Jack W. Davidson, Professor of Computer Science in the School of Engineering and Applied Science, University of Virginia

For the past twenty years, our research has been driven by the need to analyze, understand, and transform software without access to source code. Through a series of research programs, including DARPA’s Self-Regenerative Systems (SRS), AFOSR’s Enterprise Health: Self-Regenerative Incorruptible Enterprise program, IARPA’s Securely Taking on New Executable Software of Uncertain Provenance (STONESOUP) program, DARPA’s Cyber Grand Challenge (CGC), and DARPA’s Cyber Fault-Tolerant Attack and Recovery program (CFAR), and others, we have developed novel techniques to analyze and transform binaries. This talk will retrospectively examine these efforts and our key contributions in binary analysis and rewriting, from early vulnerability discovery techniques to advanced automated program transformations. We will also discuss current binary analysis research areas, speculate on where binary analysis research is heading, and why it continues to be an important, well-funded and impactful research area.

Speaker's Biography: Jack W. Davidson is a Professor of Computer Science in the School of Engineering and Applied Science at the University of Virginia. Professor Davidson is a Fellow of the ACM and a Life Fellow of the IEEE. He served as an Associate Editor of ACM’s Transactions on Programming Languages and Systems for six years, and as an Associate Editor of ACM’s Transactions on Architecture and Compiler Optimizations for eight years. He served as Chair of ACM’s Special Interest Group on Programming Languages (SIGPLAN) from 2005 to 2007. He currently serves on the ACM Executive Council and is chair of ACM’s Digital Library Board that oversees the operation and development of ACM’s Digital Library.

View More Papers

Work-in-Progress: Detecting Browser-in-the-Browser Attacks from Their Behaviors and DOM...

Ryusei Ishikawa, Soramichi Akiyama, and Tetsutaro Uehara (Ritsumeikan University)

Read More

Diffence: Fencing Membership Privacy With Diffusion Models

Yuefeng Peng (University of Massachusetts Amherst), Ali Naseh (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst)

Read More

NDSS Symposium 2025 Welcome and Opening Remarks

General Chairs: David Balenson, USC Information Sciences Institute and Heng Yin, University of California, Riverside Program Chairs: Christina Pöpper, New York University Abu Dhabi and Hamed Okhravi, MIT Lincoln Laboratory Artifact Evaluation Chairs: Daniele Cono D’Elia, Sapienza University and Mathy Vanhoef, KU Leuven

Read More

Hidden and Lost Control: on Security Design Risks in...

Haoqiang Wang, Yiwei Fang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Yichen Liu (Indiana University Bloomington), Ze Jin (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Emma Delph…

Read More