Follow
Fabrizio Biondi
Fabrizio Biondi
AI Research Manager, Avast
No verified email
Title
Cited by
Cited by
Year
Scalable approximation of quantitative information flow in programs
F Biondi, MA Enescu, A Heuser, A Legay, KS Meel, J Quilbeuf
Verification, Model Checking, and Abstract Interpretation: 19th …, 2018
462018
Effectiveness of synthesis in concolic deobfuscation
F Biondi, S Josse, A Legay, T Sirvent
Computers & Security 70, 500-515, 2017
44*2017
QUAIL: A quantitative security analyzer for imperative code
F Biondi, A Legay, LM Traonouez, A Wąsowski
Computer Aided Verification: 25th International Conference, CAV 2013, Saint …, 2013
422013
Detection of mirai by syntactic and behavioral analysis
NB Said, F Biondi, V Bontchev, O Decourbe, T Given-Wilson, A Legay, ...
2018 IEEE 29th International Symposium on Software Reliability Engineering …, 2018
36*2018
Quantifying information leakage of randomized protocols
F Biondi, A Legay, P Malacaria, A Wąsowski
Verification, Model Checking, and Abstract Interpretation: 14th …, 2013
332013
Effective, efficient, and robust packing detection and classification
F Biondi, MA Enescu, T Given-Wilson, A Legay, L Noureddine, V Verma
Computers & Security 85, 436-451, 2019
322019
Tutorial: An overview of malware detection and evasion techniques
F Biondi, T Given-Wilson, A Legay, C Puodzius, J Quilbeuf
Leveraging Applications of Formal Methods, Verification and Validation …, 2018
322018
Optimizing symbolic execution for malware behavior classification
S Sebastio, E Baranov, F Biondi, O Decourbe, T Given-Wilson, A Legay, ...
Computers & Security 93, 101775, 2020
312020
Maximizing entropy over Markov processes
F Biondi, A Legay, BF Nielsen, A Wąsowski
Journal of Logical and Algebraic Methods in Programming 83 (5-6), 384-399, 2014
222014
Quantifying information leakage of randomized protocols
F Biondi, A Legay, P Malacaria, A Wąsowski
Theoretical Computer Science 597, 62-87, 2015
152015
Hybrid statistical estimation of mutual information for quantifying information flow
Y Kawamoto, F Biondi, A Legay
International Symposium on Formal Methods, 406-425, 2016
132016
Measuring global similarity between texts
U Fahrenberg, F Biondi, K Corre, C Jegourel, S Kongshøj, A Legay
Statistical Language and Speech Processing: Second International Conference …, 2014
13*2014
Maximizing entropy over markov processes
F Biondi, A Legay, BF Nielsen, A Wąsowski
Language and Automata Theory and Applications: 7th International Conference …, 2013
132013
HyLeak: hybrid analysis tool for information leakage
F Biondi, Y Kawamoto, A Legay, LM Traonouez
Automated Technology for Verification and Analysis: 15th International …, 2017
112017
Comparative analysis of leakage tools on scalable case studies
F Biondi, A Legay, J Quilbeuf
International SPIN Workshop on Model Checking of Software, 263-281, 2015
92015
Information leakage of non-terminating processes
F Biondi, A Legay, BF Nielsen, P Malacaria, A Wasowski
IARCS Annual Conference on Foundations of Software Technology and …, 2014
92014
Attainable unconditional security for shared-key cryptosystems
F Biondi, T Given-Wilson, A Legay
Information Sciences 369, 80-99, 2016
82016
ITU DS.: Markovian Processes for Quantitative Information Leakage. D-2015/115
F Biondi
8*2015
MASSE: Modular automated syntactic signature extraction
F Biondi, F Dechelle, A Legay
2017 IEEE International Symposium on Software Reliability Engineering …, 2017
72017
Hybrid statistical estimation of mutual information and its application to information flow
F Biondi, Y Kawamoto, A Legay, LM Traonouez
Formal Aspects of Computing 31, 165-206, 2019
62019
The system can't perform the operation now. Try again later.
Articles 1–20