<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Malware on Laboratoire de Haute Sécurité</title>
    <link>https://lhs.inria.fr/tags/malware/index.html</link>
    <description>Recent content in Malware on Laboratoire de Haute Sécurité</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <managingEditor>frederic.beck@inria.fr (Frederic Beck)</managingEditor>
    <webMaster>frederic.beck@inria.fr (Frederic Beck)</webMaster>
    <lastBuildDate>Thu, 06 Jun 2024 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://lhs.inria.fr/tags/malware/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Honeypot Binaries</title>
      <link>https://lhs.inria.fr/datasets/honeypots_binaries/index.html</link>
      <pubDate>Thu, 06 Jun 2024 00:00:00 +0000</pubDate><author>frederic.beck@inria.fr (Frederic Beck)</author>
      <guid>https://lhs.inria.fr/datasets/honeypots_binaries/index.html</guid>
      <description>&lt;link href=&#34;../css/tile.css&#34; rel=&#34;stylesheet&#34;&gt;
&lt;link href=&#34;../../css/tile.css&#34; rel=&#34;stylesheet&#34;&gt;



    
    &lt;span class=&#34;badge cstyle info&#34;&gt;
        &lt;span class=&#34;badge-title&#34;&gt;&lt;i class=&#34;fas fa-tag&#34;&gt;&lt;/i&gt;&lt;/span&gt;
        &lt;span class=&#34;badge-content&#34; style=&#34;background-color: #048B9A;&#34;&gt;&lt;a style=&#34;color:#FFFFFF;&#34; href=&#34;../../tags/internet&#34;&gt;Internet&lt;/a&gt;&lt;/span&gt;
    &lt;/span&gt;

    
    &lt;span class=&#34;badge cstyle info&#34;&gt;
        &lt;span class=&#34;badge-title&#34;&gt;&lt;i class=&#34;fas fa-tag&#34;&gt;&lt;/i&gt;&lt;/span&gt;
        &lt;span class=&#34;badge-content&#34; style=&#34;background-color: #048B9A;&#34;&gt;&lt;a style=&#34;color:#FFFFFF;&#34; href=&#34;../../tags/honeypots&#34;&gt;Honeypots&lt;/a&gt;&lt;/span&gt;
    &lt;/span&gt;

    
    &lt;span class=&#34;badge cstyle info&#34;&gt;
        &lt;span class=&#34;badge-title&#34;&gt;&lt;i class=&#34;fas fa-tag&#34;&gt;&lt;/i&gt;&lt;/span&gt;
        &lt;span class=&#34;badge-content&#34; style=&#34;background-color: #048B9A;&#34;&gt;&lt;a style=&#34;color:#FFFFFF;&#34; href=&#34;../../tags/low-interaction&#34;&gt;Low Interaction&lt;/a&gt;&lt;/span&gt;
    &lt;/span&gt;

    
    &lt;span class=&#34;badge cstyle info&#34;&gt;
        &lt;span class=&#34;badge-title&#34;&gt;&lt;i class=&#34;fas fa-tag&#34;&gt;&lt;/i&gt;&lt;/span&gt;
        &lt;span class=&#34;badge-content&#34; style=&#34;background-color: #048B9A;&#34;&gt;&lt;a style=&#34;color:#FFFFFF;&#34; href=&#34;../../tags/malware&#34;&gt;Malware&lt;/a&gt;&lt;/span&gt;
    &lt;/span&gt;

    
    &lt;span class=&#34;badge cstyle info&#34;&gt;
        &lt;span class=&#34;badge-title&#34;&gt;&lt;i class=&#34;fas fa-tag&#34;&gt;&lt;/i&gt;&lt;/span&gt;
        &lt;span class=&#34;badge-content&#34; style=&#34;background-color: #048B9A;&#34;&gt;&lt;a style=&#34;color:#FFFFFF;&#34; href=&#34;../../tags/binary&#34;&gt;Binary&lt;/a&gt;&lt;/span&gt;
    &lt;/span&gt;


&lt;br&gt;



&lt;h1&gt;Honeypot Binaries&lt;/h1&gt;


    &lt;p&gt;
        Our distributed honeypot platform based on TPot allows us to operate various sensors running up to 20&amp;#43; honeypots each, centralizing the collect traces, logs and binaries in the LHS. The collected data is indexed in realtime in an Elasticsearch cluster.
    &lt;/p&gt;

    &lt;p&gt;
        Probes are placed on various dedicated network connections in the LHS, in the cloud or in our partners networks, thanks to the CyberGenAI joint project with DFKI (Germany) and OMU (Japan).
    &lt;/p&gt;</description>
    </item>
    <item>
      <title>Malwares</title>
      <link>https://lhs.inria.fr/datasets/malwares/index.html</link>
      <pubDate>Thu, 06 Jun 2024 00:00:00 +0000</pubDate><author>frederic.beck@inria.fr (Frederic Beck)</author>
      <guid>https://lhs.inria.fr/datasets/malwares/index.html</guid>
      <description>&lt;link href=&#34;../css/tile.css&#34; rel=&#34;stylesheet&#34;&gt;
&lt;link href=&#34;../../css/tile.css&#34; rel=&#34;stylesheet&#34;&gt;



