Valérie Viêt Triêm Tông
YOU?
Author Swipe
View article: Towards Automated Botnet Threat Intelligence with Knowledge-Guided Large Language Models
Towards Automated Botnet Threat Intelligence with Knowledge-Guided Large Language Models Open
International audience
View article: Enhancing security and privacy in educational environments: A secure grade distribution scheme with Moodle integration
Enhancing security and privacy in educational environments: A secure grade distribution scheme with Moodle integration Open
In today’s digital education landscape, safeguarding the privacy and security of educational data, particularly the distribution of grades, is paramount. This research presents the “secure grade distribution scheme (SGDS)”, a comprehensive…
View article: SCWAD: Automated Pentesting of Web Applications
SCWAD: Automated Pentesting of Web Applications Open
International audience
View article: CERBERE: Cybersecurity Exercise for Red and Blue team Entertainment, REproducibility
CERBERE: Cybersecurity Exercise for Red and Blue team Entertainment, REproducibility Open
International audience
View article: CVE representation to build attack positions graphs
CVE representation to build attack positions graphs Open
In cybersecurity, CVEs (Common Vulnerabilities and Exposures) are publicly disclosed hardware or software vulnerabilities. These vulnerabilities are documented and listed in the NVD database maintained by the NIST. Knowledge of the CVEs im…
View article: Unveiling Stealth Attack Paths in Windows Environments Using AWARE
Unveiling Stealth Attack Paths in Windows Environments Using AWARE Open
International audience
View article: URSID: Using formalism to Refine attack Scenarios for vulnerable Infrastructure Deployment
URSID: Using formalism to Refine attack Scenarios for vulnerable Infrastructure Deployment Open
In this paper we propose a novel way of deploying vulnerable architectures for defense and research purposes, which aims to generate deception platforms based on the formal description of a scenario. An attack scenario is described by an a…
View article: <i>OATs’inside</i> : Retrieving Object Behaviors From Native-based Obfuscated Android Applications
<i>OATs’inside</i> : Retrieving Object Behaviors From Native-based Obfuscated Android Applications Open
Analyzing Android applications is essential to review proprietary code and to understand malware behaviors. However, Android applications use obfuscation techniques to slow down this process. These obfuscation techniques are increasingly b…
View article: BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports
BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports Open
International audience
View article: PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns
PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns Open
International audience
View article: Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?
Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased? Open
International audience
View article: GUI-Mimic, a cross-platform recorder and fuzzer of Graphical User Interface
GUI-Mimic, a cross-platform recorder and fuzzer of Graphical User Interface Open
International audience
View article: Preventing Serialization Vulnerabilities through Transient Field Detection
Preventing Serialization Vulnerabilities through Transient Field Detection Open
International audience
View article: From TTP to IoC: Advanced Persistent Graphs for Threat Hunting
From TTP to IoC: Advanced Persistent Graphs for Threat Hunting Open
International audience
View article: Abusing Android Runtime for Application Obfuscation
Abusing Android Runtime for Application Obfuscation Open
International audience
View article: Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures
Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures Open
The perpetual opposition between antiviruses and malware leads both parties\nto evolve continuously. On the one hand, antiviruses put in place solutions\nthat are more and more sophisticated and propose more complex detection\ntechniques i…
View article: Modeling the Operational Phases of APT Campaigns
Modeling the Operational Phases of APT Campaigns Open
International audience
View article: Obfuscated Android Application Development
Obfuscated Android Application Development Open
International audience
View article: SEER4US, Secured Energy Efficient Routing for UAV Swarms
SEER4US, Secured Energy Efficient Routing for UAV Swarms Open
International audience
View article: Isolating malicious code in Android malware in the wild
Isolating malicious code in Android malware in the wild Open
International audience
View article: Teaching Android Mobile Security
Teaching Android Mobile Security Open
International audience
View article: Information Flows at OS Level Unmask Sophisticated Android Malware
Information Flows at OS Level Unmask Sophisticated Android Malware Open
International audience
View article: TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking
TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking Open
International audience
View article: Challenges in Android Malware Analysis
Challenges in Android Malware Analysis Open
International audience
View article: Kharon dataset: Android malware under a microscope
Kharon dataset: Android malware under a microscope Open
International audience
View article: Using Implicit Calls to Improve Malware Dynamic Execution
Using Implicit Calls to Improve Malware Dynamic Execution Open
The number of Android malware has been increasing for the last 5 years. These malware use more often evasion techniques to hide their malicious intent and avoid analysis tools. In this work, we focus on triggering the most suspicious parts…