A hint of existing information systems analysis
|
|
|
- Piers Lynch
- 9 years ago
- Views:
Transcription
1 systems analysis 2nd year PhD Student at Co-Founder of Master SCCI 10th Birthday, 12th September 2011
2 1A + 2A Engineering studies 3A Master SCCI Doctorate in virology Startup company in IS reengineering Existing
3 One particular interest for existing systems analysis : Handling complex, very informative, human-related systems No documentation From a practical point of view, standard methods & tools do not suce. Two activities: Fundamental research in computer virology Co-founding of a startup company,, specialized in system reengineering.
4
5 INRIA Nancy - Grand Est, Team CARTE A study of the ambiguous nature of software (particularly malware), because of: Implementation language (assembler x86) Mass, execution context dependency Self-modication/self-organization (capability of a program to modify/reorganize itself at execution) Programming tricks (security aw exploits, deep system features, designer experience). Ideally, we want to recover from binary les (e.g. compiled programs) a control ow graph (also called owchart) upon which we base malware detection.
6 Basic rules The player moves foward and collects objects. The only possible solution (execution trace): Rule #1 Control flow graph 0
7 Doors Two possible solutions: Door: when the player has the key, he must pass the door. Otherwise, he goes in the opposite direction. Door direct branching Rule #2 Control flow graph 0 With key Without key
8 More sophisticated rules? Teleporter: the player moves to a cell depending on the objects he has collected. Teleporter indirect branching Rule #3 Control flow graph 0... L Rule #4 Trap: makes some walls move, depending on the objects he has collected Trap self-modification......
9 Managing what is unexpected Rule #0 What if objects were appearing/disappearing through time?
10
11 Emerging startup company founded by Patrice (20 years engineering & reengineering experience) and in Nancy. Laureate of Entreprendre 2011 in emergence category. uses internal software/document reengineering and applied software engineering methodologies to provide an enlightenment to its client. Personal contribution: R&D management. KW: High Tech - Professionalism - Performance Comprendre pour mieux construire
12 Materials What kind of system? Hardware, software, human resources, industrial process Any organized set which regroup, classify, compute and broadcast on a given environment. What tools? An ontological schema: a schema that classies and gives semantics to by the mean of objects and relations between objects (implemented in Workshop). Automatic shape recognition (implemented as a module of Workshop). Research-oriented languages (Lisp, Prolog, OCaml, F#), compiler compilers, nite state automata.
13 Ontological schema: example
14 (in French)
15 To conclude One passion, two activities. Cryptography & reengineering: dierent goals but same spirit (reengineering system cryptanalysis). Master SCCI: excellent culture of scientic research, system administration and security business.
16 Questions Thank you for your attention. Questions? Contact:
Problems and Measures Regarding Waste 1 Management and 3R Era of public health improvement Situation subsequent to the Meiji Restoration
Master Specialization in Knowledge Engineering
Master Specialization in Knowledge Engineering Pavel Kordík, Ph.D. Department of Computer Science Faculty of Information Technology Czech Technical University in Prague Prague, Czech Republic http://www.fit.cvut.cz/en
South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected
At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At
Software Architecture
Cairo University Faculty of Computers and Information Computer Science Department Premasters Studies Software Architecture Report on Software Product Line Submitted to: Dr. Hany Ammar Submitted by: Hadeel
MULTI-AGENT SYSTEM FOR DECENTRALIZED COMPUTER NETWORK MANAGEMENT Krzysztof Cetnarowicz Jaros law Kozlak Institute of Computer Science, AGH - University of Mining and Metallurgy Al. Mickiewicza 30, 30-059
MAQAO Performance Analysis and Optimization Tool
MAQAO Performance Analysis and Optimization Tool Andres S. CHARIF-RUBIAL [email protected] Performance Evaluation Team, University of Versailles S-Q-Y http://www.maqao.org VI-HPS 18 th Grenoble 18/22
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
CS 6371: Advanced Programming Languages
CS 6371: Advanced Programming Languages Dr. Kevin Hamlen Spring 2014 Fill out, sign, and return prereq forms: Course number: CS 6371 Section: 1 Prerequisites: CS 5343: Algorithm Analysis & Data Structures
3 SOFTWARE AND PROGRAMMING LANGUAGES
3 SOFTWARE AND PROGRAMMING LANGUAGES 3.1 INTRODUCTION In the previous lesson we discussed about the different parts and configurations of computer. It has been mentioned that programs or instructions have
Analysis of Data Mining Concepts in Higher Education with Needs to Najran University
590 Analysis of Data Mining Concepts in Higher Education with Needs to Najran University Mohamed Hussain Tawarish 1, Farooqui Waseemuddin 2 Department of Computer Science, Najran Community College. Najran
Bachelor of Technology (Computer Engineering.) Scheme of Courses/Examination. (3 rd SEMESTER) 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2.
