Peer-reviewed Conferences

   

Papers not available here can be provided upon request.


Year 2022

  • Eric Filiol. “Backdoor-case & Cryptographic challenge - Secret Sharing or Secret Spoiling (Криптографический конкурс: разделение секрета или порча секрета)”. Ruscrypto 2022 conference, Moscow, March 23rd-24th, 2022 (online). Program.

Year 2021

  • Eric Filiol, Francesco Mercaldo & Antonella Santone. “A Method for Automatic Penetration Testing and Mitigation: A Red Hat Approach”. KES 2021, 25th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, Sep. 8th- 10th, 2021, Szczecin, Poland. To appear in Procedia Computer Science Journal, volume 192.
  • Eric Filiol. “Unconventional Attack Against Voting Machines - Enlarging the Scope of Cybersecurity Risk Analysis”. 5th International Workshop on FORmal methods for Security Engineering (ForSE 2021), February 11th-13th, 2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP’2021), pp. 763-770.
  • Eric Filiol, Pierre Gautier, Florian Le Scanf, Paul Quinonero & Pierre-Emmanuel Rabillard. “Paper-tapping to Exfiltrate Data using Laser Printer”. 16th International Conference on Cyber Warfare and Security (ICCWS’21), February 25th- 26th, 2021, Tennessee, U.S.A. Academic Conferences International Proceedings, pp. 80-90.

Year 2020

  • Pierre Filiol, Cédric Delaunay, Alexander Istomin & Eric Filiol. “On the implementation of a FPGA high-speed hardware encryption system with HSM/(О реализации высокоскоростного аппаратного шифратора в HSM на базе ПЛИС)”. RusKrypto 2020, Moscow, March 17th-20th, 2020. Program. Slides and Partial source code.
  • Baptiste David, Maxence Delong & Eric Filiol. “Detection of Crawler Traps: Formalization and Implementation Defeating Protection on Internet and on the TOR Network”. 4th International Workshop on FORmal methods for Security Engineering (ForSE 2020)/6th International Conference on Information Systems Security and Privacy (ICISSP 2020), February 25th-27th, 2020, Valetta, Malta.
  • Joanna Moubarak, Eric Filiol & Maroun Chamoun. “The Blockchain Potential in Computer Virology”. 4thi International Workshop on FORmal methods for Security Engineering (ForSE 2020)/6th International Conference on Information Systems Security and Privacy (ICISSP 2020), February 25th-27th, 2020, Valetta, Malta.

Year 2019

  • Maxence Delong, Eric Filiol & Baptiste David. “Investigation and Surveillance on the Darknet - An Architecture to Reconcile Legal Aspects with Technology”. In: Proceedings of the 18th European Conference on Cyber Warfare and Security (ECCWS’2019), July 4th-5th, 2019, University of Coimbra, Portugal.
  • Cédric Delaunay, Alexander Istomin & Eric Filiol. “Kuznyechik - Optimized Implmentations on FPGA and Microcontrollers and their DPA Analysis Resistance (КУЗНЕЧИК» - Оптимизированные внедрении на ПЛИС и микроконтроллеров и их сопротивление анализу DPA)”. RusKrypto 2019, Moscow, March 19-22, 2019. Slides.
  • Eric Filiol. “BSEA-1 - A Stream cipher Backdooring Technique (BSEA — метод построения поточного шифра с закладкой)”. RusKrypto 2019, Moscow, March 19th-22nd, 2019. The paper version is available here.
  • Joanna Moubarak, Maroun Chamoun & Eric Filiol. “Hiding Malware on Distributed Storage”. In: Proceedings of the IEEE Jordan International Joint Conference On Electrical Engineering and Information Technology (JEEIT’2019), Amman, Jordan, April 9th-11th, 2019.
  • Joanna Moubarak, Maroun Chamoun & Eric Filiol. “Cyber Attacks Evolution”. In: Artificial Intelligence in Security and Defense 2019 (AISD’2019), March 26th-29th, paper 058, 2019, Beirut, Lebanon.
  • Eric Filiol & Abhilash Hota. “Solving a Hard Instance of Suspicious Behaviors with Sparse Binary Vectors Clustering”. In: Proceedings of the 3rd International Workshop on FORmal Methods in Security Engineering (ForSE) 2019, Prague, Czech Republic, February 23rd-25th, 2019, pp. 635–644, ScitePress.

