Presented at the SERENE-RISC Workshop, 2017 October Spam detection software can use both handcrafted rules and machine learning techniques. At ZEROSPAM we are aiming at reducing the need to create or edit rules manually to adapt to constantly evolving email-borne threats. At the same time, the performance of our machine learning tools could be improved …
Presented at the SERENE-RISC Workshop – 2016 Spring The cyber-attacks targeting individuals and businesses worldwide continue to grow and wreak havoc. But one particular threat type clearly stands out from everything else we see today or had faced before. The file-encrypting ransomware has taken its victims by storm recently. It’s dominating the current threat landscape …
Presented at the Spring 2016 SERENE-RISC Workshop. Assembly code analysis is one of the critical processes for mitigating the exponentially increasing threats from malicious software. It is also a common practice for detecting and justifying software plagiarism and software patent infringements when the source code is unavailable. However, it is a manually intensive and time-consuming …
Mathieu Lavoie has a B.Eng. from the École de Technologie Supérieure (E.T.S.). He is a pentester and previously worked as a malware researcher at ESET as well as a computer security freelancer. During his free time, Mathieu is an avid participant of CTFs where he developed a deep love-hate relationship with Crypto Challenges or …
Short answer is bad, but for more reasons than first come to mind. Wikileaks recently released a vault of documents allegedly from the CIA relating to their cyber capabilities[1]. This is not the first time that Wikileaks has released fairly targeted documents against an agency in the United States[2][3][4][5]. Wikileaks founder Julian Assange has clear …