Jean-Yves Marion
Orcid: 0009-0002-8262-3887Affiliations:
- INRIA, France
According to our database1,
Jean-Yves Marion
authored at least 97 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on loria.fr
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the 39th Annual ACM/IEEE Symposium on Logic in Computer Science, 2024
2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
2022
Log. Methods Comput. Sci., 2022
Complete and tractable machine-independent characterizations of second-order polytime.
Proceedings of the Foundations of Software Science and Computation Structures, 2022
2021
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Proceedings of the A Guided Tour of Artificial Intelligence Research: Volume III: Interfaces and Applications of Artificial Intelligence, 2020
Proceedings of the A Guided Tour of Artificial Intelligence Research: Volume III: Interfaces and Applications of Artificial Intelligence, 2020
2019
How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections).
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
2016
Inf. Comput., 2016
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016
2015
Low level code analysis and applications to computer security (NII Shonan Meeting 2015-4).
NII Shonan Meet. Rep., 2015
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
Proceedings of the 8th IEEE International Conference on Software Testing, 2015
CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Theory and Applications of Models of Computation, 2014
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
2013
Implicit Computational Complexity and Applications: Resource Control, Security, Real-Number Computation (NII Shonan Meeting 2013-13).
NII Shonan Meet. Rep., 2013
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013
Proceedings of the Foundations of Software Science and Computation Structures, 2013
2012
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Theory Comput. Syst., 2011
Proceedings of the 26th Annual IEEE Symposium on Logic in Computer Science, 2011
2010
Isolated Virtualised Clusters: Testbeds for High-Risk Security Experimentation and Training.
Proceedings of the 3rd Workshop on Cyber Security Experimentation and Test, 2010
Table of Contents - 27th International Symposium on Theoretical Aspects of Computer Science.
Proceedings of the 27th International Symposium on Theoretical Aspects of Computer Science, 2010
Proceedings of the 27th International Symposium on Theoretical Aspects of Computer Science, 2010
Proceedings of the Runtime Verification - First International Conference, 2010
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
ACM Trans. Comput. Log., 2009
ACM Trans. Comput. Log., 2009
Proceedings of the 26th International Symposium on Theoretical Aspects of Computer Science, 2009
Proceedings of the Seventh IEEE International Conference on Software Engineering and Formal Methods, 2009
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009
2008
RAIRO Theor. Informatics Appl., 2008
Proceedings of the Theory and Applications of Models of Computation, 2008
Proceedings of the 10th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2008
Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2008
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2008
Proceedings of the Computer Science Logic, 22nd International Workshop, 2008
2007
Theor. Comput. Sci., 2007
Proceedings of the Second Workshop on Logical and Semantic Frameworks, with Applications, 2007
Proceedings of the Typed Lambda Calculi and Applications, 8th International Conference, 2007
Proceedings of the Theoretical Aspects of Computing, 2007
Proceedings of the Computation and Logic in the Real World, 2007
2006
J. Comput. Virol., 2006
Inf. Comput., 2006
Expressiveness + Automation + Soundness: Towards Combining SMT Solvers and Interactive Proof Assistants.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2006
Proceedings of the Logic for Programming, 2006
Proceedings of the Functional and Logic Programming, 8th International Symposium, 2006
Proceedings of the Computer Science Logic, 20th International Workshop, 2006
Proceedings of the CAISE*06 Workshop on Philosophical Foundations on Information Systems Engineering PhiSE '06, 2006
2005
Implicit Complexity over an Arbitrary Structure: Sequential and Parallel Polynomial Time.
J. Log. Comput., 2005
Proceedings of the Term Rewriting and Applications, 16th International Conference, 2005
Proceedings of the Theoretical Aspects of Computing, 2005
2004
Learning reversible categorial grammars from structures.
Proceedings of the Intelligent Information Processing and Web Mining, 2004
Tailoring Recursion to Characterize Non-Deterministic Complexity Classes over Arbitrary Structures.
Proceedings of the Exploring New Frontiers of Theoretical Informatics, 2004
2003
Proceedings of the Fifth International Workshop on Implicit Computational Complexity, 2003
Proceedings of the Foundations of Software Science and Computational Structures, 2003
2002
Proceedings of the Sixth International Workshop on Tree Adjoining Grammar and Related Frameworks, 2002
2001
J. Funct. Program., 2001
Proceedings of the Perspectives of System Informatics, 2001
Proceedings of the Computer Science Logic, 15th International Workshop, 2001
2000
Theor. Comput. Sci., 2000
Proceedings of the Logic for Programming and Automated Reasoning, 2000
1999
From Multiple Sequent for Additive Linear Logic to Decision Procedures for Free Lattices.
Theor. Comput. Sci., 1999
1998
Proceedings of the Computer Science Logic, 12th International Workshop, 1998
1997
Proceedings of the TAPSOFT'97: Theory and Practice of Software Development, 1997
Proceedings of the Logical Foundations of Computer Science, 4th International Symposium, 1997
1994
Proceedings of the Computer Science Logic, 8th International Workshop, 1994
1993
Lambda Calculus Characterizations of Poly-Time.
Fundam. Informaticae, 1993