default search action
Eric Filiol
Person information
- affiliation: INRIA, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]Eric Filiol, Pierre Filiol:
Graph-Based Modelling of Maximum Period Property for Nonlinear Feedback Shift Registers. SECRYPT 2024: 832-837 - 2021
- [j31]Baptiste David, Maxence Delong, Eric Filiol:
Detection of crawler traps: formalization and implementation - defeating protection on internet and on the TOR network. J. Comput. Virol. Hacking Tech. 17(3): 185-198 (2021) - [j30]Joanna Moubarak, Eric Filiol, Maroun Chamoun:
The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes. J. Comput. Virol. Hacking Tech. 17(3): 199-220 (2021) - [c26]Eric Filiol:
Unconventional Attack against Voting Machines Enlarging the Scope of Cybersecurity Risk Analysis. ICISSP 2021: 763-770 - [c25]Eric Filiol, Francesco Mercaldo, Antonella Santone:
A Method for Automatic Penetration Testing and Mitigation: A Red Hat Approach. KES 2021: 2039-2046 - 2020
- [j29]Joanna Moubarak, Maroun Chamoun, Eric Filiol:
On distributed ledgers security and illegal uses. Future Gener. Comput. Syst. 113: 183-195 (2020) - [j28]Eric Filiol, Maxence Delong, J. Nicolas:
Statistical and combinatorial analysis of the TOR routing protocol: structural weaknesses identified in the TOR network. J. Comput. Virol. Hacking Tech. 16(1): 3-18 (2020) - [j27]Eric Filiol:
Editorial. J. Comput. Virol. Hacking Tech. 16(4): 257-258 (2020) - [c24]Maxence Delong, Baptiste David, Eric Filiol:
Detection of Crawler Traps: Formalization and Implementation Defeating Protection on Internet and on the TOR Network. ICISSP 2020: 775-783 - [c23]Joanna Moubarak, Eric Filiol, Maroun Chamoun:
The Blockchain Potential in Computer Virology. ICISSP 2020: 796-803 - [i22]Eric Filiol:
Key-dependent Security of Stream Ciphers. CoRR abs/2001.00515 (2020)
2010 – 2019
- 2019
- [c22]Eric Filiol, Abhilash Hota:
Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering. ICISSP 2019: 635-644 - [i21]Eric Filiol:
BSEA-1 - A Stream Cipher Backdooring Technique. CoRR abs/1903.11063 (2019) - 2018
- [c21]Eric Filiol, J. Nicolas, Maxence Delong:
Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the TOR Network. ICISSP 2018: 507-516 - [c20]Joanna Moubarak, Eric Filiol, Maroun Chamoun:
On blockchain security and relevant attacks. MENACOMM 2018: 1-6 - [c19]Joanna Moubarak, Maroun Chamoun, Eric Filiol:
Developing a Κ-ary malware using blockchain. NOMS 2018: 1-4 - [i20]Maxence Delong, Eric Filiol, Clément Coddet, Olivier Fatou, Clément Suhard:
OSINT Analysis of the TOR Foundation. CoRR abs/1803.05201 (2018) - [i19]Joanna Moubarak, Eric Filiol, Maroun Chamoun:
Developing a K-ary malware using Blockchain. CoRR abs/1804.01488 (2018) - 2017
- [j26]Eric Filiol, Cécilia Gallais:
Optimization of Operational Large-Scale (Cyber) Attacks by a Combinational Approach. Int. J. Cyber Warf. Terror. 7(3): 29-43 (2017) - [j25]Baptiste David, Eric Filiol, Kévin Gallienne:
Structural analysis of binary executable headers for malware detection optimization. J. Comput. Virol. Hacking Tech. 13(2): 87-93 (2017) - [c18]Joanna Moubarak, Maroun Chamoun, Eric Filiol:
Comparative study of recent MEA malware phylogeny. ICCCS 2017: 16-20 - [c17]Joanna Moubarak, Eric Filiol, Maroun Chamoun:
Comparative analysis of blockchain technologies and TOR network: Two faces of the same reality? CSNet 2017: 1-9 - [c16]Michel Dubois, Eric Filiol:
Hacking of the AES with Boolean Functions. ICISSP 2017: 599-609 - [c15]Paul Irolla, Eric Filiol:
Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices. ICISSP 2017: 610-621 - [c14]Arnaud Bannier, Eric Filiol:
Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher. ICISSP 2017: 622-631 - [i18]Arnaud Bannier, Eric Filiol:
Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher. CoRR abs/1702.06475 (2017) - [i17]Jaydip Sen, Javier Franco-Contreras, Gouenou Coatrieux, Nilay K. Sangani, Haroot Zarger, Faouzi Jaïdi, Bob Duncan, Alfred Bratterud, Andreas Happe, Chin-Feng Lin, Che-Wei Liu, Walid Elgenaidi, Muftah Fraifer, Thomas Newe, Eoin O'Connell, Avijit Mathur, Ruolin Zhang, Eric Filiol:
Advances in Security in Computing and Communications. CoRR abs/1707.09526 (2017) - 2016
- [j24]Olivier Ferrand, Eric Filiol:
Combinatorial detection of malware by IAT discrimination. J. Comput. Virol. Hacking Tech. 12(3): 131-136 (2016) - [j23]Jonathan Dechaux, Eric Filiol:
Proactive defense against malicious documents: formalization, implementation and case studies. J. Comput. Virol. Hacking Tech. 12(3): 191-202 (2016) - [i16]Michel Dubois, Eric Filiol:
Hacking of the AES with Boolean Functions. CoRR abs/1609.03734 (2016) - [i15]Paul Irolla, Eric Filiol:
Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices. CoRR abs/1609.04718 (2016) - [i14]Arnaud Bannier, Nicolas Bodin, Eric Filiol:
Partition-Based Trapdoor Ciphers. IACR Cryptol. ePrint Arch. 2016: 493 (2016) - [i13]Arnaud Bannier, Nicolas Bodin, Eric Filiol:
Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network. IACR Cryptol. ePrint Arch. 2016: 652 (2016) - 2015
- [j22]Ashwin Kalbhor, Thomas H. Austin, Eric Filiol, Sébastien Josse, Mark Stamp:
Dueling hidden Markov models for virus analysis. J. Comput. Virol. Hacking Tech. 11(2): 103-118 (2015) - [c13]Arnaud Bannier, Nicolas Bodin, Eric Filiol:
Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network. HICSS 2015: 5165-5174 - 2013
- [c12]Thomas H. Austin, Eric Filiol, Sébastien Josse, Mark Stamp:
Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach. HICSS 2013: 5039-5048 - 2012
- [c11]Eric Filiol, Sébastien Josse:
New Trends in Security Evaluation of Bayesian Network-Based Malware Detection Models. HICSS 2012: 5574-5583 - 2011
- [j21]Anthony Desnos, Eric Filiol, Ivan Lefou:
Detecting (and creating !) a HVM rootkit (aka BluePill-like). J. Comput. Virol. 7(1): 23-49 (2011) - [i12]Eric Filiol:
PERSEUS Technology: New Trends in Information and Communication Security. CoRR abs/1101.0057 (2011) - 2010
- [j20]Jean-Baptiste Bedrune, Eric Filiol, Frédéric Raynal:
Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis. J. Comput. Virol. 6(3): 207-237 (2010) - [j19]Jean-Marie Borello, Eric Filiol, Ludovic Mé:
From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques. J. Comput. Virol. 6(3): 277-287 (2010) - [c10]Grégoire Jacob, Eric Filiol, Hervé Debar:
Formalization of Viruses and Malware Through Process Algebras. ARES 2010: 597-602 - [p1]Eric Filiol:
Viruses and Malware. Handbook of Information and Communication Security 2010: 747-769 - [i11]Eric Filiol:
Malicious cryptography techniques for unreversable (malicious or not) binaries. CoRR abs/1009.4000 (2010) - [i10]Anthony Desnos, Robert Erra, Eric Filiol:
Processor-Dependent Malware... and codes. CoRR abs/1011.1638 (2010)
2000 – 2009
- 2009
- [j18]Daniel Bilar, Eric Filiol:
Editors/translators Foreword. J. Comput. Virol. 5(1): 1-3 (2009) - [j17]Ulrich Flegel, Eric Filiol:
Editorial. J. Comput. Virol. 5(2): 89 (2009) - [j16]Grégoire Jacob, Eric Filiol, Hervé Debar:
Functional polymorphic engines: formalisation, implementation and use cases. J. Comput. Virol. 5(3): 247-261 (2009) - [c9]Grégoire Jacob, Hervé Debar, Eric Filiol:
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language. RAID 2009: 81-100 - [i9]Grégoire Jacob, Hervé Debar, Eric Filiol:
Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions. CoRR abs/0902.0322 (2009) - [i8]Grégoire Jacob, Eric Filiol, Hervé Debar:
