Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Cassius Puodzius"'
Publikováno v:
IWCC 2021-10th International Workshop on Cyber Crime (held in conjunction with ARES 2021)
ARES 2021-The 16th International Conference on Availability, Reliability and Security
ARES 2021-The 16th International Conference on Availability, Reliability and Security, Aug 2021, Virtual, Austria. pp.1-12, ⟨10.1145/3465481.3470115⟩
ARES
ARES 2021-The 16th International Conference on Availability, Reliability and Security
ARES 2021-The 16th International Conference on Availability, Reliability and Security, Aug 2021, Virtual, Austria. pp.1-12, ⟨10.1145/3465481.3470115⟩
ARES
This paper received the Best Paper Award for IWCC 2021; International audience; Malware is a primary concern in cybersecurity, being one of the attacker's favorite cyberweapons. Over time, malware evolves not only in complexity but also in diversity
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7820e0ee967de2aa9c8e6a1bb141af0c
https://hal.science/hal-03328395
https://hal.science/hal-03328395
Publikováno v:
CODASPY '21-11th ACM Conference on Data and Application Security and Privacy
CODASPY '21-11th ACM Conference on Data and Application Security and Privacy, Apr 2021, Virtual Event, United States. pp.1-12, ⟨10.1145/3422337.3447848⟩
CODASPY
CODASPY '21-11th ACM Conference on Data and Application Security and Privacy, Apr 2021, Virtual Event, United States. pp.1-12, ⟨10.1145/3422337.3447848⟩
CODASPY
International audience; Packers are widespread tools used by malware authors to hinder static malware detection and analysis. Identifying the packer used to pack a malware is essential to properly unpack and analyze the malware, be it manually or aut
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b8b210301c5cf30089cfeedeb38c997d
https://hal.inria.fr/hal-03149211
https://hal.inria.fr/hal-03149211
Autor:
Cassius Puodzius, Fabrizio Biondi, Thomas Given-Wilson, Axel Legay, Eduard Baranov, Stefano Sebastio, Jean Quilbeuf, Olivier Decourbe
Publikováno v:
Computers & Security, Vol. 93, no.?, p. 101775 (2020)
Increasingly software correctness, reliability, and security is being analyzed using tools that combine various formal and heuristic approaches. Often such analysis becomes expensive in terms of time and at the cost of high quality results. In this e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::60497a5100df58cd44e06407807f15a0
https://hdl.handle.net/2078.1/229941
https://hdl.handle.net/2078.1/229941
Publikováno v:
Journal of Systems and Software. 116:95-100
We give a description of a hash-based signature scheme with shorter signature footprint and better processing times.We argue that our signature scheme is suitable for the Internet of Things.We describe an efficient implementation of the scheme for a
Publikováno v:
ISoLA 2018-8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation
ISoLA 2018-8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, Oct 2018, Limassol, Cyprus. pp.1-23
Leveraging Applications of Formal Methods, Verification and Validation. Modeling ISBN: 9783030034177
ISoLA (1)
ISoLA 2018-8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, Oct 2018, Limassol, Cyprus. pp.1-23
Leveraging Applications of Formal Methods, Verification and Validation. Modeling ISBN: 9783030034177
ISoLA (1)
International audience; This tutorial presents and motivates various malware detection tools and illustrates their usage on a clear example. We demonstrate how statically-extracted syntactic signatures can be used for quickly detecting simple variant
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9c0e56c75d5c9f02fbf4e4ffe97a4728
https://hal.inria.fr/hal-01964222/document
https://hal.inria.fr/hal-01964222/document