Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
657 results
-
-
Seminar
-
SoSysec
Tackling obfuscated code through variant analysis and Graph Neural Networks
Speaker : Roxane Cohen and Robin David - Quarkslab
Existing deobfuscation techniques usually target specific obfuscation passes and assume a prior knowledge of obfuscated location within a program. Also, some approaches tend to be computationally costly. Conversely, few research consider bypassing obfuscation through correlation of various variants of the same obfuscated program or a clear program and a later obfuscated variant. Both scenarios are[…]-
Malware analysis
-
Binary analysis
-
Obfuscation
-
-
-
Seminar
-
Cryptography
Cryptanalyse différentielle de chiffrements conjugués.
Speaker : Jules Baudrin - UC Louvain
En cryptographie symétrique, le choix d'une (ou de plusieurs) représentation appropriée est un point crucial à la fois dans la recherche d'attaques et dans la conception de nouvelles primitives. En effet, les transformations mises en oeuvre sont souvent représentées commes des ensembles de polynômes univariés ou multivariés et cette pluralité de points de vue est très féconde. Par exemple, l'AES[…] -
-
-
Seminar
-
SoSysec
Cherifying Linux: A Practical View on using CHERI
Speaker : Kui Wang - Huawei
The CHERI ISA extension enables modern RISC CPU architectures such as RISC-V to enforce memory safety in C/C++ programs. Recent academic works use CHERI for point solutions like constructing enclaves, verifying C programs, or hardening bytecode interpreters, but since the original construction of the CHERI-BSD OS - a FreeBSD port leveraging CHERI capabilities, by Cambridge University - little has[…]-
SoSysec
-
Compartmentalization
-
Operating system and virtualization
-
-
-
-
Seminar
-
SoSysec
A Universal Composability analysis of Android Protected Confirmation
Speaker : Maïwenn Racouchot - CISPA
As phones are used for more and more sensitive operations (such as bank transfers for example), there is a great necessity to design and deploy protocols that can ensure the security of such transactions, even in cases when the phone has been compromised. In order to accomplish that, Android in collaboration with Google have worked on a protocol called Android Protected Confirmation. The idea[…]-
SoSysec
-
Formal methods
-
Protocols
-
-
-
Seminar
-
Cryptography
Updatable Encryption from Group Actions
Speaker : Maxime Romeas - ANSSI
Updatable Encryption is a variant of symmetric encryption that allows to rotate the encryption key in the outsourced storage setting while minimizing the bandwith used. Indeed, any third party can update ciphertexts to the new key using a token provided by the key holder. UE schemes aim at providing strong confidentiality guarantees against adversaries that can corrupt keys and tokens. In this[…] -