Добірка наукової літератури з теми "Analyse des logiciels malveillants"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Analyse des logiciels malveillants".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Analyse des logiciels malveillants"
Deschâtelets, Gilles. "L’homo mediaticus vs l’interface masquée : un combat à finir." Documentation et bibliothèques 31, no. 2 (October 31, 2018): 55–66. http://dx.doi.org/10.7202/1053469ar.
Повний текст джерелаLangelier, Guilaume, Houari A. Sahraoui, and Pierre Poulin. "Visualisation et analyse de logiciels de grande taille." L'objet 11, no. 1-2 (June 30, 2005): 159–73. http://dx.doi.org/10.3166/objet.11.1-2.159-173.
Повний текст джерелаBéland, Sébastien, David Magis, and Gilles Raîche. "Estimation des paramètres d’item et de sujet à partir du modèle de Rasch." Mesure et évaluation en éducation 36, no. 1 (April 22, 2014): 83–110. http://dx.doi.org/10.7202/1024466ar.
Повний текст джерелаEmirkanian, Louisette, and Lorne H. Bouchard. "Conception et réalisation de logiciels : vers une plus grande intégration des connaissances de la langue." Revue québécoise de linguistique 16, no. 2 (May 12, 2009): 189–220. http://dx.doi.org/10.7202/602599ar.
Повний текст джерелаDésilets, Mario. "Une analyse de logiciels correcteurs à partir d'un point de vue didactique." La Lettre de la DFLM 22, no. 1 (1998): 23–26. http://dx.doi.org/10.3406/airdf.1998.1330.
Повний текст джерелаBaudoux, Gaëlle, Xaviéra Calixte, and Pierre Leclercq. "Numérisation de l'idéation : analyse des méthodes de travail collaboratif instrumenté en conception intégrée." SHS Web of Conferences 82 (2020): 03002. http://dx.doi.org/10.1051/shsconf/20208203002.
Повний текст джерелаDemazière, Didier, François Horn, and Marc Zune. "La socialisation dans les « communautés » de développement de logiciels libres." Sociologie et sociétés 41, no. 1 (September 11, 2009): 217–38. http://dx.doi.org/10.7202/037914ar.
Повний текст джерелаAlbiges, Christophe. "Les sûretés et les biens immatériels en droit français : quelles sont les perspectives ?" Les Cahiers de droit 59, no. 2 (June 12, 2018): 333–50. http://dx.doi.org/10.7202/1048584ar.
Повний текст джерелаSilberztein, Max. "Linguistique et Traitement Automatique des Langues: une coopération nécessaire." Langues & Parole 5 (November 30, 2020): 43–66. http://dx.doi.org/10.5565/rev/languesparole.63.
Повний текст джерелаPetitpas, Laurent, and Frédérick Van Meer. "L’utilisation de fichiers 3D pour la création d’un clone virtuel." Revue d'Orthopédie Dento-Faciale 55, no. 1 (February 2021): 53–72. http://dx.doi.org/10.1051/odf/2021005.
Повний текст джерелаДисертації з теми "Analyse des logiciels malveillants"
Calvet, Joan. "Analyse Dynamique de Logiciels Malveillants." Phd thesis, Université de Lorraine, 2013. http://tel.archives-ouvertes.fr/tel-00922384.
Повний текст джерелаThierry, Aurélien. "Désassemblage et détection de logiciels malveillants auto-modifiants." Thesis, Université de Lorraine, 2015. http://www.theses.fr/2015LORR0011/document.
Повний текст джерелаThis dissertation explores tactics for analysis and disassembly of malwares using some obfuscation techniques such as self-modification and code overlapping. Most malwares found in the wild use self-modification in order to hide their payload from an analyst. We propose an hybrid analysis which uses an execution trace derived from a dynamic analysis. This analysis cuts the self-modifying binary into several non self-modifying parts that we can examine through a static analysis using the trace as a guide. This second analysis circumvents more protection techniques such as code overlapping in order to recover the control flow graph of the studied binary. Moreover we review a morphological malware detector which compares the control flow graph of the studied binary against those of known malwares. We provide a formalization of this graph comparison problem along with efficient algorithms that solve it and a use case in the software similarity field
Palisse, Aurélien. "Analyse et détection de logiciels de rançon." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S003/document.
Повний текст джерелаThis phD thesis takes a look at ransomware, presents an autonomous malware analysis platform and proposes countermeasures against these types of attacks. Our countermeasures are real-time and are deployed on a machine (i.e., end-hosts). In 2013, the ransomware become a hot subject of discussion again, before becoming one of the biggest cyberthreats beginning of 2015. A detailed state of the art for existing countermeasures is included in this thesis. This state of the art will help evaluate the contribution of this thesis in regards to the existing current publications. We will also present an autonomous malware analysis platform composed of bare-metal machines. Our aim is to avoid altering the behaviour of analysed samples. A first countermeasure based on the use of a cryptographic library is proposed, however it can easily be bypassed. It is why we propose a second generic and agnostic countermeasure. This time, compromission indicators are used to analyse the behaviour of process on the file system. We explain how we configured this countermeasure in an empiric way to make it useable and effective. One of the challenge of this thesis is to collate performance, detection rate and a small amount of false positive. To finish, results from a user experience are presented. This experience analyses the user's behaviour when faced with a threat. In the final part, I propose ways to enhance our contributions but also other avenues that could be explored
Beaucamps, Philippe. "Analyse de Programmes Malveillants par Abstraction de Comportements." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2011. http://tel.archives-ouvertes.fr/tel-00646395.
