This thesis is about the design of automatic or semi-automatic methods to detect and identify cryptographic algorithms inside programs compiled into machine code. Two methods are presented. The objective of the first method is to identify cryptographic primitives. A machine code implementation of a cryptographic primitive, regarded as a sequence of instructions, is represented by a graph structure. During a normalization phase, a set of rewrite rules is used to modify this graph representation while preserving a specific notion of semantics. The goal is to converge towards expressions which are shared across several implementations of the same primitive. We use these expressions as a basis to create efficient signatures. A subgraph isomorph...
In this work we have discussed the following cryptographic protection methods: •elliptic cryptograph...
The disassembled code of an executable program can be seen as a graph representing the possible sequ...
Un code identifiant est un ensemble de sommets d'un graphe tel que, d'une part, chaque sommet hors d...
This thesis is about the design of automatic or semi-automatic methods to detect and identify crypto...
Cette thèse traite de la conception de méthodes automatisées ou semi-automatisées pour détecter et i...
Abstract. Identifying that a given binary program implements a spe-cific cryptographic algorithm and...
The work presented in this document deals with identifying codes in graphs. This notion, introduced ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Composition du jury :Brigitte Plateau : PrésidenteSimon Litsyn : RapporteurAntoine Lobstein : Rappor...
The thesis deals in a first with algorithmic and combinatorial properties of different variations on...
This thesis contributes to the cryptanalysis effort needed to trust symmetric-key primitives like bl...
International audienceNous présentons dans cet article une approche de classification de graphes. Le...
CETTE THESE TRAITE LE PROBLEME DE LA RECONSTRUCTION EN CRYPTOLOGIE ET EN THEORIE DES CODES : EN UTIL...
Les échanges des informations confidentielles ou critiques dans un environnement public, et donc po...
The main goal of this thesis is the development of malware analysis methods to help human analysts b...
In this work we have discussed the following cryptographic protection methods: •elliptic cryptograph...
The disassembled code of an executable program can be seen as a graph representing the possible sequ...
Un code identifiant est un ensemble de sommets d'un graphe tel que, d'une part, chaque sommet hors d...
This thesis is about the design of automatic or semi-automatic methods to detect and identify crypto...
Cette thèse traite de la conception de méthodes automatisées ou semi-automatisées pour détecter et i...
Abstract. Identifying that a given binary program implements a spe-cific cryptographic algorithm and...
The work presented in this document deals with identifying codes in graphs. This notion, introduced ...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Composition du jury :Brigitte Plateau : PrésidenteSimon Litsyn : RapporteurAntoine Lobstein : Rappor...
The thesis deals in a first with algorithmic and combinatorial properties of different variations on...
This thesis contributes to the cryptanalysis effort needed to trust symmetric-key primitives like bl...
International audienceNous présentons dans cet article une approche de classification de graphes. Le...
CETTE THESE TRAITE LE PROBLEME DE LA RECONSTRUCTION EN CRYPTOLOGIE ET EN THEORIE DES CODES : EN UTIL...
Les échanges des informations confidentielles ou critiques dans un environnement public, et donc po...
The main goal of this thesis is the development of malware analysis methods to help human analysts b...
In this work we have discussed the following cryptographic protection methods: •elliptic cryptograph...
The disassembled code of an executable program can be seen as a graph representing the possible sequ...
Un code identifiant est un ensemble de sommets d'un graphe tel que, d'une part, chaque sommet hors d...