1. Menguy, G., Bardin, S., Lazaar, N., & Gotlieb, A. (2023, August). Active Disjunctive Constraint Acquisition. In Proceedings of the International Conference on Principles of Knowledge Representation and Reasoning (Vol. 19, No. 1, pp. 512-520).
  2. Vincent Raulin, Pierre-François Gimenez, Yufei Han, Valérie Viet Triem Tong. BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports. SECRYPT 2023 – 20th International conference on security and cryptography, Jul 2023, Rome, Italy. pp.1-8. ⟨hal-04102144⟩
  3. Ruggia, Antonio, et al. « Android, Notify Me When It Is Time To Go Phishing. » EUROS&P 2023, 8th IEEE European Symposium on Security and Privacy. 2023.
  4. Aonzo, S., Han, Y., Mantovani, A., & Balzarotti, D. (2023). Humans vs. machines in malware classification. Proc. of USENIX-23.
  5. Benoit, T., Marion, J. Y., & Bardin, S. Scalable program clone search through spectral analysis, Accepté à ESEC/FSE 2023.


  1. Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti. Humans vs. Machines in Malware Classification. 2022. 〈hal 03839818〉
  2. Ludovic Robin, Corentin Jannier, Jean-Yves Marion. Incremental clustering of malware packers using features based on transformed CFG. 2022. 〈hal-03940881v2〉
  3. Tomás Concepción Miranda, Pierre-Francois Gimenez, Jean-François Lalande, Valérie
    Viet Triem Tong, Pierre Wilke. Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?. IEEE Transactions on Information Forensics and Security, 2022, 17, pp.2182-2197. 〈10.1109/tifs.2022.3180184〉. 〈hal-03700082〉
  4. Tayssir Touili and Xin Ye : Reachability Analysis of Self Modifying Code. International Journal of Foundations of Computer Science. 2023.
  5. Tayssir Touili, Xin Ye : LTL model-checking for Self-modifying code. Formal Methods in System Design. 2023.
  6. Khanh-Huu-The Dam, Tayssir Touili: Extracting malicious behaviours. Int. J. Inf. Comput. Secur. 17(3/4): 365-404

Les commentaires sont clos.