    
    &lt;span class=&#34;badge cstyle info&#34;&gt;
        &lt;span class=&#34;badge-title&#34;&gt;&lt;i class=&#34;fas fa-tag&#34;&gt;&lt;/i&gt;&lt;/span&gt;
        &lt;span class=&#34;badge-content&#34; style=&#34;background-color: #048B9A;&#34;&gt;&lt;a style=&#34;color:#FFFFFF;&#34; href=&#34;../../tags/malware&#34;&gt;Malware&lt;/a&gt;&lt;/span&gt;
    &lt;/span&gt;

    
    &lt;span class=&#34;badge cstyle info&#34;&gt;
        &lt;span class=&#34;badge-title&#34;&gt;&lt;i class=&#34;fas fa-tag&#34;&gt;&lt;/i&gt;&lt;/span&gt;
        &lt;span class=&#34;badge-content&#34; style=&#34;background-color: #048B9A;&#34;&gt;&lt;a style=&#34;color:#FFFFFF;&#34; href=&#34;../../tags/binary&#34;&gt;Binary&lt;/a&gt;&lt;/span&gt;
    &lt;/span&gt;


&lt;br&gt;



&lt;h1&gt;Malwares&lt;/h1&gt;


    &lt;p&gt;
        Over the year, the researchers of the Carbone team have gathered more than 50M of malicious binaries.
    &lt;/p&gt;

    &lt;p&gt;
        These binaries have been collected via different methods (honeypots, blacklists crawling, exchange), and are currently being packaged and annotated to prepare them for sharing with partners.
    &lt;/p&gt;



&lt;h2&gt;Metadata&lt;/h2&gt;

&lt;table&gt;
    &lt;tbody&gt;
        &lt;tr&gt;
            &lt;th&gt;Dataset name&lt;/th&gt;
            &lt;td&gt;Malwares&lt;/td&gt;
        &lt;/tr&gt;
        &lt;tr&gt;
            &lt;th&gt;Authors&lt;/th&gt;
            &lt;td&gt;
                LHS Nancy, Carbone
            &lt;/td&gt;
        &lt;/tr&gt;
        
        &lt;tr&gt;
            &lt;th&gt;Format&lt;/th&gt;
            &lt;td&gt;
                Binaries
            &lt;/td&gt;
        &lt;/tr&gt;
        
        &lt;tr&gt;
            &lt;th&gt;Licence&lt;/th&gt;
            &lt;td&gt;
                Under NDA, ask us
            &lt;/td&gt;
        &lt;/tr&gt;
        
        &lt;tr&gt;
            &lt;th&gt;Experimentation Platform&lt;/th&gt;
            &lt;td&gt;
                &lt;a style=&#34;color:#FFFFFF;&#34; href=&#34;../../platforms/malware&#34;&gt;malware&lt;/a&gt;
            &lt;/td&gt;
        &lt;/tr&gt;
        
        &lt;tr&gt;
            &lt;th&gt;Production Location&lt;/th&gt;
            &lt;td&gt;
                LHS Nancy
            &lt;/td&gt;
        &lt;/tr&gt;
        
        &lt;tr&gt;
            &lt;th&gt;Production Date&lt;/th&gt;
            &lt;td&gt;
                Since 2008
            &lt;/td&gt;
        &lt;/tr&gt;
        
        &lt;tr&gt;
            &lt;th&gt;Update Frequency&lt;/th&gt;
            &lt;td&gt;
                Daily
            &lt;/td&gt;
        &lt;/tr&gt;
        
        &lt;tr&gt;
            &lt;th&gt;URL&lt;/th&gt;
            &lt;td&gt;
                Coming soon
            &lt;/td&gt;
        &lt;/tr&gt;
        
    &lt;/tbody&gt;
&lt;/table&gt;

&lt;h2&gt;Links&lt;/h2&gt;

&lt;ul&gt;

    &lt;li&gt;
        &lt;a href=&#34;https://www.pepr-cybersecurite.fr/projet/defmal/&#34;&gt;https://www.pepr-cybersecurite.fr/projet/defmal/&lt;/a&gt;
    &lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;Contact&lt;/h2&gt;

