For bibtex references of the publications I made during my PhD, please consult this page.
2010:
- Unconditional self-modifying code elimination with dynamic compiler optimizations, with Isabelle Gnaedig, Matthieu Kaczmarek, Stéphane Wloka, 5th International Malicious and Unwanted Software Conference (Malware 2010)
- Analyse de programmes par traçage, with Jean-Yves Marion et Wadie Guizani, Symposium sur la Sécurité des Technologies de l’Information et de la Communication 2010
- Dynamic Instrumentation: an Application to JavaScript Deobfuscation, HITB Magazine Vol. 1 Issue 2 [mirror]
- The iPhone and Android Security Model, 1-page paper appearing in Dossier Pour la Science n°66 [paper (in French)]
2009:
- A Computability Perspective on Self-Modifying Programs, with Guillaume Bonfante and Jean-Yves Marion, 7th IEEE International Conference on Software Engineering and Formal Methods. [paper]
- Dynamic Binary Instrumentation for Deobfuscation and Unpacking, with Jean-Yves Marion, presentation at the In-Depth Security Conference Europe 2009 (Deepsec09). [slides]
- Server-Side Dynamic Code Analysis, with Wadie Guizani and Jean-Yves Marion, presentation at the 4th International Malicious and Unwanted Software Conference (Malware 2009). [paper][slides]
- On the Impact of Malware on Internet Voting, with Philippe Beaucamps, Eric Filiol and Jean-Yves Marion, presentation at the 1st Luxembourg Day on Security and Reliability
- On the use of Internet Voting on Compromised Computers, with Philippe Beaucamps, Eric Filiol and Jean-Yves Marion, 4th International Conference on Information Warfare and Security. [paper]
2008:
- GPU Powered Malware, presentation at Ruxcon08. [paper under review][slides]
- Malicious Firefox Extensions, with Philippe Beaucamps, SSTIC08 rump session. [short paper] [slides]
- Obfuscation by Interpretation, with Jean-Yves Marion, presentation at the 3rd International Workshop on the Theory of Computer Viruses. [slides]
- A Survey on Virtual Machines for Malware Analysis, presentation at the 3rd International Workshop on the Theory of Computer Viruses. [slides]
2006:
- The Java Mobile Risk, publication in the Journal in Computer Virology. [paper]
2005:
- J2ME Low-Level Security, Master’s Thesis. [full report]
- Reverse Engineering and Java Viral Analysis, presentation at Virus Bulletin.
- New Threats of Java Viruses, publication in the Journal in Computer Virology. [paper]