Skip to contents

  1. Mangean, Armel [Author]; Béchennec, Jean-Luc [Author]; Briday, Mikaël [Author]; Faucou, Sébastien [Author] ; Armel Mangean and Jean-Luc Béchennec and Mikaël Briday and Sébastien Faucou [Contributor]

    BEST: a Binary Executable Slicing Tool

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2016

  2. Plohmann, Daniel Johannes [Author] ; Martini, Peter [Degree supervisor]; Rossow, Christian [Other]

    Classification, Characterization, and Contextualization of Windows Malware using Static Behavior and Similarity Analysis

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Bonn: Universitäts- und Landesbibliothek Bonn, 2022

  3. Hebbal, Yacine [Author] ; Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire [Contributor]; Menaud, Jean-Marc [Contributor]

    Semantic monitoring mechanisms dedicated to security monitoring in IaaS cloud ; Mécanismes de monitoring sémantique dédiés à la sécurité des infrastructures cloud IaaS

    Thesis
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    theses.fr, 2017-09-18

  4. Bendifallah, Zakaria [Author] ; Versailles-St Quentin en Yvelines [Contributor]; Jalby, William [Contributor]

    Généralisation de l’analyse de performance décrémentale vers l’analyse différentielle ; Generalization of the decremental performance analysis to differential analysis

    Thesis
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    theses.fr, 2015-09-17

  5. Gruber, Fabian [Author] ; Université Grenoble Alpes (ComUE) [Contributor]; Rastello, Fabrice [Contributor]

    Débogage de performance pour code binaire : Analyse de sensitivité et profilage de dépendances ; Performance Debugging Toolbox for Binaries : Sensitivity Analysis and Dependence Profiling

    Thesis
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    theses.fr, 2019-12-17

  6. Munro, J. Ian [Author]; Nicholson, Patrick K. [Author]; Benkner, Louisa Seelbach [Author]; Wild, Sebastian [Author] ; J. Ian Munro and Patrick K. Nicholson and Louisa Seelbach Benkner and Sebastian Wild [Contributor]

    Hypersuccinct Trees - New Universal Tree Source Codes for Optimal Compressed Tree Data Structures and Range Minima

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021

  7. Giacobazzi, Roberto [Author]; Simon, Axel [Author]; Zennou, Sarah [Author] ; Roberto Giacobazzi and Axel Simon and Sarah Zennou [Contributor]

    Challenges in Analysing Executables: Scalability, Self-Modifying Code and Synergy (Dagstuhl Seminar 14241)

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2014

  8. Feist, Josselin [Author] ; Université Grenoble Alpes (ComUE) [Contributor]; Potet, Marie-Laure [Contributor]; Mounier, Laurent [Contributor]

    Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free ; Analyses de code binaire pour la détection et le déclenchement de use-after-free

    Thesis
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    theses.fr, 2017-03-29

  9. Daniel, Lesly-Ann [Author] ; Université Côte d'Azur [Contributor]; Rezk, Tamara [Contributor]

    Analyse symbolique de code binaire pour la sécurité. Application à la détection d’attaques microarchitecturales dans les implémentations cryptographiques ; Symbolic binary-level code analysis for security. Application to the detection of microarchitectural timing attacks in cryptographic code

    Thesis
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    theses.fr, 2021-11-12