Peer-reviewed Journals

   

Year 2021

  • Eric Filiol, Francesco Mercaldo & Antonella Santone. “A Method for Automatic Penetration Testing and Mitigation: A Red Hat Approach”. Procedia Computer Science, vol. 192, pp. 2039–2046, 2021.
  • Joanna Moubarak, Eric Filiol & Maroun Chamoun. “The Blockchain Potential in Computer Virology - Leveraging Combinatoirla Techniques of k-ary codes“.FORSe 2020 Special Issue, Antonella Santone Guest editor, Journal of computer Virology and Hacking Techniques. Volume 17, issue 3, pp. 199–220.
  • Baptiste David, Maxence Delong & Eric Filiol. “Detection of crawler traps: formalization and implementation—defeating protection on internet and on the TOR network”. FORSe 2020 Special Issue, Antonella Santone Guest editor, Journal of computer Virology and Hacking Techniques, Volume 17, issue 3, pp. 167–183. Full-text view-only version.

Year 2020

  • Joanna Moubarak, Maroun Chamoun & Eric Filiol. “On Distributed Ledger’s Security and Illegal Uses”. Future Generation Computer Systems, Volume 113, December 2020, pages 183-195 2020. Online version available here
  • Maxence Delong, Eric Filiol & Baptiste David. “Investigation and Surveillance on the Darknet - A Secure Architecture to Reconcile Legal Aspects with Technology”. Extended version of the ECCWS 2019 paper. Journal of Information Warfare, vol. 19, issue 1, pp. 62-79.
  • Eric Filiol, Maxence Delong & Nicolas Job. “Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the Tor Network”. FORSe 2018 & 2019 Special Issue, Antonella Santone Guest editor, Journal of computer Virology and Hacking Techniques, vol. 16, issue 1, pp. 3–18, 2020.

Year 2018

  • Eric Filiol. “Les risques concernant lutilisation des algorithmes dits prédictifs dans le domaine sensible de la justice”. Archives de Philosophie du Droit, volume 60 La justice prédictive sous la direction de Sylvie Lebreton Derrien, Editions Dalloz, novembre 2018.
  • Eric Filiol. “La réalité du contexte Cyber - Menaces, risques et enjeux”. Revue Risques - Les Cahiers de l’Assurance, numéro 113, Mars 2018.

Year 2017

  • Baptiste David, Eric Filiol & Kévin Gallienne. “Structural Analysis of Binary Executable Headers for Malware Detection Optimization”. Journal in Computer Virology and Hacking Techniques, volume 13, Issue 2, pp. 87–93, 2017.
  • Eric Filiol & Cécilia Gallais. “Combinatorial Optimization of Operational (Cyber) Attacks against Large-scale Critical Infrastructure - The Vertex Cover Approach”. International Journal in Cyber Warfare and Terrorism, vol. 7, issue 3, pp. 29–43, June/July 2017.
  • Eric Filiol & Cécilia Gallais. “Critical Infrastructure: Where we Stand Today - A Comprehensive and Comparative Study of the Definitions of a Critical Infrastructure”. Journal of Information Warfare, Volume 16, Issue 1, pp. 64–87, 2017.

Year 2016

  • Michel Dubois & Eric Filiol. “3D Visualization Applied to PRBG and Cryptography”. Computer Science and Information Technology, Vol. 4(5), pp. 171–180, DOI: 10.13189/csit.2016.04050.
  • Olivier Ferrand & Eric Filiol. “Combinatorial Detection of Malware by IAT Discrimination”. Special Issue on Knowledge-based System and Security, Prof. Roy Park Guest Editor, Journal in Computer Virology and Hacking Techniques, vol. 12, issue 3, pp. 131–136, DOI number 10.1007/s11416-015-0257-8), 2016.
  • Jonathan Dechaux & Eric Filiol. “Proactive Defense Against Malicious Documents. Formalization, Implementation and Case Studies”. Special Issue on Knowledge-based System and Security, Prof. Roy Park Guest Editor, Journal in Computer Virology and Hacking Techniques, vol. 12, issue 3, pp. 191–202, DOI number 10.1007/s11416-015-0259-6.

