scispace - formally typeset
E

Eric Filiol

Researcher at ESIEA

Publications -  74
Citations -  1553

Eric Filiol is an academic researcher from ESIEA. The author has contributed to research in topics: Malware & Cryptography. The author has an hindex of 20, co-authored 74 publications receiving 1464 citations. Previous affiliations of Eric Filiol include French Institute for Research in Computer Science and Automation & École Normale Supérieure.

Papers
More filters
Journal ArticleDOI

Behavioral detection of malware: from a survey towards an established taxonomy

TL;DR: A survey of the different reasoning techniques deployed among the behavioral detectors has been drawn up, classified according to a new taxonomy introduced inside the paper.
Journal Article

Combinatorial Optimisation of Worm Propagation on an Unknown Network

TL;DR: A stealth worm propagation model which has been extensively simulated and analysed on a huge virtual network and shows that the combinatorial topology of routing may have a huge impact on the worm propagation and thus some servers play a more essential and significant role than others.
Journal ArticleDOI

Malware Pattern Scanning Schemes Secure Against Black-box Analysis

TL;DR: This paper presents a new model of malware detection pattern based on Boolean functions and identifies some properties that a reliable detection pattern should have and describes a combinatorial, probabilistic malware pattern scanning scheme that can incidentally provide some useful technical information to malware crime investigators, thus allowing a faster identification of copycats.
Proceedings ArticleDOI

On blockchain security and relevant attacks

TL;DR: The purpose of this paper is to evaluate Blockchain security summarizing its current state, thoroughly showing threatening flaws and assessing some countermeasures to dissuade vulnerabilities on the network.
Proceedings ArticleDOI

Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach

TL;DR: This paper examines HMMs for four different compilers, hand-written assembly code, three virus construction kits, and a metamorphic virus in order to note similarities and differences in the hidden states of the HMMs, and develops the dueling HMM Strategy, which leverages the knowledge about differentCompilers for more precise identification.