-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathvita.html
433 lines (353 loc) · 16.4 KB
/
vita.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Damien Octeau</title>
<link href="css.css" rel="stylesheet" type="text/css">
<script src="js/ga.js"></script>
</head>
<body>
<table cellspacing="0" cellpadding="5px">
<tr> <td class="myname">Damien Octeau</td> </tr>
<tr> <td id="nav" class="mylinks"> <myl> <a href="index.html" class="linknostyle">Home</a> ◊ <a href="research.html" class="linknostyle">Research</a> ◊ <a href="publications.html" class="linknostyle">Publications</a> ◊ <strong>Vita</strong> ◊ <a href="tools.html" class="linknostyle">Tools</a> </myl> </td> </tr>
</table>
<div class="content">
<h2 class="vitaheader">Experience</h1>
<b>Google Inc.</b>, Mountain View, CA<br>
Software Engineer, September 2015 - Present
<ul>
<li>Working on various techniques for mobile malware detection
</li>
</ul>
<b>University of Wisconsin-Madison</b>, Madison, WI<br>
<b>Pennsylvania State University</b>, University Park, PA<br>
Postdoctoral Research Associate, September 2014 - September 2015
<ul>
<li>Designed and implemented a technique for propagation of constants
with composite types. Presented it at ICSE 2015. Released the tool at
<a href="http://siis.cse.psu.edu/coal">http://siis.cse.psu.edu/coal</a>.
</li>
<li>Reformulated the problem of inferring Android Inter-Component
Communication to a composite constant propagation problem. Released the
tool at
<a href="http://siis.cse.psu.edu/ic3">http://siis.cse.psu.edu/ic3</a>.
</li>
<li>Studied probabilistic ranking of program values inferred using
static analysis. Presented it at POPL 2016. Released the tool at
<a href="http://siis.cse.psu.edu/primo">http://siis.cse.psu.edu/primo</a>.
</li>
</ul>
<b>Pennsylvania State University</b>, University Park, PA<br>
Research Assistant, January 2009 - July 2014
<ul>
<li>Designed and implemented Ded, the first efficient method to
decompile applications running on Google Android (≈95% success
rate). Released the tool at
<a href="http://siis.cse.psu.edu/ded">http://siis.cse.psu.edu/ded</a>.
</li>
<li>Used Ded for a study of the security of 1,100 applications using
static analysis, presented at USENIX Security 2011.
</li>
<li>Designed and implemented Dare, the most efficient method to
retarget Android applications to Java bytecode (99.99% success rate).
Presented it at FSE 2012. Released the tool and source code at
<a href="http://siis.cse.psu.edu/dare">http://siis.cse.psu.edu/dare</a>.
</li>
<li>Designed and implemented Epicc, a tool to analyze Android
Inter-Component Communication. Presented it at USENIX Security
2013. Released the tool at
<a href="http://siis.cse.psu.edu/epicc">http://siis.cse.psu.edu/epicc</a>.
</li>
</ul>
<b>Google Inc.</b>, Mountain View, CA<br>
Intern in the Security team, Summer 2013<br>
<br>
<b>Google Inc.</b>, Mountain View, CA<br>
Intern, Summer 2011<br>
<ul>
<li>Designed and implemented tools to analyze and visualize experimental
data about user proximity.
</li>
<li>Patented the work as U.S. Patent 8,830,909, issued on September 9,
2014.
</li>
</ul>
<b>Pennsylvania State University</b>, University Park, PA<br>
Teaching Assistant, August 2010 - December 2010<br>
Assisted students in labs for CMPSC 122, the course in intermediate
programming in C++.<br>
<br>
<b>Osiatis France</b>, Bordeaux, France<br>
Intern, Summer 2008<br>
<ul>
<li>Designed and implemented a collaborative php/MySQL application to
manage the follow up on all IT issues for a major client.</li>
<li>Trained the local team to use and modify it.</li>
</ul>
<h2 class="vitaheader">Education</h1>
<b>Pennsylvania State University, 2014</b>
<ul>
<li>Ph.D. in Computer Science and Engineering<br>
Thesis: <i>Analysis of Inter-Component Communication in Mobile Applications Through Retargeting</i><br>
Advisor: Dr. Patrick McDaniel</li>
<li>M.S. in Computer Science and Engineering, 2010<br>
Thesis: <i>Automated Certification of Android Applications</i><br>
Advisor: Dr. Patrick McDaniel</li>
</ul>
<b>Ecole Centrale de Lyon</b>, France
<ul>
<li><i>Diplôme d'ingénieur</i> (Master's degree in
Engineering), 2010</li>
<li>B.S. in Engineering, 2007</li>
</ul>
<h2 class="vitaheader">Publications</h2>
<h3>Journal Publications</h3>
Damien Octeau, Daniel Luchaup, Somesh Jha, and Patrick McDaniel.