Formalization of malware through process calculi. CoRR abs/0902.0469 (2009) - [i7]Johann Barbier, Eric Filiol:
Overview of Turbo-Code Reconstruction Techniques. IACR Cryptol. ePrint Arch. 2009: 68 (2009) - 2008
- [j15]Philippe Biondi, Eric Filiol:
Foreword. J. Comput. Virol. 4(1): 1-3 (2008) - [j14]Eric Filiol:
Editorial. J. Comput. Virol. 4(3): 159-160 (2008) - [j13]Grégoire Jacob, Eric Filiol, Hervé Debar:
Malware as interaction machines: a new framework for behavior modelling. J. Comput. Virol. 4(3): 235-250 (2008) - [j12]Grégoire Jacob, Hervé Debar, Eric Filiol:
Behavioral detection of malware: from a survey towards an established taxonomy. J. Comput. Virol. 4(3): 251-266 (2008) - 2007
- [j11]Johann Barbier, Eric Filiol, Kichenakoumar Mayoura:
Universal Detection of JPEG Steganography. J. Multim. 2(2): 1-9 (2007) - [j10]Eric Filiol, Roland Büschkes, Pavel Laskov:
Foreword. J. Comput. Virol. 2(4): 241-242 (2007) - [j9]Philippe Beaucamps, Eric Filiol:
On the possibility of practically obfuscating programs towards a unified perspective of code protection. J. Comput. Virol. 3(1): 3-21 (2007) - [j8]Eric Filiol, Grégoire Jacob, Mickaël Le Liard:
Evaluation methodology and theoretical model for antiviral behavioural detection strategies. J. Comput. Virol. 3(1): 23-37 (2007) - [j7]Eric Filiol, Sébastien Josse:
A statistical model for undecidable viral detection. J. Comput. Virol. 3(2): 65-74 (2007) - [j6]Eric Filiol:
Formalisation and implementation aspects of K -ary (malicious) codes. J. Comput. Virol. 3(2): 75-86 (2007) - 2006
- [j5]Eric Filiol, Marko Helenius, Stefano Zanero:
Open Problems in Computer Virology. J. Comput. Virol. 1(3-4): 55-66 (2006) - [j4]Vlasti Broucek, Eric Filiol, Paul Turner:
Foreword. J. Comput. Virol. 2(1): 1-2 (2006) - [j3]Eric Filiol:
Malware Pattern Scanning Schemes Secure Against Black-box Analysis. J. Comput. Virol. 2(1): 35-50 (2006) - [j2]Eric Filiol:
Foreword. J. Comput. Virol. 2(2): 99 (2006) - [c8]Johann Barbier, Eric Filiol, Kichenakoumar Mayoura:
Universal JPEG Steganalysis in the Compressed Frequency Domain. IWDW 2006: 253-267 - [i6]Johann Barbier, Eric Filiol, Kichenakoumar Mayoura:
New features for JPEG Steganalysis. IACR Cryptol. ePrint Arch. 2006: 301 (2006) - [i5]Eric Filiol:
Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption. IACR Cryptol. ePrint Arch. 2006: 303 (2006) - 2005
- [j1]Eric Filiol:
Foreword. J. Comput. Virol. 1(1-2): 2-3 (2005) - 2003
- [i4]Eric Filiol:
Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case. IACR Cryptol. ePrint Arch. 2003: 3 (2003) - 2002
- [c7]Eric Filiol:
A New Statistical Testing for Symmetric Ciphers and Hash Functions. ICICS 2002: 342-353 - [i3]Eric Filiol:
A New Statistical Testing for Symmetric Ciphers and Hash Functions. IACR Cryptol. ePrint Arch. 2002: 99 (2002) - 2001
- [c6]Eric Filiol, Caroline Fontaine:
A New Ultrafast Stream Cipher Design: COS Ciphers. IMACC 2001: 85-98 - [i2]Eric Filiol, Caroline Fontaine:
COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers. IACR Cryptol. ePrint Arch. 2001: 80 (2001) - 2000
- [c5]Anne Canteaut, Eric Filiol:
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators. FSE 2000: 165-180 - [c4]Eric Filiol:
Decimation Attack of Stream Ciphers. INDOCRYPT 2000: 31-42 - [i1]Eric Filiol:
Decimation Attack of Stream Ciphers. IACR Cryptol. ePrint Arch. 2000: 40 (2000)
1990 – 1999
- 1999
- [c3]Eric Filiol:
Designs, Intersecting Families, and Weight of Boolean Functions. IMACC 1999: 70-80 - 1998
- [c2]Eric Filiol, Caroline Fontaine:
Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity. EUROCRYPT 1998: 475-488 - 1997
- [c1]Eric Filiol:
Reconstruction of Convolutional Encoders over GF(q). IMACC 1997: 101-109
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint