Protection against malicious code appears to be a major issue. Recent examples of worms such as Conficker and Stuxnet show that any information system may be the target of such attacks. Therefore, we address the threat posed by malicious code, and especially the case of metamorphism. This is indeed the result of codes evolution techniques ("obfuscation") that allows a program to avoid detection. To address metamorphism we adopt a dual approach: in a first part we focus on the development of a metamorphic engine to estimate its offensive potential. For this, we propose an obfuscation technique, for which the inverse transformation is proofed to be NP-complete in the context of static analysis. Then we apply this engine on a previously detect...
Computer viruses and other forms of malware have viewed as a threat to any software system. A comput...
Malware detection is a crucial aspect of software security. Malware typically recur to a variety of ...
The thesis consists in two principal parts: the first one discusses the message format extraction an...
Protection against malicious code appears to be a major issue. Recent examples of worms such as Conf...
Protection against malicious code appears to be a major issue. Recent examples of worms such as Conf...
Protection against malicious code appears to be a major issue. Recent examples of worms such as Conf...
Protection against malicious code appears to be a major issue. Recent examples of worms such as Conf...
La protection contre les codes malveillants représente un enjeu majeur. Il suffit en effet de consid...
International audienceIn [1] we have proposed a advance code obfuscation technique for metamorphic c...
International audienceIn [1] we have proposed a advance code obfuscation technique for metamorphic c...
International audienceIn [1] we have proposed a advance code obfuscation technique for metamorphic c...
International audienceIn this paper, we present the design of a metamorphic engine representing a ty...
International audienceIn this paper, we present the design of a metamorphic engine representing a ty...
International audienceIn this paper, we present the design of a metamorphic engine representing a ty...
Computer viruses and other forms of malware have viewed as a threat to any software system. They hav...
Computer viruses and other forms of malware have viewed as a threat to any software system. A comput...
Malware detection is a crucial aspect of software security. Malware typically recur to a variety of ...
The thesis consists in two principal parts: the first one discusses the message format extraction an...
Protection against malicious code appears to be a major issue. Recent examples of worms such as Conf...
Protection against malicious code appears to be a major issue. Recent examples of worms such as Conf...
Protection against malicious code appears to be a major issue. Recent examples of worms such as Conf...
Protection against malicious code appears to be a major issue. Recent examples of worms such as Conf...
La protection contre les codes malveillants représente un enjeu majeur. Il suffit en effet de consid...
International audienceIn [1] we have proposed a advance code obfuscation technique for metamorphic c...
International audienceIn [1] we have proposed a advance code obfuscation technique for metamorphic c...
International audienceIn [1] we have proposed a advance code obfuscation technique for metamorphic c...
International audienceIn this paper, we present the design of a metamorphic engine representing a ty...
International audienceIn this paper, we present the design of a metamorphic engine representing a ty...
International audienceIn this paper, we present the design of a metamorphic engine representing a ty...
Computer viruses and other forms of malware have viewed as a threat to any software system. They hav...
Computer viruses and other forms of malware have viewed as a threat to any software system. A comput...
Malware detection is a crucial aspect of software security. Malware typically recur to a variety of ...
The thesis consists in two principal parts: the first one discusses the message format extraction an...