Year 2018

  • Joanna Moubarak, Maroun Chamoun & Eric Filiol. “Developping a k-ary Malware Using Blockchain”. In: Proceedings of NOMS 2018 IEEE/IFIP Man2Block 2018, Tapei, April 27th, 2018. An extended version is available on ArXiv.
  • Joanna Moubarak, Eric Filiol & Maroun Chamoun. “On Blockchain Security and Relevant Attacks”. In: Proceedings of IEEE Menacomm 2018, Jounieh, Lebanon, April 18th-20th, 2018.
  • Maxence Delong, Eric Filiol, Clément Coddet, Olivier Fatou and Clément Suhard. “Technical and OSINT Analysis of the TOR Foundation”. In: Proceedings of the 13th International Conference on Cyber Warfare and Security (ICCWS’2018), National Defense University, Washington DC, USA. March 8th-9th, 2018. Published by ACPI, Jim S. Chen & John S. Hurley eds., pp. 164-173, 2018. The paper is available on ArXiv.
  • Eric Filiol, Nicolas J. and Maxence Delong. “Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the TOR Network”. In: Proceedings of the 2nd International Workshop on FORmal Methods in Security Engineering (ForSE 2018, Madeira, Portugal, February 22nd-24th, 2018, pp. 507–516, ScitePress.

Year 2017

  • Joanna Moubarak, Eric Filiol & Maroun Chamoun. “Comparative Analysis of Blockchain Technologies and the TOR Network: Two Faces of the same Reality?”. IEEE-CSNet 2017, Rio de Janeiro, Brazil, October 18th-20th, 2017.
  • Joanna Moubarak, Maroun Chamoun & Eric Filiol. “Comparative Study of Recent MEA Malware Phylogeny”. In: Proceedings of the 2nd International Conference on Computer and Communication Systems (ICCCS’2017, July 11th-14th, 2017, Krakow, Poland, IEEE Proceedings, pp. 16–20. This paper has received the best presentation award.
  • Joanna Moubarak, Maroun Chamoun & Eric Filiol. “Middle East Malware Evolution”. In: Proceedings of the 23rd international Scientific Conference of LAAS, April 6th- 7th, 2017, Beirut, Lebanon.
  • Arnaud Bannier & Eric Filiol. “One construction of a backdoored AES-like block cipher and how to break it”. RusKrypto 2017, Moscow, March 21st-24th, 2017. Conference Program. Slides.
  • Paul Irolla & Eric Filiol. “Glassbox: Dynamic Analysis Platform for Android Malware Applications on Real Devices”. In: Proceedings of the 1st International Workshop on FORmal Methods in Security Engineering (ForSE 2017, Porto, Portugal, February 21st-23rd, 2017.
  • Arnaud Bannier & Eric Filiol. “Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher”. In: Proceedings of the 1st International Workshop on FORmal Methods in Security Engineering (ForSE 2017, Porto, Portugal, February 21st-23rd, 2017. Paper available on arXiv.org.
  • Michel Dubois & Eric Filiol. “Hacking of the AES with Boolean Functions”. In: Proceedings of the 1st International Workshop on FORmal Methods in Security Engineering (ForSE 2017, Porto, Portugal, February 21st-23rd, 2017.
  • Nicolas Bodin, Eric Filiol, Clément Coddet & Olivier Fatou. “Intelligence Gathering by Comparison of JPEG images and Their Thumbnails”. In: Proceedings of the 12th International Conference on Cyber Warfare and Security (ICCWS 2017, Wright State University & the Center for Cyberspace Research, Air Force Institute of Technology, Dayton, USA, March 2nd-3th, 2017, pp. 48–56, Academic Conference Publishing International. Paper.

