Reinforced Autonomous Agents with Attack-Defense Exercises in Realistic Environments

The current trend is towards automation inside a security operations center (SOC), in particular on the remediation side […]
Netspot: a simple Intrusion Detection System with statistical learning

Persistent Threats (APT) since only pre-registered and well-characterized attacks can be catched. Some recent systems use unsupervised ML algorithms […]
BEEZH : une plateforme de détonation réaliste pour l’analyse des modes opératoires d’attaquants

Cet article expose la mise en oeuvre du leurrage dans un but de renseignement sur les attaquants (outils et méthodes).
C&ESAR 2018 / Intelligent Thresholding

The current trend is towards automation inside a security operations center (SOC), in particular on the remediation side […]
Are your data gathered? The Folding Test of Unimodality

Understanding data distributions is one of the most fundamentalresearch topic in data analysis. The literature provides a great dealof powerful statistical learning algorithms […]
KDD 2017: Anomaly Detection in Streams with Extreme Value Theory

Anomaly detection in time series has attracted considerable attention due to its importance in many real-world applications including intrusion detection, energy management and finance […]
Confusion de Type en C++ : État de l’Art et Difficultés de Détection

Le langage C++ s’est imposé comme une référence dans les domaines où la modularité du développement ne doit pas empiéter sur les performances du logiciel final […]
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing

Verification of software security properties, when conducted at the binary code level, is a difficult and cumbersome task. This paper is focused on […]
Confusion de type en C++ : la performance au détriment de la « type safety »

Depuis le début du premier semestre 2016, six CVE permettant l’exécution de code arbitraire ont été déposées. Ces CVE ont toutes en commun l’exploitation d’une vulnérabilité encore peu considérée la confusion de type […]
ASIACCS15 / Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism

Softwares use cryptographic algorithms to secure their communications and to protect their internal data. However the algorithm choice, its implementation design […]