Composite Constant Propagation and its
Application to Android Program Analysis. <i>IEEE Transactions of
Software Engineering (TSE)</i>, vol. 42, no. 11, pp. 999-1014, November
2016.
<br>
<br>
Basak Guler, Burak Varan, Kaya Tutuncuoglu, Mohamed Nafea, Ahmed A.
Zewail, Aylin Yener, and Damien Octeau. Using Social Sensors for
Influence Propagation in Networks with Positive and Negative
Relationships. <i>IEEE Journal on Selected Topics in Signal Processing:
Special Issue on Signal Processing for Situational Awareness from
Networked Sensors and Social Media</i>. March 2015.
<h3>Conference Publications</h3>
Li Li, Tegawende F. Bissyande, Damien Octeau and Jacques Klein.
Reflection-Aware Static Analysis of Android Apps, <i>Proceedings of
the 31st IEEE/ACM International Conference on Automated Software
Engineering (ASE), Tool Track</i>, September 2016, Singapore, Singapore.
<br>
<br>
Michael Backes, Sven Bugiel, Erik Derr, Patrick McDaniel, Damien
Octeau, and Sebastian Weisgerber. On Demystifying the Android
Application Framework: Re-Visiting Android Permission Specification
Analysis. <i>Proceedings of the 25th USENIX Security Symposium</i>,
August 2016, Austin, TX. <i>Acceptance rate: 15.6%</i>.
<br>
<br>
Li Li, Tegawende F. Bissyande, Damien Octeau, and Jacques Klein.
DroidRA: Taming Reflection to Support Whole-Program Analysis of Android
Apps. <i>Proceedings of the 25th International Symposium on Software
Testing and Analysis (ISSTA)}</i>. Saarbrucken, Germany, July 2016.
<i>Acceptance rate: 25.17%</i>.
<br>
<br>
Damien Octeau, Somesh Jha, Matthew Dering, Patrick McDaniel, Alexandre
Bartel, Li Li, Jacques Klein, and Yves Le Traon. Combining Static
Analysis with Probabilistic Models to Enable Market-Scale Android
Inter-Component Analysis. <i>Proceedings of the 43rd ACM SIGPLAN-SIGACT
Symposium on Principles of Programming Languages (POPL)</i>. St.
Petersburg, Florida, USA, January 2016. <i>Acceptance rate: 23.3%</i>.
<br>
<br>
Damien Octeau, Daniel Luchaup, Matthew Dering, Somesh Jha, and Patrick
McDaniel. Composite Constant Propagation: Application to Android
Inter-Component Communication Analysis. <i>Proceedings of the 37th
International Conference on Software Engineering (ICSE)</i>, May 2015.
Florence, Italy. <i>Acceptance rate: 18.5%</i>.
<br>
<br>
Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Artz,
Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel.
I Know What leaked in Your Pocket: Uncovering Privacy Leaks on Android
Apps with Static Taint Analysis. <i>Proceedings of the 37th
International Conference on Software Engineering (ICSE)</i>, May 2015.
Florence, Italy. <i>Acceptance rate: 18.5%</i>.
<br>
<br>
Basak Guler, Burak Varan, Kaya Tutuncuoglu, Mohamed Nafea, Ahmed A.
Zewail, Aylin Yener, and Damien Octeau. Communicating in a
Socially-Aware Network: Impact of Relationship Types. <i>Proceedings of
the 2nd IEEE Global Conference on Signal and Information Processing
(GlobalSIP)</i>, December 2014. Atlanta, GA.
<br>
<br>
Wenhui Hu, Damien Octeau, Patrick McDaniel, and Peng Liu. Duet: Library
Integrity Verification for Android Applications.
<i> Proceedings of the 7th ACM Conference on Security and Privacy in
Wireless and Mobile Networks (WiSec)</i>, July 2014. Oxford, UK.
