Papier de conférence
Bettaieb, S., Lucca, S., Bertrand Van Ouytsel, C.-H., Riviere, E., & et al. (2025). A Unified Comparison of Tabular and Graph-Based Feature Representations in Machine Learning for Malware Detection. 2025 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). Published. 4th Workshop on Rethinking Malware Analysis (WoRMA), Venice, Italy. https://doi.org/10.1109/EuroSPW67616.2025.00012
Bettaieb, S., D’hooge, L., Bertrand Van Ouytsel, C.-H., Legay, A., Riviere, E., Verkerken, M., & Volckaert, B. (2025). Simplicity Performs, But Should It? Evaluating Malware Detection Benchmarks. Proceedings of the ESORICS 2025 workshops. Published. Workshop on Security and Artificial Intelligence (SECAI), Toulouse, France.
Bettaieb, S., Lucca, S., Bertrand Van Ouytsel, C.-H., & Riviere, E. (2025). Evaluating Behavior Graph Reduction Strategies for Machine Learning-Based Malware Detection. Proceedings of the 24th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Published. The 24th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guiyang, China.
Papier de conférence
D’Hondt, A., Bertrand Van Ouytsel, C.-H., Legay, A., & Van Mechelen, A. (2024). Packing-Box: Improving Detection of Executable Packing. Black Hat Arsenal Europe 2024, London.
D’Hondt, A., Bertrand Van Ouytsel, C.-H., & Legay, A. (2024). Evading Packing Detection:Breaking Heuristic-Based Static Detectors (Extended Abstract). 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2024), Switzerland.
Gios, S., Bertrand Van Ouytsel, C.-H., & Legay, A. (2024). A vision on a methodology for the application of an Intrusion Detection System for satellites. In General Chair:Author Vladimir Filkov,Program Co-chairs:Author Baishakhi Ray,Author Minghui Zhou (ed.), ASE ’24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering (p. p. 2205 - 2209). Association for Computing Machinery. https://doi.org/10.1145/3691620.3695314
D’Hondt, A., Bertrand Van Ouytsel, C.-H., Legay, A., & et al. (2024). Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning. 19th International Conference on Risks and Security of Internet and Systems (CRiSIS 2024), France.
D’Hondt, A., Bertrand Van Ouytsel, C.-H., Legay, A., & Ramhani, J. (2024). NotPacked++: Evading Static Packing Detection. Black Hat Arsenal Europe 2024, London.
Chapitre de livre
Lucca, S., Wauters, D., Bertrand Van Ouytsel, C.-H., & Legay, A. (2024). Assessing static and dynamic features for packing detection. In Mike Hinchey, Bernhard Steffen (eds.) (ed.), The Combined Power of Research, Education, and Dissemination (pp. 146-166). Springer Cham.
Thèse
Bertrand Van Ouytsel, C.-H. (2024). Analysis and classification of malware based on symbolic execution and machine learning.
Article de journal
Bertrand Van Ouytsel, C.-H., Dam, K. H. T., & Legay, A. (2023). Analysis of Machine Learning Approaches to Packing Detection. Computers & Security, 136, 103536. (Original work published 2024)
Papier de conférence
D’Hondt, A., Bertrand Van Ouytsel, C.-H., Martinez Balbuena, S., Jennes, R., & Legay, A. (2023). Packing-Box: Breaking Detectors and Visualizing Packing. Black Hat Arsenal Europe 2023, London.
D’Hondt, A., Bertrand Van Ouytsel, C.-H., & Legay, A. (2023). Experimental Toolkit for Manipulating Executable Packing. Published. 18th International Conference on Risks and Security of Internet and Systems, Rabat, Morocco. https://doi.org/10.1007/978-3-031-61231-2_17
Lucca, S., Crochet, C., Bertrand Van Ouytsel, C.-H., & Legay, A. (2023). On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr. FPS2023, Bordeaux.
Papier de conférence
Bertrand Van Ouytsel, C.-H., Crochet, C., & Legay, A. (2022). Tool paper - SEMA: Symbolic Execution toolchain for Malware Analysis. CRiSIS ’22: Proceedings of the 17th International Conference on Risks and Security of Internet and Systems. Published. 17th International Conference on Risks and Security of Internet and Systems.
Bertrand Van Ouytsel, C.-H., Dam, K. H. T., & Legay, A. (2022). Symbolic analysis meets federated learning to enhance malware identifier. ARES ’22: Proceedings of the 17th International Conference on Availability, Reliability and Security, p. 1-10. https://doi.org/10.1145/3538969.3538996
Bertrand Van Ouytsel, C.-H., & Legay, A. (2022). Malware Analysis with Symbolic Execution and Graph Kernel. NordSec′22: Proceedings of the 27th Nordic conference on Secure IT Systems, p. 292-310.
D’Hondt, A., Bertrand Van Ouytsel, C.-H., & Legay, A. (2022). Packing-Box: Playing with Executable Packing. Black Hat Arsenal Europe 2022, London.
Article de journal
Bertrand Van Ouytsel, C.-H., Bronchain, O., Cassiers, G., & Standaert, F.-X. (2021). How to Fool a Black Box Machine Learning Based Side-Channel Security Evaluation. New York, 13(4), 573-585. https://doi.org/10.1007/s12095-021-00479-x (Original work published 2021)
Papier de conférence
Bertrand Van Ouytsel, C.-H., & Legay, A. (2021). Extended abstract - Detection and classification of malware based on symbolic execution and machine learning methods. Cybersec&AI, Online.