Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Exécution symbolique"'
Autor:
Puodzius, Cassius
Publikováno v:
Cryptography and Security [cs.CR]. Inria Rennes, 2022. English. ⟨NNT : ⟩
Cryptography and Security [cs.CR]. Université de Rennes I, 2022. English. ⟨NNT : ⟩
Other [cs.OH]. Université de Rennes, 2022. English. ⟨NNT : 2022REN1S090⟩
Cryptography and Security [cs.CR]. Université de Rennes I, 2022. English. ⟨NNT : ⟩
Other [cs.OH]. Université de Rennes, 2022. English. ⟨NNT : 2022REN1S090⟩
Historically, malware (MW) analysis has heavily resorted to human savvy for manual signature creation to detect and classify MW. This procedure is very costly and time consuming, thus unable to cope with modern cyber threat scenario. The solution is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::0c70dd913c00e376078eb004b886fa01
https://hal.inria.fr/tel-03935152/document
https://hal.inria.fr/tel-03935152/document
Autor:
Girol, Guillaume
Publikováno v:
Cryptography and Security [cs.CR]. Université Paris-Saclay, 2022. English. ⟨NNT : 2022UPASG071⟩
Modern bug-finding techniques have become effective enough that the bottleneck is not finding bugs but finding the time to fix them. A popular way to address this problem is to focus first on bugs with a security impact, also known as vulnerabilities
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::9627b2e93d8ad215b40228a7debc7265
https://theses.hal.science/tel-03865452
https://theses.hal.science/tel-03865452
Autor:
Sabourin, Ian
On est habitué à penser comme suit à un programme qui exécute: une donnée entre (un input), un moment passe, et un résultat ressort. On assume tacitement de l'information complète sur le input, le résultat, et n'importe quels résultats inter
Externí odkaz:
http://hdl.handle.net/1866/26541
Autor:
Daniel, Lesly-Ann
Publikováno v:
Cryptography and Security [cs.CR]. Université Côte d'Azur, 2021. English. ⟨NNT : 2021COAZ4092⟩
Programs commonly perform computations involving secret data, relying on cryptographic code to guarantee their confidentiality. In this context, it is crucial to ensure that cryptographic code cannot be exploited by an attacker to leak secret data. U
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::b90e310ffed83bc5955bdaa688700a0a
https://theses.hal.science/tel-03642418
https://theses.hal.science/tel-03642418
Autor:
Mahe, Erwan
Publikováno v:
Formal Languages and Automata Theory [cs.FL]. Université Paris-Saclay, 2021. English. ⟨NNT : 2021UPAST062⟩
Interactions represent asynchronous communications in a distributed context and can be represented graphically in an intuitive manner while allowing the specification of precise scheduling policies for ordering events. In this thesis, we formalize su
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::2ba7e45a7b0ecff26c576c0377787e46
https://tel.archives-ouvertes.fr/tel-03369906/file/2021UPAST062_MAHE_archivage.pdf
https://tel.archives-ouvertes.fr/tel-03369906/file/2021UPAST062_MAHE_archivage.pdf
Autor:
Cecchetto, Sylvain
Publikováno v:
Informatique [cs]. Université de Lorraine, 2021. Français. ⟨NNT : 2021LORR0042⟩
The increase in cyber-attacks around the world makes malicious code analysis a priority research area. This software uses various protection methods, also known as obfuscations, to bypass antivirus software and slow down the analysis process. In this
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::d3659f6f5ea577a372b76595f03ba50d
https://hal.univ-lorraine.fr/tel-03229129/file/DDOC_T_2021_0042_CECCHETTO.pdf
https://hal.univ-lorraine.fr/tel-03229129/file/DDOC_T_2021_0042_CECCHETTO.pdf
Autor:
Poeplau, Sebastian
Publikováno v:
Thesis
Symbolic execution has the potential to make software more secure by significantly improving automated vulnerability search. In this thesis, we propose a general technique that allows for more efficient implementations of the execution component in s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::798ec20a168074efbb840c0ffaa90ea9
http://www.eurecom.fr/publication/6331
http://www.eurecom.fr/publication/6331
Autor:
Corteggiani, Nassim
Publikováno v:
Embedded Systems. Sorbonne Université, 2020. English. ⟨NNT : 2020SORUS285⟩
This thesis is dedicated to the improvement of dynamic analysis techniques allowing the verification of software designed for embedded systems, commonly called firmware. It is clear that the increasing pervasiveness and connectivity of embedded devic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::795d81b0969802f1335d9d4ac1ae4e9a
https://tel.archives-ouvertes.fr/tel-03413371
https://tel.archives-ouvertes.fr/tel-03413371
Autor:
Gonzalvez, Alexandre
Publikováno v:
Cryptographie et sécurité [cs.CR]. Ecole nationale supérieure Mines-Télécom Atlantique, 2020. Français. ⟨NNT : 2020IMTA0187⟩
High demand exists nowadays to improve advanced obfuscation and deobfuscation techniques, with the purpose of preventing intellectual property piracy or improving defence against cyber security attacks. This thesis focuses on the improvement of the d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2592::4754d11ab8088730728c3fd38ae7a080
https://tel.archives-ouvertes.fr/tel-02927808/document
https://tel.archives-ouvertes.fr/tel-02927808/document
Autor:
Gonzalvez, Alexandre
Publikováno v:
Cryptographie et sécurité [cs.CR]. Ecole nationale supérieure Mines-Télécom Atlantique, 2020. Français. ⟨NNT : 2020IMTA0187⟩
High demand exists nowadays to improve advanced obfuscation and deobfuscation techniques, with the purpose of preventing intellectual property piracy or improving defence against cyber security attacks. This thesis focuses on the improvement of the d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______212::4754d11ab8088730728c3fd38ae7a080
https://tel.archives-ouvertes.fr/tel-02927808/document
https://tel.archives-ouvertes.fr/tel-02927808/document