Publications

. How Triton can help to reverse virtual machine based software protections. How Triton can help to reverse virtual machine based software protections, 2016.

Project Slides

. Dynamic Binary Analysis and Obfuscated Codes. Dynamic Binary Analysis and Obfuscated Codes, 2016.

Project Slides

. How Triton may help to analyse obfuscated binaries. How Triton may help to analyse obfuscated binaries, 2015.

PDF

On how we used LIEF to lift an Android x86_64 library to Linux to perform our usual white-box attacks on it.

READ

This post explains how to use Frida gadget on a non-rooted device.

READ

This post explains how to use LIEF to transform an ELF executable into a library

READ

This blog post introduces new features of LIEF as well as some uses cases.

READ

We are open-sourcing LIEF, a library to parse and manipulate ELF, PE and Mach-O binary formats. This blog post explains the purpose of this project and some parts of its architecture.

READ

Projects

Android Dump log

Android dumplog enables to filter logs based on package name and

LIEF

LIEF is a Library to Instrument Executable Formats

Work Experience

Security Researcher at QuarksLab

Since September 2015

My research topics are mostly:

  • Code obfuscation
  • Reverse engineering
  • Android
  • Software protections (Packing…)

Trainer on Android which aims to give keys to analyze Android applications as well as their interactions with the system.

This training covers the following topics:

  • Malware analysis
  • Android Runtime and file formats (DEX, ART, OAT, ODEX, VDEX, ELF)
  • IPC and Binder
  • Boot process
  • Securities (dm-verity, SELinux, …)
  • Protections (Obfuscation, packer, anti-debug, …)

See: https://quarkslab.com/en/trainings/#android-applications


Internship at QuarksLab

from April 2015 to July 2015

During this internship, I worked on a compiler code obfuscator

  • I used LLVM compiler infrastructure.
  • I developed a code coverage tool based on Trtion
  • I studied the Obfuscator-LLVM security with Triton

Internship at QuarksLab

from July 2014 to August 2014

During my internship, I studied the JTAG and how to discover its ports. I used various devices like router, 4G Internet key.

  • I developed a JTAG testing tool – Available my GitHub page.
  • I used the Bus Blaster and the JTAGulator with the openOCD library.

Internship at ATACAMA Compagny

August 2013 to November 2013

I developed the company’s website by using Model–view–controller architecture.

  • PHP5
  • MySQL
  • JQuery