Bachelor of Technology (Computer Engineering.) Scheme of s/examination Sl. (3 rd SEMESTER) Teaching Schedule Examination Schedule 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2.5 2 COT-201 Programming
Minor in ii INFORMATION SECURITY i at ESIEA Laval, France
Minor in ii INFORMATION SECURITY i at ESIEA Laval, France Program Strengths Provides a thorough overview of information and network security, from secure programming to risk management within a company.
The Eighth International Conference INCOSE_IL 2015. Formal Methods Security Tools in the Service of Cyber Security
The Eighth International Conference INCOSE_IL 2015 כלים ובדיקות Formal Methods Security Tools in the Service of Cyber Security Dr. Michael J. May Kinneret College on the Sea of Galilee 1 כלים ובדיקות /
B) Using Processor-Cache Affinity Information in Shared Memory Multiprocessor Scheduling
A) Recovery Management in Quicksilver 1) What role does the Transaction manager play in the recovery management? It manages commit coordination by communicating with servers at its own node and with transaction
The CompCert verified C compiler
The CompCert verified C compiler Compiler built and proved by Xavier Leroy et al. Talk given by David Pichardie - Harvard University / INRIA Rennes Slides largely inspired by Xavier Leroy own material
THE TRANSITION GAME "WHAT IT IS AND HOW TO TEACH IT" PRESENTED BY TIM TAYLOR FOR MASS. DISTRICT USA HOCKEY COACHES CLINIC
THE TRANSITION GAME "WHAT IT IS AND HOW TO TEACH IT" PRESENTED BY TIM TAYLOR FOR MASS. DISTRICT USA HOCKEY COACHES CLINIC The Transition Game - What Is It And Row To Teach It. The Dictionary definition:
Programming Languages
Programming Languages Programming languages bridge the gap between people and machines; for that matter, they also bridge the gap among people who would like to share algorithms in a way that immediately
Evaluation of speech technologies
CLARA Training course on evaluation of Human Language Technologies Evaluations and Language resources Distribution Agency November 27, 2012 Evaluation of speaker identification Speech technologies Outline
Progress Report to ONR on MURI Project Building Interactive Formal Digital Libraries of Algorithmic Mathematics
Progress Report to ONR on MURI Project Building Interactive Formal Digital Libraries of Algorithmic Mathematics Robert L. Constable Cornell University February 2003 Project Web Page http://www.cs.cornell.edu/info/projects/nuprl/html/digital
Customer Service. Training Manual Corporate Training Materials
Customer Service Training Manual Corporate Training Materials TABLE OF CONTENTS Module One: Getting Started...4 Pre-Assignment Review... 4 Workshop Objectives... 5 Module Two: Who We Are and What We Do...6
Start up licenses high performance traffic analysis engine from Exploit Technologies
MEDIA RELEASE FOR IMMEDIATE RELEASE Singapore, 10 February 2010 Total: 6 pages (including notes to editor) Start up licenses high performance traffic analysis engine from Exploit Technologies Singapore,
Developing SAP Enterprise Cloud Computing Strategy
White Paper WFT Cloud Technology SAP Cloud Integration Service Provider Developing SAP Enterprise Cloud Computing Strategy SAP Cloud Computing is a significant IT paradigm change with the potential to
Department of Commerce National Institute of Standards and Technology (NIST)
Department of Commerce National Institute of Standards and Technology (NIST) Response to Request for Information on Quantum Information Science and the Needs of U.S. Industry Posted Date: April 8, 2015
