Follow
Joan Calvet
Title
Cited by
Cited by
Year
Survey of publicly available reports on advanced persistent threat actors
A Lemay, J Calvet, F Menet, JM Fernandez
Computers & Security 72, 26-59, 2018
1732018
Aligot: Cryptographic function identification in obfuscated binary programs
J Calvet, JM Fernandez, JY Marion
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1342012
Malware authors don't learn, and that's good!
J Calvet, CR Davis, PM Bureau
2009 4th International Conference on Malicious and Unwanted Software …, 2009
412009
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet
J Calvet, CR Davis, JM Fernandez, JY Marion, PL St-Onge, W Guizani, ...
Proceedings of the 26th annual computer security applications conference …, 2010
302010
Isolated Virtualised Clusters: Testbeds for {High-Risk} Security Experimentation and Training
J Calvet, CR Davis, JM Fernandez, W Guizani, M Kaczmarek, JY Marion, ...
3rd Workshop on Cyber Security Experimentation and Test (CSET 10), 2010
242010
Follow the traffic: Stopping click fraud by disrupting the value chain
M Faou, A Lemay, D Décary-Hétu, J Calvet, F Labrèche, M Jean, ...
2016 14th Annual Conference on Privacy, Security and Trust (PST), 464-476, 2016
182016
Large-scale malware experiments: Why, how, and so what
J Calvet, JM Fernandez, PM Bureau, JY Marion
Proceedings of the 2010 Virus Bulletin Conference (VB) 515, 2010
132010
Analyse dynamique de logiciels malveillants
J Calvet
École Polytechnique de Montréal, 2013
112013
Recognition of binary patterns by Morphological analysis
A Thierry, G Bonfante, J Calvet, JY Marion, F Sabatier
Reverse Engineering Conference, 2012
82012
WaveAtlas: surfing through the landscape of current malware packers
J Calvet, FL Lévesque, JM Fernandez, J Marion, E Traourouder, F Menet
Virus Bulletin Conference, 2015
62015
Visiting The Bear Den
J Calvet, J Campos, T Dupuy
WeLiveSecurity Blog, 2016
52016
Understanding swizzor's obfuscation scheme
J Calvet, PM Bureau
REcon, 2010
32010
Operation Windigo
O Bilodeau, PM Bureau, J Calvet, A Dorais-Joncas, MÉM Léveillé, ...
22015
The never ending war in the stack and the reincarnation of ROP attacks
A Nader, J Calvet, JM Fernandez
arXiv preprint arXiv:2005.11886, 2020
12020
Tripoux: reverse-engineering of malware packers for dummies
J Calvet
DeepSec 2010, 2010
12010
The good, the bad and the ugly: the advertiser, the bot & the traffic broker
M Faou, J Calvet, A Lemay, JM Fernandez, PM Bureau
2016
WaveAtlas: surfing through the landscape of current malware
J Calvet, F Lalonde Levesque, JM Fernandez, E Traourouder, F Menet, ...
2015
PC Chair
C Davis, J Calvet, M Mannan, J Fernandez, R Ford, L Jean-Yves Marion, ...
2013
Aligot
J Calvet, JM Fernandez, JY Marion
Proceedings of the 2012 ACM conference on Computer and communications security, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–19