GORILLE

Morphological Analysis at the heart of corporate IT security

Traditional malware detection engines most often use signature recognition techniques such as YARA rules.

This is no longer sufficient as malware is now able to self-modify quickly and easily, breaking the signatures used to detect it. 

To remedy this cyber security flaw, we have developed a unique technique: morphological analysis.

Our solution analyzes statically and dynamically the binary code of applications to guarantee the IT security of companies.

What is the added value of morphological analysis?

IcĂ´ne

Saves time for the teams because it limits false positives/negatives

IcĂ´ne

A more accurate analysis because it is dynamic and composed of hybrid algorithms

IcĂ´ne

Easy connection with other protection tools

IcĂ´ne

A concrete solution to operating losses


The functioning of the morphological analysis

Morphological analysis qualifies the detected malicious behavior. This ability improves the IT security of companies by identifying increasingly sophisticated, unknown or obfuscated attacks.

Morphological analysis combines artificial intelligence, which assimilates new threats and functions, with reverse-engineering techniques essential for disassembly and de-obfuscation.

This innovation, also coupled with formal methods tools, offers a singular and unequalled precision on executables without requiring a learning phase.

How to detect new variants?

Morphological analysis disassembles and analyzes the binary code through a control flow graph. By performing a dynamic analysis, we are able to apply transformations, reductions and slicing of the binary to determine its nature. We can then estimate the percentage of similarity with a previously detected malware and detect its variants.