International audienceIn the field of malware detection, method based on syntactical consideration are usually efficient. However, they are strongly vulnerable to obfuscation techniques. This study proposes an efficient construction of a morphological malware detector based on a syntactic and a semantic analysis, technically on control flow graphs of programs (CFG). Our construction employs tree automata techniques to provide an efficient representation of the CFG database. Next, we deal with classic obfuscation of programs by mutation using a generic graph rewriting engine. Finally, we carry out experiments to evaluate the false-positive ratio of the proposed methods
This study proposes a malware detection strategy based on control flow graphs. It carries out experi...
In this paper, we propose a methodology, based on machine learning, for building a symbolic finite s...
Identifying malicious software provides great benefit for distributed and networked systems. Traditi...
International audienceMost of malware detectors are based on syntactic signatures that identify know...
International audienceThis study proposes a malware detection strategy based on control flow. It con...
Malware is a type of malicious programs, and is one of the most common and serious types of attacks ...
This dissertation explores tactics for analysis and disassembly of malwares using some obfuscation t...
Malware is a program with malicious intent that has the potential to harm the machine on which it ex...
Malware programs (e.g., viruses, worms, Trojans, etc.) are a worldwide epidemic. Studies and statist...
Metamorphism is a technique that mutates the binary code using different obfuscations and never keep...
Malware is a specific type of software intended to breed damages ranging from computer systems fallo...
International audienceAbstract. The number of malicious software (malware) is growing out of control...
A malware detector is a system that attempts to de-termine whether a program has malicious intent. I...
A malware detector is a system that attempts to determine whether a program has malicious intent. I...
Abstract. The underground malware-based economy is flourishing and it is ev-ident that the classical...
This study proposes a malware detection strategy based on control flow graphs. It carries out experi...
In this paper, we propose a methodology, based on machine learning, for building a symbolic finite s...
Identifying malicious software provides great benefit for distributed and networked systems. Traditi...
International audienceMost of malware detectors are based on syntactic signatures that identify know...
International audienceThis study proposes a malware detection strategy based on control flow. It con...
Malware is a type of malicious programs, and is one of the most common and serious types of attacks ...
This dissertation explores tactics for analysis and disassembly of malwares using some obfuscation t...
Malware is a program with malicious intent that has the potential to harm the machine on which it ex...
Malware programs (e.g., viruses, worms, Trojans, etc.) are a worldwide epidemic. Studies and statist...
Metamorphism is a technique that mutates the binary code using different obfuscations and never keep...
Malware is a specific type of software intended to breed damages ranging from computer systems fallo...
International audienceAbstract. The number of malicious software (malware) is growing out of control...
A malware detector is a system that attempts to de-termine whether a program has malicious intent. I...
A malware detector is a system that attempts to determine whether a program has malicious intent. I...
Abstract. The underground malware-based economy is flourishing and it is ev-ident that the classical...
This study proposes a malware detection strategy based on control flow graphs. It carries out experi...
In this paper, we propose a methodology, based on machine learning, for building a symbolic finite s...
Identifying malicious software provides great benefit for distributed and networked systems. Traditi...