Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Code binaire"'
Autor:
Mengin, Elie
In this thesis, we address the problem of binary diffing, i.e. the problem of finding the best possible one-to-one correspondence between the functions of two programs in binary form. This problem is a major challenge in several fields of computer se
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______166::73ea624a6f49601e49a1ac68b7f7efed
https://theses.hal.science/tel-03667920
https://theses.hal.science/tel-03667920
Autor:
gruber, fabian
Publikováno v:
Mathematical Software [cs.MS]. Université Grenoble Alpes, 2019. English. ⟨NNT : 2019GREAM071⟩
Debugging, as usually understood, revolves around finding and removing defects in software that prevent it from functioning correctly.That is, when one talks about bugs and debugging one usually means functional bugs and functional debugging.In the c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2592::d37806da7afa7ea62bd290df3ebaf45e
https://tel.archives-ouvertes.fr/tel-02908498/file/GRUBER_2019_archivage.pdf
https://tel.archives-ouvertes.fr/tel-02908498/file/GRUBER_2019_archivage.pdf
Autor:
gruber, fabian
Publikováno v:
Mathematical Software [cs.MS]. Université Grenoble Alpes, 2019. English. ⟨NNT : 2019GREAM071⟩
Debugging, as usually understood, revolves around finding and removing defects in software that prevent it from functioning correctly.That is, when one talks about bugs and debugging one usually means functional bugs and functional debugging.In the c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______212::d37806da7afa7ea62bd290df3ebaf45e
https://tel.archives-ouvertes.fr/tel-02908498/file/GRUBER_2019_archivage.pdf
https://tel.archives-ouvertes.fr/tel-02908498/file/GRUBER_2019_archivage.pdf
Autor:
Bréjon, Jean-Baptiste
Publikováno v:
Cryptographie et sécurité [cs.CR]. Université Pierre et Marie CURIE, 2020. Français
Embedded systems are processing and handling more and more sensitive data. They now come in multiple forms and affect areas such as health, aerospace or transportation. The security of these systems is now a prime concern for those who designs them.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2592::7bc439442b1ac6206773bfc3f726d45b
https://hal.archives-ouvertes.fr/tel-03140951/file/these.pdf
https://hal.archives-ouvertes.fr/tel-03140951/file/these.pdf
Autor:
Bréjon, Jean-Baptiste
Publikováno v:
Cryptographie et sécurité [cs.CR]. Université Pierre et Marie CURIE, 2020. Français
Embedded systems are processing and handling more and more sensitive data. They now come in multiple forms and affect areas such as health, aerospace or transportation. The security of these systems is now a prime concern for those who designs them.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______212::7bc439442b1ac6206773bfc3f726d45b
https://hal.archives-ouvertes.fr/tel-03140951/file/these.pdf
https://hal.archives-ouvertes.fr/tel-03140951/file/these.pdf
Autor:
Ye, Xin
Publikováno v:
Logic in Computer Science [cs.LO]. Université de Paris; East China normal university (Shanghai), 2019. English. ⟨NNT : 2019UNIP7010⟩
A Self modifying code is code that modifies its own instructions during execution time. It is nowadays widely used, especially in malware to make the code hard to analyse and to detect by anti-viruses. Thus, the analysis of such self modifying progra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::ffdb827966f47842c9f5fcf682bca5c2
https://tel.archives-ouvertes.fr/tel-02972592/document
https://tel.archives-ouvertes.fr/tel-02972592/document
Autor:
Ye, Xin
Publikováno v:
Logic in Computer Science [cs.LO]. Université de Paris; East China normal university (Shanghai), 2019. English. ⟨NNT : 2019UNIP7010⟩
A Self modifying code is code that modifies its own instructions during execution time. It is nowadays widely used, especially in malware to make the code hard to analyse and to detect by anti-viruses. Thus, the analysis of such self modifying progra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2592::ffdb827966f47842c9f5fcf682bca5c2
https://tel.archives-ouvertes.fr/tel-02972592/document
https://tel.archives-ouvertes.fr/tel-02972592/document
Autor:
Hallou, Nabil
Les applications ne sont pas toujours optimisées pour le matériel sur lequel elles s'exécutent, comme les logiciels distribués sous forme binaire, ou le déploiement des programmes dans des fermes de calcul. On se concentre sur la maximisation de
Externí odkaz:
http://www.theses.fr/2017REN1S120/document
Autor:
Hebbal, Yacine
L’introspection de machine virtuelle (VM) consiste à superviser les états et les activités de celles-ci depuis la couche de virtualisation, tirant ainsi avantage de son emplacement qui offre à la fois une bonne visibilité des états et des act
Externí odkaz:
http://www.theses.fr/2017IMTA0029/document
Autor:
Hebbal, Yacine
Publikováno v:
Computation and Language [cs.CL]. Ecole nationale supérieure Mines-Télécom Atlantique, 2017. English. ⟨NNT : 2017IMTA0029⟩
Virtual Machine Introspection (VMI) consists inmonitoring VMs security from the hypervisor layer which offers thanks to its location a strong visibility on their activities in addition to a strong isolation from them. However, hypervisor view of VMs
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::112f4a2b0b8982b1351504a5dc78980f
https://tel.archives-ouvertes.fr/tel-01797056/document
https://tel.archives-ouvertes.fr/tel-01797056/document