

{"id":1789,"date":"2024-07-08T15:23:20","date_gmt":"2024-07-08T13:23:20","guid":{"rendered":"https:\/\/pepr-defmal.loria.fr\/?page_id=1789"},"modified":"2026-04-16T11:03:02","modified_gmt":"2026-04-16T09:03:02","slug":"deliverables","status":"publish","type":"page","link":"https:\/\/pepr-defmal.loria.fr\/fr\/deliverables\/","title":{"rendered":"Livrables"},"content":{"rendered":"<p><strong> WP0   \u2013 Project management<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>ID<\/strong><\/td><td><strong>Title<\/strong><\/td><td> <br><strong>Publication date<\/strong><br><\/td><td> <strong>Supervisor <\/strong><\/td><\/tr><tr><td>EA1<\/td><td><a href=\"https:\/\/theconversation.com\/rancongiciel-une-plongee-dans-le-monde-de-la-cybercriminalite-215489\">Scientific review<\/a><\/td><td>01\/07\/2023<\/td><td>Universit\u00e9 de Lorraine<br><\/td><\/tr><tr><td>EA2<\/td><td><a href=\"https:\/\/cacm.acm.org\/research\/ransomware-extortion-is-my-business\/\">Scientific review<\/a><\/td><td>01\/07\/2024<\/td><td>Universit\u00e9 de Lorraine<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>WP1 \u2013 \u00c9valuation: M\u00e9thodologie et jeux de test (MJT)<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td> ID <\/td><td> Title <\/td><td> <br><strong>Publication date<\/strong><br> <\/td><td> <br> <strong>Supervisor <\/strong> <\/td><\/tr><tr><td>MJT1<\/td><td><a href=\"https:\/\/mwdb.lhs.loria.fr\/\">M\u00e9thodologie et jeux de test pour diff\u00e9rentes architectures<\/a><\/td><td>01\/07\/2023<\/td><td>Universit\u00e9 de Lorraine<br><\/td><\/tr><tr><td>MJT2<\/td><td><a href=\"https:\/\/anr.hal.science\/hal-05224264v1\" data-type=\"link\" data-id=\"https:\/\/anr.hal.science\/hal-05224264v1\"> M\u00e9thodologie et jeux <\/a><a href=\"https:\/\/goatracer.lhs.loria.fr\/\">de test pour diff\u00e9rentes architectures <\/a><\/td><td>01\/07\/2025<\/td><td>Universit\u00e9 de Lorraine <\/td><\/tr><tr><td>MJT3<\/td><td> M\u00e9thodologie et jeux de test pour diff\u00e9rentes architectures <\/td><td>01\/07\/2027<\/td><td>Universit\u00e9 de Lorraine<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>WP2 \u2013 Compr\u00e9hension (et aide \u00e0 la r\u00e9tro-ing\u00e9nierie)<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td> <strong>ID<\/strong>  <\/td><td>  <strong>Title  <\/strong><\/td><td> <br><strong>Publication date<\/strong> <\/td><td> <br> <strong>Supervisor <\/strong> <\/td><\/tr><tr><td>L2.1.1<\/td><td><a href=\"https:\/\/baguette.irisa.fr\/\">M\u00e9thode d\u2019analyse dynamique d\u2019un programme<\/a><\/td><td>30\/01\/2024<\/td><td>CEA<br><\/td><\/tr><tr><td>L2.1.2<\/td><td>D\u00e9compilation certifi\u00e9e<\/td><td>01\/07\/2026<\/td><td>CEA<\/td><\/tr><tr><td>L2.2.1<\/td><td>Techniques de d\u00e9obfuscation bo\u00eete noire<\/td><td>01\/07\/2026<\/td><td>CEA<\/td><\/tr><tr><td>L2.2.2<\/td><td>Techniques de d\u00e9obfuscation bo\u00eete grise<\/td><td>01\/07\/2027<\/td><td>CEA<\/td><\/tr><tr><td>L2.3.1<\/td><td>Mod\u00e9lisation des \u00e9l\u00e9ments malveillants<\/td><td>01\/07\/2026<\/td><td>CEA<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>WP3 \u2013 D\u00e9tection de malwares<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>ID<\/strong><\/td><td><strong>Title<\/strong><\/td><td><strong>Publication date<\/strong> <\/td><td><strong>Supervisor<\/strong><\/td><\/tr><tr><td>L3.1.1<\/td><td><a href=\"https:\/\/gitlab.inria.fr\/vviettri\/livrable-defmal-functions\">Cartographie des fonctions et de leurs relations<\/a><\/td><td>01\/01\/2026<\/td><td>CentraleSupelec<\/td><\/tr><tr><td>L3.2.1  <\/td><td>D\u00e9tection de malwares Windows\/Linux<\/td><td>01\/07\/2028<\/td><td>CentraleSupelec <\/td><\/tr><tr><td>L3.2.2  <\/td><td>D\u00e9tection de malwares Android<\/td><td>01\/01\/2028<\/td><td>CentraleSupelec <\/td><\/tr><tr><td>L3.3.1 <\/td><td>Analyse de compromission dans les syst\u00e8mes embarqu\u00e9s<\/td><td>01\/07\/2027<\/td><td>CentraleSupelec <\/td><\/tr><tr><td>L3.3.2  <br><\/td><td>Analyse de compromission dans les COTS<\/td><td>01\/07\/2026<\/td><td>CentraleSupelec  <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>WP4 \u2013 Analyse forensique (et attribution)<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>ID<\/strong> <\/td><td> <strong>Title<\/strong> <\/td><td><strong>Publication date<\/strong> <\/td><td><strong>Supervisor<\/strong> <\/td><\/tr><tr><td>L4.1.1<\/td><td>Techniques de comparaison de firmwares <\/td><td>01\/07\/2026<\/td><td>EURECOM<\/td><\/tr><tr><td>L4.1.2<\/td><td>Nouvelles techniques d\u2019analyse d\u2019OS embarqu\u00e9s<\/td><td>01\/01\/2028<\/td><td>EURECOM<\/td><\/tr><tr><td>L4.2.1<\/td><td>Techniques d\u2019analyse de la m\u00e9moire<\/td><td>01\/01\/2027<\/td><td>EURECOM<\/td><\/tr><tr><td>L4.2.2<\/td><td>Attribution des traces et composants r\u00e9utilis\u00e9s<\/td><td>01\/07\/2028<\/td><td>EURECOM<\/td><\/tr><tr><td>L4.3.1<\/td><td>Reconnaissance automatique des artefacts \u00e0 collecter<\/td><td>01\/07\/2026<\/td><td>EURECOM<\/td><\/tr><tr><td>L4.3.2<\/td><td>Evaluation de la compromissions d\u2019un t\u00e9l\u00e9phone<\/td><td>01\/07\/2028<\/td><td>EURECOM<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>WP5 \u2013 \u00c9cosyst\u00e8me de malware<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>ID<\/strong><\/td><td><strong>Title<\/strong><\/td><td><strong>Publication date<\/strong> <\/td><td><strong>Supervisor<\/strong><\/td><\/tr><tr><td>L5.1.1<\/td><td><a href=\"https:\/\/cacm.acm.org\/research\/ransomware-extortion-is-my-business\/\" data-type=\"link\" data-id=\"https:\/\/cacm.acm.org\/research\/ransomware-extortion-is-my-business\/\">Cartographie de \u00e9cosyst\u00e8me du malware<\/a><\/td><td>01\/01\/2025<\/td><td>Universit\u00e9 de Lorraine<\/td><\/tr><tr><td>L5.1.2<\/td><td>D\u00e9finition d\u2019un corpus: Quelles plateformes d\u2019\u00e9changes? Quelles langues?<\/td><td>01\/07\/2024<\/td><td>Universit\u00e9 de Lorraine <\/td><\/tr><tr><td>L5.2.2<\/td><td>M\u00e9thode d\u2019analyse du corpus et de pr\u00e9diction<\/td><td>01\/07\/2026<\/td><td>Universit\u00e9 de Lorraine <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>WP6 \u2013 Platform and data<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>ID<\/strong><\/td><td><strong>Title<\/strong><\/td><td><strong>Publication date<\/strong> <\/td><td><strong>Supervisor<\/strong><\/td><\/tr><tr><td>R0<\/td><td><a href=\"https:\/\/mwdb.lhs.loria.fr\/login\">Pr\u00e9-release<\/a><\/td><td>01\/06\/2023<\/td><td>Universit\u00e9 de Lorraine<\/td><\/tr><tr><td>R1<\/td><td><a href=\"https:\/\/goatracer.lhs.loria.fr\/\">Release<\/a><\/td><td>01\/07\/2025<\/td><td>Universit\u00e9 de Lorraine <\/td><\/tr><tr><td>R2<\/td><td>Release<\/td><td>01\/12\/2026<\/td><td>Universit\u00e9 de Lorraine <\/td><\/tr><tr><td>R3<\/td><td>Release<\/td><td>01\/06\/2028<\/td><td>Universit\u00e9 de Lorraine<\/td><\/tr><\/tbody><\/table><\/figure>","protected":false},"excerpt":{"rendered":"<p>WP0 \u2013 Project management ID Title Publication date Supervisor EA1 Scientific review 01\/07\/2023 Universit\u00e9 de Lorraine EA2 Scientific review 01\/07\/2024 Universit\u00e9 de Lorraine WP1 \u2013 \u00c9valuation: M\u00e9thodologie et jeux de test (MJT) ID Title Publication date Supervisor MJT1 M\u00e9thodologie et jeux de test pour diff\u00e9rentes architectures 01\/07\/2023 Universit\u00e9 de Lorraine\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/pepr-defmal.loria.fr\/fr\/deliverables\/\"><span>en savoir+<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":1990,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1789","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/pages\/1789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/users\/1990"}],"replies":[{"embeddable":true,"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/comments?post=1789"}],"version-history":[{"count":17,"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/pages\/1789\/revisions"}],"predecessor-version":[{"id":2212,"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/pages\/1789\/revisions\/2212"}],"wp:attachment":[{"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/media?parent=1789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}