Jean-Yves Marion
Last known affiliation: LORIA
Bio: Jean-Yves Marion got a Ph.D. in Computer Science from Paris 7 University in 1991. He had a Post Doctoral Research position at Indiana University in 1992 and in 1993. From 1995 to 2002, he was Assistant Professor (maître de conférences) at Nancy 2 University (IUT Charlemagne in the computer science dept). He obtained an Habilitation à Diriger les Recherches in 2000. Since 2002, he is full professor at the Ecole Nationale Supérieure des Mines de Nancy (ENSMN). He is one of the co-founders of High Security Lab (LHS).
Ludovic Robin 🗣 | Corentin Jannier 🗣 | Jean-Yves Marion 🗣
Abstract (click to view)
Packer detection is an important topic because most malware is packed and this allows it to avoid detection based on static analysis. Identifying classes of packers is the key to effective detection because it makes it easier to determine from a static analysis whether further analysis is needed or whether a decision is already possible. Thus in this work we propose new features to cluster packers from their unpacking function. This method makes it possible to effectively cluster packers, and is able, by clustering, to identify packer classes used by malware. It is a step towards a larger data clustering allowing to identify custom packers.
Thanh Dinh Ta 🗣 | Jean-Yves Marion 🗣 | Guillaume Bonfante 🗣
Abstract (click to view)
One of the issues of a malware detection service is to update its database. For that, an analysis of new samples must be performed. Usually, one tries to replay the behavior of malware in a safe environment. But, a bot sample may activate a malicious function only if it receives some particular input from its command and control server. The game is to find inputs which activate all relevant branches in a bot binary in order to retrieve its malicious behaviors. From a larger viewpoint, this problem is an aggregation of the program exploration and the message format extraction problem, both of them captures many active researches. This is a work in progress in which we try a new approach to code coverage relying on input tainting.
Pierre Marty 🗣 | Romain Guittienne 🗣 | Quentin Jacqmin | Jean-Yves Marion | Fabrice Sabatier
Abstract (click to view)
We introduce GoaTracer, a hybrid dynamic binary analysis platform combining instrumentation and introspection to efficiently reconstruct Control Flow Graphs and Call Graphs of Windows Portable Executable files. GoaTracer minimizes execution slowdowns, tracks obfuscated and self-modifying code, and bypasses anti-analysis measures, offering a comprehensive view of malware behavior.
