The security of a software can be taken into account right from the design stage. This approach, called security by design, allows to influence as early as possible the design to influence the architecture of a software. The protections against control flow hijacks, such as return oriented programming, are not designed to change the way of designing the software. They often aim to protect a software either during its compilation or by working directly on the binary produced. In this thesis, we propose metrics allowing a developer to evaluate the sensitivity of a software program to attacks by control flow hijacks. To ease development, metrics defined allow to identify the parameters used in the production of binaries of a software that resu...
La prolifération de petits équipements ouverts tels que les dispositifs personnels de confiance a fa...
Despite the increased focus of today's research towards improving security of the cyber infrastructu...
Our society has been growingly dependent on computer systems and this tendency will not slow down in...
The security of a software can be taken into account right from the design stage. This approach, cal...
Les systèmes embarqués traitent et manipulent de plus en plus de données sensibles. La sécurité de c...
Les systèmes embarqués sont de plus en plus présents dans notre quotidien (e.g. cartes de crédits, s...
L'objectif de cette thèse est le développement de méthodes de compréhension des logiciels malveillan...
Dans ce début du troisième millénium, nous sommes témoins d'un nouvel âge. Ce nouvel âge est caracté...
Critical systems, including embedded systems built around a single core microprocessor running a sof...
In order to ensure security guarantees of binary applications, program analyses and verifications ha...
The security of embedded systems containing sensitive data has become a main concern. These widely d...
La menace posée par les vulnérabilités logicielles croît de manière exponentielle. Ce phénomèneest d...
Embedded systems are increasingly present in our daily lives (e.g. credit cards, smartphones and bio...
Memory corruption attacks have been a major issue in software security for over two decades and are ...
Reliability of a software, i.e. its capacity to produce the expected behaviour, is essential to the ...
La prolifération de petits équipements ouverts tels que les dispositifs personnels de confiance a fa...
Despite the increased focus of today's research towards improving security of the cyber infrastructu...
Our society has been growingly dependent on computer systems and this tendency will not slow down in...
The security of a software can be taken into account right from the design stage. This approach, cal...
Les systèmes embarqués traitent et manipulent de plus en plus de données sensibles. La sécurité de c...
Les systèmes embarqués sont de plus en plus présents dans notre quotidien (e.g. cartes de crédits, s...
L'objectif de cette thèse est le développement de méthodes de compréhension des logiciels malveillan...
Dans ce début du troisième millénium, nous sommes témoins d'un nouvel âge. Ce nouvel âge est caracté...
Critical systems, including embedded systems built around a single core microprocessor running a sof...
In order to ensure security guarantees of binary applications, program analyses and verifications ha...
The security of embedded systems containing sensitive data has become a main concern. These widely d...
La menace posée par les vulnérabilités logicielles croît de manière exponentielle. Ce phénomèneest d...
Embedded systems are increasingly present in our daily lives (e.g. credit cards, smartphones and bio...
Memory corruption attacks have been a major issue in software security for over two decades and are ...
Reliability of a software, i.e. its capacity to produce the expected behaviour, is essential to the ...
La prolifération de petits équipements ouverts tels que les dispositifs personnels de confiance a fa...
Despite the increased focus of today's research towards improving security of the cyber infrastructu...
Our society has been growingly dependent on computer systems and this tendency will not slow down in...