&lt;div class=&#34;customTileBox&#34;&gt;
    &lt;a href=&#34;mailto:fabrice.sdabatier@loria.fr&amp;body=&#34;&gt;
        &lt;div class=&#34;customTile emailTile&#34;&gt;
            &lt;i class=&#39;fas fa-paper-plane&#39;&gt;&lt;/i&gt;
            &lt;div&gt;
                &lt;div&gt;
                    Fabrice Sabatier
                &lt;/div&gt;
                &lt;div class=&#34;italic&#34;&gt;
                    fabrice.sdabatier@loria.fr
                &lt;/div&gt;
            &lt;/div&gt;
        &lt;/div&gt;
    &lt;/a&gt;
&lt;/div&gt;</description>
    </item>
    <item>
      <title>Malware Analysis</title>
      <link>https://lhs.inria.fr/platforms/malware/index.html</link>
      <pubDate>Wed, 05 Jun 2024 00:00:00 +0000</pubDate><author>frederic.beck@inria.fr (Frederic Beck)</author>
      <guid>https://lhs.inria.fr/platforms/malware/index.html</guid>
      <description>&lt;link href=&#34;../css/tile.css&#34; rel=&#34;stylesheet&#34;&gt;
&lt;link href=&#34;../../css/tile.css&#34; rel=&#34;stylesheet&#34;&gt;



    
    &lt;span class=&#34;badge cstyle info&#34;&gt;
        &lt;span class=&#34;badge-title&#34;&gt;&lt;i class=&#34;fas fa-tag&#34;&gt;&lt;/i&gt;&lt;/span&gt;
        &lt;span class=&#34;badge-content&#34; style=&#34;background-color: #048B9A;&#34;&gt;&lt;a style=&#34;color:#FFFFFF;&#34; href=&#34;../../tags/malware&#34;&gt;Malware&lt;/a&gt;&lt;/span&gt;
    &lt;/span&gt;

    
    &lt;span class=&#34;badge cstyle info&#34;&gt;
        &lt;span class=&#34;badge-title&#34;&gt;&lt;i class=&#34;fas fa-tag&#34;&gt;&lt;/i&gt;&lt;/span&gt;
        &lt;span class=&#34;badge-content&#34; style=&#34;background-color: #048B9A;&#34;&gt;&lt;a style=&#34;color:#FFFFFF;&#34; href=&#34;../../tags/virus&#34;&gt;Virus&lt;/a&gt;&lt;/span&gt;
    &lt;/span&gt;

    
    &lt;span class=&#34;badge cstyle info&#34;&gt;
        &lt;span class=&#34;badge-title&#34;&gt;&lt;i class=&#34;fas fa-tag&#34;&gt;&lt;/i&gt;&lt;/span&gt;
        &lt;span class=&#34;badge-content&#34; style=&#34;background-color: #048B9A;&#34;&gt;&lt;a style=&#34;color:#FFFFFF;&#34; href=&#34;../../tags/static-analysis&#34;&gt;Static analysis&lt;/a&gt;&lt;/span&gt;
    &lt;/span&gt;

    
    &lt;span class=&#34;badge cstyle info&#34;&gt;
        &lt;span class=&#34;badge-title&#34;&gt;&lt;i class=&#34;fas fa-tag&#34;&gt;&lt;/i&gt;&lt;/span&gt;
        &lt;span class=&#34;badge-content&#34; style=&#34;background-color: #048B9A;&#34;&gt;&lt;a style=&#34;color:#FFFFFF;&#34; href=&#34;../../tags/dynamic-analysis&#34;&gt;Dynamic analysis&lt;/a&gt;&lt;/span&gt;
    &lt;/span&gt;


&lt;br&gt;



&lt;center&gt;
    &lt;div style=&#39;width:500px; margin-bottom:25px; margin-top:25px;&#39;&gt;
        &lt;img class=&#34;resizableImage&#34; src=&#34;../images/malware.jpg&#34; style=&#34;width:&#39;&#39;&#34; alt=&#34;Malware Analysis&#34;/&gt;
    &lt;/div&gt;
&lt;/center&gt;

&lt;h1&gt;Malware analysis&lt;/h1&gt;


    &lt;p&gt;
        Using a dedicated and isolated environment, malwares are analyzed, either statically, or dynamically, with the tools implemented by our researchers.
    &lt;/p&gt;

    &lt;p&gt;
        Novel and state of the art methods and tools are being developed to identify, characterize and categorize malicious code, and produce execution traces.
    &lt;/p&gt;



&lt;h2&gt;Links&lt;/h2&gt;

&lt;ul&gt;

    &lt;li&gt;
        &lt;a href=&#34;https://www.pepr-cybersecurite.fr/projet/defmal/&#34;&gt;https://www.pepr-cybersecurite.fr/projet/defmal/&lt;/a&gt;
    &lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;Contact&lt;/h2&gt;

&lt;div class=&#34;customTileBox&#34;&gt;
    &lt;a href=&#34;mailto:fabrice.sdabatier@loria.fr&amp;body=&#34;&gt;
        &lt;div class=&#34;customTile emailTile&#34;&gt;
            &lt;i class=&#39;fas fa-paper-plane&#39;&gt;&lt;/i&gt;
            &lt;div&gt;
                &lt;div&gt;
                    Fabrice Sabatier
                &lt;/div&gt;
                &lt;div class=&#34;italic&#34;&gt;
                    fabrice.sdabatier@loria.fr
                &lt;/div&gt;
            &lt;/div&gt;
        &lt;/div&gt;
    &lt;/a&gt;
&lt;/div&gt;</description>
    </item>
  </channel>
</rss>