Sciweavers

VIROLOGY
2010
89views more  VIROLOGY 2010»
13 years 6 months ago
Malicious origami in PDF
Frédéric Raynal, Guillaume Delugr&ea...
VIROLOGY
2010
136views more  VIROLOGY 2010»
13 years 6 months ago
Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis
Jean-Baptiste Bedrune, Eric Filiol, Fréd&ea...
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 6 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
VIROLOGY
2010
91views more  VIROLOGY 2010»
13 years 6 months ago
Small treatise about e-manipulation for honest people
Frédéric Raynal, François Gas...
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 10 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
VIROLOGY
2010
82views more  VIROLOGY 2010»
13 years 10 months ago
Practical overview of a Xen covert channel
Mikaël Salaün
VIROLOGY
2010
128views more  VIROLOGY 2010»
13 years 10 months ago
Auto-Sign: an automatic signature generator for high-speed malware filtering devices
This research proposes a novel automatic method (termed Auto-Sign) for extracting unique signatures of malware executables to be used by high-speed malware filtering devices based...
Gil Tahan, Chanan Glezer, Yuval Elovici, Lior Roka...
VIROLOGY
2010
113views more  VIROLOGY 2010»
13 years 10 months ago
A general definition of malware
We propose a general, formal definition of the concept of malware (malicious software) as a single sentence in the language of a certain modal logic. Our definition al thanks to it...
Simon Kramer, Julian C. Bradfield
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 10 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé