Fabrizio Biondi
Fabrizio Biondi
AI Research Manager, Avast
Verified email at avast.com
Title
Cited by
Cited by
Year
Quantifying information leakage of randomized protocols
F Biondi, A Legay, P Malacaria, A Wąsowski
Theoretical Computer Science 597, 62-87, 2015
422015
QUAIL: A quantitative security analyzer for imperative code
F Biondi, A Legay, LM Traonouez, A Wąsowski
International Conference on Computer Aided Verification, 702-707, 2013
372013
Scalable approximation of quantitative information flow in programs
F Biondi, MA Enescu, A Heuser, A Legay, KS Meel, J Quilbeuf
International Conference on Verification, Model Checking, and Abstract …, 2018
222018
Maximizing entropy over Markov processes
F Biondi, A Legay, BF Nielsen, A Wąsowski
Journal of Logical and Algebraic Methods in Programming 83 (5-6), 384-399, 2014
222014
Effectiveness of synthesis in concolic deobfuscation
F Biondi, S Josse, A Legay, T Sirvent
Computers & Security 70, 500-515, 2017
21*2017
Hybrid statistical estimation of mutual information for quantifying information flow
Y Kawamoto, F Biondi, A Legay
International Symposium on Formal Methods, 406-425, 2016
112016
HyLeak: hybrid analysis tool for information leakage
F Biondi, Y Kawamoto, A Legay, LM Traonouez
International Symposium on Automated Technology for Verification and …, 2017
102017
Comparative analysis of leakage tools on scalable case studies
F Biondi, A Legay, J Quilbeuf
International SPIN Workshop on Model Checking of Software, 263-281, 2015
92015
Attainable unconditional security for shared-key cryptosystems
F Biondi, T Given-Wilson, A Legay
Information Sciences 369, 80-99, 2016
82016
Measuring global similarity between texts
U Fahrenberg, F Biondi, K Corre, C Jegourel, S Kongshøj, A Legay
International Conference on Statistical Language and Speech Processing, 220-232, 2014
8*2014
Effective, efficient, and robust packing detection and classification
F Biondi, MA Enescu, T Given-Wilson, A Legay, L Noureddine, V Verma
Computers & Security 85, 436-451, 2019
62019
Detection of mirai by syntactic and behavioral analysis
NB Said, F Biondi, V Bontchev, O Decourbe, T Given-Wilson, A Legay, ...
2018 IEEE 29th International Symposium on Software Reliability Engineering …, 2018
6*2018
Information leakage of non-terminating processes
F Biondi, A Legay, BF Nielsen, P Malacaria, A Wasowski
62014
ITU DS.: Markovian Processes for Quantitative Information Leakage. D-2015/115
F Biondi
52015
Optimizing symbolic execution for malware behavior classification
S Sebastio, E Baranov, F Biondi, O Decourbe, T Given-Wilson, A Legay, ...
Computers & Security, 101775, 2020
42020
Tutorial: An overview of malware detection and evasion techniques
F Biondi, T Given-Wilson, A Legay, C Puodzius, J Quilbeuf
International Symposium on Leveraging Applications of Formal Methods, 565-586, 2018
42018
MASSE: Modular Automated Syntactic Signature Extraction
F Biondi, F Dechelle, A Legay
2017 IEEE International Symposium on Software Reliability Engineering …, 2017
42017
Security and privacy of protocols and software with formal methods
F Biondi, A Legay
International Symposium on Leveraging Applications of Formal Methods, 883-892, 2016
32016
Information leakage as a scheduling resource
F Biondi, M Chadli, T Given-Wilson, A Legay
Critical Systems: Formal Methods and Automated Verification, 83-99, 2017
22017
Hybrid statistical estimation of mutual information and its application to information flow
F Biondi, Y Kawamoto, A Legay, LM Traonouez
Formal Aspects of Computing 31 (2), 165-206, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20