Survey of publicly available reports on advanced persistent threat actors A Lemay, J Calvet, F Menet, JM Fernandez Computers & Security 72, 26-59, 2018 | 193 | 2018 |
Aligot: Cryptographic function identification in obfuscated binary programs J Calvet, JM Fernandez, JY Marion Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 138 | 2012 |
Malware authors don't learn, and that's good! J Calvet, CR Davis, PM Bureau 2009 4th International Conference on Malicious and Unwanted Software …, 2009 | 41 | 2009 |
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet J Calvet, CR Davis, JM Fernandez, JY Marion, PL St-Onge, W Guizani, ... Proceedings of the 26th annual computer security applications conference …, 2010 | 31 | 2010 |
Isolated Virtualised Clusters: Testbeds for {High-Risk} Security Experimentation and Training J Calvet, CR Davis, JM Fernandez, W Guizani, M Kaczmarek, JY Marion, ... 3rd Workshop on Cyber Security Experimentation and Test (CSET 10), 2010 | 24 | 2010 |
Follow the traffic: Stopping click fraud by disrupting the value chain M Faou, A Lemay, D Décary-Hétu, J Calvet, F Labrèche, M Jean, ... 2016 14th Annual Conference on Privacy, Security and Trust (PST), 464-476, 2016 | 18 | 2016 |
Large-scale malware experiments: Why, how, and so what J Calvet, JM Fernandez, PM Bureau, JY Marion Proceedings of the 2010 Virus Bulletin Conference (VB) 515, 2010 | 13 | 2010 |
Analyse dynamique de logiciels malveillants J Calvet École Polytechnique de Montréal, 2013 | 11 | 2013 |
Recognition of binary patterns by Morphological analysis A Thierry, G Bonfante, J Calvet, JY Marion, F Sabatier Reverse Engineering Conference, 2012 | 8 | 2012 |
WaveAtlas: surfing through the landscape of current malware packers J Calvet, FL Lévesque, JM Fernandez, J Marion, E Traourouder, F Menet Virus Bulletin Conference, 2015 | 6 | 2015 |
Visiting The Bear Den J Calvet, J Campos, T Dupuy WeLiveSecurity Blog, 2016 | 5 | 2016 |
Understanding swizzor's obfuscation scheme J Calvet, PM Bureau REcon, 2010 | 3 | 2010 |
Operation Windigo O Bilodeau, PM Bureau, J Calvet, A Dorais-Joncas, MÉM Léveillé, ... | 2 | 2015 |
The never ending war in the stack and the reincarnation of ROP attacks A Nader, J Calvet, JM Fernandez arXiv preprint arXiv:2005.11886, 2020 | 1 | 2020 |
Tripoux: reverse-engineering of malware packers for dummies J Calvet DeepSec 2010, 2010 | 1 | 2010 |
The good, the bad and the ugly: the advertiser, the bot & the traffic broker M Faou, J Calvet, A Lemay, JM Fernandez, PM Bureau | | 2016 |
WaveAtlas: surfing through the landscape of current malware J Calvet, F Lalonde Levesque, JM Fernandez, E Traourouder, F Menet, ... | | 2015 |
PC Chair C Davis, J Calvet, M Mannan, J Fernandez, R Ford, L Jean-Yves Marion, ... | | 2013 |
Aligot J Calvet, JM Fernandez, JY Marion Proceedings of the 2012 ACM conference on Computer and communications security, 2012 | | 2012 |