

{"id":1789,"date":"2024-07-08T15:23:20","date_gmt":"2024-07-08T13:23:20","guid":{"rendered":"https:\/\/pepr-defmal.loria.fr\/?page_id=1789"},"modified":"2025-10-01T12:01:03","modified_gmt":"2025-10-01T10:01:03","slug":"deliverables","status":"publish","type":"page","link":"https:\/\/pepr-defmal.loria.fr\/en\/deliverables\/","title":{"rendered":"Deliverables"},"content":{"rendered":"<p style=\"text-align:center\"><strong> WP0   &#8211; Project management<\/strong><\/p>\n\n\n\n<table class=\"wp-block-table is-style-regular\"><tbody><tr><td><strong>ID<\/strong><\/td><td><strong>Title<\/strong><\/td><td> <br><strong>Publication date<\/strong><br><\/td><td> <strong>Supervisor <\/strong><\/td><\/tr><tr><td>EA1<\/td><td><a href=\"https:\/\/theconversation.com\/rancongiciel-une-plongee-dans-le-monde-de-la-cybercriminalite-215489\">Scientific review<\/a><\/td><td>01\/07\/2023<\/td><td>Universit\u00e9 de Lorraine<br><\/td><\/tr><tr><td>EA2<\/td><td>Scientific review<\/td><td>01\/07\/2024<\/td><td>Universit\u00e9 de Lorraine<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p style=\"text-align:center\"><strong>WP1 &#8211; \u00c9valuation: M\u00e9thodologie et jeux de test (MJT)<\/strong><\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td> ID <\/td><td> Title <\/td><td> <br><strong>Publication date<\/strong><br> <\/td><td> <br> <strong>Supervisor <\/strong> <\/td><\/tr><tr><td>MJT1<\/td><td><a href=\"https:\/\/mwdb.lhs.loria.fr\/\">M\u00e9thodologie et jeux de test pour diff\u00e9rentes architectures<\/a><\/td><td>01\/07\/2023<\/td><td>Universit\u00e9 de Lorraine<br><\/td><\/tr><tr><td>MJT2<\/td><td> M\u00e9thodologie et jeux de test pour diff\u00e9rentes architectures <\/td><td>01\/07\/2025<\/td><td>Universit\u00e9 de Lorraine<\/td><\/tr><tr><td>MJT3<\/td><td> M\u00e9thodologie et jeux de test pour diff\u00e9rentes architectures <\/td><td>01\/07\/2027<\/td><td>Universit\u00e9 de Lorraine<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p style=\"text-align:center\"><strong>WP2 &#8211; Compr\u00e9hension (et aide \u00e0 la r\u00e9tro-ing\u00e9nierie)<\/strong><\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td> <strong>ID<\/strong>  <\/td><td>  <strong>Title  <\/strong><\/td><td> <br><strong>Publication date<\/strong> <\/td><td> <br> <strong>Supervisor <\/strong> <strong> <\/strong><\/td><\/tr><tr><td>L2.1.1<\/td><td><a href=\"https:\/\/baguette.irisa.fr\/\">M\u00e9thode d&#8217;analyse dynamique d&#8217;un programme<\/a><\/td><td>30\/01\/2024<\/td><td>CEA<br><\/td><\/tr><tr><td>L2.1.2<\/td><td>D\u00e9compilation certifi\u00e9e<\/td><td>01\/07\/2026<\/td><td>CEA<\/td><\/tr><tr><td>L2.2.1<\/td><td>Techniques de d\u00e9obfuscation bo\u00eete noire<\/td><td>01\/07\/2026<\/td><td>CEA<\/td><\/tr><tr><td>L2.2.2<\/td><td>Techniques de d\u00e9obfuscation bo\u00eete grise<\/td><td>01\/07\/2027<\/td><td>CEA<\/td><\/tr><tr><td>L2.3.1<\/td><td>Mod\u00e9lisation des \u00e9l\u00e9ments malveillants<\/td><td>01\/07\/2026<\/td><td>CEA<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p style=\"text-align:center\"><strong>WP3 &#8211; D\u00e9tection de malwares<\/strong><\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td><strong>ID<\/strong><\/td><td><strong>Title<\/strong><\/td><td><strong>Publication date<\/strong> <\/td><td><strong>Supervisor<\/strong><\/td><\/tr><tr><td>L3.1.1<\/td><td>Cartographie des fonctions et de leurs relations<\/td><td>01\/01\/2026<\/td><td>CentraleSupelec<\/td><\/tr><tr><td>L3.2.1  <\/td><td>D\u00e9tection de malwares Windows\/Linux<\/td><td>01\/07\/2028<\/td><td>CentraleSupelec <\/td><\/tr><tr><td>L3.2.2  <\/td><td>D\u00e9tection de malwares Android<\/td><td>01\/01\/2028<\/td><td>CentraleSupelec <\/td><\/tr><tr><td>L3.3.1 <\/td><td>Analyse de compromission dans les syst\u00e9mes embarqu\u00e9s<\/td><td>01\/07\/2027<\/td><td>CentraleSupelec <\/td><\/tr><tr><td>L3.3.2  <br><\/td><td>Analyse de compromission dans les COTS<\/td><td>01\/07\/2026<\/td><td>CentraleSupelec  <\/td><\/tr><\/tbody><\/table>\n\n\n\n<p style=\"text-align:center\"><strong>WP4 &#8211; Analyse forensique (et