Year 2016

  • Baptiste David, Eric Filiol, Kevin Gallienne & Olivier Ferrand. “Heuristic and Proactive IAT/EAT-based Detection Module of Unknown Malware”. In: Proceedings of the 15th European Conference on Cyber Warfare and Security (ECCWS) 2016, Bundeswehr University, Munich, Germany, July 7th-8th, 2016, ACPI, pp. 84–93.
  • Michel Dubois & Eric Filiol. “3D Visualization Applied to PRBGs and Cryptography”. In: Proceedings of the 11th International Conference on Cyber Warfare and Security ICCWS, 2016, Boston, March 17th-18th, 2016. ACPI, pp. 371–381. This paper has received the “ICCWS 2016 Best PhD Paper Award”.
  • Eric Filiol & Cecilia Gallais. “Combinatorial Optimization of Operational (cyber) Attacks Against Large-scale Critical Infrastructures - The Vertex Cover Approach”. in: Proceedings of the 11th International Conference on Cyber Warfare and Security ICCWS 2016, Boston, March 17th-18th, 2016. ACPI, pp. 129–138.

Year 2015

  • Eric Filiol & Cécilia Gallais. “How Internal and External Dependencies can Affect Infrastructure’s Security”. In: Proceedings of the 14th European Conference on Cyber Warfare and Security ECCWS-15, Hatfield, UK, July 2nd-3rd, pp. 363–372,
  • Arnaud Bannier, Nicolas Bodin & Eric Filiol. “Automatic Search for a Maximum Probability Differential Characteristic in a SPN”. HICSS 2015, Software technology, Cybersecurity and Software Assurance Track, Hawai, January 5th-8th, 2015. This paper has received the Best Paper Award (Software Technology Track; Award). The extended and revised version is available here.

Year 2014

  • Bhume Bhumiratana, Saran Chiwtanasuntorn & Eric Filiol.”Perseus on VoIP Protocols - Development and Implementation of VoIP Platforms”. IEEE - ECTI-CON, Thailand, May 14th-17th, 2014. Paper
  • Eric Filiol & Cécilia Gallais. “Critical Infrastructure: Where We Stand Today?”. In: Proceedings of the 9th International Conference On Cyber Warfare and Security (ICCWS’2014, pp. 47–57, Indiana, USA, March 24th-25th, 2014.

Year 2013

  • Éric Filiol. “The control of Technology by Nation State: Past, Present and Future - The case of Cryptology and Information Security”. In: Proceedings of the 12th ECIW conference 2013, Jyvaskyla, Finland,, July 11th-12th, 2013. Paper, pp. 62–69, ACPI Press, ISBN 978-1-909507-34-0.
  • Grégory Commin & Éric Filiol. “Unrestricted Warfare versus Western Traditional Warfare: A Comparative Study”. In: Proceedings of the 12th ECIW conference 2013, Jyvaskyla, Finland, July 11th-12th, 2013, pp. 38–44, ACPI Press, ISBN 978-1-909507-34-0.
  • Tom Austin, Éric Filiol & Sébastien Josse. “Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach”. HICSS 2013, HICSS-46, Hawai, January 2013.

Year 2012

  • Michel Dubois & Eric Filiol. “Proposal for a new Equation System Modelling of Block Ciphers. Application to AES 128”. In: Proceedings of the 11th European Conference in Information Warfare (ECIW’2012), July 5th - 6th, 2012.
  • Baptiste David, Eric Filiol, Dorian Larget & Thibaut Scherrer. “Why and How the Current AV Approach Fails (with demos)”. In: Proceedings of the 21st EICAR conference 2012, Lisbon, May 6th, July 2012.
  • Eric Filiol & Sébastien Josse. “New Trends in Security Evaluation of Bayesian Network-based Malware Detection Models”, HICSS 2012, HICSS-45, Hawai, January 2012.

