Sites Inria

There are 5 Results with the keyword : "malware"

Research

Dynamic Synthesis of Obfuscated Code

Obfuscated code can be deobfuscated via dynamic synthesis.

Obfuscation can be used to hide malicious code and to hinder reverse-engineering of programs. In particular, obfuscated code is resistant to static analysis techniques. We will show how an attacker based on dynamic synthesis can be used to implement a general black-box deobfuscation technique based on interrogating the obfuscated code as an oracle, and reconstructing its behavior accordingly, until a synthesized program behaving like the obfuscated one is obtained.

Keywords:

Home > Centre > Nancy > Innovation > RII 2016 > Demos > Dynamic Synthesis of Obfuscated Code

More

Laboratoire de Haute Sécurité

Research

High Security Laboratory

The High-Security Laboratory (LHS) is designed to host decisive research work in order to make networks, Internet exchanges and associated telecommunications equipments safer. The LHS provides the technological and regulatory framework needed for scientific advances that accompany developments in our technological society. Open to industrial partners, the laboratory also represents a favourable opportunity for the reliability tests that are needed before various technological products or solutions can be put on the market.

Keywords:

Home > Centre > Nancy > Innovation > RII 2016 > Demos > Laboratoire de Haute Sécurité

More

Research

High Security Laboratory Rennes : Ransomware Attacks and Countermeasures

Threat mitigation in a controlled environment.

We get a "trivial" ransomware running in a virtual machine with standards documents (word, excel, pdf, ...). Demonstrations objectives will be to recover the originals documents using the dictionary method (AES-ECB) and get the AES key. The AES key is extracted through the integration of a provider (CryptoAPI) in the system. Then we will prove with OpenSSL the key validity by retrieving a document.

Keywords:

Home > Centre > Nancy > Innovation > RII 2016 > Demos > Laboratoire Haute Sécurité de Rennes : Ransomware Attacks and Countermeasures

More

© INRIA Sophie Auvin - T comme Temps

Rencontres Inria Industrie

Data Thieves Detection via semantic analysis

Équipe Tamis (Inria Rennes-Bretagne Atlantique) -

One of the current threat on the privacy and confidentiality of data is the possibility of data theft through malware infection. In our demonstration, we show how our malware detection tool chain can be used to detect malwares and prevent exfiltration of data after an infection. Methods based on syntactic properties become ineffective as soon as the binary is slightly mutated or obfuscated. We'll show that our method, based on behavioral analysis, is able to detect even mutated and obfuscated malware, thus protecting user data from avanced infections.

Keywords:

Home > Centre > Paris > Innovation > RII "Les données" 17-18 octobre 2017 > Demos > Détection de voleurs de donnée par analyse sémantique

More

Cubes du jeu Datagramme : données et malware © Inria / Photo G. Scagnelli

Partnership

Inria and Cisco Team Up in Malware Research

Jean-Michel Prima - 30/11/2017

A security research team based at Inria center, in Rennes, Brittany, France, Tamis recently partnered with American networking hardware giant Cisco Systems in a move meant to design an innovative method for uncovering malware at code execution.

Keywords:

Home > Centre > Rennes > News > Inria et Cisco partenaires contre les malwares

More

Top