Tech Presentation 2016
Tech Presentation 2016 Our Management Team Marvin Igelman CEO Alex Zivkovic CTO David Berman CFO Matt Burns PM and Growth BreakingSports is the world s first fully automated real-time alerts platform for
The Enterprise Semantic Reference Framework
The Enterprise Semantic Reference Framework Simon Polovina Conceptual Structures Research Group Communication and Computing Research Centre Cultural Communication and Computing Research Institute (C3RI)
2933A: Developing Business Process and Integration Solutions Using Microsoft BizTalk Server 2006
www.peaksolutions.com 2933A: Developing Business Process and Integration Solutions Using Microsoft BizTalk Server 2006 Course 2933A: Five days; Instructor-Led Introduction This five-day instructor-led
App: HomeBound 1.1 (https://play.google.com/store/apps/developer?id=zebu+games) Device: Samsung GT-S5302 Android 2.3.6
Contest 12 Task Pick any three mnemonics from http://www.qualityperspectives.ca/resources_mnemonics.html and find at least three bugs for each mnemonic. Feel free to use any application (website/desktop/mobile)
Certificate in Cyber Security
Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff
Certification Programs
Registration Questions? Please contact us directly. 507 S. Grand Ave., Lansing, MI 48933 [email protected] (517) 342-9057 Certification Programs 2015 Following the lecture on day 2, students have the
UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE
UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE SCHOOL OF COMPUTER SCIENCE, CIUDAD REAL Core Subjects (CS) Compulsory Subjects (CPS) Optional
SIPAC. Signals and Data Identification, Processing, Analysis, and Classification
SIPAC Signals and Data Identification, Processing, Analysis, and Classification Framework for Mass Data Processing with Modules for Data Storage, Production and Configuration SIPAC key features SIPAC is
Guidelines on Allowable Project Costs
Guidelines on Allowable Project Costs 2013/2014 LIST OF CONTENTS 1. INTRODUCTION 3 2. BUDGET CATEGORIES 5 2.1 HUMAN RESOURCES 5 2.2 RUNNING COSTS (DIRECT COSTS) 7 2.3 OVERHEADS (INDIRECT COSTS) 8 2.4 CAPEX
MS in Computer Sciences MS in Software Engineering
SUKKUR INSTITUTE OF BUSINESS ADMINISTRATION Merit-Quality-Excellence Schema of Studies for MS in Computer Sciences MS in Software Engineering (2013-2014) DEPARTMENT OF COMPUTER SCIENCE FACULTY OF SCIENCE
Mission Statement. Program Overview. PhD Program in Microbiology & Immunology (MIM)
PhD Program in Microbiology & Immunology (MIM) Mission Statement The aim of the PhD program in Microbiology and Immunology (MIM) is to recruit and train future leaders in different fields of Microbiology
Cold Calling College A Four-Part Teleclass
Cold Calling College A Four-Part Teleclass Part I: Why Your Customer Needs You Presented by Wendy Weiss The Queen of Cold Calling http://www.wendyweiss.com For information (212) 463-8212 [email protected]
DOCTORAL WORKSHOP PHD ON THE GO. «Study and Analysis of the olive oil process: Quality and Traceability»
DOCTORAL WORKSHOP PHD ON THE GO «Study and Analysis of the olive oil process: Quality and Traceability» RESEARCH FIELD: The Food Sector is more and more competitive and the food companies have to qualify
Major Work of the Grade