Year 2015

  • Gregory Commin & Eric Filiol. “Unrestricted Warfare vs Western Traditional Warfare: a Comparative Study”. Journal in Information Warfare, vol. 14, Issue 1, pp. 14–23, 2015.
  • Ashwin Kalbhor, Thomas Austin, Eric Filiol, Sébastien Josse & Mark Stamp. “Dueling Hidden Markov Models for Virus Analysis”. Journal in Computer Virology and Hacking Techniques, vol. 11, Issue 2, pp. 103–118, 2015.
  • Eric Filiol. “Comment vraiment paralyser un pays à l’aide du cyber”. Les Cahiers de la Revue de Défense Nationale “Penser autrement”, 10 juin 2015, pp. 103–110. Le Cahier.

Year 2014

  • Eric Filiol. “La realidad operacional de la ciberguerra y de los ciberataques: cómo paralizar un país”. La Vanguardia, Dossier 54, pp. 70-76, December 11th, 2014 (texts in Spanish and English).

Year 2013

  • Eric Filiol. “The Control of technology by Nation States: Past, Present and Future - The Case of Cryptology and Information Security”. Journal in Information Warfare, Vol. 12, Issue 3, pp. 1–10, October 2013.

Year 2012

  • Michel Dubois & Eric Filiol. “Proposal for a New Equation System Modelling of Block Ciphers and Application to AES 128”. PIONNEER Journal of Algebra, Number Theory and Its Applications, vol. 4, issue 2, pp. 11-40, 2012, ISSN 2231-1831.
  • Eric Filiol. “PERSEUS Technology: New Trends in Information and Communication Security.” Intellectual Archive Bulletin, Abstract ID 491, pp. 21-22, June 2012, ISSN 1929-1329.

Year 2011

  • Cécile Duvigneau & Eric Filiol. “Bijective differentially 2-uniform functions and Balanced Incomplete Block Design: New Combinatorial Construction”. Pioneer Journal of Advances in Applied Mathematics. volume 2, issue 1, pp. 21–38, 2011.
  • Anthony Desnos, Eric Filiol and & Lefou. “Detecting (and Creating!) A HVM Rootkit (aka BluePill-like)”. Journal in Computer Virology, 7(1), pp. 23–50, 2011.
  • Eric Filiol. “Renseignement, planification et conduite d’une cyberattaque”. Dossier Contrôles et surveillance dans le cyberespace, sous la direction de F. Ocqueteau, La Documentation Francaise, numéro 988, septembre 2011, pp. 69ff.
  • Eric Filiol. “Cybermenaces, cyberguerres et cyberterrorisme en et contre l’Europe”. Dossier Grande Europe numéro 34, La documentation Française, juillet 2011. Article.

Year 2010

  • Jean-Baptiste Bédrune, Eric Filiol and Frédéric Raynal. “Cryptography: All-out Attacks or How to Attack Cryptography Without Intensive Cryptanalysis”. SSTIC 2008 Special Issue, P. Biondi editor, Journal in Computer Virology, 6(3), pp. 207–237, 2010.
  • Jean-Marie Borello, Eric Filiol & Ludovic Mé. “From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques”. Journal in Computer Virology, 6(3), pp. 277–287, 2010.

Year 2009

  • Daniel Bilar & Eric Filiol. Annotated translation from the German of J. Kraus’s thesis entitled “On self-reproducing Computer Programs”. Journal in Computer Virology, 5(1), pp. 9–87, 2009.
  • Grégoire Jacob, Eric Filiol & Hervé Debar. “Functional Polymorphic Engines: Formalization, Implementation and Use Cases”. Journal in Computer Virology, 5(3), pp. 247 – 262, 2009.
  • Eric Filiol “Menaces virtuelles… bien réelles”. Cahier Sécurité - Un monde en alerte, L’Abécédaire des Institutions, cahier 42, pp. 19–22, 2009.
  • Eric Filiol & Fred Raynal. “Cyberguerre : de l’attaque du bunker à l’attaque dans la profondeur”. Revue de Défense Nationale et Sécurité Collective volume 2009-3, pp. 74–86, mars 2009.

