Learn More
Behavioral detection differs from appearance detection in that it identifies the actions performed by the malware rather than syntactic markers. Identifying these malicious actions and interpreting their final purpose is a complex reasoning process. This paper draws up a survey of the different reasoning techniques deployed among the behavioral detectors.(More)
This paper presents a generalization of the fast correlation attack presented by Chepyshov, Johansson and Smeets at FSE 2000, for the particular case of filter generators. By considering not only the extremal Walsh coefficients of the filtering function but all the nonzero values in the Walsh spectrum, it is possible to significantly reduce the number of(More)
Behavioural analysis for detection of malware has recently emerged as a new promising set of antiviral techniques: function-based detection is now considered along with sequence-based detection. Most of the antivirus publishers now claim to use behavioral analysis as a marketing argument. But the real impact of these “new” techniques seems to be mitigated(More)
This paper presents a new stream cipher family whose output bits are produced by blocks. We particularly focus on the member of this family producing 128-bit blocks with a 256-bit key. The design is based on a new technique called crossing over which allows to vectorize stream ciphering by using nonlinear shift registers. These algorithms offer a very high(More)