{"id":228072,"date":"2014-06-10T16:11:04","date_gmt":"2014-06-10T14:11:04","guid":{"rendered":"http:\/\/securite.intrinsec.com\/?p=1531"},"modified":"2014-06-10T16:11:04","modified_gmt":"2014-06-10T14:11:04","slug":"sstic-2014-troisieme-journee","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/sstic-2014-troisieme-journee\/","title":{"rendered":"SSTIC 2014 \u2013 Day Three"},"content":{"rendered":"<p>Here is the report of the third and final day of the SSTIC 2014 edition.<\/p>\n<p>THE <em>social event<\/em> Having been through it myself, this report is a little lighter \ud83d\ude42<\/p>\n<h1>\u00ab&quot;Development of an intermediate representation for concolic execution and data marking under Windows&quot; \u2013 S\u00e9bastien Lecomte<\/h1>\n<p>Introducing FuzzWin, a tool for instrumenting binaries (intercepting system calls, instructions, etc.).<\/p>\n<p>&nbsp;<\/p>\n<h1>\u00ab&quot;Python Code Obfuscation: Improving Existing Techniques&quot; \u2013 Ninon Eyrolles &amp; Serge Guelton<\/h1>\n<p>Introducing Python-pack, a packer that makes Python 2.7 code unreadable (permutation of the instruction set, addition of new opcodes, encryption of constant strings, transformation of if statements into while loops, automatic translation into pseudo-functional code, etc.).<\/p>\n<p>&nbsp;<\/p>\n<h1>\u00ab&quot;DRM Deobfuscation via Side Attacks&quot; \u2013 Camille Mougey &amp; Francis Gabriel<\/h1>\n<p>Introducing pTra (Python TRace Analyser), a tool that facilitates the understanding of a DRM algorithm (constant detection to identify cryptographic algorithms, input\/output analysis, data slicing, etc.).<\/p>\n<p>&nbsp;<\/p>\n<h1>\u00abExample of strengthening the security of a critical infrastructure operator\u00bb \u2013 Victor Vuillard<\/h1>\n<p>Victor Vuillard works at EDF in the nuclear sector. He presented the specific characteristics of his field compared to more &quot;conventional&quot; environments. Mindsets differ: there is a strong focus on safety in the nuclear sector, facilitating the implementation of certain security policies. There are also similarities between the nuclear sector and cybersecurity: concepts of defense in depth, preventative measures, monitoring, and response.<\/p>\n<p>&nbsp;<\/p>\n<h1>Short presentation: &quot;Securing dynamic resource management in the cloud: taking control of triggering automatic virtual machine migrations&quot; \u2013 Haiming Zheng, Jalel Ben-Othman, Kahina Lazri, and Sylvie Laniepce<\/h1>\n<p>The DRS algorithm used by VMware to migrate virtual machines (VMs) has been studied, and an attack has been demonstrated. By abusing the resources consumed by one or more VMs, it is possible to force the migration of that VM(s). This allows for the compromise of resources across an entire cluster (permanent VM migration).<\/p>\n<p>&nbsp;<\/p>\n<h1>Short presentation: &quot;RpcView: a tool for exploring and decompiling MS RPC&quot; \u2013 Jean-Marie Borello, J\u00e9r\u00e9my Bou\u00e9tard, Julien Boutet, and Yoanne Girardin<\/h1>\n<p>Starting from the observation that there is no equivalent to ProcessExplorer or ProcessHacker for RPCs, Jean-Marie Borello, J\u00e9r\u00e9my Bou\u00e9tard, Julien Boutet and Yoanne Girardin developed a tool to decompile RPCs: Rpcview.<\/p>\n<p>&nbsp;<\/p>\n<h1>Short presentation: &quot;Haka: a network and security-oriented language&quot; \u2013 Kevin Denis, Mehdi Talbi, Paul Fariello, and Pierre Sylvain Desse<\/h1>\n<p>Haka is a language for defining security rules and performing protocol dissection. It is designed to be modular and allows for the easy definition of dissectors and filtering rules, as well as the modification or injection of network flows.<\/p>\n<p>&nbsp;<\/p>\n<h1>\u00abMiasm Tutorial\u00bb \u2013 Fabrice Desclaux<\/h1>\n<p>Presentation of the new features added to Miasm since SSTIC 2012 through a demonstration (carried out at a particularly fast pace!).<\/p>","protected":false},"excerpt":{"rendered":"<p>Here is the report of the third and final day of the 2014 SSTIC conference. The [\u2026]<\/p>","protected":false},"author":13,"featured_media":262,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[65],"class_list":["post-228072","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-securite","tag-sstic"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SSTIC 2014 - Troisi\u00e8me journ\u00e9e - INTRINSEC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/sstic-2014-troisieme-journee\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SSTIC 2014 - Troisi\u00e8me journ\u00e9e\" \/>\n<meta property=\"og:description\" content=\"Voici le compte-rendu de la troisi\u00e8me et derni\u00e8re journ\u00e9e de l&rsquo;\u00e9dition du SSTIC 2014. Le [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/sstic-2014-troisieme-journee\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-10T14:11:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/02\/Logo_Isec.DPI_300.