Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Ouairy, Léopold"'
Publikováno v:
In Procedia Computer Science 2019 160:70-76
Autor:
Raulin, Vincent, Gimenez, Pierre-François, Han, Yufei, Viet Triem Tong, Valérie, Ouairy, Léopold
Publikováno v:
GreHack 2021-9th International Symposium on Research in Grey-Hat Hacking
GreHack 2021-9th International Symposium on Research in Grey-Hat Hacking, Nov 2021, Grenoble, France. pp.1-7
GreHack 2021-9th International Symposium on Research in Grey-Hat Hacking, Nov 2021, Grenoble, France. pp.1-7
International audience; In program analysis, a fuzzing toolset is needed to automatically trigger software operations in a natural while efficient way. Especially in dynamic analysis of malware, such a toolset can help execute the suspicious files to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3273b3c2309258663c47b754c711f9c5
https://hal.archives-ouvertes.fr/hal-03449827/file/GUI_Mimic.pdf
https://hal.archives-ouvertes.fr/hal-03449827/file/GUI_Mimic.pdf
Publikováno v:
ARES 2020: 15th International Conference on Availability, Reliability and Security
ARES 2020: 15th International Conference on Availability, Reliability and Security, Aug 2020, Dublin (effectué en visioconférence), Ireland. ⟨10.1145/3407023.3407031⟩
ARES 2020: 15th International Conference on Availability, Reliability and Security, Aug 2020, Dublin (effectué en visioconférence), Ireland. ⟨10.1145/3407023.3407031⟩
International audience; This study focuses on automatically detecting wrong implementations of specification in Java Card programs, without any knowledge on the source code or the specification itself. To achieve this, an approach based on Natural La
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::cc37164b19febcd9279c48f5ddc07432
https://inria.hal.science/hal-02933668/document
https://inria.hal.science/hal-02933668/document
Autor:
Viet Triem Tong, Valérie, Fournier, Benoît, Fournier, Guillaume, Ouairy, Léopold, Cotret, Pascal
Publikováno v:
MISC-Le journal de la sécurité informatique
MISC-Le journal de la sécurité informatique, Lavoisier, 2019
MISC-Le journal de la sécurité informatique, 2019
MISC-Le journal de la sécurité informatique, Lavoisier, 2019
MISC-Le journal de la sécurité informatique, 2019
National audience; Les drones sont de plus en plus présents dans notre quotidien, passant du gadget technologique à l'outil de travail. Ils font désormais partie intégrante de la famille des objets connectés et constituent donc une nouvelle surf
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::167c5b3e0592ee4e628504dfcbca2839
https://hal.archives-ouvertes.fr/hal-02380997
https://hal.archives-ouvertes.fr/hal-02380997
Publikováno v:
FPS 2018-11th International Symposium on Foundations & Practice of Security
FPS 2018-11th International Symposium on Foundations & Practice of Security, Nov 2018, Montréal, Canada. p.156-172, ⟨10.1007/978-3-030-18419-3_11⟩
FPS 2018-11th International Symposium on Foundations & Practice of Security, Nov 2018, Montréal, Canada. p.156-172, ⟨10.1007/978-3-030-18419-3_11⟩
International audience; A fuzzing attack enables an attacker to gain access to restricted resources by exploiting a wrong specification implementation. Fuzzing attack consists in sending commands with parameters out of their specification range. This
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::5b8e0d64242e19b7ae27869abdc8a01c
https://inria.hal.science/hal-01976753
https://inria.hal.science/hal-01976753
Publikováno v:
SECITC 2018 : 11th International Conference on Security for Information Technology and Communications
SECITC 2018 : 11th International Conference on Security for Information Technology and Communications, Nov 2018, Bucarest, Romania. pp.29-40, ⟨10.1007/978-3-030-12942-2_4⟩
SECITC 2018 : 11th International Conference on Security for Information Technology and Communications, Nov 2018, Bucarest, Romania. pp.29-40, ⟨10.1007/978-3-030-12942-2_4⟩
International audience; Security issues can be leveraged when input parameters are not checked. These missing checks can lead an application to an unexpected state where an attacker can get access to assets. The tool Chucky-ng aims at detecting such
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3a3bc6a4b61e6a6713b6da31894c267f
https://hal.inria.fr/hal-01976747/document
https://hal.inria.fr/hal-01976747/document