Kharon dataset: Android malware under a microscope E CIDRE Learning from Authoritative Security Experiment Results, 1, 2016 | 48 | 2016 |
Gpfinder: tracking the invisible in android malware M Leslous, VVT Tong, JF Lalande, T Genet 2017 12th International Conference on Malicious and Unwanted Software …, 2017 | 12 | 2017 |
Challenges for reliable and large scale evaluation of android malware analysis JF Lalande, VVT Tong, M Leslous, P Graux 2018 International Conference on High Performance Computing & Simulation …, 2018 | 11 | 2018 |
Inferring a distributed application behavior model for anomaly based intrusion detection E Totel, M Hkimi, M Hurfin, M Leslous, Y Labiche 2016 12th European Dependable Computing Conference (EDCC), 53-64, 2016 | 10 | 2016 |
Information flows at OS level unmask sophisticated Android malware VVT Tong, A Trulla, M Leslous, JF Lalande 14th International Conference on Security and Cryptography 6, 578-585, 2017 | 4 | 2017 |
Challenges in Android Malware Analysis VVT Tong, JF Lalande, M Leslous ERCIM News, 42-43, 2016 | 2 | 2016 |
Highlight and execute suspicious paths in Android malware M Leslous Université Rennes 1, 2018 | 1 | 2018 |
Using Implicit Calls to Improve Malware Dynamic Execution M Leslous, JF Lalande, VVT Tong 37th IEEE Symposium on Security and Privacy, 2016 | 1 | 2016 |
Anomaly Based Intrusion Detection in Distributed Applications without global clock E Totel, M Hkimi, M Hurfin, M Leslous, Y Labiche SEC2 2016-Deuxième atelier sur la Sécurité dans les Clouds, 2016 | | 2016 |
Poster: Using Implicit Calls to Improve Malware Dynamic Execution M Leslous, VVT Tong, JF Lalande | | |