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1678\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2014-troisieme-journee\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2014-troisieme-journee\\\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\"},\"headline\":\"SSTIC 2014 &#8211; Troisi\u00e8me journ\u00e9e\",\"datePublished\":\"2014-06-10T14:11:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2014-troisieme-journee\\\/\"},\"wordCount\":573,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2014-troisieme-journee\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Logo_Isec.DPI_300.png\",\"keywords\":[\"SSTIC\"],\"articleSection\":[\"Veille S\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2014-troisieme-journee\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2014-troisieme-journee\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2014-troisieme-journee\\\/\",\"name\":\"SSTIC 2014 - Troisi\u00e8me journ\u00e9e - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2014-troisieme-journee\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2014-troisieme-journee\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Logo_Isec.DPI_300.png\",\"datePublished\":\"2014-06-10T14:11:04+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2014-troisieme-journee\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2014-troisieme-journee\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2014-troisieme-journee\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Logo_Isec.DPI_300.png\",\"contentUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Logo_Isec.DPI_300.png\",\"width\":1678,\"height\":344},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/sstic-2014-troisieme-journee\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SSTIC 2014 &#8211; Troisi\u00e8me journ\u00e9e\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"caption\":\"Admin\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SSTIC 2014 - Day Three - INTRINSEC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/sstic-2014-troisieme-journee\/","og_locale":"en_US","og_type":"article","og_title":"SSTIC 2014 - Troisi\u00e8me journ\u00e9e","og_description":"Voici le compte-rendu de la troisi\u00e8me et derni\u00e8re journ\u00e9e de l&rsquo;\u00e9dition du SSTIC 2014. Le [&hellip;]","og_url":"https:\/\/www.intrinsec.com\/en\/sstic-2014-troisieme-journee\/","og_site_name":"INTRINSEC","article_published_time":"2014-06-10T14:11:04+00:00","og_image":[{"width":1678,"height":344,"url":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/02\/Logo_Isec.DPI_300.png","type":"image\/png"}],"author":"Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/sstic-2014-troisieme-journee\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/sstic-2014-troisieme-journee\/"},"author":{"name":"Admin","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a"},"headline":"SSTIC 2014 &#8211; Troisi\u00e8me journ\u00e9e","datePublished":"2014-06-10T14:11:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/sstic-2014-troisieme-journee\/"},"wordCount":573,"commentCount":0,"image":{"@id":"https:\/\/www.intrinsec.com\/sstic-2014-troisieme-journee\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/02\/Logo_Isec.DPI_300.png","keywords":["SSTIC"],"articleSection":["Veille S\u00e9curit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intrinsec.com\/sstic-2014-troisieme-journee\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/sstic-2014-troisieme-journee\/","url":"https:\/\/www.intrinsec.com\/sstic-2014-troisieme-journee\/","name":"SSTIC 2014 - Day Three - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/sstic-2014-troisieme-journee\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/sstic-2014-troisieme-journee\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/02\/Logo_Isec.DPI_300.png","datePublished":"2014-06-10T14:11:04+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a"},"breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/sstic-2014-troisieme-journee\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/sstic-2014-troisieme-journee\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/sstic-2014-troisieme-journee\/#primaryimage","url":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/02\/Logo_Isec.DPI_300.png","contentUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/02\/Logo_Isec.DPI_300.png","width":1678,"height":344},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/sstic-2014-troisieme-journee\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"SSTIC 2014 &#8211; Troisi\u00e8me journ\u00e9e"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","caption":"Admin"},"url":"https:\/\/www.intrinsec.com\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/228072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=228072"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/228072\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media\/262"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=228072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=228072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=228072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}