Year 2008

  • Grégoire Jacob, Hervé Debar & Eric Filiol. “Behavioral Detection of Malware: From a Survey Towards an Established Taxonomy”. Journal in Computer Virology, 4(3), pp. 251–266, 2008.
  • Eric Filiol & Frederic Raynal. “Enciphered Communications: A Can of Worms?”. Revue de Défense Nationale, Special Issue “From Crybercrime to Cyberwarfare, volume 708.
  • Grégoire Jacob, Eric Filiol & Hervé Debar. “Malware as Interaction Machines: A New Framework for Behavior Modelling”. Journal in Computer Virology, 4(3), pp. 235 – 250, 2008.
  • Eric Filiol. “New Memory Persistence Threats”. Virus Bulletin, July 2008, pp. 6–9. PDF
  • Eric Filiol, Frédéric Jennequin & Guillaume Delaunay. “Malware-based Information Leakage over IPSEC Tunnels”, Journal in Information Warfare, volume 7, issue 3, pp. 11–22, December 2008.
  • Johann Barbier, Eric Filiol & Ananda Mayoura. “New features for specific JPEG Steganalysis”. International Journal of Computer, Electrical, Automation, Control and Information Engineering, Vol. 2, Issue 4, pp. 1095 – 1100, 2008.
  • Eric Filiol & Fred Raynal. “Communications chiffrées : et si le ver n’était pas (que) dans la pomme ?”. Revue de la Défense Nationale, Nr 547, pp. xx-yy, mai 2008.

Year 2007

  • Philippe Beaucamps & Eric Filiol. “On the possibility of practically obfuscating programs - Towards a unified perspective of code protection”. WTCV’06 Special Issue, G. Bonfante & J.-Y. Marion eds, Journal in Computer Virology/, 3(1), 3–21, 2007.
  • Eric Filiol & Sébastien Josse. “A Statistical Model for Viral Detection Undecidability”. ICAR 2007 Special Issue, V. Broucek ed., Journal in Computer Virology, 3(2), pp. 65–74, 2007.
  • Eric Filiol. “Formalisation and Implementation Aspects of K-ary (malicious) Codes”. EICAR 2007 Special Issue, V. Broucek ed., Journal in Computer Virology, 3(2), pp. 75–86, 2007.
  • Johann Barbier, Eric Filiol & Kichenakoumar Mayoura. “Efficient Blind Detection of JPEG Steganography”. Journal of Multimedia, 2(2), pp. 1–9, 2007. pdf
  • Eric Filiol. “Metamorphism, Formal Grammars and Undecidable Code Mutation”. International Journal of Computer, Electrical, Automation, Control and Information Engineering, Vol. 1, Issue 2, pp. 281 – 286, 2007.
  • Eric Filiol & Jean-Paul Fizaine. “OpenOffice Security and Viral Risk - Part One”. Virus Bulletin, pp. 11–17, September 2007. Pdf Part1 & 2
  • Eric Filiol & Jean-Paul Fizaine. “OpenOffice Security and Viral Risk - Part Two”. Virus Bulletin, pp. 8–12, October 2007.
  • Eric Filiol, Edouard Franc, Alessandro Gubbioli, Benoit Moquet & Guillaume Roblot. “Combinatorial Optimisation of Worm Propagation on an Unknown Network”. International Journal of Computer, Electrical, Automation, Control and Information Engineering, Vol. 1, Issue 10, pp. 2931 – 2937, 2007.
  • Eric Filiol, Mickael Le Liard & Grégroire Jacob. “Evaluation Methodology and Theoretical Model for Antiviral Behavioural Detection Strategies”. WTCV’06 Special Issue, G. Bonfante & J.-Y. Marion eds, Journal in Computer Virology, 3(1), pp. 23–37, 2007.

Year 2006

  • Eric Filiol. “Malware Pattern Scanning Schemes Secure Against Black-box Analysis”. EICAR 2006 Special Issue, V. Broucek & Paul Turner eds, Journal in Computer Virology/, 2(1), pp. 35–50, 2006.
  • Eric Filiol. “Zero Knowledge-like proof of cryptanalysis of Bluetooth Encryption”. International Journal of Computer, Electrical, Automation, Control and Information Engineering, Vol. 1 Issue 8, pp. 2429 – 2437, 2006, Local copy.

Year 2005

  • Eric Filiol, Marko Helenius & Stefano Zanero. “Open problems in computer virology” Journal in Computer Virology, 1, (3-4), pp. 55–66, 2005

Year 2004

  • Eric Filiol. “Repetition Codes Cryptanalysis of Block Ciphers”. Journal of the Indian Statistical Association, 42 (2), pp. 159–178, 2004.