• Cyber-Detect
    Face cyberattacks
    with the morphological analysis©
  • Cyber-Detect
    Morphological analysis©
    Morphological analysis© is a breakthrough technology for binary code analysis
    It is the result of many years of research in LORIA, a research institute in Nancy, France.
    It is a fast and scalable solution to find similarities between different software.
  • Products
    & services
    Thanks to its skills in cybersecurity and software development,
    Cyber-Detect offers software and related services for cybersecurity experts, institutions and large companies
Cyber-Detect : a LORIA spinoff for

innovative solutions in cyberdefense

Morphological analysis© is a breakthrough technology for binary code analysis. It is the result of many years of research in LORIA, a research institute in Nancy, France. It is a fast and scalable solution to find similarities between different software.




Some of our secrets in

binary code analysis

In order to achieve meaningful results, we strived towards a high level of semantics using Control Flow Graphs. After applying some graph rewriting rules to normalise them, we tackled the subgraph search problem in a both efficient and convenient way for that perticular kind of graphs.

Considered from algorithm's complexity and on computational models, malicious software are interesting in that they push cybersecurity tools to their limits by placing them in worst-case scenario. For these steps to succeed, some pitfalls needed to be considered...


Learn more

A fullset of

Products & Services

Thanks to its skills in cybersecurity and software development, Cyber-Detect offers software and related services for cybersecurity experts, institutions and large companies.




Cyber-Detect Expert

Solution for binary code analysis.
 

Expertise

Benefit from our knowledge of cybersecurity,
especially in malware analysis.

Custom software development

Outsource this task while keeping trust
in the produced code’s security.

Training

Take your skills to the next level to face ever
increasing stakes in cybersecurity.