E
Eric Filiol
Researcher at ESIEA
Publications - 74
Citations - 1553
Eric Filiol is an academic researcher from ESIEA. The author has contributed to research in topics: Malware & Cryptography. The author has an hindex of 20, co-authored 74 publications receiving 1464 citations. Previous affiliations of Eric Filiol include French Institute for Research in Computer Science and Automation & École Normale Supérieure.
Papers
More filters
Journal ArticleDOI
Behavioral detection of malware: from a survey towards an established taxonomy
TL;DR: A survey of the different reasoning techniques deployed among the behavioral detectors has been drawn up, classified according to a new taxonomy introduced inside the paper.
Journal Article
Combinatorial Optimisation of Worm Propagation on an Unknown Network
TL;DR: A stealth worm propagation model which has been extensively simulated and analysed on a huge virtual network and shows that the combinatorial topology of routing may have a huge impact on the worm propagation and thus some servers play a more essential and significant role than others.
Journal ArticleDOI
Malware Pattern Scanning Schemes Secure Against Black-box Analysis
TL;DR: This paper presents a new model of malware detection pattern based on Boolean functions and identifies some properties that a reliable detection pattern should have and describes a combinatorial, probabilistic malware pattern scanning scheme that can incidentally provide some useful technical information to malware crime investigators, thus allowing a faster identification of copycats.
Proceedings ArticleDOI
On blockchain security and relevant attacks
TL;DR: The purpose of this paper is to evaluate Blockchain security summarizing its current state, thoroughly showing threatening flaws and assessing some countermeasures to dissuade vulnerabilities on the network.
Proceedings ArticleDOI
Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach
TL;DR: This paper examines HMMs for four different compilers, hand-written assembly code, three virus construction kits, and a metamorphic virus in order to note similarities and differences in the hidden states of the HMMs, and develops the dueling HMM Strategy, which leverages the knowledge about differentCompilers for more precise identification.