{"id":13,"date":"2015-06-15T10:26:53","date_gmt":"2015-06-15T08:26:53","guid":{"rendered":"http:\/\/members.loria.fr\/thierrygartiser\/?page_id=13"},"modified":"2016-09-29T19:11:51","modified_gmt":"2016-09-29T17:11:51","slug":"publications","status":"publish","type":"page","link":"https:\/\/members.loria.fr\/JYMarion\/publications\/","title":{"rendered":"Publicationss"},"content":{"rendered":"<p>   <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD XHTML 1.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/xhtml1\/DTD\/xhtml1-transitional.dtd\"> <html xmlns='http:\/\/www.w3.org\/1999\/xhtml' xml:lang='fr' lang='fr'> <head> <meta name=\"robots\" content=\"noindex, nofollow\" \/> <meta http-equiv=\"content-type\" content= \"text\/html;charset=UTF-8\" \/> <meta http-equiv=\"Content-Language\" content=\"fr\" \/> <link rel=\"stylesheet\" type=\"text\/css\" href=\"..\/css\/VisuGen.css\" \/> <link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/haltools.inria.fr\/\/css\/VisuRubriqueEncadre.css\" \/> <!-- Piwik haltools.inria.fr--> <script type=\"text\/javascript\">   var _paq = _paq || [];   _paq.push(['trackPageView']);   _paq.push(['enableLinkTracking']);   (function() {     var u=\"\/\/piwik.inria.fr\/\";     _paq.push(['setTrackerUrl', u+'piwik.php']);     _paq.push(['setSiteId', 25]);     var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];     g.type='text\/javascript'; g.async=true; g.defer=true; g.src=u+'piwik.js'; s.parentNode.insertBefore(g,s);   })(); <\/script> <noscript><\/p>\n<p><img decoding=\"async\" src=\"\/\/piwik.inria.fr\/piwik.php?idsite=25\" style=\"border:0;\" alt=\"\" \/><\/p>\n<p><\/noscript> <!-- End Piwik Code -->  <title>Publications HAL de  jean-yves marion<\/title> <\/head> <body> <\/p>\n<div id=\"res_script\">\n<p class='Rubrique'>2026<\/p>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-04914773v2\" target=\"_blank\" >Attacking the First-Principle: A Black-Box, Query-Free Targeted Mimicry Attack on Binary Function Classifiers<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Gabriel Sauger, Jean-Yves Marion, Sazzadur Rahaman, Vincent Tourneur, Muaz Ali, Victor Matrat<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2026<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Preprints, Working Papers, &#8230;<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-04914773\/file\/kelpie_with_authors.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04914773\/file\/kelpie_with_authors.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04914773\/file\/kelpie_with_authors.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04914773v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2025<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-05555513v1\" target=\"_blank\" >Ransomware: Extortion Is My Business<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Communications of the ACM<\/i>, 2025, 68 (05), pp.36-47. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3697829\">&#x27E8;10.1145\/3697829&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/3697829\" target=\"_blank\" >10.1145\/3697829<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-05555513v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-05045904v1\" target=\"_blank\" >Les capacit\u00e9s offensives de l\u2019intelligence artificielle dans le cyberespace<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">L\u00e9o Bertrand, Ma\u00edra de Freitas Pereira, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>\u00c9tudes fran\u00e7aises de renseignement et de cyber<\/i>, 2025, n\u00b0 4 (3), pp.217-233. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3917\/efrc.243.0218\">&#x27E8;10.3917\/efrc.243.0218&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.3917\/efrc.243.0218\" target=\"_blank\" >10.3917\/efrc.243.0218<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-05045904v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-05097335v1\" target=\"_blank\" >Complete and tractable machine-independent characterizations of second-order polytime<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Emmanuel Hainry, Bruce M Kapron, Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Logical Methods in Computer Science<\/i>, 2025, Volume 21, Issue 1, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.46298\/lmcs-21(1:5)2025\">&#x27E8;10.46298\/lmcs-21(1:5)2025&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.46298\/lmcs-21(1:5)2025\" target=\"_blank\" >10.46298\/lmcs-21(1:5)2025<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-05097335\/file\/2208.14739v5.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-05097335\/file\/2208.14739v5.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-05097335\/file\/2208.14739v5.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-05097335v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-05086241v1\" target=\"_blank\" >GoaTracer: An Open Service for Advanced PE Tracing<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Romain Guittienne, Quentin Jacqmin, Jean-Yves Marion, Pierre Marty, Fabrice Sabatier<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Botconf 2025 &#8211; 12th Edition<\/i>, May 2025, Angers, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-05086241\/file\/GoaTracer.