"June 2017"@fr . "9781450302029"^^ . "200930"^^ . "Luo"@fr . "March 2018"@fr . "158"^^ . "W. M."@fr . . "Yim"@fr . "May 2009"@fr . "Mehdi"@fr . "http://doi.acm.org/10.1145/3073559|consult\u00E9 le=2018-01-10"@fr . "Twenty-Third Annual Computer Security Applications Conference"@fr . "149"^^ . "http://ieeexplore.ieee.org/document/7546501/|consult\u00E9 le=2017-11-07"@fr . "144"^^ . "You2010"@fr . "Troia"@fr . "2016"^^ . "November 2012"@fr . "2017"^^ . "Guillaume"@fr . "Donald"@fr . "Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"@fr . "2008-08-01"^^ . "Andrew Woodward"@fr . "G\u00E9rard"@fr . "Automating Reverse Engineering with Machine Learning Techniques"@fr . "Malware analysis using reverse engineering and data mining tools"@fr . "Renovo: A Hidden Code Extractor for Packed Executables"@fr . . "Z."@fr . . . . . "Liao"@fr . . "http://ieeexplore.ieee.org/document/6061171/|consult\u00E9 le=2017-11-21"@fr . "Daryabar"@fr . "http://ieeexplore.ieee.org/document/4630086/|consult\u00E9 le=2017-11-07"@fr . . "Computers & Security"@fr . "177"^^ . "20117"^^ . "173"^^ . "Chang"@fr . "http://doi.acm.org/10.1145/1655148.1655151|consult\u00E9 le=2017-11-07"@fr . "Andersen"@fr . . "Hsing-Kuo"@fr . "Malware Analysis: Tools and Techniques"@fr . "Honeypot-Powered Malware Reverse Engineering"@fr . "Ye2017"@fr . . "Csallner"@fr . "Malware Forensics: Discovery of the Intent of Deception"@fr . "Jamdagni"@fr . "Analyse des logiciels malveillants"@fr . "10.1057"^^ . "E."@fr . . "http://ieeexplore.ieee.org/document/7436133/|consult\u00E9 le=2017-11-07"@fr . "McPhall"@fr . "Jean-Yves"@fr . "The New Technique of Decompilation and Its Application in Information Security"@fr . "Li"@fr . "Thomas"@fr . "James E."@fr . "Vidyarthi"@fr . "Mixed-Mode Malware and Its Analysis"@fr . "Curtis"@fr . "Investigation of bypassing malware defences and malware detections"@fr . "20152"^^ . "Micah"@fr . "McCamant"@fr . "N. I."@fr . "http://ieeexplore.ieee.org/document/6498426/|consult\u00E9 le=2017-11-07"@fr . "A."@fr . "Mechanisms of Polymorphic and Metamorphic Viruses"@fr . "Theodoor"@fr . "Bryant"@fr . "Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"@fr . "https://link.springer.com/article/10.1007/s11416-015-0261-z|consult\u00E9 le=2018-01-07"@fr . "Liszka"@fr . . "Jan Tobias"@fr . "Furfaro"@fr . "Chih-Hung"@fr . "Xu"@fr . "251"^^ . "D."@fr . "641"^^ . "Lanzi"@fr . "245"^^ . "Dehghantanha"@fr . . "http://doi.acm.org/10.1145/1940941.1940944|consult\u00E9 le=2017-11-07"@fr . "Sharif2009"@fr . "4"^^ . "2"^^ . "http://doi.acm.org/10.1145/2810103.2813627|consult\u00E9 le=2017-11-07"@fr . "3"^^ . . "http://ieeexplore.ieee.org/document/7527817/|consult\u00E9 le=2017-11-07"@fr . "1"^^ . . "Sanjeev"@fr . "M. K."@fr . . "Bailey"@fr . . "Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware"@fr . "Modeling information flow for an autonomous agent to support reverse engineering work"@fr . "Malware detection vectors and analysis techniques: A brief survey"@fr . "10.4236"^^ . "Daniel A"@fr . "http://ieeexplore.ieee.org/document/6410138/|consult\u00E9 le=2017-11-07"@fr . "Guillaume Bonfante"@fr . "Rathnayaka2017"@fr . "Z. M."@fr . . . "Behavioral detection of malware: from a survey towards an established taxonomy"@fr . "Matthieu Kaczmarek"@fr . "Burji"@fr . "M."