SSTIC 2014 June 4, 2014 to June 6, 2014, Rennes, France

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening conference (title pending) Travis Goodspeed Invited lecture. The link "full article" points to the third issue of PoC | | ...
Security Analysis of an Active Directory with the BTA tool Philippe Biondi , Joffrey Czarny Most companies, large or small, using Microsoft technologies to work. The Active Directory is at ...
Control paths in Active Directory environment Emmanuel Gras , Lucas Bouillot This paper presents a method for analyzing the security of Active Directory environments based on ...
Episode authentication secrets II: Kerberos against attack Aurélien Bordes This paper has two objectives. The first is to examine some specific Kerberos in Active ...
Security analysis of mobile terminals modems Benoit Michau This article introduces the basic operation of 2G mobile networks, 3G and LTE, as well ...
How to play Hooker: A solution for automated analysis of markets Android Georges Bossert , Dimitri Kirchner Android is now the operating system on most common mobile market, which has made it ...
Digital Forensics & Apple iOS devices - Acquisition of data stored on a closed system data Mathieu Renard Suitable English term "computer forensics", the term "digital investigation" is the use of specialized techniques ...
Catch Me If You Can - A Compilation Of Recent Anti-Malware Analysis In Marion Marschalek Malware versus analyst is an Ongoing war for more than a decade about. In a ...
Short presentation: Analysis Security ADSL box Eric Alata , Yves Deswarte , Jean-christophe Nicomette , Yann Bachy The majority of Internet subscriptions offered by French suppliers include a box allowing the user ...
Short presentation: Security ordivisions Frédéric Basse Exploration Security SmartTV
Short profile: The radio came from the cold Alain Schneider The Norwegian company "Nordic Semiconductor" is a specialist foundry chip radio communications. The family "24 ...
Privilege escalation in a smart card Java Card Guillaume Bouffard , Jean-louis Lanet The smart card is now considered a secure system. However, it is possible, using certain ... IncludeThinkstScapes
Search for vulnerabilities in USB Battery: approaches and tools Fernand Lone Blood , Jordan Bouyat USB is now widely adopted and the interface tends to spread quickly. Indeed, it is ...
Bootkit revisited Samuel Bedside The first proof of concept Bootkit was presented at BlackHat 2005 by Derek Soeder. It ...
Integrity VM hypervisor remote testing and assisted by the hardware Vincent Nicomette , Eric Alata , Morgan Benoit Managers of virtual machines (or VMM) are increasingly used in the computer world today (especially ...
Safety mainframes Stéphane Diacquenod Often at the heart of SI large groups (banking, industry, etc..), The mainframe remains unknown ...
Short presentation: Recognition large-scale network: port scan is not dead Fred Raynal , Adrien Guinet Since networks exist, people look close to their own machine in search of everything and ...
Cryptocoding Jean-Philippe Aumasson Cryptography is difficult to implement correctly; we recently had an example with "Heartbleed" and "goto ...
Buy it, use it, break it ... fix it: Crush Caml, a PKCS # 11 proxy filter Marion Daubignard , Ryad Benadjila , Thomas Calderon Smart cards and cryptographic dedicated resources are valuable tools for enhancing the security of information ...
Martine rides a CERT Nicolas Bareil Although increasingly CERT exist community as a whole, is still quite closed. This presentation hopes ...
Development of an intermediate representation for concolic execution and marking data in Windows Sebastian Lecomte While under GNU / Linux, Valgrind off? Re an intermediate representation of binary code, it ...
Python code obfuscation: improvement of existing technologies Ninon Eyrolles , Serge Guelton Python has experienced a boom over the past decade. To facilitate the deployment or hinder ...
Deobfuscation DRM by auxiliary attacks Francis Gabriel , Camille Mougey This presentation focuses on the analysis of a DRM ("Digital Rights Management") with widespread and ...
Example of strengthening the security of OIV Victor Vuillard Invited lecture
Short presentation: Security dynamic resource management in the cloud: the takeover trigger automatic migrations of virtual machines Haiming Zheng , Jalel Ben-othman , Kahina Lazri , Sylvie Laniepce New vulnerabilities related to the sharing of resources appear with multi-tenant cloud infrastructure. In this ...
Short profile: RpcView: an exploration and decompiling tool MS RPC Jean-marie Girardin , Jeremy , Julien Boutet , Yoanne RpcView is an exploration tool for MS RPC, able to list all local interfaces on ...
Short profile: Haka: a network and security-oriented language Kevin Denis , Mehdi Talbi , Paul Fariello , Pierre Sylvain Desse We propose in this paper a framework for defining and applying security policies on network ...