

{"id":599,"date":"2023-03-31T12:16:45","date_gmt":"2023-03-31T10:16:45","guid":{"rendered":"https:\/\/pepr-defmal.loria.fr\/?page_id=599"},"modified":"2025-04-28T11:09:14","modified_gmt":"2025-04-28T09:09:14","slug":"publications","status":"publish","type":"page","link":"https:\/\/pepr-defmal.loria.fr\/fr\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pepr-defmal.loria.fr\/files\/2023\/04\/hal_logo-seul-rvb_fond-clair-1024x498.png\" alt=\"\" class=\"wp-image-1024\" width=\"227\" height=\"110\" srcset=\"https:\/\/pepr-defmal.loria.fr\/files\/2023\/04\/hal_logo-seul-rvb_fond-clair-1024x498.png 1024w, https:\/\/pepr-defmal.loria.fr\/files\/2023\/04\/hal_logo-seul-rvb_fond-clair-300x146.png 300w, https:\/\/pepr-defmal.loria.fr\/files\/2023\/04\/hal_logo-seul-rvb_fond-clair-768x374.png 768w, https:\/\/pepr-defmal.loria.fr\/files\/2023\/04\/hal_logo-seul-rvb_fond-clair-150x73.png 150w, https:\/\/pepr-defmal.loria.fr\/files\/2023\/04\/hal_logo-seul-rvb_fond-clair-250x122.png 250w, https:\/\/pepr-defmal.loria.fr\/files\/2023\/04\/hal_logo-seul-rvb_fond-clair.png 1081w\" sizes=\"auto, (max-width: 227px) 100vw, 227px\" \/><\/figure><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">2023<\/h4>\n\n\n\n<ol class=\"wp-block-list\"><li> Menguy, G., Bardin, S., Lazaar, N., &amp; Gotlieb, A. (2023, August). Active Disjunctive Constraint Acquisition. In <em>Proceedings of the International Conference on Principles of Knowledge Representation and Reasoning<\/em> (Vol. 19, No. 1, pp. 512-520). <\/li><li> Vincent Raulin, Pierre-Fran\u00e7ois Gimenez, Yufei Han, Val\u00e9rie Viet Triem  Tong. BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic  Analysis Reports. <em>SECRYPT 2023 &#8211; 20th International conference on security and cryptography<\/em>, Jul 2023, Rome, Italy. pp.1-8. <a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/hal.science\/hal-04102144\">\u27e8hal-04102144\u27e9<\/a><\/li><li> Ruggia, Antonio, et al. \u00ab\u00a0Android, Notify Me When It Is Time To Go Phishing.\u00a0\u00bb <em>EUROS&amp;P 2023, 8th IEEE European Symposium on Security and Privacy<\/em>. 2023. <\/li><li>Aonzo, S., Han, Y., Mantovani, A., &amp; Balzarotti, D. (2023). Humans vs. machines in malware classification. <em>Proc. of USENIX-23<\/em>. <\/li><li>Benoit, T., Marion, J. Y., &amp; Bardin, S. Scalable program clone search through spectral analysis, Accept\u00e9 \u00e0 ESEC\/FSE 2023. <\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\">2022<\/h4>\n\n\n\n<ol class=\"wp-block-list\"><li>Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti. Humans vs. Machines in Malware Classification. 2022. \u3008hal 03839818\u3009 <\/li><li>Ludovic Robin, Corentin Jannier, Jean-Yves Marion. Incremental clustering of malware packers using features based on transformed CFG. 2022. \u2329hal-03940881v2\u232a<\/li><li>Tom\u00e1s Concepci\u00f3n Miranda, Pierre-Francois Gimenez, Jean-Fran\u00e7ois Lalande, Val\u00e9rie<br> Viet Triem Tong, Pierre Wilke. Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?. IEEE Transactions on Information Forensics and Security, 2022, 17, pp.2182-2197. \u232910.1109\/tifs.2022.3180184\u232a. \u2329hal-03700082\u232a<\/li><li>Tayssir Touili and Xin Ye : Reachability Analysis of Self Modifying Code. International Journal of Foundations of Computer Science. 2023. https:\/\/doi.org\/10.1142\/S0129054122500290<\/li><li>Tayssir Touili, Xin Ye : LTL model-checking for Self-modifying code. Formal Methods in System Design. 2023. https:\/\/doi.org\/10.1007\/s10703-022-00394-8<\/li><li>Khanh-Huu-The Dam, Tayssir Touili: Extracting malicious behaviours. Int. J. Inf. Comput. Secur. 17(3\/4): 365-404 <\/li><\/ol>","protected":false},"excerpt":{"rendered":"<p>2023 Menguy, G., Bardin, S., Lazaar, N., &amp; Gotlieb, A. (2023, August). Active Disjunctive Constraint Acquisition. In Proceedings of the International Conference on Principles of Knowledge Representation and Reasoning (Vol. 19, No. 1, pp. 512-520). Vincent Raulin, Pierre-Fran\u00e7ois Gimenez, Yufei Han, Val\u00e9rie Viet Triem Tong. BAGUETTE: Hunting for Evidence of\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/pepr-defmal.loria.fr\/fr\/publications\/\"><span>en savoir+<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":1990,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-599","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/pages\/599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/users\/1990"}],"replies":[{"embeddable":true,"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/comments?post=599"}],"version-history":[{"count":21,"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/pages\/599\/revisions"}],"predecessor-version":[{"id":2088,"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/pages\/599\/revisions\/2088"}],"wp:attachment":[{"href":"https:\/\/pepr-defmal.loria.fr\/fr\/wp-json\/wp\/v2\/media?parent=599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}