@fr . . "2016-10-11"^^ . "How to Accidentally Stop a Global Cyber Attacks"@fr . "July 2011"@fr . "http://ieeexplore.ieee.org/document/5633410/|consult\u00E9 le=2017-11-07"@fr . "Journal of Information Security"@fr . "http://ieeexplore.ieee.org:80/document/6388211/?reload=true|consult\u00E9 le=2017-11-07"@fr . "13"^^ . "Austin"@fr . "October 2012"@fr . "8"^^ . "2011-01-13"^^ . "MCARTA: A Malicious Code Automated Run-Time Analysis framework"@fr . "720"^^ . "11"^^ . . "Christoph"@fr . "C. S."@fr . "6"^^ . "Benjamin"@fr . . "December 2011"@fr . . "1"^^ . "Aur\u00E9lien Thierry"@fr . "11148812"^^ . "3"^^ . "\u062A\u062D\u0644\u064A\u0644 \u0627\u0644\u0628\u0631\u0645\u062C\u064A\u0627\u062A \u0627\u0644\u062E\u0628\u064A\u062B\u0629"@ar . "Alazab"@fr . "Xi"@fr . "Fifth International Conference on Intelligent Control and Information Processing"@fr . . "PPREW-4"@fr . "Manuel"@fr . "Storlie"@fr . "765"^^ . "http://ieeexplore.ieee.org/document/7942517/|consult\u00E9 le=2018-01-10"@fr . "Limits of Static Analysis for Malware Detection"@fr . . "April 2016"@fr . "Sharif"@fr . "46"^^ . "CCS '16"@fr . "Ye"@fr . "41"^^ . . . "Malware Analysis Reverse Engineering Methodology & Malware Defense Timeline"@fr . "38"^^ . "Zolotarev"@fr . "September 2011"@fr . "X."@fr . "Lin"@fr . "745"^^ . . "Evolution of evasive malwares: A survey"@fr . "Gr\u00E9goire"@fr . "94"^^ . "Unity in Diversity: Phylogenetic-inspired Techniques for Reverse Engineering and Detection of Malware Families"@fr . . "http://doi.acm.org/10.1145/1314389.1314399|consult\u00E9 le=2017-11-07"@fr . "Heng"@fr . "http://ieeexplore.ieee.org/document/6121379/|consult\u00E9 le=2017-11-07"@fr . "Ekta"@fr . "R. A."@fr . "Jadhav"@fr . . "CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions"@fr . . "81"^^ . "Proceedings of the 2007 ACM Workshop on Recurring Malcode"@fr . "June 2008"@fr . . "Mao"@fr . "March 2008"@fr . "Venkatraman"@fr . "Reverse Engineering Malicious Applications"@fr . "9781450339629"^^ . "7"^^ . "J."@fr . "M. J."@fr . "2494"^^ . "10.1016"^^ . "Malicious Code Detection Using Penalized Splines on OPcode Frequency"@fr . "Malware Virtualization-Resistant Behavior Detection"@fr . "65"^^ . "Bombardieri"@fr . "Kruegel"@fr . "Stephen"@fr . "November 2010"@fr . "Code synchronization by morphological analysis"@fr . "Azarmi"@fr . . "9781605586373"^^ . "Moser"@fr . "9781450331531"^^ . "Malware behaviour analysis"@fr . "9781450338325"^^ . "117"^^ . "Chan Lee"@fr . "201218"^^ . "Loh"@fr . "An\u00E1lisis de malware"@es . "115"^^ . . "Automatic loop detection in the sequence of system calls"@fr . "Kirda"@fr . "1558"^^ . "http://doi.acm.org/10.1145/2905055.2905361|consult\u00E9 le=2018-01-10"@fr . . . "Goldman"@fr . "103"^^ . "AISec '14"@fr . . "VMSec '09"@fr . "Deka2016"@fr . "Reversing Compiled Executables for Malware Analysis via Visualization"@fr . "http://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html|site=malwaretech.com|date=|consult\u00E9 le="@fr . "http://ieeexplore.ieee.org/document/7225311/|consult\u00E9 le=2017-11-07"@fr . "Ioan Cristian Iacob"@fr . . . "August 2017"@fr . . "Panicker"@fr . "Sun2011"@fr . "http://ieeexplore.ieee.org/document/5551719/|consult\u00E9 le=2017-11-07"@fr . "Bonfante"@fr . "Shudrak"@fr . . "Sisco"@fr . "http://ieeexplore.ieee.org/document/6092757/|consult\u00E9 le=2017-11-07"@fr . "N."@fr . "P."