Malware analysis is a growing research field due to the criticity and variety of assets targeted as well as the increasing implied costs. These softwares frequently use evasion tricks aiming at hindering detection and analysis techniques. Among these, obfuscation intent to hide the program behavior. This thesis studies the potential of Dynamic Symbolic Execution (DSE) for reverse-engineering. First, we propose two variants of DSE algorithms adapted and designed to fit on protected codes. The first is a flexible definition of the DSE path predicate computation based on concretization and symbolization. The second is based on the definition of a backward-bounded symbolic execution algorithm. Then, we show how to combine these techniques with ...
L'objectif de cette thèse est le développement de méthodes de compréhension des logiciels malveillan...
L’augmentation des cyberattaques dans le monde fait de l’analyse des codes malveillants un domaine d...
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretical...
L’analyse de codes malveillants est un domaine de recherche en pleine expansion de par la criticité ...
International audienceCode obfuscation is a major tool for protecting software intellectual property...
Code obfuscation is a major tool for protecting software intellectual property from attacks such as ...
Abstract. Trigger-based code (malicious in many cases, but not nec-essarily) only executes when spec...
Symbolic and concolic execution find important applications in a number of security-related program ...
The increase in cyber-attacks around the world makes malicious code analysis a priority research are...
Cette thèse a été faite dans un cadre industriel où les activités principales sont la rétro-ingénier...
This dissertation explores tactics for analysis and disassembly of malwares using some obfuscation t...
The thesis consists in two principal parts: the first one discusses the message format extraction an...
Les systèmes embarqués traitent et manipulent de plus en plus de données sensibles. La sécurité de c...
Symbolic execution has the potential to make software more secure by significantly improving automat...
Automatic malware analysis is an essential part of today's computer security practices. Nearly one m...
L'objectif de cette thèse est le développement de méthodes de compréhension des logiciels malveillan...
L’augmentation des cyberattaques dans le monde fait de l’analyse des codes malveillants un domaine d...
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretical...
L’analyse de codes malveillants est un domaine de recherche en pleine expansion de par la criticité ...
International audienceCode obfuscation is a major tool for protecting software intellectual property...
Code obfuscation is a major tool for protecting software intellectual property from attacks such as ...
Abstract. Trigger-based code (malicious in many cases, but not nec-essarily) only executes when spec...
Symbolic and concolic execution find important applications in a number of security-related program ...
The increase in cyber-attacks around the world makes malicious code analysis a priority research are...
Cette thèse a été faite dans un cadre industriel où les activités principales sont la rétro-ingénier...
This dissertation explores tactics for analysis and disassembly of malwares using some obfuscation t...
The thesis consists in two principal parts: the first one discusses the message format extraction an...
Les systèmes embarqués traitent et manipulent de plus en plus de données sensibles. La sécurité de c...
Symbolic execution has the potential to make software more secure by significantly improving automat...
Automatic malware analysis is an essential part of today's computer security practices. Nearly one m...
L'objectif de cette thèse est le développement de méthodes de compréhension des logiciels malveillan...
L’augmentation des cyberattaques dans le monde fait de l’analyse des codes malveillants un domaine d...
Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretical...