A hint of existing information systems analysis

Similar documents
Problems and Measures Regarding Waste 1 Management and 3R Era of public health improvement Situation subsequent to the Meiji Restoration

Master Specialization in Knowledge Engineering

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, Sample not collected

Software Architecture


MAQAO Performance Analysis and Optimization Tool

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

CS 6371: Advanced Programming Languages

3 SOFTWARE AND PROGRAMMING LANGUAGES

Analysis of Data Mining Concepts in Higher Education with Needs to Najran University

Bachelor of Technology (Computer Engineering.) Scheme of Courses/Examination. (3 rd SEMESTER) 1 HUT-211 Organizational Behaviour

Minor in ii INFORMATION SECURITY i at ESIEA Laval, France

The Eighth International Conference INCOSE_IL Formal Methods Security Tools in the Service of Cyber Security

B) Using Processor-Cache Affinity Information in Shared Memory Multiprocessor Scheduling

The CompCert verified C compiler

THE TRANSITION GAME "WHAT IT IS AND HOW TO TEACH IT" PRESENTED BY TIM TAYLOR FOR MASS. DISTRICT USA HOCKEY COACHES CLINIC

Programming Languages

Evaluation of speech technologies

Progress Report to ONR on MURI Project Building Interactive Formal Digital Libraries of Algorithmic Mathematics

Customer Service. Training Manual Corporate Training Materials

Start up licenses high performance traffic analysis engine from Exploit Technologies

Developing SAP Enterprise Cloud Computing Strategy

Department of Commerce National Institute of Standards and Technology (NIST)

Tech Presentation 2016

The Enterprise Semantic Reference Framework

2933A: Developing Business Process and Integration Solutions Using Microsoft BizTalk Server 2006

App: HomeBound 1.1 ( Device: Samsung GT-S5302 Android 2.3.6

Certificate in Cyber Security

Certification Programs

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE

SIPAC. Signals and Data Identification, Processing, Analysis, and Classification

Guidelines on Allowable Project Costs

MS in Computer Sciences MS in Software Engineering

Mission Statement. Program Overview. PhD Program in Microbiology & Immunology (MIM)

Cold Calling College A Four-Part Teleclass

DOCTORAL WORKSHOP PHD ON THE GO. «Study and Analysis of the olive oil process: Quality and Traceability»

Major Work of the Grade

B2B Social Media Marketing Social s Means Business

Spreadsheet Programming:

Senior Information Technology Systems Analyst

The Agency for Public Intangibles of France accompanies public sector actors in developing value from intangibles

"BIG DATA A PROLIFIC USE OF INFORMATION"

Implementing a Microsoft SQL Server 2005 Database

Department of Information Systems and Cyber Security

WorkJam Media Kit. Company Overview: Executive Bios

An Automated Workflow System Geared Towards Consumer Goods and Services Companies

Module: Software Instruction Scheduling Part I

Media for Equity: the newest VC concept from Europe. Elena Bocharova for Berliner Börsenkreis 30 June, 2015

Pacman 3D. Suggestions Multiple levels Powerups that let Pacman chase and eat Ghosts; ghosts need to respawn

Management School. MSc/PG Dip/PG Cert. MSc Business and Management. University of Stirling Management School

CYBER SECURITY Audit, Test & Compliance

Curriculum Vitae. May 10, 1975 (Born in Alexandria, Egypt)

Full and Para Virtualization

Scalable End-User Access to Big Data HELLENIC REPUBLIC National and Kapodistrian University of Athens

Cradlepoint unleashes LTE-A modems for enterprise networking, SD WANs

Ann-Charlotte TEGLBORG Department: Entrepreneurship and Innovation

HYDRONIC DESIGNER / INSTALLER MODULE DESCRIPTIONS

Design and Implementation of an Open Ended Automated Vault Security System

White Paper. Data Mining for Business

Common Criteria For Information Technology Security Evaluation

Master of Science Service Oriented Architecture for Enterprise. Courses description

Nemea: Searching for Botnet Footprints

Spécication et analyse formelle des politiques de sécurité dans le cloud computing

Adversary Modelling 1

THE BEST HR SOLUTIONS FOR YOUR BUSINESS

Enterprise Software Development Services

Complexity problems over algebraic structures

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Efficient Program Exploration by Input Fuzzing

Compilers. Introduction to Compilers. Lecture 1. Spring term. Mick O Donnell: michael.odonnell@uam.es Alfonso Ortega: alfonso.ortega@uam.

Change Management. Why Change Management? CHAPTER

A Change Impact Analysis Tool for Software Development Phase

Reviving smart card analysis

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Transcription:

systems analysis 2nd year PhD Student at Co-Founder of Master SCCI 10th Birthday, 12th September 2011

1A + 2A Engineering studies 3A Master SCCI Doctorate in virology Startup company in IS reengineering Existing

One particular interest for existing systems analysis : Handling complex, very informative, human-related systems No documentation From a practical point of view, standard methods & tools do not suce. Two activities: Fundamental research in computer virology Co-founding of a startup company,, specialized in system reengineering.

INRIA Nancy - Grand Est, Team CARTE A study of the ambiguous nature of software (particularly malware), because of: Implementation language (assembler x86) Mass, execution context dependency Self-modication/self-organization (capability of a program to modify/reorganize itself at execution) Programming tricks (security aw exploits, deep system features, designer experience). Ideally, we want to recover from binary les (e.g. compiled programs) a control ow graph (also called owchart) upon which we base malware detection.

Basic rules The player moves foward and collects objects. The only possible solution (execution trace): Rule #1 Control flow graph 0

Doors Two possible solutions: Door: when the player has the key, he must pass the door. Otherwise, he goes in the opposite direction. Door direct branching Rule #2 Control flow graph 0 With key Without key

More sophisticated rules? Teleporter: the player moves to a cell depending on the objects he has collected. Teleporter indirect branching Rule #3 Control flow graph 0... L Rule #4 Trap: makes some walls move, depending on the objects he has collected. 0... Trap self-modification......

Managing what is unexpected Rule #0 What if objects were appearing/disappearing through time?

Emerging startup company founded by Patrice (20 years engineering & reengineering experience) and in Nancy. Laureate of Entreprendre 2011 in emergence category. uses internal software/document reengineering and applied software engineering methodologies to provide an enlightenment to its client. Personal contribution: R&D management. KW: High Tech - Professionalism - Performance Comprendre pour mieux construire

Materials What kind of system? Hardware, software, human resources, industrial process Any organized set which regroup, classify, compute and broadcast on a given environment. What tools? An ontological schema: a schema that classies and gives semantics to by the mean of objects and relations between objects (implemented in Workshop). Automatic shape recognition (implemented as a module of Workshop). Research-oriented languages (Lisp, Prolog, OCaml, F#), compiler compilers, nite state automata.

Ontological schema: example

(in French)

To conclude One passion, two activities. Cryptography & reengineering: dierent goals but same spirit (reengineering system cryptanalysis). Master SCCI: excellent culture of scientic research, system administration and security business.

Questions Thank you for your attention. Questions? Contact: stephane.wloka@inria.fr