Scalable approximation of quantitative information flow in programs F Biondi, MA Enescu, A Heuser, A Legay, KS Meel, J Quilbeuf Verification, Model Checking, and Abstract Interpretation: 19th …, 2018 | 52 | 2018 |
Effective, efficient, and robust packing detection and classification F Biondi, MA Enescu, T Given-Wilson, A Legay, L Noureddine, V Verma Computers & Security 85, 436-451, 2019 | 46 | 2019 |
Effectiveness of synthesis in concolic deobfuscation F Biondi, S Josse, A Legay, T Sirvent Computers & Security 70, 500-515, 2017 | 46* | 2017 |
Tutorial: An overview of malware detection and evasion techniques F Biondi, T Given-Wilson, A Legay, C Puodzius, J Quilbeuf Leveraging Applications of Formal Methods, Verification and Validation …, 2018 | 44 | 2018 |
Optimizing symbolic execution for malware behavior classification S Sebastio, E Baranov, F Biondi, O Decourbe, T Given-Wilson, A Legay, ... Computers & Security 93, 101775, 2020 | 43 | 2020 |
QUAIL: A quantitative security analyzer for imperative code F Biondi, A Legay, LM Traonouez, A Wąsowski Computer Aided Verification: 25th International Conference, CAV 2013, Saint …, 2013 | 43 | 2013 |
Detection of mirai by syntactic and behavioral analysis NB Said, F Biondi, V Bontchev, O Decourbe, T Given-Wilson, A Legay, ... 2018 IEEE 29th International Symposium on Software Reliability Engineering …, 2018 | 40* | 2018 |
Quantifying information leakage of randomized protocols F Biondi, A Legay, P Malacaria, A Wąsowski Verification, Model Checking, and Abstract Interpretation: 14th …, 2013 | 33 | 2013 |
Maximizing entropy over Markov processes F Biondi, A Legay, BF Nielsen, A Wąsowski Journal of Logical and Algebraic Methods in Programming 83 (5-6), 384-399, 2014 | 28 | 2014 |
Quantifying information leakage of randomized protocols F Biondi, A Legay, P Malacaria, A Wąsowski Theoretical Computer Science 597, 62-87, 2015 | 16 | 2015 |
HyLeak: hybrid analysis tool for information leakage F Biondi, Y Kawamoto, A Legay, LM Traonouez Automated Technology for Verification and Analysis: 15th International …, 2017 | 14 | 2017 |
Measuring global similarity between texts U Fahrenberg, F Biondi, K Corre, C Jegourel, S Kongshøj, A Legay Statistical Language and Speech Processing: Second International Conference …, 2014 | 14* | 2014 |
Hybrid statistical estimation of mutual information for quantifying information flow Y Kawamoto, F Biondi, A Legay International Symposium on Formal Methods, 406-425, 2016 | 13 | 2016 |
Maximizing entropy over markov processes F Biondi, A Legay, BF Nielsen, A Wąsowski Language and Automata Theory and Applications: 7th International Conference …, 2013 | 12 | 2013 |
High-confidence malware severity classification of reference file set M Bálek, F Biondi, D Kuznetsov, O Petrova US Patent 11,861,006, 2024 | 11 | 2024 |
Hybrid statistical estimation of mutual information and its application to information flow F Biondi, Y Kawamoto, A Legay, LM Traonouez Formal Aspects of Computing 31, 165-206, 2019 | 10 | 2019 |
Comparative analysis of leakage tools on scalable case studies F Biondi, A Legay, J Quilbeuf International SPIN Workshop on Model Checking of Software, 263-281, 2015 | 10 | 2015 |
Information leakage of non-terminating processes F Biondi, A Legay, BF Nielsen, P Malacaria, A Wasowski IARCS Annual Conference on Foundations of Software Technology and …, 2014 | 10 | 2014 |
Attainable unconditional security for shared-key cryptosystems F Biondi, T Given-Wilson, A Legay Information Sciences 369, 80-99, 2016 | 9 | 2016 |
ITU DS.: Markovian Processes for Quantitative Information Leakage. D-2015/115 F Biondi | 9* | 2015 |