Year 2011

  • Jonathan Dechaux and Eric Filiol. “Microsoft Office vs Libre Office: Security comparison regarding viral attacks”. LibreOffice Conference 2011, Paris, October 12th-15th. Slides
  • Michel Dubois and Eric Filiol. “Proposal of a New Equation System Modelling for Block Ciphers”. In: Second IMA Conference on Mathematics in Defence, October 20th, 2011, Defence Academy Shrivenham, UK, ISBN 978-0-905091-29-7, IMA Press 2011.
  • Eric Filiol. “Perseus Library: Issue of an Alternative to Encryption”. In: 12th RMLL, Strasbourg, July 2011. Slides in French and in English.
  • Jean-Marie Borello, Eric Filiol & Ludovic Mé. “Détection dynamique de codes malveillants par mesure de similarité comportementale”. In: SARSSI 2011, La Rochelle, May 18th-21st, 2011.
  • Eric Filiol & Sébastien Josse. “Malware Spectral Analysis: Security Evaluation of Bayesian Networks”. In: Proceedings of the 20th EICAR conference, pp. 27–48, Krems, Austria, May 2011.
  • Eric Filiol & Alan Zaccardelle. “Magic Lantern…reloaded/Antiviral Psychosis McAfee Case”. In: Proceedings of the 20th EICAR conference, pp. 143–164, Krems, Austria, May 2011. Paper.
  • Jonathan Dechaux, Eric Filiol & Jean-Paul Fizaine. “Perverting Emails: a New Dimension in Internet (in)Security”. In: Proceedings of the 10th ECIW conference, July 2011, Tallinn, Estonia.
  • Eric Filiol. “The Computer Security of Public/open Computer Spaces: Feedback of a Field Study in Europe”. In: Proceedings of the 10th ECIW conference, July 2011, Tallinn, Estonia.

Year 2010

  • Hervé Debar, Eric Filiol & Grégoire Jacob. “Formalization of Viruses and Malware Through Process Algebra”. In: IEEE Fourth International Workshop on Advances in Information Security (IEEE-WAIS’2010), February 15th-18th, 2010, Cracovia, Poland. Paper. The extended version is available upon request.
  • Eric Filiol. “Anti-Forensic Techniques Based on Malicious Cryptography”. http://toc.proceedings.com/16459webtoc.pdf. In: Proceedings of the 9th European Conference in Information Warfare, Thessaloniki, Greece, June 30th-July 2nd, pp. 63–70, Academic Conference International, 2010.

Year 2009

  • Grégoire Jacob, Hervé Debar & Eric Filiol. “Malware Behavioural Detection by Attribute-Automata Using Abstraction from Platform and Language”. In: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID’09), Lecture Notes in Computer Science 5758, pp. 81–100, Springer Verlag, 2009.
  • Eric Filiol. “Operational Aspects of cyberwarfare of cyber-terrorist attacks: what a truly devastating attack could do”. In: Proceedings of the 18th European Conference on Information Warfare and Security 2009 (ECCWS 2009), Lisbon, Portugal, July 6th-7th, 2009, pp. 71–79.
  • Jean-Marie Borello, Eric Filiol & Ludovic Mé. “Are Antivirus Programs Able to Detect Complex Metamorphic Malware?”. In: Proceedings of the 18th EICAR Conference, Berlin, pp. 45–66, 2009.
  • Anthony Desnos, Eric Filiol & Ivan Lefou. “Detection of a HVM rootkit (aka BluePill-like)”. In: Proceedings of the 18th EICAR Conference, Berlin, pp. 105–133, 2009.
  • Philippe Beaucamp, Eric Filiol, Jean-Yves Marion & Daniel Reynaud-Plantey. “On the Use of Internet Voting Machine on Compromised Computers”. In: Proceedings of the 4th International Conference on Information Warfare and Security 2009, Cape Town, South Africa, 26th-27th mars 2009, pp. 1–9.
  • Philippe Beaucamp, Eric Filiol, Jean-Yves Marion & Daniel Reynaud-Plantey. “On the Impact of Malware on Internet Voting”. In: Proceedins of the 1st Luxembourg Day on Security and Reliability, February 10th, 2009, Luxembourg. Paper.

