SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code, Digital Investigation, vol.12, issue.511, 1346. ,
DOI : 10.1016/j.diin.2015.01.011
Architecture of a morphological malware detector, Journal in Computer Virology, vol.0, issue.4, pp.263-270, 2009. ,
DOI : 10.1007/s11416-008-0102-4
URL : https://hal.archives-ouvertes.fr/inria-00330022
Recognition of binary patterns by morphological analysis, 2012. ,
Analysis and diversion of Duqu's driver, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE), 2013. ,
DOI : 10.1109/MALWARE.2013.6703692
comparing-the-regin-module-50251-and-the- qwerty-keylogger ,
Functracker: Discovering shared code to aid malware forensics, Presented as part of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013. ,
Unveiling metamorphism by abstract interpretation of code properties, Theoretical Computer Science, vol.577, issue.0, pp.74-97, 2015. ,
DOI : 10.1016/j.tcs.2015.02.024