<i>Acceptance rate: 26.0%</i>.
<br>
<br>
Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden,
Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and
Patrick McDaniel. FlowDroid: Precise Context, Flow, Field,
Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps.
<i> Proceedings of the 35th Conference on Programming Language Design and
Implementation (PLDI)</i>, June 2014. Edinburgh, UK. <i>Acceptance
rate: 18.1%</i>.
<br>
<br>
Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel,
Eric Bodden, Jacques Klein, and Yves Le Traon.
Effective
Inter-Component Communication Mapping in Android with <i>Epicc</i>: An
Essential Step Towards Holistic Security Analysis. <i>Proceedings of
the 22nd USENIX Security Symposium</i>, August 2013. Washington, DC.
<i>Acceptance rate: 16.2%</i>.
<br>
<br>
Damien Octeau, Somesh Jha, and Patrick McDaniel.
Retargeting Android Applications to Java Bytecode.
<i>Proceedings of the 20th International Symposium on the
Foundations of Software Engineering</i>, November 2012.
Cary, NC. <i>Acceptance rate: 17.4%</i>.
<i><font color = "ff0000">Best Artifact Award</font></i>
<br>
<br>
William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.
A Study of Android Application Security.
<i>Proceedings of the 20th USENIX Security Symposium</i>, August 2011.
San Francisco, CA. <i>Acceptance rate: 17.2%</i>.
<h3>Other Publications</h3>
Basak Guler, Burak Varan, Kaya Tutuncuoglu, Mohamed Nafea, Ahmed A.
Zewail, Aylin Yener, and Damien Octeau. Optimal Strategies for Targeted
Influence in Signed Networks. <i>Proceedings of the ASONAM C3-2014
Workshop</i>, August 2014. Beijing, China.
<br>
<br>
Damien Octeau. Analysis of Inter-Component Communication in Mobile
Applications Through Retargeting. Ph.D. Dissertation. Pennsylvania
State University, University Park, PA, August 2014.
<br>
<br>
Damien Octeau. Automated Certification of Android Applications.
Master's Thesis. Pennsylvania State University, University Park, PA,
May 2010.
<br>
<br>
Damien Octeau, William Enck and Patrick McDaniel. The ded Decompiler.
<i>Technical Report NAS-TR-0140-2010</i>, Network and Security
Research Center, Department of Computer Science and Engineering,
Pennsylvania State University, University Park, PA.
<h2 class="vitaheader">Awards</h2>
<ul>
<li>AT&T Graduate Fellowship, 2013</li>
<li>Best Research Artifact Award, 20th International
Symposium on the Foundations of Software Engineering (FSE), 2012</li>
<li>USENIX Security Symposium Travel Grant, 2009, 2011, 2013</li>
</ul>
<h2 class="vitaheader">Presentations</h2>
Combining Static Analysis with Probabilistic Models to Enable
Market-Scale Android Inter-Component Analysis. <i>43rd ACM
SIGPLAN-SIGACT Symposium on Principles of Programming Languages
(POPL)</i>, St. Petersburg, Florida, USA, January 2016.<br>
<br>
Composite Constant Propagation: Application to Android Inter-Component
Communication Analysis, <i>37th International Conference on Software
Engineering (ICSE)</i>, Florence, Italy, May 2015.<br>
<br>
Analysis of Inter-Component Communication in Mobile Applications
Through Retargeting, <i>Invited talk at the City University of New
York</i>, New York, NY, April 2015.<br>
<br>
Analysis of Inter-Component Communication in Mobile Applications
Through Retargeting, <i>Invited talk at IBM Research</i>, Yorktown
Heights, NY, March 2015.<br>
<br>
Analysis of Inter-Component Communication in Mobile Applications
Through Retargeting, <i>Invited talk at the Virginia Polytechnic
Institute and State University</i>, Blacksburg, VA, March 2015.<br>
<br>
Analysis of Inter-Component Communication in Mobile Applications
Through Retargeting, <i>Invited talk at the North Carolina State
University</i>, Raleigh, NC, March 2015.<br>
<br>
Analysis of Inter-Component Communication in Mobile Applications
Through Retargeting, <i>Invited talk at the New York University</i>,
