1. Aonzo, S., Han, Y., Mantovani, A., & Balzarotti, D. (2023). Humans vs. machines in malware classification. Proc. of USENIX-23.
  2. Menguy, Grégoire, Sébastien Bardin, Arnaud Gotlieb, and Nadjib Lazaar. « Active Disjunctive Constraint Acquisition.«  Accepté KR 2023)
  3. Benoit, T., Marion, J. Y., & Bardin, S. . Scalable program clone search through spectral analysis, Accepté à ESEC/FSE 2023.


  1. Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti. Humans vs. Machines in Malware Classification. 2022. 〈hal 03839818〉
  2. Ludovic Robin, Corentin Jannier, Jean-Yves Marion. Incremental clustering of malware packers using features based on transformed CFG. 2022. 〈hal-03940881v2〉
  3. Tomás Concepción Miranda, Pierre-Francois Gimenez, Jean-François Lalande, Valérie
    Viet Triem Tong, Pierre Wilke. Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?. IEEE Transactions on Information Forensics and Security, 2022, 17, pp.2182-2197. 〈10.1109/tifs.2022.3180184〉. 〈hal-03700082〉
  4. Tayssir Touili and Xin Ye : Reachability Analysis of Self Modifying Code. International Journal of Foundations of Computer Science. 2023.
  5. Tayssir Touili, Xin Ye : LTL model-checking for Self-modifying code. Formal Methods in System Design. 2023.
  6. Khanh-Huu-The Dam, Tayssir Touili: Extracting malicious behaviours. Int. J. Inf. Comput. Secur. 17(3/4): 365-404

Les commentaires sont clos.