Year 2008

  • Eric Filiol, Frédéric Jennequin & Guillaume Delaunay. “Malware-based Information Leakage over IPSEC Tunnels”. In: Proceedings of the 7th European Conference on Information Warfare ECIW. Plymouth, June 2008.
  • Jean-Baptiste Bédrune, Eric Filiol & Frédéric Raynal. “Cryptographie: attaques tous azimuts. Comment attaquer la cryptographie sans cryptanalyse intensive”. Actes de la conférence SSTIC 2008, Rennes, France (in French).
  • Grégoire Jacob, Eric Filiol & Hervé Debar. “Functional Polymorphic Engines: Formalisation, Implementation and Use Cases”. In: Proceedings of the 17th EICAR Conference, Laval, France, May 2008.

Year 2007

  • Eric Filiol, Edouard Franc, Alessandro Gubbioli, Benoit Moquet & Guillaume Roblot. “Combinatorial Optimisation of Worm Propagation on an Unknown Network”. In: XXIIIth International Conference on Computer, Electrical and System Science and Engineering, Berlin, August 24th, 2007. In: Proceedings of World Academy of Science, Engineering and Technology, Volume 23, pp. 373–380, August 2007, Waset ed., ISBN 978-975-01752-2-0. Published in the International Journal of Computer, Electrical, Automation, Control and Information Engineering, Vol. 1, Issue 10, pp. 2931 – 2937, local copy.
  • Eric Filiol. “Formal Model Proposal for (Malware) Program Stealth”. In: Proceedings of the 17th Virus Bulletin Conference, Vienna, Austria, 21st-24th September 2007, pp. 179–185, Virus Bulletin Ltd, 2007. Paper & slides.
  • Jean-Marie Borello, Eric Filiol & Ludovic Mé. “Techniques d’obscurcissement de codes pour virus métamorphes”. In: Proceedings de la conférence SARSSI 2007, Annecy, juin 2007, ISBN 2-916377-49-2 (in French).
  • Eric Filiol, Grégoire Jacob & Hervé Debar. “Malware as Interactive Machines: A New Framework for Behaviour Modelling”. In: Proceedings of the 2nd Workshop in Theoretical Computer Virology, Nancy, France, May 2007. Paper
  • Eric Filiol, Grégoire Jacob & Hervé Debar. “Behavioral Detection of malware: from a surbey towards an established taxonomy”. In: Proceedings of the 2nd Workshop in Theoretical Computer Virology, Nancy, France, May 2007. Paper.
  • Eric Filiol. “Metamorphism, Formal Grammars and Undecidable Code Mutation”. In: Proceedings of the 4th International Conference on Computational Intelligence, Barcelona, April 2007. Published in the World Academy of Science, Engineering and Technology, vol. 20, ISBN 978-975-00803-9-5. Published in the International Journal of Computer, Electrical, Automation, Control and Information Engineering, Vol. 1, Issue 2, pp. 281–286, local copy.
  • Eric Filiol. “Formalisation and Implementation Aspects of K-ary (malicious) Codes”. Proceedings of the 16th EICAR Conference, Budapest, Hungary, May 2007.
  • Eric Filiol & Sébastien Josse. “A Statistical Model for Viral Detection Undecidability”. In: Proceedings of the 16th EICAR Conference, Budapest, Hungary, May 2007.

Year 2006

  • Johann Barbier, Eric Filiol & Ananda Mayoura. “New features for specific JPEG Steganalysis”. In: 3rd International conference on Cryptography, Coding and Information Security (CCIS 2006). Venise, 24-26 November 2006, pp. 72–77, ISBN 975-00803-6-X, local copy.
  • Johann Barbier, Eric Filiol & Ananda Mayoura. “Universal JPEG Steganalysis in the Compressed Frequency Domain”. In: Proceedings of IWDW 2006 Conference, Lecture Notes in Computer Science 4283, pp. 253–257, Springer Verlag, 2006.
  • Philippe Beaucamps & Eric Filiol. “On the possibility of practically obfuscating programs - Towards a unified perspective of code protection”. In: Proceedings of the 1st Workshop in Theoretical Computer Virology, Nancy, May 2006.
  • Eric Filiol, Grégoire Jacob & Mickael Leliard. “Evaluation methodology of viral behavioural analysis”. In: Proceedings of the 1st Workshop in Theoretical Computer Virology, Nancy, France, May 2006. Paper.
  • Eric Filiol. “Malware Pattern Scanning Schemes Secure Against Black-box Analysis”. In: Proceedings of the 15th EICAR Conference, Hamburg, Germany, May 2006.