attribution)<\/strong><\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td><strong>ID<\/strong> <\/td><td> <strong>Title<\/strong> <\/td><td><strong>Publication date<\/strong> <\/td><td><strong>Supervisor<\/strong> <\/td><\/tr><tr><td>L4.1.1<\/td><td>Techniques de comparaison de firmwares <\/td><td>01\/07\/2026<\/td><td>EURECOM<\/td><\/tr><tr><td>L4.1.2<\/td><td>Nouvelles techniques d&#8217;analyse d&#8217;OS embarqu\u00e9s<\/td><td>01\/01\/2028<\/td><td>EURECOM<\/td><\/tr><tr><td>L4.2.1<\/td><td>Techniques d&#8217;analyse de la m\u00e9moire<\/td><td>01\/01\/2027<\/td><td>EURECOM<\/td><\/tr><tr><td>L4.2.2<\/td><td>Attribution des traces et composants r\u00e9utilis\u00e9s<\/td><td>01\/07\/2028<\/td><td>EURECOM<\/td><\/tr><tr><td>L4.3.1<\/td><td>Reconnaissance automatique des artefacts \u00e0 collecter<\/td><td>01\/07\/2026<\/td><td>EURECOM<\/td><\/tr><tr><td>L4.3.2<\/td><td>Evaluation de la compromissions d&#8217;un t\u00e9l\u00e9phone<\/td><td>01\/07\/2028<\/td><td>EURECOM<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p style=\"text-align:center\"><strong>WP5 &#8211; \u00c9cosyst\u00e8me de malware<\/strong><\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td><strong>ID<\/strong><\/td><td><strong>Title<\/strong><\/td><td><strong>Publication date<\/strong> <\/td><td><strong>Supervisor<\/strong><\/td><\/tr><tr><td>L5.1.1<\/td><td>Cartographie de \u00e9cosyst\u00e8me du malware<\/td><td>01\/01\/2025<\/td><td>Universit\u00e9 de Lorraine<\/td><\/tr><tr><td>L5.1.2<\/td><td>D\u00e9finition d&#8217;un corpus: Quelles plateformes d&#8217;\u00e9changes? Quelles langues?<\/td><td>01\/07\/2024<\/td><td>Universit\u00e9 de Lorraine <\/td><\/tr><tr><td>L5.2.2<\/td><td>M\u00e9thode d&#8217;analyse du corpus et de pr\u00e9diction<\/td><td>01\/07\/2026<\/td><td>Universit\u00e9 de Lorraine <\/td><\/tr><\/tbody><\/table>\n\n\n\n<p style=\"text-align:center\"><strong>WP6 &#8211; Plateforme donn\u00e9es et outils<\/strong><\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td><strong>ID<\/strong><\/td><td><strong>Title<\/strong><\/td><td> <strong>Publication date<\/strong> <\/td><td><strong>Supervisor<\/strong><\/td><\/tr><tr><td>R0<\/td><td><a href=\"https:\/\/lhs.loria.fr\/platforms\/malware\/\">Pr\u00e9-release<\/a><\/td><td>01\/07\/2023<\/td><td> Universit\u00e9 de Lorraine <\/td><\/tr><tr><td>R1<\/td><td>Release<\/td><td>01\/04\/2025<\/td><td> Universit\u00e9 de Lorraine <\/td><\/tr><tr><td>R2<\/td><td>Release<\/td><td>01\/01\/2027<\/td><td> Universit\u00e9 de Lorraine <\/td><\/tr><tr><td>R3<\/td><td>Release<\/td><td>01\/07\/2028<\/td><td> Universit\u00e9 de Lorraine <\/td><\/tr><\/tbody><\/table>","protected":false},"excerpt":{"rendered":"<p>WP0 &#8211; Project management ID Title Publication date Supervisor EA1 Scientific review 01\/07\/2023 Universit\u00e9 de Lorraine EA2 Scientific review 01\/07\/2024 Universit\u00e9 de Lorraine WP1 &#8211; \u00c9valuation: M\u00e9thodologie et jeux de test (MJT) ID Title Publication date Supervisor MJT1 M\u00e9thodologie et jeux de test pour diff\u00e9rentes architectures 01\/07\/2023 Universit\u00e9 de Lorraine\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/pepr-defmal.loria.fr\/en\/deliverables\/\"><span>en savoir+<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":1990,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1789","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/pepr-defmal.loria.fr\/en\/wp-json\/wp\/v2\/pages\/1789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pepr-defmal.loria.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pepr-defmal.loria.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pepr-defmal.loria.fr\/en\/wp-json\/wp\/v2\/users\/1990"}],"replies":[{"embeddable":true,"href":"https:\/\/pepr-defmal.loria.fr\/en\/wp-json\/wp\/v2\/comments?post=1789"}],"version-history":[{"count":16,"href":"https:\/\/pepr-defmal.loria.fr\/en\/wp-json\/wp\/v2\/pages\/1789\/revisions"}],"predecessor-version":[{"id":2160,"href":"https:\/\/pepr-defmal.loria.fr\/en\/wp-json\/wp\/v2\/pages\/1789\/revisions\/2160"}],"wp:attachment":[{"href":"https:\/\/pepr-defmal.loria.fr\/en\/wp-json\/wp\/v2\/media?parent=1789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}