Seguir
Joan Calvet
Joan Calvet
ESET
Dirección de correo verificada de eset.com
Título
Citado por
Citado por
Año
Survey of publicly available reports on advanced persistent threat actors
A Lemay, J Calvet, F Menet, JM Fernandez
Computers & Security 72, 26-59, 2018
1782018
Aligot: Cryptographic function identification in obfuscated binary programs
J Calvet, JM Fernandez, JY Marion
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1372012
Malware authors don't learn, and that's good!
J Calvet, CR Davis, PM Bureau
2009 4th International Conference on Malicious and Unwanted Software …, 2009
422009
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet
J Calvet, CR Davis, JM Fernandez, JY Marion, PL St-Onge, W Guizani, ...
Proceedings of the 26th annual computer security applications conference …, 2010
302010
Isolated Virtualised Clusters: Testbeds for {High-Risk} Security Experimentation and Training
J Calvet, CR Davis, JM Fernandez, W Guizani, M Kaczmarek, JY Marion, ...
3rd Workshop on Cyber Security Experimentation and Test (CSET 10), 2010
242010
Follow the traffic: Stopping click fraud by disrupting the value chain
M Faou, A Lemay, D Décary-Hétu, J Calvet, F Labrèche, M Jean, ...
2016 14th Annual Conference on Privacy, Security and Trust (PST), 464-476, 2016
182016
Large-scale malware experiments: Why, how, and so what
J Calvet, JM Fernandez, PM Bureau, JY Marion
Proceedings of the 2010 Virus Bulletin Conference (VB) 515, 2010
132010
Analyse dynamique de logiciels malveillants
J Calvet
École Polytechnique de Montréal, 2013
112013
Recognition of binary patterns by Morphological analysis
A Thierry, G Bonfante, J Calvet, JY Marion, F Sabatier
Reverse Engineering Conference, 2012
82012
WaveAtlas: surfing through the landscape of current malware packers
J Calvet, FL Lévesque, JM Fernandez, J Marion, E Traourouder, F Menet
Virus Bulletin Conference, 2015
62015
Visiting The Bear Den
J Calvet, J Campos, T Dupuy
WeLiveSecurity Blog, 2016
52016
Understanding swizzor's obfuscation scheme
J Calvet, PM Bureau
REcon, 2010
32010
Operation Windigo
O Bilodeau, PM Bureau, J Calvet, A Dorais-Joncas, MÉM Léveillé, ...
22015
The never ending war in the stack and the reincarnation of ROP attacks
A Nader, J Calvet, JM Fernandez
arXiv preprint arXiv:2005.11886, 2020
12020
Tripoux: reverse-engineering of malware packers for dummies
J Calvet
DeepSec 2010, 2010
12010
The good, the bad and the ugly: the advertiser, the bot & the traffic broker
M Faou, J Calvet, A Lemay, JM Fernandez, PM Bureau
2016
WaveAtlas: surfing through the landscape of current malware
J Calvet, F Lalonde Levesque, JM Fernandez, E Traourouder, F Menet, ...
2015
PC Chair
C Davis, J Calvet, M Mannan, J Fernandez, R Ford, L Jean-Yves Marion, ...
2013
Aligot
J Calvet, JM Fernandez, JY Marion
Proceedings of the 2012 ACM conference on Computer and communications security, 2012
2012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–19