The document shows the step-by-step execution of a program with a MAIN function that calls a SUB function. It pushes ECX onto the stack, calls SUB, then stores the return value of SUB in EDX. SUB retrieves the call argument from the stack into EAX and returns. The document traces the changing values of registers and memory locations during each step of execution.
The document shows the step-by-step execution of a program with a MAIN function that calls a SUB function. It pushes ECX onto the stack, calls SUB, then stores the return value of SUB in EDX. SUB retrieves the call argument from the stack into EAX and returns. The document traces the changing values of registers and memory locations during each step of execution.
Trendmicro Security Award 2012 Final PresentationHiromu Yakura
The document describes a new malware detection system for Android that uses SEAndroid and Jubatus. It summarizes the increasing threat of Android malware and limitations of current security applications. The proposed system would use SEAndroid's mandatory access controls and logging combined with Jubatus' real-time machine learning to detect unauthorized commands and determine if applications are malware, defending against zero-day attacks. While it depends on device support for SEAndroid, which no current devices have, it could also use other Linux security modules and some devices support TOMOYO Linux as an alternative. The goal is to improve Android security.
This document provides biographical information about an individual named hiromu.yakura. It states that they were born in 1996 and are currently 19 years old. They have been interested in computer security since age 15 and have experience with the Linux operating system as well as programming Android applications. They have received several awards between 2012-2015 for achievements in computer security competitions and hacker conferences.