Description

Dynamic analysis provides a powerful framework for extracting actionable insights from running programs and enforcing runtime protections to enhance security. By instrumenting software during execution, we uncover vulnerabilities and gain a deeper understanding of their behavior in real-world conditions. This enables precise diagnosis and supports the development of targeted mitigations. Additionally, our runtime protection systems dynamically retrofit security mechanisms and privilege controls, strengthening applications without altering their original design. Dynamic analysis also plays a crucial role in generating test cases, improving test coverage, and producing inputs that better explore complex program behavior. Through these multifaceted applications, dynamic analysis bridges vulnerability discovery, runtime defense, and testing, delivering comprehensive solutions for secure and resilient software systems.

Solutions

  • DIODE: Input Synthesis Engine
  • Lucien: Supply Chain Telemetry, Assessment, and Protection

Projects

DRIFT

Enhancing SBOMs to solve vulnerability discovery, reachability and remediation.

PI: Michael Gordon

Technical Areas: Static Analysis, Dynamic Analysis, Binary Patching, Supply Chain Security, Vulnerability Remediation, Vulnerability Reachability

ClearScope

Precise and comprehensive runtime monitoring of sensitive behaviors in Android apps.

PI: Michael Gordon

Technical Areas: Dynamic Analysis, Runtime Protection, Supply Chain Security, Vulnerability Discovery

Saran

Instrumentation system for Android apps to track sensitive information and retrofit security policies.

PI: Jeff Perkins

Technical Areas: Static Analysis, Dynamic Analysis, Runtime Protection

Aikido

Automating Realistic Vulnerability Generation for Cyber Defense Evaluation

PI: Ricardo Baratto

Technical Areas: Static Analysis, Dynamic Analysis

Arya (TA2)

Automated exploitation and vulnerability validation across diverse systems

PI: Jeff Perkins

Technical Areas: Dynamic Analysis, Supply Chain Security, Vulnerability Discovery

Recent Blog Posts and News

Papers