Year 2005

  • Eric Filiol. “Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis: the BRADLEY virus”. In: Proceedings of the 14th EICAR Conference, Malta, pp.- 201–217, May 2005.

Year 2004

  • Eric Filiol. “Evolution des idées en virologie informatique”. In: Actes du 7</sup>ème</sup> Colloque d’Histoire de l’Informatique et de télécommunications à Rennes, CHIR 2004, pp. 155–170, ISBN 2-72611-1281-1 (in French)
  • Eric Filiol, Caroline Fontaine & Sébastien Josse. “The COSvd Ciphers”. In: Proceedings of the Ecrypt Conference on the State-of-the Art of Stream Ciphers, Bruges, October 13th-15th, 2004. Paper & slides.

Year 2003

  • Eric Filiol. “Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers”. In: Workshop on Combinatorics, Codes and Cryptology 2003, Huangshan, China, June 23rd–28th, 2003 (conference cancelled due to the SRAS epidemy). Paper.

Year 2002

  • Eric Filiol. “A New Statistical Testing for Symmetric Ciphers and Hash Functions”. In: Proceedings of the 4th International Conference on Information and Communication Security 2002, Lecture Notes in Computer Science 2513, pp. 342–353, Springer Verlag, 2002. Programs and data are available upon request.
  • Anne Canteaut & Eric Filiol. “On the Influence of the Filtering Function on the Performance of Fast Correlation Attacks on Filter Generators”. In: Benoit Macq & Jean-Jacques Quisquater eds, Proceedings of the Symposium on Information Theory in Benelux 2002, Louvain-La-Neuve. Belgium, pp. 299–306.
  • Eric Filiol. “Petites histoires cachées du chiffrement symétrique”. Journées Codes et Cryptographie 2002, CIRM - Luminy.

Year 2001

  • Eric Filiol & Caroline Fontaine. “A new Ultrafast Stream Ciphers Design: COS Ciphers”. In: Proceedings of the 8th IMA Conference on Cryptography and Coding, Lecture Notes in Computer Science 2260, pp. 85–98, Springer Verlag, 2001.
  • Eric Filiol & Caroline Fontaine. “A New, Fast Block Cipher Design: COS Ciphers”. In: Proceedings of IEEE International Symposium on Information Theory (ISIT) 2001, pp. 138, Washington, USA, 2001.

Year 2000

  • Anne Canteaut & Eric Filiol. “Ciphertext Only Reconstruction of Stream Ciphers based on Combination Generators”. In: Proceedings of Fast Software Encryption 2000, Lecture Notes in Computer Science 1978, pp. 61–72, Springer Verlag, 2000.
  • Eric Filiol. “Reconstruction of Punctured Convolutional Encoders”. In: Proceedings of the 2000 International Symposium on Information Theory and Applications (ISITA), Honolulu, USA, IEICE Publishing, 2000. Paper.
  • Eric Filiol. “Decimation Attack of Stream Ciphers”. In: Proceedings of the First International Conference in India - INDOCRYPT’2000, Lecture Notes in Computer Science 1977, pp. 125–148, Springer Verlag, 2000.

Year 1999

  • Eric Filiol. “Designs, Intersecting Families and Weight of Boolean Functions”. In: Proceedings of the 7th IMA Conference on Cryptography and Coding, Lecture Notes in Computer Science, 1746, pp. 70–80, Springer Verlag, 1999.

Year 1998

  • Eric Filiol & Caroline Fontaine. “Highly Nonlinear Balanced Boolean Functions with a good Correlation Immunity”. In: Advances in Cryptology - EUROCRYPT’98, Lecture Notes in Computer Science, 1403, pp. 475–488, Springer Verlag, 1998.

Year 1997

  • Eric Filiol. “Reconstruction of Convolutional Encoders over GF(q)”. In: Proceedings of the 6th IMA Conference on Cryptography and Coding, Lecture Notes in Computer Science, 1355, pp. 101–109, Springer Verlag, 1997.