The increase in cyber-attacks around the world makes malicious code analysis a priority research area. This software uses various protection methods, also known as obfuscations, to bypass antivirus software and slow down the analysis process. In this context, this thesis provides a solution to build the Control Float Graph (CFG) of obfuscated binary code. We developed the BOA platform (Basic blOck Analysis) which performs a static analysis of a protected binary code. For this, we have defined a semantics based on the BINSEC tool to which we have added continuations. These allow on one hand to control the self-modifications, and on the other hand to simulate the operating system to handle system calls and interruptions. The static analysis i...
This doctoral work has been done in an industrial environment where the mainactivities were reverse ...
Fuzzing is a popular security testing technique consisting in generating massive amount of random in...
Security is becoming a major concern in software development, both for software editors, end-users, ...
The increase in cyber-attacks around the world makes malicious code analysis a priority research are...
L’augmentation des cyberattaques dans le monde fait de l’analyse des codes malveillants un domaine d...
This dissertation explores tactics for analysis and disassembly of malwares using some obfuscation t...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
In this thesis we have studied different deobfuscation approaches toward a static evaluation of obfu...
L'obscurcissement de code est perçu comme une stratégie de gestion de l'information visant à masquer...
The main goal of this thesis is the development of malware analysis methods to help human analysts b...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
The thesis consists in two principal parts: the first one discusses the message format extraction an...
L'objectif de cette thèse est le développement de méthodes de compréhension des logiciels malveillan...
Cette thèse porte en premier lieu sur l'analyse et le désassemblage de programmes malveillants utili...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
This doctoral work has been done in an industrial environment where the mainactivities were reverse ...
Fuzzing is a popular security testing technique consisting in generating massive amount of random in...
Security is becoming a major concern in software development, both for software editors, end-users, ...
The increase in cyber-attacks around the world makes malicious code analysis a priority research are...
L’augmentation des cyberattaques dans le monde fait de l’analyse des codes malveillants un domaine d...
This dissertation explores tactics for analysis and disassembly of malwares using some obfuscation t...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
In this thesis we have studied different deobfuscation approaches toward a static evaluation of obfu...
L'obscurcissement de code est perçu comme une stratégie de gestion de l'information visant à masquer...
The main goal of this thesis is the development of malware analysis methods to help human analysts b...
This thesis examines code obfuscation techniques to protect software against analysis and unwanted m...
The thesis consists in two principal parts: the first one discusses the message format extraction an...
L'objectif de cette thèse est le développement de méthodes de compréhension des logiciels malveillan...
Cette thèse porte en premier lieu sur l'analyse et le désassemblage de programmes malveillants utili...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
This doctoral work has been done in an industrial environment where the mainactivities were reverse ...
Fuzzing is a popular security testing technique consisting in generating massive amount of random in...
Security is becoming a major concern in software development, both for software editors, end-users, ...