Eric Filiol

Affiliations:
  • INRIA, France


According to our database1, Eric Filiol authored at least 70 papers between 1997 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes.
J. Comput. Virol. Hacking Tech., 2021

Detection of crawler traps: formalization and implementation - defeating protection on internet and on the TOR network.
J. Comput. Virol. Hacking Tech., 2021

A Method for Automatic Penetration Testing and Mitigation: A <i>Red Hat</i> Approach.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Unconventional Attack against Voting Machines Enlarging the Scope of Cybersecurity Risk Analysis.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
Statistical and combinatorial analysis of the TOR routing protocol: structural weaknesses identified in the TOR network.
J. Comput. Virol. Hacking Tech., 2020

Editorial.
J. Comput. Virol. Hacking Tech., 2020

On distributed ledgers security and illegal uses.
Future Gener. Comput. Syst., 2020

Key-dependent Security of Stream Ciphers.
CoRR, 2020

The Blockchain Potential in Computer Virology.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
BSEA-1 - A Stream Cipher Backdooring Technique.
CoRR, 2019

Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Developing a K-ary malware using Blockchain.
CoRR, 2018

OSINT Analysis of the TOR Foundation.
CoRR, 2018

Developing a Κ-ary malware using blockchain.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

On blockchain security and relevant attacks.
Proceedings of the IEEE Middle East and North Africa Communications Conference, 2018

2017
Structural analysis of binary executable headers for malware detection optimization.
J. Comput. Virol. Hacking Tech., 2017

Optimization of Operational Large-Scale (Cyber) Attacks by a Combinational Approach.
Int. J. Cyber Warf. Terror., 2017

Advances in Security in Computing and Communications.
CoRR, 2017

Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Hacking of the AES with Boolean Functions.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Comparative analysis of blockchain technologies and TOR network: Two faces of the same reality?
Proceedings of the 1st Cyber Security in Networking Conference, 2017

Comparative study of recent MEA malware phylogeny.
Proceedings of the 2nd International Conference on Computer and Communication Systems, 2017

2016
Combinatorial detection of malware by IAT discrimination.
J. Comput. Virol. Hacking Tech., 2016

Proactive defense against malicious documents: formalization, implementation and case studies.
J. Comput. Virol. Hacking Tech., 2016

Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network.
IACR Cryptol. ePrint Arch., 2016

Partition-Based Trapdoor Ciphers.
IACR Cryptol. ePrint Arch., 2016

2015
Dueling hidden Markov models for virus analysis.
J. Comput. Virol. Hacking Tech., 2015

2013
Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
New Trends in Security Evaluation of Bayesian Network-Based Malware Detection Models.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Detecting (and creating !) a HVM rootkit (aka BluePill-like).
J. Comput. Virol., 2011

PERSEUS Technology: New Trends in Information and Communication Security
CoRR, 2011

2010
Viruses and Malware.
Proceedings of the Handbook of Information and Communication Security, 2010

From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques.
J. Comput. Virol., 2010

Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis.
J. Comput. Virol., 2010

Processor-Dependent Malware... and codes
CoRR, 2010

Malicious cryptography techniques for unreversable (malicious or not) binaries
CoRR, 2010

Formalization of Viruses and Malware Through Process Algebras.
Proceedings of the ARES 2010, 2010

2009
Functional polymorphic engines: formalisation, implementation and use cases.
J. Comput. Virol., 2009

Editorial.
J. Comput. Virol., 2009

Editors/translators Foreword.
J. Comput. Virol., 2009

Overview of Turbo-Code Reconstruction Techniques.
IACR Cryptol. ePrint Arch., 2009

Formalization of malware through process calculi
CoRR, 2009

Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions
CoRR, 2009

Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

2008
Malware as interaction machines: a new framework for behavior modelling.
J. Comput. Virol., 2008

Behavioral detection of malware: from a survey towards an established taxonomy.
J. Comput. Virol., 2008

Foreword.
J. Comput. Virol., 2008

2007
Evaluation methodology and theoretical model for antiviral behavioural detection strategies.
J. Comput. Virol., 2007

A statistical model for undecidable viral detection.
J. Comput. Virol., 2007

Foreword.
J. Comput. Virol., 2007

Formalisation and implementation aspects of <i>K</i> -ary (malicious) codes.
J. Comput. Virol., 2007

On the possibility of practically obfuscating programs towards a unified perspective of code protection.
J. Comput. Virol., 2007

Universal Detection of JPEG Steganography.
J. Multim., 2007

2006
Open Problems in Computer Virology.
J. Comput. Virol., 2006

Foreword.
J. Comput. Virol., 2006

Malware Pattern Scanning Schemes Secure Against Black-box Analysis.
J. Comput. Virol., 2006

Foreword.
J. Comput. Virol., 2006

Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption.
IACR Cryptol. ePrint Arch., 2006

New features for JPEG Steganalysis.
IACR Cryptol. ePrint Arch., 2006

Universal JPEG Steganalysis in the Compressed Frequency Domain.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

2003
Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case.
IACR Cryptol. ePrint Arch., 2003

2002
A New Statistical Testing for Symmetric Ciphers and Hash Functions.
IACR Cryptol. ePrint Arch., 2002

2001
COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers.
IACR Cryptol. ePrint Arch., 2001

A New Ultrafast Stream Cipher Design: COS Ciphers.
Proceedings of the Cryptography and Coding, 2001

2000
Decimation Attack of Stream Ciphers.
IACR Cryptol. ePrint Arch., 2000

Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

1999
Designs, Intersecting Families, and Weight of Boolean Functions.
Proceedings of the Cryptography and Coding, 1999

1998
Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
Reconstruction of Convolutional Encoders over GF(q).
Proceedings of the Cryptography and Coding, 1997


  Loading...