Matthieu Kaczmarek
École nationale supérieure des mines de Nancy
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Matthieu Kaczmarek.
Journal in Computer Virology | 2009
Guillaume Bonfante; Matthieu Kaczmarek; Jean-Yves Marion
Most of malware detectors are based on syntactic signatures that identify known malicious programs. Up to now this architecture has been sufficiently efficient to overcome most of malware attacks. Nevertheless, the complexity of malicious codes still increase. As a result the time required to reverse engineer malicious programs and to forge new signatures is increasingly longer. This study proposes an efficient construction of a morphological malware detector, that is a detector which associates syntactic and semantic analysis. It aims at facilitating the task of malware analysts providing some abstraction on the signature representation which is based on control flow graphs. We build an efficient signature matching engine over tree automata techniques. Moreover we describe a generic graph rewriting engine in order to deal with classic mutations techniques. Finally, we provide a preliminary evaluation of the strategy detection carrying out experiments on a malware collection.
Journal in Computer Virology | 2006
Guillaume Bonfante; Matthieu Kaczmarek; Jean-Yves Marion
We are concerned with theoretical aspects of computer viruses. For this, we suggest a new definition of viruses which is clearly based on the iteration theorem and above all on Kleenes recursion theorem. We in this study capture in a natural way previous definitions, and in particular the one of Adleman. We establish generic virus constructions and we illustrate them by various examples. Lastly, we show the results on virus detection.
international conference on malicious and unwanted software | 2008
Guillaume Bonfante; Matthieu Kaczmarek; Jean-Yves Marion
In the field of malware detection, method based on syntactical consideration are usually efficient. However, they are strongly vulnerable to obfuscation techniques. This study proposes an efficient construction of a morphological malware detector based on a syntactic and a semantic analysis, technically on control flow graphs of programs (CFG). Our construction employs tree automata techniques to provide an efficient representation of the CFG database. Next, we deal with classic obfuscation of programs by mutation using a generic graph rewriting engine. Finally, we carry out experiments to evaluate the false-positive ratio of the proposed methods.
conference on computability in europe | 2007
Guillaume Bonfante; Matthieu Kaczmarek; Jean-Yves Marion
We study computer virology from an abstract point of view. Viruses and worms are self-replicating programs, whose constructions are essentially based on Kleenes second recursion theorem. We show that we can classify viruses as solutions of fixed point equations which are obtained from different versions of Kleenes second recursion theorem. This lead us to consider four classes of viruses which various polymorphic features. We propose to use virus distribution in order to deal with mutations. Topics covered.Computability theoretic aspects of programs, computer virology.
international colloquium on theoretical aspects of computing | 2005
Guillaume Bonfante; Matthieu Kaczmarek; Jean-Yves Marion
We are concerned with theoretical aspects of computer viruses. For this, we suggest a new definition of viruses which is clearly based on the iteration theorem and above all on Kleene’s recursion theorem. We show that we capture in a natural way previous definitions, and in particular the one of Adleman. We establish generic constructions in order to construct viruses, and we illustrate them by various examples. We discuss the relationship between information theory and viruses and we propose a defense against a kind of viral propagation. Lastly, we show that virus detection is Π2-complete. However, since we are able to deal with system vulnerability, we exhibit another defense based on controlling system access.
International Workshop on the Theory of Computer Viruses | 2007
Guillaume Bonfante; Matthieu Kaczmarek; Jean-Yves Marion
CSET'10 Proceedings of the 3rd international conference on Cyber security experimentation and test | 2010
Joan Calvet; Carlton R. Davis; José M. Fernandez; Wadie Guizani; Matthieu Kaczmarek; Jean-Yves Marion; Pier-Luc St-Onge
Inter-Regional Workshop on Rigorous System Development and Analysis 2007 | 2007
Guillaume Bonfante; Matthieu Kaczmarek; Jean-Yves Marion
EICAR | 2008
Guillaume Bonfante; Matthieu Kaczmarek; Jean-Yves Marion
Third Workshop on Applied Semantics - APPSEM'05 | 2005
Guillaume Bonfante; Matthieu Kaczmarek; Jean-Yves Marion
Collaboration
Dive into the Matthieu Kaczmarek's collaboration.
French Institute for Research in Computer Science and Automation
View shared research outputs