{"id":1544,"date":"2018-04-22T18:06:14","date_gmt":"2018-04-22T18:06:14","guid":{"rendered":"http:\/\/fehmijaafar.net\/?p=1544"},"modified":"2018-07-03T18:15:19","modified_gmt":"2018-07-03T18:15:19","slug":"icons-2018","status":"publish","type":"post","link":"https:\/\/fehmijaafar.net\/fr\/2018\/04\/22\/icons-2018\/","title":{"rendered":"IC\u00d4NES 2018"},"content":{"rendered":"<p><a href=\"http:\/\/crim.ca\/en\/researchers-directory\/fehmi-jaafar\" target=\"_blank\" rel=\"noopener\">Fehmi Jaafar.<\/a>, Ph.D., chercheur en cybers\u00e9curit\u00e9 au CRIM, pr\u00e9sentera le document\u00a0<strong>&#8220;<em>Experimental Analysis of Behavior of Crypto Ransomware&#8221;<\/em><\/strong>\u00a0lors de la 13e Conf\u00e9rence internationale sur les syst\u00e8mes (ICONS 2018). Il fera \u00e9galement partie du panel sur les r\u00e9seaux et les syst\u00e8mes, le lundi 23 avril \u00e0 15h45.<\/p>\n<p>\nCrypto-ransomware est une famille de logiciels malveillants couramment utilis\u00e9s qui exploitent les vuln\u00e9rabilit\u00e9s logicielles des serveurs accessibles sur Internet, des ordinateurs des utilisateurs finaux et des appareils mobiles. Dans cet article, le comportement du crypto-ransomware est analys\u00e9 exp\u00e9rimentalement. L'analyse dynamique du ransomware a \u00e9t\u00e9 r\u00e9alis\u00e9e dans un environnement virtuel en utilisant une approche de mod\u00e9lisation de flux de donn\u00e9es. La modification des valeurs de registre et des fonctions d'appel syst\u00e8me par le logiciel malveillant relevait de la port\u00e9e de l'analyse. Les r\u00e9sultats de l'\u00e9tude exp\u00e9rimentale fournissent un certain nombre d'indicateurs qui peuvent \u00eatre consid\u00e9r\u00e9s lors de l'\u00e9valuation de l'efficacit\u00e9 des solutions con\u00e7ues pour pr\u00e9venir et d\u00e9tecter les crypto-ran\u00e7ongiciels.<\/p>","protected":false},"excerpt":{"rendered":"<p>Fehmi Jaafar, Ph.D., researcher in cybersecurity at CRIM, will present\u00a0 the paper\u00a0&#8220;Experimental Analysis of Behavior of Crypto Ransomware&#8221;\u00a0at the 13th International Conference on Systems (ICONS 2018). He will also be part of the panel on Networking and Systems, Monday, April 23, 15:45. Crypto-ransomware is a family of one of the commonly seen malware that exploits [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/posts\/1544"}],"collection":[{"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/comments?post=1544"}],"version-history":[{"count":0,"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/posts\/1544\/revisions"}],"wp:attachment":[{"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/media?parent=1544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/categories?post=1544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fehmijaafar.net\/fr\/wp-json\/wp\/v2\/tags?post=1544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}