Counting and Cardinality Know number names and the count sequence. Count to tell the number of objects. Compare numbers. Kindergarten Describe and compare measurable attributes. Classify objects and count
B2B Social Media Marketing Social s Means Business
B2B Social Media Marketing Social s Means Business Elissa Kline May 2011 1 Social media is changing the way companies interact with customers Why Does Social Media fit With B2B Companies? Key Trends: Social
Spreadsheet Programming:
Spreadsheet Programming: The New Paradigm in Rapid Application Development Contact: [email protected] www.knowledgedynamics.com Spreadsheet Programming: The New Paradigm in Rapid Application Development
Senior Information Technology Systems Analyst
Career Service Authority Senior Information Technology Systems Analyst Page 1 of 6 GENERAL STATEMENT OF CLASS DUTIES Performs full performance level professional work analyzing, refining and documenting
The Agency for Public Intangibles of France accompanies public sector actors in developing value from intangibles
The Agency for Public Intangibles of France accompanies public sector actors in developing value from intangibles Public Intangibles and the Role of APIE Public intangibles cover a broad spectrum of assets,
"BIG DATA A PROLIFIC USE OF INFORMATION"
Ojulari Moshood Cameron University - IT4444 Capstone 2013 "BIG DATA A PROLIFIC USE OF INFORMATION" Abstract: The idea of big data is to better use the information generated by individual to remake and
Implementing a Microsoft SQL Server 2005 Database
This class combines two courses into one 5-day class. 2779 (3-day) & 2780 (2-day) Implementing a Microsoft SQL Server 2005 Database Course 2779: Three days; Instructor-Led Introduction This three-day instructor-led
Department of Information Systems and Cyber Security
The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association
WorkJam Media Kit. Company Overview: Executive Bios
WorkJam Media Kit Company Overview: WorkJam is a web and mobile app that runs either stand-alone or integrated with existing workforce management systems to enable better communication with associates,
An Automated Workflow System Geared Towards Consumer Goods and Services Companies
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 An Automated Workflow System Geared Towards Consumer Goods and Services
Module: Software Instruction Scheduling Part I
Module: Software Instruction Scheduling Part I Sudhakar Yalamanchili, Georgia Institute of Technology Reading for this Module Loop Unrolling and Instruction Scheduling Section 2.2 Dependence Analysis Section
Media for Equity: the newest VC concept from Europe. Elena Bocharova for Berliner Börsenkreis 30 June, 2015
Media for Equity: the newest VC concept from Europe Elena Bocharova for Berliner Börsenkreis 30 June, 2015 Outline: get excited How do you finance a company? A brief overview Media for Equity: what do
Pacman 3D. Suggestions Multiple levels Powerups that let Pacman chase and eat Ghosts; ghosts need to respawn
Mario 3D Mario is a classic game featuring a side scrolling 2D Mario character that can jump to avoid moving enemies and collect coins. In this 3D version, you will program a Mario like character to respond
Management School. MSc/PG Dip/PG Cert. MSc Business and Management. University of Stirling Management School
Management School MSc/PG Dip/PG Cert MSc Business and Management University of Stirling Management School I am passionate about helping our students to excel and achieve whatever they wish in their careers.
