11.11.2014 Views

Veille Technologique Sécurité - cert devoteam

Veille Technologique Sécurité - cert devoteam

Veille Technologique Sécurité - cert devoteam

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

OCTOBRE 2009<br />

PE-Probe: leveraging packer detection to detect malicious portable executables<br />

I can't go back to yesterday, because I was a different person then<br />

Tales from cloud nine<br />

Detecting malicious documents with combined static and dynamic analysis<br />

A fractal approach to social network spam detection<br />

Reputation: a new chapter in malware protection<br />

Firefox malware - when browsers attack<br />

Présentations de la dernière minute<br />

Brazil: land of plentiful bankers<br />

iPhone v3 malware vector<br />

The real face of Koobface<br />

Twarfing: malicious tweets<br />

WebStalker: detection of malicious pages through monitoring web browser behaviour<br />

Connecting the AV industry<br />

Autres présentations<br />

You can teach a new user old tricks ... old users learn too<br />

Fragmented distribution attack<br />

POUR PLUS D’INFORMATION<br />

http://www.virusbtn.com/conference/vb2009/slides/index<br />

Mudassar Farooq<br />

Chun Feng<br />

Mihai Chiriac<br />

Carsten Willems<br />

A. Catalin Cosoi<br />

Vijay Seshadri<br />

C.Wüest, E.Florio<br />

Dmitry Bestuzhev<br />

Marius van Oers<br />

Ivan Macalintal<br />

C.Raiu, M.Swimmer<br />

Minseong Kim<br />

Igor Muttik<br />

Randy Abrams<br />

Anoirel Issa<br />

RAID2009<br />

Le 12 ième International Symposium on Recent Advances in Intrusion<br />

Detection – RAID – a eu lieu les 23, 24 et 25 septembre à St Malo.<br />

Les actes de cette conférence sont disponibles en ligne.<br />

Anomaly and Specification-Based Approaches<br />

Fighting Malware<br />

Opening talk<br />

Opening talk<br />

Panacea: Automating Attack Classification for Anomaly-based NIDS<br />

Protecting a Moving Target: Addressing Web Application Concept Drift<br />

Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating<br />

Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems<br />

Malware Detection and Prevention<br />

Malware Behavioral Detection by Attribute-Automata using Abstraction<br />

Automatic Generation of String Signatures for Malware Detection<br />

PE-miner: Mining Structural Information to Detect Malicious Executables in Real-Time<br />

Toward Revealing Kernel Malware Behavior in Virtual Execution Environments<br />

Exploiting Temporal Persistence to Detect Covert Botnet Channels<br />

Network and Host Intrusion Detection and Prevention<br />

Automatically Adapting a Trained Anomaly Detector to Software Patches<br />

Towards Generating High Coverage Vulnerability-based Signatures<br />

Automated Behavioral Fingerprinting<br />

Intrusion Detection for Mobile Devices<br />

SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection<br />

Keystroke-based User Identification on Smart Phones<br />

VirusMeter: Preventing Your Cellphone from Spies<br />

When Science Meets Security<br />

High-performance Intrusion Detection<br />

Regular Expression Matching on Graphics Hardware for Intrusion Detection<br />

Multi-Byte Regular Expression Matching with Speculation<br />

POUR PLUS D’INFORMATION<br />

http://www.rennes.supelec.fr/RAID2009/program.html<br />

Luis Corron<br />

Ludovic Mé<br />

Engin Kirda<br />

D.Bolzoni & all<br />

F.Maggi & all<br />

G.Cretu-Ciocarlie<br />

M.Rehak & all<br />

H.Debar & all<br />

S.Schneider<br />

Z.Shafiq & all<br />

C.Xuan & all<br />

J.Chandrashekar<br />

P.Li & all<br />

J.Caballero & all<br />

J.François<br />

Guanhua Yan & all<br />

S.Zahid<br />

L.Liu & all<br />

R.Maxion<br />

G.Vasiliadis & all<br />

D.Luchaup & all<br />

HITB2009<br />

Les actes de la conférence technique HITBSec2009 – Hack In The Box - qui s’est<br />

tenue du 5 au 8 octobre à Kuala Lumpur, Malaisie, ont été mis en ligne.<br />

Nous recommandons à ceux qui ne l’auraient pas déjà lue la présentation intitulée ‘Defeating Software<br />

Protection with Metasm’. Celle-ci détaille les spécificités de l’excellent désassembleur (et plus encore)<br />

METASM, un très sérieux concurrent du fabuleux outil IDA, du moins dans le domaine de l’analyse des<br />

<strong>Veille</strong> <strong>Technologique</strong> Sécurité N°135 Page 22/35<br />

© DEVOTEAM - Tous droits réservés Diffusion restreinte aux clients abonnés au service de veille technologique

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!