Skip to main content
  • Home
  • About
  • Faculty Experts
  • For The Media
  • ’Cuse Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit
STEM
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • Syracuse University Impact
  • |
  • The Peel
  • Athletics
Sections
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • Syracuse University Impact
  • |
  • The Peel
  • Athletics
  • Home
  • About
  • Faculty Experts
  • For The Media
  • ’Cuse Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit
STEM

LCS’s Heng Yin awarded NSF grant to fight against malicious code

Tuesday, September 7, 2010, By News Staff
Share
Research and Creative

It is a notable achievement to receive a National Science Foundation (NSF) grant.  It is a rare and laudable achievement to receive an NSF grant on the first attempt and as a first-year professor who completed a doctorate degree less than a year ago.  Yet, that is exactly what Heng Yin, assistant professor of computer science in the L.C. Smith College of Engineering and Computer Science has accomplished.  

yinAfter completing his Ph.D. in 2009, Yin went straight to work preparing his grant proposal, “Mining Operating System Semantics: Techniques and Applications.”  For this proposal, Yin has received a $427,000 grant from the NSF to fight against malicious code.  

“Previously I have conducted considerable research on understanding and detecting malicious code,” says Yin.  “In this proposal, I switched the analysis target, which is the operating system to be protected against malicious code.” 

Operating systems manage hardware resources and provide a higher-level environment for user applications. Operating systems play a central role in computer systems, especially with respect to security and trustworthiness. The growing focus around security makes it crucial to have in-depth knowledge about inner workings of an operating system.  

Researchers look to track and analyze events such as: what processes are active in the system, which process is currently running, what modules are loaded into a specific process, which files are opened by a process and which network connections have been established. The knowledge about operating system semantics is the foundation for many computer security applications, such as virtual machine introspection, malware detection and analysis and computer forensics. 

However, the existing techniques for obtaining the operating system semantics fall short. They perform static analysis on the operating system source code, and thus cannot be applied to the closed-source operating systems (e.g., MS Windows). The source code analysis also suffers from the WYSINWYX (i.e., What You See Is Not What You eXecute) problem. Furthermore, the obtained semantics knowledge can be easily compromised by various attacks. With such an unsound foundation, the functionality and trustworthiness of these security applications become questionable. 

Yin will work over the next three years to build a novel analysis framework to fortify this base knowledge of code analysis. This analysis framework aims to automatically extract the operating system semantics simply from the binary distribution of an operating system and capture invariants, areas of constancy, among these semantics. 

The benefit of this framework is that it is binary-centric, and therefore can deal with closed-source operating systems. The identified invariants can also help derive trustworthy semantics knowledge, so various forgery attacks can be detected and thwarted. With this proposed analysis framework, Yin will further investigate how to strengthen the functionality and robustness of several key security applications, including virtual machine introspection, rootkit defense and live memory forensics. 

“By analyzing the operating system instead of individual malware instances, we may come up with better defense mechanisms that can defeat entire classes of malware attacks even before new malware attacks are launched,” says Yin.

  • Author

News Staff

  • Recent
  • Live Like Liam Foundation Establishes Endowed Scholarship for InclusiveU
    Tuesday, May 13, 2025, By Cecelia Dain
  • Dara Drake ’23 Named the University’s First Knight-Hennessey Scholar
    Tuesday, May 13, 2025, By Kelly Homan Rodoski
  • ECS Team Takes First Place in American Society of Civil Engineers Competition
    Tuesday, May 13, 2025, By Kwami Maranga
  • Years of Growth Fueled Women’s Club Ice Hockey Team to Success
    Tuesday, May 13, 2025, By Samantha Perkins
  • Utility Projects to Begin on Campus This Week; Temporary Closures and Detours Expected Throughout the Summer
    Monday, May 12, 2025, By Jennifer DeMarchi

More In STEM

ECS Team Takes First Place in American Society of Civil Engineers Competition

Civil and environmental engineering student teams participated in the American Society of Civil Engineers (ASCE) Sustainable Solutions and Steel Bridge competitions during the 2025 Upstate New York-Canada Student Symposium, winning first place in the Sustainable Solutions competition. The symposium was…

Chloe Britton Naime Committed to Advocating for Improved Outcomes for Neurodivergent Individuals

Chloe Britton Naime ’25 is about to complete a challenging and rare dual major program in both mechanical engineering from the College of Engineering and Computer Science and neuroscience from the College of Arts and Sciences. Even more impressive? Britton…

Graduating Research Quartet Synthesizes Long-Lasting Friendships Through Chemistry

When Jesse Buck ’25, Isabella Chavez Miranda ’25, Lucy Olcott ’25 and Morgan Opp ’25 started as student researchers in medicinal chemist Robert Doyle’s lab, they hoped to hone their research skills. It quickly became evident this would be unlike…

Biologist Reveals New Insights Into Fish’s Unique Attachment Mechanism

On a wave-battered rock in the Northern Pacific Ocean, a fish called the sculpin grips the surface firmly to maintain stability in its harsh environment. Unlike sea urchins, which use their glue-secreting tube feet to adhere to their surroundings, sculpins…

Distinguished ECS Professor Pramod K. Varshney Establishes Endowed Faculty Fellowship

Distinguished Professor Pramod K. Varshney has exemplified Orange excellence since joining the University as a 23-year-old faculty member. A world-renowned researcher and educator, he’s been recognized for his seminal contributions to information fusion and related fields, introducing new, innovative courses…

Subscribe to SU Today

If you need help with your subscription, contact sunews@syr.edu.

Connect With Us

  • X
  • Facebook
  • Instagram
  • Youtube
  • LinkedIn
Social Media Directory

For the Media

Find an Expert Follow @SyracuseUNews
  • Facebook
  • Instagram
  • Youtube
  • LinkedIn
  • @SyracuseU
  • @SyracuseUNews
  • Social Media Directory
  • Accessibility
  • Privacy
  • Campus Status
  • Syracuse.edu
© 2025 Syracuse University News. All Rights Reserved.