Zum Hauptinhalt springen

Showing 1–3 of 3 results for author: Tong, V V T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.02585  [pdf, other

    cs.CR

    CVE representation to build attack positions graphs

    Authors: Manuel Poisson, Valérie Viet Triem Tong, Gilles Guette, Frédéric Guihéry, Damien Crémilleux

    Abstract: In cybersecurity, CVEs (Common Vulnerabilities and Exposures) are publicly disclosed hardware or software vulnerabilities. These vulnerabilities are documented and listed in the NVD database maintained by the NIST. Knowledge of the CVEs impacting an information system provides a measure of its level of security. This article points out that these vulnerabilities should be described in greater deta… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

    Journal ref: CyberHunt 2023, Workshop on Cyber Threat Intelligence and Hunting, IEEE BigData, Dec 2023, Sorrento, Italy. pp.1-5

  2. arXiv:2303.17373  [pdf, other

    cs.CR

    URSID: Using formalism to Refine attack Scenarios for vulnerable Infrastructure Deployment

    Authors: Pierre-Victor Besson, Valérie Viet Triem Tong, Gilles Guette, Guillaume Piolle, Erwan Abgrall

    Abstract: In this paper we propose a novel way of deploying vulnerable architectures for defense and research purposes, which aims to generate deception platforms based on the formal description of a scenario. An attack scenario is described by an attack graph in which transitions are labeled by ATT&CK techniques or procedures. The state of the attacker is modeled as a set of secrets he acquires and a set o… ▽ More

    Submitted 30 March, 2023; originally announced March 2023.

    Comments: 13 pages, 9 figures

  3. Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures

    Authors: Cédric Herzog, Valérie Viet Triem Tong, Pierre Wilke, Arnaud van Straaten, Jean-Louis Lanet

    Abstract: The perpetual opposition between antiviruses and malware leads both parties to evolve continuously. On the one hand, antiviruses put in place solutions that are more and more sophisticated and propose more complex detection techniques in addition to the classic signature analysis. This sophistication leads antiviruses to leave more traces of their presence on the machine they protect. To remain un… ▽ More

    Submitted 25 September, 2020; originally announced September 2020.

    Journal ref: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.302-309