What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Axel Legay
Google Scholar
11
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
A Unified Comparison of Tabular and Graph-Based Feature Representations in Machine Learning for Malware Detection.
Samy Bettaieb
Serena Lucca
Charles-Henry Bertrand Van Ouytsel
Axel Legay
Etienne Rivière
2024
journals/compsec
Analysis of machine learning approaches to packing detection.
Charles-Henry Bertrand Van Ouytsel
Khanh-Huu-The Dam
Axel Legay
2024
conf/acsac
Automated Vulnerability Detection in Smart Contracts using Control Flow Graphs and Machine Learning.
Charles Lohest
Samy Bettaieb
Axel Legay
2022
journals/popets
SoK: Privacy-enhancing Smart Home Hubs.
Igor Zavalyshyn
Axel Legay
Annanda Rath
Etienne Rivière
2022
conf/esorics
Product Incremental Security Risk Assessment Using DevSecOps Practices.
Sébastien Dupont
Artsiom Yautsiukhin
Guillaume Ginis
Giacomo Iadarola
Stefano Fagnano
Fabio Martinelli
Christophe Ponsard
Axel Legay
Philippe Massonet
2021
journals/compsec
Quantitative Security Risk Modeling and Analysis with RisQFLan.
Maurice H. ter Beek
Axel Legay
Alberto Lluch-Lafuente
Andrea Vandin
2020
journals/compsec
Optimizing symbolic execution for malware behavior classification.
Stefano Sebastio
Eduard Baranov
Fabrizio Biondi
Olivier Decourbe
Thomas Given-Wilson
Axel Legay
Cassius Puodzius
Jean Quilbeuf
2019
journals/compsec
Effective, efficient, and robust packing detection and classification.
Fabrizio Biondi
Michael A. Enescu
Thomas Given-Wilson
Axel Legay
Lamine Noureddine
Vivek Verma
2017
journals/compsec
Effectiveness of synthesis in concolic deobfuscation.
Fabrizio Biondi
Sébastien Josse
Axel Legay
Thomas Sirvent
2017
conf/africacrypt
Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks.
Stjepan Picek
Annelie Heuser
Alan Jovic
Axel Legay
2015
conf/ccs
Modelling Social-Technical Attacks with Timed Automata.
Nicolas David
Alexandre David
René Rydhof Hansen
Kim Guldstrand Larsen
Axel Legay
Mads Chr. Olesen
Christian W. Probst
Coauthors
Alan Jovic
(1)
Alberto Lluch-Lafuente
(1)
Alexandre David
(1)
Andrea Vandin
(1)
Annanda Rath
(1)
Annelie Heuser
(1)
Artsiom Yautsiukhin
(1)
Axel Legay
(11)
Cassius Puodzius
(1)
Charles Lohest
(1)
Charles-Henry Bertrand Van Ouytsel
(2)
Christian W. Probst
(1)
Christophe Ponsard
(1)
Eduard Baranov
(1)
Etienne Rivière
(2)
Fabio Martinelli
(1)
Fabrizio Biondi
(3)
Giacomo Iadarola
(1)
Guillaume Ginis
(1)
Igor Zavalyshyn
(1)
Jean Quilbeuf
(1)
Khanh-Huu-The Dam
(1)
Kim Guldstrand Larsen
(1)
Lamine Noureddine
(1)
Mads Chr. Olesen
(1)
Maurice H. ter Beek
(1)
Michael A. Enescu
(1)
Nicolas David
(1)
Olivier Decourbe
(1)
Philippe Massonet
(1)
René Rydhof Hansen
(1)
Samy Bettaieb
(2)
Sébastien Dupont
(1)
Sébastien Josse
(1)
Serena Lucca
(1)
Stefano Fagnano
(1)
Stefano Sebastio
(1)
Stjepan Picek
(1)
Thomas Given-Wilson
(2)
Thomas Sirvent
(1)
Vivek Verma
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to