This page contains the publications, reports, posters and presentations made about the Kharon project. Some of these documents are only available in french.
Conferences
- CominLabs Kharon project - final report
- SECRYPT 2017: V. Viet Triem Tong, A. Trulla, M. Leslous, and J.-F. Lalande, Information flows at OS level unmask sophisticated Android malware in 14th International Conference on Security and Cryptography, 2017, vol. 6, pp. 578–585.
- RESSI18 2018: J.-F. Lalande, V. Viet Triem Tong, V. Viet, and T. Tong, Le projet CominLabs Kharon: aidons les malwares à s’exécuter in Rendez-Vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information, 2018.
- ERCIM News 2016: J.-F. Lalande and V. Viet Triem Tong, Challenges in Android Malware Analysis
- LASER 2016: N.Kiss, J.-F. Lalande, M.Leslous and V. Viet Triem Tong. Kharon dataset: Android malware under a microscope. Learning from Authoritative Security Experiment Results (LASER) workshop co-located with the 37th IEEE Symposium on Security and Privacy (S&P), San Jose, May 2016.
- MALCON 2015: A. Abraham, R. Andriatsimandefitra, A. Brunelat, J.-F. Lalande, and V. Viet Triem Tong. GroddDroid: a Gorilla for Triggering Malicious Behaviors. 10th International Conference on Malicious and Unwanted Software, Puerto Rico, nov 2015. (best paper award, Slides of the presentation, Demo video)
- CSCloud 2015: R. Andriatsimandefitra and V. Viet Triem Tong. Detection and Identification of Android Malware Based on Information Flow Monitoring. 2nd IEEE International Conference on Cyber Security and Cloud Computing, New York, USA, nov 2015.
- RESSI 2015: slideshow on Kharon project presented at Les Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information.
Posters in conferences
- SP 2016: Poster: Using Implicit Calls to Improve Malware Dynamic Execution at the 37th IEEE Symposium on Security and Privacy (S&P), San Jose, May 2016.
- DIMVA 2015: Poster at 12th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Milano, Italy, July 2015.
Tutorials
- Tutorial at Cyber in Bretagne, july 2016: Android malware reverse engineering
- Lab at Université of Orléans, november 2016: Android malware reverse engineering
- Tutorial at CISSI 2016, december 2016: Reverse of Android malware
Master thesis reports (French)
- Internship report by Etienne Charron, Loic Cloatre, Marc Menu and Guillaume Savy Reverse of Zagruski, Minecraft Malware, VideoPlayer, Mazar BOT, AndroRAT, Kemoge.
- Master thesis report by Adrien Abraham (2015) Automatic Malware Triggering.
Slideshows
- Presentation to the International Forum on CyberSecurity (FIC) by Valérie Viet Triem Tong & Jean François Lalande (January 2016) GroddDroid and ElseGazebo.
- Presentation to the High Security Laboratory by Valérie Viet Triem Tong (February 2016) Malware Triggering and Monitoring.
Workflow of development
The workflow is represented here