@fr . "Corrado Aaron"@fr . "2008-11-01"^^ . "Rathnayaka"@fr . "http://www.scirp.org/journal/PaperInformation.aspx?PaperID=44440|consult\u00E9 le=2018-01-07"@fr . . "Rouxel"@fr . "Dudenhofer"@fr . "White"@fr . "http://ieeexplore.ieee.org:80/document/6459819/?reload=true|consult\u00E9 le=2017-11-07"@fr . . "mars 2016"@fr . . "Gandotra2014"@fr . "Aaron"@fr . "52907"^^ . "http://doi.acm.org/10.1145/2666652.2666665|consult\u00E9 le=2017-11-07"@fr . "Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 2, 2015"@fr . "Murray Brand"@fr . "S. Sitharama"@fr . "P. K. K."@fr . "Castan\u00F2"@fr . "Cory Q."@fr . "2014-02-20"^^ . "Moser2007"@fr . "Patrick P"@fr . "Anusha"@fr . "M. H."@fr . "Tan"@fr . "Jean-Yves Marion"@fr . "Alexandre"@fr . "Kang"@fr . "State"@fr . . "Jilcott2015"@fr . . "Parsa"@fr . "Lee Ling"@fr . "Aboughadareh"@fr . "Lu"@fr . . "Dulaunoy"@fr . "10.1109"^^ . "2014"^^ . . "619"^^ . "Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop"@fr . "Lio"@fr . "S."@fr . "Nolan"@fr . "Thomas H."@fr . "Gandotra"@fr . "Egele"@fr . "Laih"@fr . "1772"^^ . "http://doi.acm.org/10.1145/2689702.2689703|consult\u00E9 le=2017-11-07"@fr . "Poosankam"@fr . . "P. P."@fr . "Radu"@fr . . "http://ieeexplore.ieee.org/document/5207639/|consult\u00E9 le=2017-11-07"@fr . . "Jose"@fr . "L'analyse des logiciels malveillants (\u00AB malware \u00BB en anglais) permet de d\u00E9terminer leurs fonctionnements et leurs impacts potentiels. C'est une t\u00E2che essentielle dans la s\u00E9curit\u00E9 informatique, elle fournit la compr\u00E9hension n\u00E9cessaire pour concevoir des contre-mesures efficaces et des strat\u00E9gies d'att\u00E9nuation contre les diff\u00E9rents logiciels malveillants."@fr . "V."@fr . "Quist"@fr . "July 2010"@fr . "Adam R"@fr . "http://linkinghub.elsevier.com/retrieve/pii/S016740481730247X|consult\u00E9 le=2018-01-07"@fr . . . "A comparison of static, dynamic, and hybrid analysis for malware detection"@fr . "Rupprecht"@fr . . "Udzir"@fr . "2016"^^ . . . "Al-Nemrat"@fr . . . . "M. A."@fr . "Journal of Digital Forensics, Security and Law, Vol. 5"@fr . "10.1007"^^ . "Malware Analysis and Classification: A Survey"@fr . "Debar"@fr . "December 2007"@fr . "9781450341394"^^ . "180561122"^^ . "Sarma"@fr . "An Efficient Approach for Advanced Malware Analysis Using Memory Forensic Technique"@fr . "http://doi.acm.org/10.1145/2089125.2089126|consult\u00E9 le=2018-01-07"@fr . "Damodaran"@fr . "Chuan"@fr . "Curcio"@fr . "9781605587806"^^ . . "10.1846"^^ . . . "1145"^^ . "http://ieeexplore.ieee.org/document/8029568/|consult\u00E9 le=2017-11-21"@fr . "Dechand"@fr . "CCS '15"@fr . "Yin"@fr . "K. J."@fr . "May 2016"@fr . "421"^^ . . . "Visaggio"@fr . "Eric"@fr . "Alaeiyan"@fr . "2153"^^ . "Anderson"@fr . "Gao"@fr . "April 2015"@fr . "November 2015"@fr . . . "Fabrice Sabatier"@fr . "ACM"@fr . "Liebrock"@fr . . "Survey on malware anti-analysis"@fr . "Craig Valli"@fr . . "2007"^^ . "2009"^^ . "2010"^^ . "2012"^^ . "Automatic Reverse Engineering of Malware Emulators"@fr . "Tao"@fr . "2014"^^ . "W."@fr . "2015"^^ . "A static and dynamic visual debugger for malware analysis"@fr . "912"^^ . "L'analyse des logiciels malveillants (\u00AB malware \u00BB en anglais) permet de d\u00E9terminer leurs fonctionnements et leurs impacts potentiels. C'est une t\u00E2che essentielle dans la s\u00E9curit\u00E9 informatique, elle fournit la compr\u00E9hension n\u00E9cessaire pour concevoir des contre-mesures efficaces et des strat\u00E9gies d'att\u00E9nuation contre les diff\u00E9rents logiciels malveillants."