Повний текст джерелаLebel, Bernard. "Analyse de maliciels sur Android par l'analyse de la mémoire vive." Master's thesis, Université Laval, 2018. http://hdl.handle.net/20.500.11794/29851.
Повний текст джерелаMobile devices are at the core of modern society. Their versatility has allowed third-party developers to generate a rich experience for the user through mobile apps of all types (e.g. productivity, games, communications). As mobile platforms have become connected devices that gather nearly all of our personal and professional information, they are seen as a lucrative market by malware developers. Android is an open-sourced operating system from Google targeting specifically the mobile market and has been targeted by malicious activity due the widespread adoption of the latter by the consumers. As Android malwares threaten many consumers, it is essential that research in malware analysis address specifically this mobile platform. The work conducted during this Master’s focuses on the analysis of malwares on the Android platform. This was achieved through a literature review of the current malware trends and the approaches in static and dynamic analysis that exists to mitigate them. It was also proposed to explore live memory forensics applied to the analysis of malwares as a complement to existing methods. To demonstrate the applicability of the approach and its relevance to the Android malwares, a case study was proposed where an experimental malware has been designed to express malicious behaviours difficult to detect through current methods. The approach explored is called differential live memory analysis. It consists of analyzing the difference in the content of the live memory before and after the deployment of the malware. The results of the study have shown that this approach is promising and should be explored in future studies as a complement to current approaches.
Puodzius, Cassius. "Data-driven malware classification assisted by machine learning methods." Electronic Thesis or Diss., Rennes 1, 2022. https://ged.univ-rennes1.fr/nuxeo/site/esupversions/3dabb48c-b635-46a5-bcbe-23992a2512ec.
Повний текст джерелаHistorically, malware (MW) analysis has heavily resorted to human savvy for manual signature creation to detect and classify MW. This procedure is very costly and time consuming, thus unable to cope with modern cyber threat scenario. The solution is to widely automate MW analysis. Toward this goal, MW classification allows optimizing the handling of large MW corpora by identifying resemblances across similar instances. Consequently, MW classification figures as a key activity related to MW analysis, which is paramount in the operation of computer security as a whole. This thesis addresses the problem of MW classification taking an approach in which human intervention is spared as much as possible. Furthermore, we steer clear of subjectivity inherent to human analysis by designing MW classification solely on data directly extracted from MW analysis, thus taking a data-driven approach. Our objective is to improve the automation of malware analysis and to combine it with machine learning methods that are able to autonomously spot and reveal unwitting commonalities within data. We phased our work in three stages. Initially we focused on improving MW analysis and its automation, studying new ways of leveraging symbolic execution in MW analysis and developing a distributed framework to scale up our computational power. Then we concentrated on the representation of MW behavior, with painstaking attention to its accuracy and robustness. Finally, we fixed attention on MW clustering, devising a methodology that has no restriction in the combination of syntactical and behavioral features and remains scalable in practice. As for our main contributions, we revamp the use of symbolic execution for MW analysis with special attention to the optimal use of SMT solver tactics and hyperparameter settings; we conceive a new evaluation paradigm for MW analysis systems; we formulate a compact graph representation of behavior, along with a corresponding function for pairwise similarity computation, which is accurate and robust; and we elaborate a new MW clustering strategy based on ensemble clustering that is flexible with respect to the combination of syntactical and behavioral features
Nisi, Dario. "Unveiling and mitigating common pitfalls in malware analysis." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS528.
Повний текст джерелаAs the importance of computer systems in modern-day societies grows, so does the damage that malicious software causes. The security industry and malware authors engaged in an arms race, in which the first creates better detection systems while the second try to evade them. In fact, any wrong assumption (no matter how subtle) in the design of an anti-malware tool may create new avenues for evading detection. This thesis focuses on two often overlooked aspects of modern malware analysis techniques: the use of API-level information to encode malicious behavior and the reimplementation of parsing routines for executable file formats in security-oriented tools. We show that taking advantage of these practices is possible on a large and automated scale. Moreover, we study the feasibility of fixing these problems at their roots, measuring the difficulties that anti-malware architects may encounter and providing strategies to solve them
Reynaud, Daniel. "Analyse de codes auto-modifiants pour la sécurité logicielle." Thesis, Vandoeuvre-les-Nancy, INPL, 2010. http://www.theses.fr/2010INPL049N/document.
