PhD position - Automatic Extraction of TTPs from a Program's Binary Code
Position Details (PhD Program)
Context
Today, the detection of malicious programs is performed by neural models, supplementing syntactic rules such as Yara. While this approach works well for a fairly wide range of threats, the pressure and offensive capabilities are such that scientific advances are needed to break through the glass ceiling of current malware defenses.
Subject
ProblemStatement
This PhD topic falls within the general theme of fighting malware, and more specifically in the field of binary code analysis of obfuscated programs, with a direct but potential application to the detection of suspicious behavior.
Most of the time, only the binary code of malicious programs, such as ransomware, on Windows/ Linux/MacOS is accessible. This code must be analyzed to understand the intentions of the final payload of the attack. This tedious and time-consuming task is carried out by reverse engineering experts. A triage is performed beforehand by trying to associate a malicious program with a known family in order to reduce the number of analyses. The result is a list of tactics, techniques, and procedures (TTPs) that are implemented in the malware, which will subsequently feed Cyber Threat Intelligence (CTI).
Objective
TheobjectiveofthisPhDistoextractTTPsfromthebinarycodeofamaliciousprogram.
In the context of the DefMal project, this PhD contributes both to work on reverse engineering and on detection. The proposed approach is to start with dynamic analysis to extract the control flow graph and the function call graph, as well as various information, in particular system register modifications, thread creations, and information on communications with the Command & Control C2.
The LORIA part (Carbone team) of the DefMal project has provided a dynamic analysis service that will supply all this information. Then, we will use heuristics for feature identification. This work will require enhancing approaches through various means, notably by dynamic symbolic analysis or generative AI.
ResearchQuestions
- Givenaprogram’sbinarycode,howcanweidentifyapatterncorrespondingtoaprocedure
- Howcanwedefineatechnique,thenatactic,fromaproceduregraph
- HowcanweconcludefromtheextractionofTTPsthataprogram’sbehaviorispotentially malicious?
Expected Results
The results will be published in the best possible conferences. Some parts of the work should be applicable quite quickly, and prototypes will be developed and validated incrementally as scientific advances are made. The tool may also be presented at more technical conferences such as SSTIC, BotConf, or BlackHat. The final prototype is intended to be a component in the DefMal analysis platform, enriching the TTPs associated with malware and the resulting CTI.
Organization and Support
AweeklymeetingisorganizedviavideoconferencewiththePhDstudent,andmeetingswith the whole team are held every two weeks.
This position will be assigned to a restricted area (ZRR) at Loria in Nancy. The PhD student will benefit from the team’s expertise and will be able to interact and collaborate with the team’s engineers and post-docs. The PhD student will have access to the High Security Laboratory (LHS). Finally, the laboratory offers a stimulating scientific environment with numerous seminars and a PhD student association.
Application
- ThePhDpositioncanstartanytimefromnow,andlatestinJune2026-theapplication deadline is set for March 2026.
- Toapply,pleasecontactJean-YvesMarion([emailprotected])andDylanMarinho ([emailprotected]).