Computer Viruses and Malware, 2006. ,
On the possibility of practically obfuscating programs towards a unified perspective of code protection, Journal in Computer Virology, vol.51, issue.8, 2007. ,
DOI : 10.1007/s11416-006-0029-6
URL : https://hal.archives-ouvertes.fr/inria-00338074
Computer viruses -theory and experiments Eric Filiol Strong cryptography armoured computer viruses forbidding code analysis: the BRADLEY virus Computer viruses: from theory to applications, Proceedings of the 14th EICAR conference. [Fil05] ´ Eric Filiol, 1984. ,
Computer Viruses, Artificial Life and Evolution, 1993. ,
The Giant Black Book of Computer Viruses, 1995. ,
[MDa] The Mental Driller. METAPHOR source code. Version 1D available at, Journal of Statistical Software, vol.8, issue.14, 2003. ,
An introduction to encryption Available at: http://vx.netlux.org, p.506, 1999. ,
Environmental Key Generation Towards Clueless Agents, Lecture Notes In Computer Science, pp.15-24, 1998. ,
DOI : 10.1007/3-540-68671-1_2
The evolution of self-defense technologies in malware Available at: http://www.net-security.org/article.php?id=1028, 2007. ,
Reliable identification of bounded-length viruses is NP-complete, IEEE Transactions on Information Theory, vol.49, issue.1, pp.280-284, 2003. ,
DOI : 10.1109/TIT.2002.806137
The Art of Computer Virus Research and Defense, 2005. ,
He works on the modelization of viral infections, and on formal and practical malware detection and protection. Contact address: Loria, ´ Equipe Carte, p.54603 ,