New York, NY, February 2015.<br>
<br>
Duet: Library Integrity Verification for Android Applications,
<i>7th ACM Conference of Security and Privacy in Wireless and Mobile
Networks</i>, July 2014.<br>
<br>
Effective Inter-Component Communication Analysis in Android with
<i>Epicc</i>, <i>2014 Network and Distributed Systems Security (NDSS)
Symposium</i>, San Diego, CA, February 2014 (poster).<br>
<br>
Effective Inter-Component Communication Mapping in Android with
<i>Epicc</i>: An Essential Step Towards Holistic Security Analysis,
<i>Invited talk at Google Inc.</i>, Mountain View, CA, August 2013.<br>
<br>
Effective Inter-Component Communication Mapping in Android with
<i>Epicc</i>: An Essential Step Towards Holistic Security Analysis,
<i>22nd USENIX Security Symposium</i>, August 2013.<br>
<br>
Retargeting Android Applications to Java Bytecode, <i>20th
International Symposium on the Foundations of Software Engineering</i>,
November 2012.<br>
<br>
Retargeting Android Applications to Java Bytecode for Static Analysis,
<i>Invited talk at the University of Luxembourg</i>, September 2012.<br>
<br>
Android Application Analysis through Retargeting, <i>Network and
Security Research Center Industry Day 2012 (poster)</i>.<br>
<br>
Decompiling Android Applications, <i>Network and
Security Research Center Industry Day 2009 (poster)</i>.<br>
<br>
Decompiling Android Applications, <i>18th USENIX Security Symposium
(work-in-progress report)</i>, Montreal, Canada, August 2009.
<h2 class="vitaheader">Patents</h2>
<b>U.S. Patent 8,830,909</b>. Methods and Systems to Determine User
Relationships, Events and Spaces using Wireless Fingerprints. Damien
Octeau and Arunesh Mishra. Issued September 9, 2014.
<h2 class="vitaheader">Professional Activities</h2>
<b>Committees:</b>
<ul>
<li>Mobile Security Technologies (MoST), 2017, PC Member</li>
<li>Annual ACM CCS Workshop on Security and Privacy in Smartphones
and Mobile Devices (SPSM), 2016, PC Member</li>
<li>ACM Conference on Security and Privacy in Wireless and Mobile
Networks (WiSec), 2016, PC Member</li>
<li>International Workshop on Mobile Computing Security, 2015, PC
Member</li>
<li>International Workshop on System-Level Security of Smartphones,
2014, PC Member</li>
</ul>
<b>Reviewer (conferences):</b>
<ul>
<li>ACM Symposium on Principles of Programming Languages (POPL):
2016</li>
<li>ACM Workshop on Moving Target Defense: 2015</li>
<li>IEEE International Conference on Computer and Communication
Technology (ICCCT): 2015</li>
<li>International Symposium on Engineering Secure Software and
Systems (ESSoS): 2015</li>
<li>USENIX Security Symposium: 2014</li>
<li>IEEE Computer Security Foundations Symposium (CSF): 2014</li>
<li>International Symposium on Software Testing and Analysis
(ISSTA): 2014</li>
<li>IEEE Symposium on Security and Privacy (Oakland): 2013</li>
<li>ACM Conference on Computer Security (CCS): 2012</li>
<li>ACM Annual International Conference on Mobile Computing and
Networking (MobiCom): 2012</li>
<li>Network and Distributed Systems Security Symposium (NDSS):
2012</li>
</ul>
<b>Reviewer (journals):</b>
<ul>
<li>Pervasive and Mobile Computing: 2016</li>
<li>IEEE Transactions on Services Computing: 2015</li>
<li>IEEE Pervasive Computing: 2015</li>
<li>IEEE Security and Privacy: 2014</li>
<li>Security and Communication Networks: 2014, 2015, 2016</li>
<li>ACM Computing Surveys: 2014, 2015</li>
<li>Journal of Computer Security: 2014</li>
<li>IEEE Transactions on Mobile Computing (TMC): 2013</li>
<li>IEEE Transactions on Dependable and Secure Computing (TDSC): 2013</li>
<li>ACM Transactions on Embedded Computing Systems (TECS): 2013</li>
<li>IEEE Transactions on Parallel and Distributed Systems (TPDS): 2012</li>
</div>
<div class="bott">
<table>
<tr> <td> </td> </tr>
</table>
</div>
</body>
</html>