Automated Evasion Attacks and Fingerprinting Using Blackbox Differential Automata Learning
Association for Computing Machinery (ACM) via YouTube
Overview
Syllabus
Intro
Motivation
Evaluating Web Security Products
Why Differential Testing
Why not Differential Testing
Overview
Symbolic Finite Automata (SFA)
Learning Symbolic Automata
Why Differential Automata Learning
Bootstrapping SFA Learning
Difference Analysis
Generating Program Fingerprints
Fingerprint Tree
Evaluation Of Bootstrapping Algorithm
Differences in TCP/IP Implementations
Mac OSX TCP/IP State Machine
Conclusions
Taught by
ACM CCS