Aller au contenu principal
Photo of Charles-Henry Bertrand Van Ouytsel

Charles-Henry Bertrand Van Ouytsel

Assistant de recherche, Chargé de cours invité

SST/ICTM Institute of Information and Communication Technologies, Electronics and Applied Mathematics (ICTEAM)

SST/ICTM/INGI Pôle en ingénierie informatique (INGI)

SST/EPL Ecole polytechnique de Louvain (EPL)

2025
Papier de conférence

Bettaieb, S., Lucca, S., Bertrand Van Ouytsel, C.-H., Riviere, E., & et al. (2025). A Unified Comparison of Tabular and Graph-Based Feature Representations in Machine Learning for Malware Detection. 2025 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). Published. 4th Workshop on Rethinking Malware Analysis (WoRMA), Venice, Italy. https://doi.org/10.1109/EuroSPW67616.2025.00012


Bettaieb, S., D’hooge, L., Bertrand Van Ouytsel, C.-H., Legay, A., Riviere, E., Verkerken, M., & Volckaert, B. (2025). Simplicity Performs, But Should It? Evaluating Malware Detection Benchmarks. Proceedings of the ESORICS 2025 workshops. Published. Workshop on Security and Artificial Intelligence (SECAI), Toulouse, France.


Bettaieb, S., Lucca, S., Bertrand Van Ouytsel, C.-H., & Riviere, E. (2025). Evaluating Behavior Graph Reduction Strategies for Machine Learning-Based Malware Detection. Proceedings of the 24th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Published. The 24th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guiyang, China.


2024
Papier de conférence

D’Hondt, A., Bertrand Van Ouytsel, C.-H., Legay, A., & Van Mechelen, A. (2024). Packing-Box: Improving Detection of Executable Packing. Black Hat Arsenal Europe 2024, London.


D’Hondt, A., Bertrand Van Ouytsel, C.-H., & Legay, A. (2024). Evading Packing Detection:Breaking Heuristic-Based Static Detectors (Extended Abstract). 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2024), Switzerland.


Gios, S., Bertrand Van Ouytsel, C.-H., & Legay, A. (2024). A vision on a methodology for the application of an Intrusion Detection System for satellites. In General Chair:Author Vladimir Filkov,Program Co-chairs:Author Baishakhi Ray,Author Minghui Zhou (ed.), ASE ’24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering (p. p. 2205 - 2209). Association for Computing Machinery. https://doi.org/10.1145/3691620.3695314


D’Hondt, A., Bertrand Van Ouytsel, C.-H., Legay, A., & et al. (2024). Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning. 19th International Conference on Risks and Security of Internet and Systems (CRiSIS 2024), France.


D’Hondt, A., Bertrand Van Ouytsel, C.-H., Legay, A., & Ramhani, J. (2024). NotPacked++: Evading Static Packing Detection. Black Hat Arsenal Europe 2024, London.


Chapitre de livre

Lucca, S., Wauters, D., Bertrand Van Ouytsel, C.-H., & Legay, A. (2024). Assessing static and dynamic features for packing detection. In Mike Hinchey, Bernhard Steffen (eds.) (ed.), The Combined Power of Research, Education, and Dissemination (pp. 146-166). Springer Cham.


Thèse

Bertrand Van Ouytsel, C.-H. (2024). Analysis and classification of malware based on symbolic execution and machine learning.


2023
Article de journal

Bertrand Van Ouytsel, C.-H., Dam, K. H. T., & Legay, A. (2023). Analysis of Machine Learning Approaches to Packing Detection. Computers & Security, 136, 103536. (Original work published 2024)


Papier de conférence

D’Hondt, A., Bertrand Van Ouytsel, C.-H., Martinez Balbuena, S., Jennes, R., & Legay, A. (2023). Packing-Box: Breaking Detectors and Visualizing Packing. Black Hat Arsenal Europe 2023, London.


D’Hondt, A., Bertrand Van Ouytsel, C.-H., & Legay, A. (2023). Experimental Toolkit for Manipulating Executable Packing. Published. 18th International Conference on Risks and Security of Internet and Systems, Rabat, Morocco. https://doi.org/10.1007/978-3-031-61231-2_17


Lucca, S., Crochet, C., Bertrand Van Ouytsel, C.-H., & Legay, A. (2023). On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr. FPS2023, Bordeaux.


2022
Papier de conférence

Bertrand Van Ouytsel, C.-H., Crochet, C., & Legay, A. (2022). Tool paper - SEMA: Symbolic Execution toolchain for Malware Analysis. CRiSIS ’22: Proceedings of the 17th International Conference on Risks and Security of Internet and Systems. Published. 17th International Conference on Risks and Security of Internet and Systems.


Bertrand Van Ouytsel, C.-H., Dam, K. H. T., & Legay, A. (2022). Symbolic analysis meets federated learning to enhance malware identifier. ARES ’22: Proceedings of the 17th International Conference on Availability, Reliability and Security, p. 1-10. https://doi.org/10.1145/3538969.3538996


Bertrand Van Ouytsel, C.-H., & Legay, A. (2022). Malware Analysis with Symbolic Execution and Graph Kernel. NordSec′22: Proceedings of the 27th Nordic conference on Secure IT Systems, p. 292-310.


D’Hondt, A., Bertrand Van Ouytsel, C.-H., & Legay, A. (2022). Packing-Box: Playing with Executable Packing. Black Hat Arsenal Europe 2022, London.


2021
Article de journal

Bertrand Van Ouytsel, C.-H., Bronchain, O., Cassiers, G., & Standaert, F.-X. (2021). How to Fool a Black Box Machine Learning Based Side-Channel Security Evaluation. New York, 13(4), 573-585. https://doi.org/10.1007/s12095-021-00479-x (Original work published 2021)


Papier de conférence

Bertrand Van Ouytsel, C.-H., & Legay, A. (2021). Extended abstract - Detection and classification of malware based on symbolic execution and machine learning methods. Cybersec&AI, Online.


Unités d'enseignement pour 2025

Libellé Code
Secured systems engineering LINFO2144