Pluginizing quic Q De Coninck, F Michel, M Piraux, F Rochet, T Given-Wilson, A Legay, ... Proceedings of the ACM Special Interest Group on Data Communication, 59-74, 2019 | 109 | 2019 |
Effective, efficient, and robust packing detection and classification F Biondi, MA Enescu, T Given-Wilson, A Legay, L Noureddine, V Verma Computers & Security 85, 436-451, 2019 | 45 | 2019 |
Tutorial: An overview of malware detection and evasion techniques F Biondi, T Given-Wilson, A Legay, C Puodzius, J Quilbeuf Leveraging Applications of Formal Methods, Verification and Validation …, 2018 | 44 | 2018 |
Optimizing symbolic execution for malware behavior classification S Sebastio, E Baranov, F Biondi, O Decourbe, T Given-Wilson, A Legay, ... Computers & Security 93, 101775, 2020 | 42 | 2020 |
A combinatory account of internal structure B Jay, T Given-Wilson The Journal of Symbolic Logic 76 (3), 807-826, 2011 | 37 | 2011 |
An automated formal process for detecting fault injection vulnerabilities in binaries and case study on present T Given-Wilson, N Jafri, JL Lanet, A Legay 2017 IEEE Trustcom/BigDataSE/ICESS, 293-300, 2017 | 34 | 2017 |
Combined software and hardware fault injection vulnerability detection T Given-Wilson, N Jafri, A Legay Innovations in Systems and Software Engineering 16 (2), 101-120, 2020 | 33 | 2020 |
Detection of mirai by syntactic and behavioral analysis NB Said, F Biondi, V Bontchev, O Decourbe, T Given-Wilson, A Legay, ... 2018 IEEE 29th International Symposium on Software Reliability Engineering …, 2018 | 31 | 2018 |
Concurrent pattern calculus T Given-Wilson, D Gorla, B Jay IFIP International Conference on Theoretical Computer Science, 244-258, 2010 | 25 | 2010 |
The serums tool-chain: ensuring security and privacy of medical data in smart patient-centric healthcare systems V Janjic, JKF Bowles, AF Vermeulen, A Silvina, M Belk, C Fidas, ... 2019 IEEE International Conference on Big Data (Big Data), 2726-2735, 2019 | 22 | 2019 |
Packer classification based on association rule mining KHT Dam, T Given-Wilson, A Legay, R Veroneze Applied Soft Computing 127, 109373, 2022 | 20 | 2022 |
An automated and scalable formal process for detecting fault injection vulnerabilities in binaries T Given‐Wilson, A Heuser, N Jafri, A Legay Concurrency and Computation: Practice and Experience 31 (23), e4794, 2019 | 16 | 2019 |
Analysis of machine learning approaches to packing detection CHB Van Ouytsel, KHT Dam, A Legay Computers & Security 136, 103536, 2024 | 14 | 2024 |
High performance static analysis for industry M Bradley, F Cassez, A Fehnker, T Given-Wilson, R Huuck Electronic Notes in Theoretical Computer Science 289, 3-14, 2012 | 14 | 2012 |
The state of fault injection vulnerability detection T Given-Wilson, N Jafri, A Legay Verification and Evaluation of Computer and Communication Systems: 12th …, 2018 | 13 | 2018 |
Formalising fault injection and countermeasures T Given-Wilson, A Legay Proceedings of the 15th International Conference on Availability …, 2020 | 11 | 2020 |
Chaos duck: A tool for automatic iot software fault-tolerance analysis I Zavalyshyn, T Given–Wilson, A Legay, R Sadre, E Rivière 2021 40th International Symposium on Reliable Distributed Systems (SRDS), 46-55, 2021 | 10 | 2021 |
Unsupervised behavioural mining and clustering for malware family identification KHT Dam, T Given-Wilson, A Legay Proceedings of the 36th Annual ACM Symposium on Applied Computing, 374-383, 2021 | 10 | 2021 |
A concurrent pattern calculus T Given-Wilson, D Gorla, B Jay Logical Methods in Computer Science 10, 2014 | 10 | 2014 |
Pattern matching and bisimulation T Given-Wilson, D Gorla International Conference on Coordination Languages and Models, 60-74, 2013 | 10 | 2013 |