To maintain the security of information systems, deploying the proposed updates as soon as they are available is a good practice encouraged by all the computer security actors. Indeed, the exploitation of 1-day vulnerabilities (so called because a patch has been available for at least 1 day) can be devastating as EternalBlue or Shellshock have illustrated. The objective of this thesis is to propose methods and their practical application to detect if these patches are well applied at the lowest level, i.e. in the binary code. This is essential to have a reliable view of a system protection. To achieve this goal, we have established several milestones. The first one consists in an in-depth study of a typical patch, before formalizing a frame...
The threat caused by software vulnerabilities is growing exponentially. This phenomenon is due, on t...
Programming has become central in the development of human activities while not being immune to defa...
In this paper, we present ShieldGen, a system for au-tomatically generating a data patch or a vulner...
N-day vulnerabilities are public, recently disclosed, but not well-known software and hardware vulne...
N-day vulnerabilities are public, recently disclosed, but not well-known software and hardware vulne...
Android is the most used operating system and thus, ensuring security for its applications is an ess...
N-day vulnerabilities are public, recently disclosed, but not well-known software and hardware vulne...
The Android operating system is the most spread mobile platform in the world. Therefor attackers are...
La menace posée par les vulnérabilités logicielles croît de manière exponentielle. Ce phénomèneest d...
Android is currently the largest mobile platform with around 750 million devices worldwide. Unfortun...
Testing is a viable approach for detecting implementation bugs which have a security impact, a.k.a. ...
The threat caused by software vulnerabilities is growing exponentially. This phenomenon is due, on t...
The threat caused by software vulnerabilities is growing exponentially. This phenomenon is due, on t...
Testing is a viable approach for detecting implementation bugs which have a security impact, a.k.a. ...
The threat caused by software vulnerabilities is growing exponentially. This phenomenon is due, on t...
The threat caused by software vulnerabilities is growing exponentially. This phenomenon is due, on t...
Programming has become central in the development of human activities while not being immune to defa...
In this paper, we present ShieldGen, a system for au-tomatically generating a data patch or a vulner...
N-day vulnerabilities are public, recently disclosed, but not well-known software and hardware vulne...
N-day vulnerabilities are public, recently disclosed, but not well-known software and hardware vulne...
Android is the most used operating system and thus, ensuring security for its applications is an ess...
N-day vulnerabilities are public, recently disclosed, but not well-known software and hardware vulne...
The Android operating system is the most spread mobile platform in the world. Therefor attackers are...
La menace posée par les vulnérabilités logicielles croît de manière exponentielle. Ce phénomèneest d...
Android is currently the largest mobile platform with around 750 million devices worldwide. Unfortun...
Testing is a viable approach for detecting implementation bugs which have a security impact, a.k.a. ...
The threat caused by software vulnerabilities is growing exponentially. This phenomenon is due, on t...
The threat caused by software vulnerabilities is growing exponentially. This phenomenon is due, on t...
Testing is a viable approach for detecting implementation bugs which have a security impact, a.k.a. ...
The threat caused by software vulnerabilities is growing exponentially. This phenomenon is due, on t...
The threat caused by software vulnerabilities is growing exponentially. This phenomenon is due, on t...
Programming has become central in the development of human activities while not being immune to defa...
In this paper, we present ShieldGen, a system for au-tomatically generating a data patch or a vulner...