Publications and Presentations

For bibtex references of the publications I made during my PhD, please consult this page.

2010:

  • Unconditional self-modifying code elimination with dynamic compiler optimizations, with Isabelle Gnaedig, Matthieu Kaczmarek, Stéphane Wloka, 5th International Malicious and Unwanted Software Conference (Malware 2010)
  • Analyse de programmes par traçage, with Jean-Yves Marion et Wadie Guizani, Symposium sur la Sécurité des Technologies de l’Information et de la Communication 2010
  • Dynamic Instrumentation: an Application to JavaScript Deobfuscation, HITB Magazine Vol. 1 Issue 2 [mirror]
  • The iPhone and Android Security Model, 1-page paper appearing in Dossier Pour la Science n°66 [paper (in French)]

2009:

  • A Computability Perspective on Self-Modifying Programs, with Guillaume Bonfante and Jean-Yves Marion, 7th IEEE International Conference on Software Engineering and Formal Methods. [paper]
  • Dynamic Binary Instrumentation for Deobfuscation and Unpacking, with Jean-Yves Marion, presentation at the In-Depth Security Conference Europe 2009 (Deepsec09). [slides]
  • Server-Side Dynamic Code Analysis, with Wadie Guizani and Jean-Yves Marion, presentation at the 4th International Malicious and Unwanted Software Conference (Malware 2009). [paper][slides]
  • On the Impact of Malware on Internet Voting, with Philippe Beaucamps, Eric Filiol and Jean-Yves Marion, presentation at the 1st Luxembourg Day on Security and Reliability
  • On the use of Internet Voting on Compromised Computers, with Philippe Beaucamps, Eric Filiol and Jean-Yves Marion, 4th International Conference on Information Warfare and Security. [paper]

2008:

  • GPU Powered Malware, presentation at Ruxcon08. [paper under review][slides]
  • Malicious Firefox Extensions, with Philippe Beaucamps, SSTIC08 rump session. [short paper] [slides]
  • Obfuscation by Interpretation, with Jean-Yves Marion, presentation at the 3rd International Workshop on the Theory of Computer Viruses. [slides]
  • A Survey on Virtual Machines for Malware Analysis, presentation at the 3rd International Workshop on the Theory of Computer Viruses. [slides]

2006:

  • The Java Mobile Risk, publication in the Journal in Computer Virology. [paper]

2005:

  • J2ME Low-Level Security, Master’s Thesis. [full report]
  • Reverse Engineering and Java Viral Analysis, presentation at Virus Bulletin.
  • New Threats of Java Viruses, publication in the Journal in Computer Virology. [paper]
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s