CYBER SECURITY Audit, Test & Compliance
www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit
Curriculum Vitae. May 10, 1975 (Born in Alexandria, Egypt)
Curriculum Vitae NAME: BIRTH DATE: ADDRESS: Islam Tharwat Elkabani May 10, 1975 (Born in Alexandria, Egypt) Beirut Arab University, Faculty of Science, Department of Mathematics and Computer Science, Beirut,
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens
Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many
Cradlepoint unleashes LTE-A modems for enterprise networking, SD WANs
IMPACT REPORT Cradlepoint unleashes LTE-A modems for enterprise networking, SD WANs APRIL 29 2016 BY JAMES DUFFY Cradlepoint unveiled a Category 6 LTE Advanced (LTE-A) modem for 4G cellular enterprise
Ann-Charlotte TEGLBORG Department: Entrepreneurship and Innovation
Ann-Charlotte TEGLBORG Department: Entrepreneurship and Innovation Biography Ann-Charlotte TEGLBORG hold her Ph.D. in December 2010 at Paris I- Sorbonne (IAE). Her research interest focuses on democratization
HYDRONIC DESIGNER / INSTALLER MODULE DESCRIPTIONS
HYDRONIC DESIGNER / INSTALLER MODULE DESCRIPTIONS PIP301: Blueprint Reading This module covers the basic skills required for interpreting information provided by drawings. These skills are essential in
Design and Implementation of an Open Ended Automated Vault Security System
Design and Implementation of an Open Ended Automated Vault Security System Saunak Mitra Sarit Hati Diganta Sengupta Indraneel Datta Pratim Sinha Roy Soumyanil Banerjee Future Institute of Engineering and
White Paper. Data Mining for Business
White Paper Data Mining for Business January 2010 Contents 1. INTRODUCTION... 3 2. WHY IS DATA MINING IMPORTANT?... 3 FUNDAMENTALS... 3 Example 1...3 Example 2...3 3. OPERATIONAL CONSIDERATIONS... 4 ORGANISATIONAL
Common Criteria For Information Technology Security Evaluation
Security Characterisation and Integrity Assurance for Software Components and Component-Based Systems Jun Han and Yuliang Zheng Peninsula School of Computing and Information Technology Monash University,
Master of Science Service Oriented Architecture for Enterprise. Courses description
Master of Science Service Oriented Architecture for Enterprise Courses description SCADA and PLC networks The course aims to consolidate and transfer of extensive knowledge regarding the architecture,
Nemea: Searching for Botnet Footprints
Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech
Spécication et analyse formelle des politiques de sécurité dans le cloud computing
Spécication et analyse formelle des politiques de sécurité dans le cloud computing Asma GUESMI, Patrice CLEMENTE, Frédéric LOULERGUE, Pascal BERTHOMÉ Laboratoire d'informatique Fondamentale d'orléans (LIFO)
Adversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
THE BEST HR SOLUTIONS FOR YOUR BUSINESS
THE BEST HR SOLUTIONS FOR YOUR BUSINESS WORK SERVICE The largest HR outsourcing company in Central and Eastern Europe Founded In 1999 in Poland Operates In more than 16 countries Present in the Russian
Enterprise Software Development Services
Introduction Business Software is moving from in-house to cloud based solution, where companies can focus on business and ignore IT overhead for managing their business software. MB9 is a pioneer in cloud
Complexity problems over algebraic structures
Complexity problems over algebraic structures Theses of PhD dissertation Created by: Horváth Gábor Mathematical Doctoral School Theor. Mathematical Doctoral Program Dir. of School: Dr. Laczkovich Miklós
Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
Efficient Program Exploration by Input Fuzzing
Efficient Program Exploration by Input Fuzzing towards a new approach in malcious code detection Guillaume Bonfante Jean-Yves Marion Ta Thanh Dinh Université de Lorraine CNRS - INRIA Nancy First Botnet
Compilers. Introduction to Compilers. Lecture 1. Spring term. Mick O Donnell: [email protected] Alfonso Ortega: alfonso.ortega@uam.
Compilers Spring term Mick O Donnell: [email protected] Alfonso Ortega: [email protected] Lecture 1 to Compilers 1 Topic 1: What is a Compiler? 3 What is a Compiler? A compiler is a computer
Change Management. Why Change Management? CHAPTER
Change Management 19 CHAPTER In this chapter, you will Learn why change management is an important enterprise management tool Understand the key concept of segregation of duties Review the essential elements
A Change Impact Analysis Tool for Software Development Phase
, pp. 245-256 http://dx.doi.org/10.14257/ijseia.2015.9.9.21 A Change Impact Analysis Tool for Software Development Phase Sufyan Basri, Nazri Kama, Roslina Ibrahim and Saiful Adli Ismail Advanced Informatics
Reviving smart card analysis
Reviving smart card analysis Christopher Tarnovsky Karsten Nohl [email protected] [email protected] Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
