Understanding computer security requires a strong knowledge of the underlying technologies and a deep awareness of the origin of today’s threats. To help the community facing the new challenges of computer security,our research is based on these fundamentals.One of our goal was to include in our work, both of the offensive and defensive approaches, to best meet the requirements of the fight against cyber threats. Starting with a technical background and knowing the attacker’s point of view allowed us to design both offensive and defensive tools.Our work aims at enhancing the defense of several systems by first looking for vulnerabilities in them. Thus, we worked on several axes to provide a strong defense in depth. At first, we improved the...
Ensuring the security of an application through its life cycle is a tedious task. The choice, the im...
Ensuring the security of an application through its life cycle is a tedious task. The choice, the im...
Ensuring the security of an application through its life cycle is a tedious task. The choice, the im...
Understanding computer security requires a strong knowledge of the underlying technologies and a dee...
Understanding computer security requires a strong knowledge of the underlying technologies and a dee...
La compréhension de la sécurité informatique passe nécessairement par une réelle maitrise des brique...
This thesis aims to define the best strategy to secure the Information System I’m currently working ...
As the importance of computer systems in modern-day societies grows, so does the damage that malicio...
As the importance of computer systems in modern-day societies grows, so does the damage that malicio...
The Internet has become a great integration platform capable of efficiently interconnecting billions...
There is a permanent confrontation between malware and antiviruses, leading both parties to evolve c...
L'objectif de cette thèse est le développement de méthodes de compréhension des logiciels malveillan...
Les systèmes de contrôle-commande industriels (Industrial Control System, ICS) sont des infrastructu...
The main goal of this thesis is the development of malware analysis methods to help human analysts b...
The main goal of this thesis is the development of malware analysis methods to help human analysts b...
Ensuring the security of an application through its life cycle is a tedious task. The choice, the im...
Ensuring the security of an application through its life cycle is a tedious task. The choice, the im...
Ensuring the security of an application through its life cycle is a tedious task. The choice, the im...
Understanding computer security requires a strong knowledge of the underlying technologies and a dee...
Understanding computer security requires a strong knowledge of the underlying technologies and a dee...
La compréhension de la sécurité informatique passe nécessairement par une réelle maitrise des brique...
This thesis aims to define the best strategy to secure the Information System I’m currently working ...
As the importance of computer systems in modern-day societies grows, so does the damage that malicio...
As the importance of computer systems in modern-day societies grows, so does the damage that malicio...
The Internet has become a great integration platform capable of efficiently interconnecting billions...
There is a permanent confrontation between malware and antiviruses, leading both parties to evolve c...
L'objectif de cette thèse est le développement de méthodes de compréhension des logiciels malveillan...
Les systèmes de contrôle-commande industriels (Industrial Control System, ICS) sont des infrastructu...
The main goal of this thesis is the development of malware analysis methods to help human analysts b...
The main goal of this thesis is the development of malware analysis methods to help human analysts b...
Ensuring the security of an application through its life cycle is a tedious task. The choice, the im...
Ensuring the security of an application through its life cycle is a tedious task. The choice, the im...
Ensuring the security of an application through its life cycle is a tedious task. The choice, the im...