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05086241\/file\/GoaTracer.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05086241\/file\/GoaTracer.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05086241v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2024<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-04917504v1\" target=\"_blank\" >Trace Partitioning as an Optimization Problem<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Charles Babu, S\u00e9bastien Bardin, Matthieu Lemerre, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Static Analysis Symposia<\/i>, Roberto Giacobazzi; Alessandra Gorla; Marco Campion, Oct 2024, Pasedena, California, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-04917504\/file\/149950026%20copy.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04917504\/file\/149950026%20copy.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04917504\/file\/149950026%20copy.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04917504v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04742085v1\" target=\"_blank\" >Declassification Policy for Program Complexity Analysis<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Emmanuel Hainry, Bruce M Kapron, Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>LICS &#8217;24: 39th Annual ACM\/IEEE Symposium on Logic in Computer Science<\/i>, Jul 2024, Tallinn Estonia, France. pp.1-14, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3661814.3662100\">&#x27E8;10.1145\/3661814.3662100&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/3661814.3662100\" target=\"_blank\" >10.1145\/3661814.3662100<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-04742085\/file\/LICS24-112.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04742085\/file\/LICS24-112.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04742085\/file\/LICS24-112.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04742085v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2023<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03826726v4\" target=\"_blank\" >Scalable program clone search through spectral analysis<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tristan Benoit, Jean-Yves Marion, S\u00e9bastien Bardin<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ESEC\/FSE &#8217;23 &#8211; 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering<\/i>, Dec 2023, San Francisco, United States. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.48550\/arXiv.2210.13063\">&#x27E8;10.48550\/arXiv.2210.13063&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.48550\/arXiv.2210.13063\" target=\"_blank\" >10.48550\/arXiv.2210.13063<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-03826726\/file\/ESEC_FSE_CR_PREPRINT.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03826726\/file\/ESEC_FSE_CR_PREPRINT.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03826726\/file\/ESEC_FSE_CR_PREPRINT.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03826726v4\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.univ-lorraine.fr\/hal-04282419v1\" target=\"_blank\" >Table ronde inaugurale : 2\u00e8me Assises universitaires Droit et Cybers\u00e9curit\u00e9<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ir\u00e8ne Weiss, Lionel Adam, Fabrice Gartner, Christophe Fardet, Jean-Yves Marion, Marc Burg<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2\u00e8me Assises universitaires Droit et Cybers\u00e9curit\u00e9<\/i>, Facult\u00e9 de droit et de sciences \u00e9conomiques de Nancy; LORIA, Oct 2023, Nancy (Centre de Congr\u00e8s), France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.univ-lorraine.fr\/hal-04282419v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.univ-lorraine.fr\/hal-04282443v1\" target=\"_blank\" >Conclusion 2\u00e8me Assises universitaires Droit et Cybers\u00e9curit\u00e9<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Marc Burg<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2\u00e8me Assises universitaires Droit et Cybers\u00e9curit\u00e9<\/i>, Facult\u00e9 de droit et sciences \u00e9conomiques de Nancy; LORIA, Oct 2023, Nancy (Centre de Congr\u00e8s), France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.univ-lorraine.fr\/hal-04282443v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Other publications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-04547822v1\" target=\"_blank\" >Ran\u00e7ongiciel, une plong\u00e9e dans le monde de la cybercriminalit\u00e9<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Ran\u00e7ongiciel, une plong\u00e9e dans le monde de la cybercriminalit\u00e9<\/i>, 2023<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Other publications<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-04547822\/file\/Ran%C3%A7ongiciel%2C%20une%20plong%C3%A9e%20dans%20le%20monde%20de%20la%20cybercriminalit%C3%A9.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04547822\/file\/Ran%C3%A7ongiciel%2C%20une%20plong%C3%A9e%20dans%20le%20monde%20de%20la%20cybercriminalit%C3%A9.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04547822\/file\/Ran%C3%A7ongiciel%2C%20une%20plong%C3%A9e%20dans%20le%20monde%20de%20la%20cybercriminalit%C3%A9.