@fr . "Journal in Computer Virology"@fr . "Efficient dynamic malware analysis using virtual time control mechanics"@fr . "http://ieeexplore.ieee.org:80/document/7514657/?reload=true|consult\u00E9 le=2018-01-10"@fr . "Jilcott"@fr . "10.1145"^^ . "InfoSecCD '10"@fr . "Christopher"@fr . . "ACM Comput. Surv."@fr . "Jian-Wei"@fr . "http://ieeexplore.ieee.org/document/4413008/|consult\u00E9 le=2018-01-07"@fr . "Herv\u00E9"@fr . "Steve"@fr . "2017-02-01"^^ . "Malware Obfuscation Techniques: A Brief Survey"@fr . "360"^^ . "Zachary D"@fr . "10.1177"^^ . "Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security"@fr . "Pongsin"@fr . "http://ieeexplore.ieee.org:80/document/6122815/?reload=true|consult\u00E9 le=2017-11-07"@fr . "Zainal"@fr . "Giffin"@fr . "Sharma"@fr . "Wagener"@fr . "Priyanka"@fr . "Khoo"@fr . "1772"^^ . "Information Visualization"@fr . "Egele2008"@fr . "N. J."@fr . "Marion"@fr . "POSTER: Identifying Dynamic Data Structures in Malware"@fr . . "Adjeroh"@fr . "73"^^ . "Malware analysis"@en . "Journal of Computer Virology and Hacking Techniques"@fr . . "279"^^ . "August 2014"@fr . "Ismail"@fr . "December 2016"@fr . . "Kunwar"@fr . "50"^^ . . "270"^^ . "Min Gyung"@fr . "WORM '07"@fr . "The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology"@fr . "http://journals.sagepub.com/doi/10.1057/ivs.2010.11|consult\u00E9 le=2017-11-07"@fr . "Yakdan2016"@fr . "David H."@fr . . "d\u00E9cembre 2015"@fr . . "Scalable malware forensics using phylogenetic analysis"@fr . "You"@fr . . "Blake"@fr . "Emulating Emulation-resistant Malware"@fr . "44"^^ . "Sofat"@fr . "2263"^^ . "Y."@fr . "Lee"@fr . "Sun"@fr . "Chan"@fr . . . "Jacob"@fr . "C. C."@fr . . "Proceedings of the 1st ACM Workshop on Virtual Machine Security"@fr . . "Kunwar2016"@fr . "297"^^ . "I."@fr . "Rakesh Singh"@fr . "Shabnam"@fr . "9781595938862"^^ . "4"^^ . "Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study"@fr . "C."@fr . "Engin"@fr . "Hanna"@fr . "Chen"@fr . "F."@fr . "1"^^ . "Hemavathy"@fr . . "13"^^ . "14"^^ . "Fernandez"@fr . "http://doi.acm.org/10.1145/2976749.2989041|consult\u00E9 le=2017-11-07"@fr . "https://link.springer.com/article/10.1007/s11416-008-0086-0|consult\u00E9 le=2018-01-07"@fr . "10"^^ . "Fabio Di"@fr . "https://journal.cecyf.fr/ojs/index.php/cybin/article/view/2|consult\u00E9 le=2017-11-07"@fr . "Yanfang"@fr . "Yakdan"@fr . . "https://link.springer.com/article/10.1007/s11416-007-0074-9|consult\u00E9 le=2017-11-07"@fr . "Proceedings of the 4th Program Protection and Reverse Engineering Workshop"@fr . . . . "Divya"@fr . "ICTCS '16"@fr . . "Iyengar"@fr . "en"@fr . "The Journal on Cybercrime & Digital Investigations"@fr . "K."@fr . "A Survey on Malware Detection Using Data Mining Techniques"@fr . "http://ieeexplore.ieee.org/document/7010353/|consult\u00E9 le=2018-01-10"@fr . "Lorie M"@fr . . "Damodaran2017"@fr . . "Yates"@fr . . "Bansal"@fr . "Smith"@fr . . . "2008"^^ . . . "M\u00FChlberg"@fr . "2010"^^ . "2011"^^ . . "2012"^^ . . . . "Deka"@fr . . "Malware Instrumentation Application to Regin Analysis"@fr . "2015"^^ . . "Pao"@fr . . "Gerhards-Padilla"@fr . "A Survey on Automated Dynamic Malware-analysis Techniques and Tools"@fr . . . . . "http://journals.sagepub.com/doi/10.1177/1548512916670784|consult\u00E9 le=2017-11-07"@fr . "Filiol"@fr . "Nguyen"@fr . "Yee"@fr . "Kadiri"@fr . "M"@fr . "359"^^ . "Scholte"@fr .