao@fdu.edu\n\nBldg: Muscarelle M105\, 1000 River Road\, Teaneck\, New Jers
 ey\, United States\, 07666
LOCATION:Bldg: Muscarelle M105\, 1000 River Road\, Teaneck\, New Jersey\, U
 nited States\, 07666
ORGANIZER:zhao@fdu.edu
SEQUENCE:31
SUMMARY:Low-Level Hardware Information Assisted Approach Towards System Sec
 urity 
URL;VALUE=URI:https://events.vtools.ieee.org/m/537576
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 8.
 0pt\; text-align: justify\;&quot;&gt;&lt;span style=&quot;font-size: 14pt\; line-height: 1
 15%\; font-family: &#39;times new roman&#39;\, times\, serif\; color: rgb(51\, 51\
 , 51)\; letter-spacing: 0.25pt\; background: white\;&quot;&gt;&lt;span style=&quot;line-he
 ight: 115%\; font-family: &#39;Times New Roman&#39;\, serif\; color: rgb(51\, 51\,
  51)\; letter-spacing: 0.25pt\; background: white\;&quot;&gt;Cyber-attacks come in
  many different shapes and forms. In order to combat modern cyber-attacks\
 , cyber-security researchers have to play the game of &amp;ldquo\;cat and mous
 e&amp;rdquo\; in analyzing and discovering the vulnerabilities of the system t
 o come out on top against the malicious attackers. However\, the tradition
 al static detection systems are not able to differentiate between benign a
 nd malicious behaviors effectively. In this talk\, I will share our though
 ts on the detection of different attacks through modeling the execution be
 havior of an application using low-level hardware information. Our approac
 hes can provide more flexibility for detection schemes by performing dynam
 ic behavioral analysis at run-time. With anomaly detection methods\, the a
 bnormal behaviors that deviate from benign behaviors at run-time can be fl
 agged and captured. &lt;/span&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;
 IEEE North Jersey Section Computer Chapter and Signal Processing Chapter S
 eminar&lt;/p&gt;\n&lt;p&gt;Title: &lt;span style=&quot;font-size: 14pt\;&quot;&gt;&lt;strong&gt;&lt;span style=
 &quot;line-height: 115%\; font-family: &#39;Times New Roman&#39;\, serif\; color: rgb(5
 1\, 51\, 51)\; letter-spacing: 0.25pt\; background: white\;&quot;&gt;Low-Level Har
 dware Information Assisted Approach Towards System Security&amp;nbsp\;&lt;/span&gt;&lt;
 /strong&gt;&lt;/span&gt;&lt;/p&gt;\n&lt;p&gt;Speaker: Prof. Chen Liu\,&amp;nbsp\; Department of Ele
 ctrical and Computer Engineering\, Clarkson University&lt;/p&gt;\n&lt;p&gt;Time: 1:30p
 m-2:30pm&lt;/p&gt;\n&lt;p&gt;Fairleigh Dickinson University&lt;/p&gt;\n&lt;p&gt;1000 River Road\, 
 &amp;nbsp\;&lt;span class=&quot;sublabel&quot;&gt;Building:&lt;/span&gt; Muscarelle Center\, &lt;span c
 lass=&quot;sublabel&quot;&gt;Room Number:&lt;/span&gt; 105&lt;/p&gt;\n&lt;p&gt;Teaneck\, New Jersey\, Uni
 ted States 07666&lt;/p&gt;\n&lt;p&gt;For additional information about the venue and pa
 rking\, please contact&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;Dr. Hong Zhao&lt;/strong&gt;&amp;nbsp\;&lt;/p&gt;\n
 &lt;p&gt;&lt;a href=&quot;mailto:zhao@fdu.edu&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener no
 referrer&quot;&gt;zhao@fdu.edu&lt;/a&gt;&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;
 &lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&amp;
 nbsp\;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