Повний текст джерелаSelf-modifying programs run in a very specific way: they are capable to rewrite their own code at runtime. Remarkably absent from theoretical computation models, they are present in every modern computer and operating system. Indeed, they are used by bootloaders, for just-in-time compilation or dynamic optimizations. They are also massively used by malware authors in order to bypass antivirus signatures and to delay analysis. Finally, they are unintentionally present in every program, since we can model code injection vulnerabilities (such as buffer overflows) as the ability for a program to accidentally execute data.In this thesis, we propose a formal framework in order to characterize advanced self-modifying behaviors and code armoring techniques. A prototype, TraceSurfer, allows us to detect these behaviors by using fine-grained execution traces and to visualize them as self-reference graphs. Finally, we assess the performance and efficiency of the tool by running it on a large corpus of malware samples
Lemay, Frédérick. "Instrumentation optimisée de code pour prévenir l'exécution de code malicieux." Thesis, Université Laval, 2012. http://www.theses.ulaval.ca/2012/29030/29030.pdf.
Повний текст джерелаKhoury, Raphaël. "Détection du code malicieux : système de type à effets et instrumentation du code." Thesis, Université Laval, 2005. http://www.theses.ulaval.ca/2005/23250/23250.pdf.
Повний текст джерелаThe purpose of this thesis is twofold. In the first place it presents a comparative study of the advantages and drawbacks of several approaches to insure software safety and security. It then focuses more particularly on combining static analyses and dynamic monitoring in order to produce a more powerful security architecture. The first chapters of the thesis present an analytical review of the various static, dynamic and hybrid approaches that can be used to secure a potentially malicious code. The advantages and drawbacks of each approach are thereby analyzed and the field of security properties that can be enforced by using it are identified. The thesis then focuses on the possibility of combining static and dynamic analysis through a new hybrid approach. This approach consists in a code instrumentation, that only alters those parts of a program where it is necessary to do so to insure the respect of a user-defined security policy expressed in a set of modal μ-calculus properties. this instrumentation is guided by a static analysis based on a type and effect system. The effects represent the accesses made to pretested system ressources.
Книги з теми "Analyse des logiciels malveillants"
Inc, ebrary, ed. Malware analyst's cookbook and dvd: Tools and techniques for fighting malicious code. Indianapolis, Ind: Wiley Pub., Inc, 2011.
Знайти повний текст джерелаHerman, Jacques. Analyse de données qualitatives. Paris: Masson, 1986.
Знайти повний текст джерелаBowden, Mark. Worm: The first digital world war. New York: Grove, 2013.
Знайти повний текст джерелаCarle, André. Analyse coûts-bénéfices de la méthode d'inventaire d'intervention en forêt feuillue: Projet no. 4066. Québec, Qué: Service d'extension en foresterie de l'Est-du-Québec, 1996.
Знайти повний текст джерелаVallet, Gilles. Techniques de planification de projets. 2nd ed. Paris: Dunod, 1996.
Знайти повний текст джерелаCarricano, Manu. Analyse de donne es avec SPSS. Paris: Pearson Education France, 2008.
Знайти повний текст джерелаPlaksin, Anna Viktoria Katrin. Modelle zur computergestützten Analyse von Überlieferungen der Mensuralmusik: Empirische Textforschung im Kontext phylogenetischer Verfahren. Münster]: WWU Münster, 2021.
Знайти повний текст джерелаGröhn, Andreas. Netzwerkeffekte und Wettbewerbspolitik: Eine ökonomische Analyse des Softwaremarktes. Tübingen: Mohr Siebeck, 1999.
Знайти повний текст джерелаMerrien, Jean-Louis. Analyse numérique avec Matlab: Rappels de cours, méthodes, exercices et problèmes avec corrigés détaillés. Paris: Dunod, 2007.
Знайти повний текст джерелаChris, Phillips. Computational numerical methods. Chichester [West Sussex]: Ellis Horwood, 1986.
Знайти повний текст джерелаЧастини книг з теми "Analyse des logiciels malveillants"
Lebraty, Jean-Fabrice, Katia Lobre-Lebraty, and Stéphane Trébucq. "Chapitre 16. Logiciels et analyse de données qualitatives." In Les méthodes de recherche du DBA, 283. EMS Editions, 2018. http://dx.doi.org/10.3917/ems.cheva.2018.01.0283.
Повний текст джерелаТези доповідей конференцій з теми "Analyse des logiciels malveillants"
Moïse, Alexandre. "Analyse des logiciels d'application spécialisée pour le courtage en épargne collective." In the 18th international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1132736.1132754.
Повний текст джерелаЗвіти організацій з теми "Analyse des logiciels malveillants"
Nédellec, Claire, Adeline Nazarenko, Francis André, Catherine Balivo, Béatrice Daille, Anastasia Drouot, Jorge Flores, et al. Recommandations sur l’analyse automatique de documents : acquisition, gestion, exploration. Ministère de l'enseignement supérieur et de la recherche, September 2019. http://dx.doi.org/10.52949/10.
Повний текст джерела