| |
 Advancing Android Security through Hardware-Enforced Isolation and Live Thread Analysis |  | NG Ying Tat PhD Candidate School of Computing and Information Systems Singapore Management University | Research Area Dissertation Committee Research Advisor Committee Members |
| | Date 22 April 2026 (Wednesday) | Time 3:30pm - 4:30pm | Venue Meeting room 5.1, Level 5 School of Computing and Information Systems 1, Singapore Management University, 80 Stamford Road Singapore 178902 | Please register by 20 April 2026. We look forward to seeing you at this research seminar. 
|
|
|
| | ABOUT THE TALK Android malware use UI manipulation, multi-stage payload delivery and malicious native libraries to avoid detection and trick users to perform unintended actions. To protect users, we leverage on hardware virtualization features, such as the protected kernel-based virtual machine (pKVM), to isolate sensitive UI components against a kernel adversary. Second, we use a live thread analysis approach at the binary level, combining symbolic execution with runtime introspection to uncover hidden behaviors during execution. | | | SPEAKER BIOGRAPHY NG Ying Tat is a part-time Ph.D. candidate in Computer Science at the School of Computing and Information Systems, Singapore Management University (SMU), under the supervision of Prof Ding Xuhua. His research interest is in Android and ARM System Security Assisted by Hardware Features. |
|