CoDisasm: Medium scale concatic disassembly of self-modifying binaries with overlapping instructions G Bonfante, J Fernandez, JY Marion, B Rouxel, F Sabatier, A Thierry Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 89 | 2015 |
Analysis and diversion of Duqu's driver G Bonfante, JY Marion, F Sabatier, A Thierry 2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013 | 14 | 2013 |
Recognition of binary patterns by Morphological analysis A Thierry, G Bonfante, J Calvet, JY Marion, F Sabatier Reverse Engineering Conference, 2012 | 8 | 2012 |
Selective imaging of file system data on live systems F Faust, A Thierry, T Müller, F Freiling Forensic Science International: Digital Investigation 36, 301115, 2021 | 7 | 2021 |
Code synchronization by morphological analysis G Bonfante, JY Marion, F Sabatier, A Thierry 2012 7th International Conference on Malicious and Unwanted Software, 112-119, 2012 | 6 | 2012 |
Désassemblage et détection de logiciels malveillants auto-modifiants A Thierry Université de Lorraine, 2015 | 5 | 2015 |
Detection of cryptographic algorithms with grap. L Benedetti, A Thierry, J Francq IACR Cryptol. ePrint Arch. 2017, 1119, 2017 | 4 | 2017 |
A systematic approach to understanding MACB timestamps on Unix-like systems A Thierry, T Müller Forensic Science International: Digital Investigation 40, 301338, 2022 | 3 | 2022 |
Codisasm G Bonfante, J Fernandez, JY Marion, B Rouxel, F Sabatier, A Thierry Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 2 | 2015 |
Duqu contre Duqu: Analyse et détournement du driver de Duqu G Bonfante, JY Marion, F Sabatier, A Thierry SSTIC-Symposium sur la sécurité des technologies de l'information et des …, 2013 | 1 | 2013 |
Technical report: Selective imaging of file system data on live systems F Faust, A Thierry, T Müller, F Freiling arXiv preprint arXiv:2012.02573, 2020 | | 2020 |
GRAP: define and match graph patterns within binaries A Thierry, J Thieuleux REcon Brussels, 2017 | | 2017 |
Test d'intrusion dans un système de contrôle de la qualité de l'eau A Reziouk, A Thierry, JC Demay C&ESAR 2016, 39, 2016 | | 2016 |
Analysis and Diversion of Duqu’s Driver A Thierry, F Sabatier, G Bonfante, JY Marion | | |
Duqu contre Duqu: Analyse et détournement du driver de Duqu A Thierry | | |
Analyse morphologique en temps réel pour la détection de malware A Thierry | | |