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-04547822v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2022<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03722168v1\" target=\"_blank\" >A tier-based typed programming language characterizing Feasible Functionals<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Emmanuel Hainry, Bruce Kapron, Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Logical Methods in Computer Science<\/i>, 2022, 18 (1), pp.31. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.46298\/LMCS-18(1:33)2022\">&#x27E8;10.46298\/LMCS-18(1:33)2022&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.46298\/LMCS-18(1:33)2022\" target=\"_blank\" >10.46298\/LMCS-18(1:33)2022<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03722168\/file\/hkmplmcs.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03722168\/file\/hkmplmcs.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03722168\/file\/hkmplmcs.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03722168v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.univ-lorraine.fr\/hal-04050011v1\" target=\"_blank\" >Conclusion<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mathieu Feuillet, Jean-Yves Marion, Marc Burg<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Assises universitaires et europ\u00e9ennes de la cybers\u00e9curit\u00e9<\/i>, Facult\u00e9 de droit de Nancy et le LORIA (CNRS, INRIA, Universit\u00e9 de Lorraine), Jul 2022, Nancy, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.univ-lorraine.fr\/hal-04050011v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03722245v3\" target=\"_blank\" >Complete and tractable machine-independent characterizations of second-order polytime<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Emmanuel Hainry, Bruce M Kapron, Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>FoSSaCS 2022 &#8211; 25th International Conference on Foundations of Software Science and Computation Structures<\/i>, Apr 2022, Munich, Germany. pp.368-388, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-99253-8_19\">&#x27E8;10.1007\/978-3-030-99253-8_19&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-030-99253-8_19\" target=\"_blank\" >10.1007\/978-3-030-99253-8_19<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03722245\/file\/ctcbff.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03722245\/file\/ctcbff.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03722245\/file\/ctcbff.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03722245v3\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03940881v2\" target=\"_blank\" >Incremental clustering of malware packers using features based on transformed CFG<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ludovic Robin, Corentin Jannier, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2022<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Preprints, Working Papers, &#8230;<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-03940881\/file\/Packer_detection%20%283%29.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03940881\/file\/Packer_detection%20%283%29.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03940881\/file\/Packer_detection%20%283%29.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03940881v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2021<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03549482v1\" target=\"_blank\" >Obfuscation-Resilient Executable Payload Extraction From Packed Malware<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Binlin Cheng, Ming Jiang, Erika A Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>30th Usenix Security Sympoisum<\/i>, Aug 2021, Virtual, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-03549482\/file\/Marion-Usenix2021.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03549482\/file\/Marion-Usenix2021.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03549482\/file\/Marion-Usenix2021.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03549482v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03447628v1\" target=\"_blank\" >Binary level toolchain provenance identification with graph neural networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tristan Benoit, Jean-Yves Marion, S\u00e9bastien Bardin<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>SANER 2021 &#8211; 28th IEEE International Conference on Software Analysis, Evolution and Reengineering<\/i>, Mar 2021, Honolulu \/ Virtual, United States. pp.131-141, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SANER50967.2021.00021\">&#x27E8;10.1109\/SANER50967.2021.00021&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/SANER50967.2021.00021\" target=\"_blank\" >10.1109\/SANER50967.2021.00021<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-03447628\/file\/SANER_2021_CAMERA_READY_1.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03447628\/file\/SANER_2021_CAMERA_READY_1.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03447628\/file\/SANER_2021_CAMERA_READY_1.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03447628v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03270335v1\" target=\"_blank\" >Compiler and optimization level recognition using graph neural networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">S\u00e9bastien Bardin, Tristan Benoit, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>MLPA 2020 &#8211; Machine Learning for Program Analysis<\/i>, Jan 2021, Yokohama \/ Virtual, Japan<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-03270335\/file\/Workshop_MLBA_MLPA_2020.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03270335\/file\/Workshop_MLBA_MLPA_2020.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03270335\/file\/Workshop_MLBA_MLPA_2020.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03270335v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2020<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-02573188v1\" target=\"_blank\" >Primitive recursion in the abstract<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Daniel Leivant, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Mathematical Structures in Computer Science<\/i>, 2020, 30 (1), pp.33-43. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1017\/S0960129519000112\">&#x27E8;10.1017\/S0960129519000112&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1017\/S0960129519000112\" target=\"_blank\" >10.1017\/S0960129519000112<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-02573188\/file\/mscs.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02573188\/file\/mscs.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02573188\/file\/mscs.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02573188v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02881308v1\" target=\"_blank\" >A tier-based typed programming language characterizing Feasible Functionals<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Emmanuel Hainry, Bruce Kapron, Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>LICS &#8217;20 &#8211; 35th Annual ACM\/IEEE Symposium on Logic in Computer Science<\/i>, Jul 2020, Saarbr\u00fccken, Germany. pp.535-549, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3373718.3394768\">&#x27E8;10.1145\/3373718.3394768&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/3373718.3394768\" target=\"_blank\" >10.1145\/3373718.3394768<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02881308\/file\/bff-lics.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02881308\/file\/bff-lics.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02881308\/file\/bff-lics.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02881308v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Book sections<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03173193v1\" target=\"_blank\" >Theoretical Computer Science: Computability, Decidability and Logic<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Gilles Dowek, R\u00e9mi Gilleron, Serge Grigorieff, Jean-Yves Marion, Simon Perdrix, S. Tison<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>A Guided Tour of Artificial Intelligence Research &#8211; Volume III: Interfaces and Applications of Artificial Intelligence (10.1007\/978-3-030-06170-8)<\/i>, Springer International Publishing, pp.1-50, 2020, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-06170-8_1\">&#x27E8;10.1007\/978-3-030-06170-8_1&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Book sections<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-030-06170-8_1\" target=\"_blank\" >10.1007\/978-3-030-06170-8_1<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-03173193v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-02995771v1\" target=\"_blank\" >Theoretical Computer Science: Computational Complexity<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Gilles Dowek, R\u00e9mi Gilleron, Serge Grigorieff, Jean-Yves Marion, Simon Perdrix, S. Tison<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>A Guided Tour of Artificial Intelligence Research &#8211; Volume III: Interfaces and Applications of Artificial Intelligence (10.1007\/978-3-030-06170-8)<\/i>, Springer International Publishing, 2020<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Book sections<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-02995771v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2019<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.univ-lorraine.fr\/hal-02564103v1\" target=\"_blank\" >How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mathilde Ollivier, S\u00e9bastien Bardin, Richard Bonichon, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ACSAC &#8217;19: 2019 Annual Computer Security Applications Conference<\/i>, Dec 2019, San Juan, Puerto Rico, United States. pp.177-189, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3359789.3359812\">&#x27E8;10.1145\/3359789.3359812&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/3359789.3359812\" target=\"_blank\" >10.1145\/3359789.3359812<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.univ-lorraine.fr\/hal-02564103\/file\/acsac_final.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.univ-lorraine.fr\/hal-02564103\/file\/acsac_final.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.univ-lorraine.fr\/hal-02564103\/file\/acsac_final.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.univ-lorraine.fr\/hal-02564103v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-02573099v1\" target=\"_blank\" >Obfuscation: where are we in anti-DSE protections? (a first attempt)<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mathilde Ollivier, S\u00e9bastien Bardin, Richard Bonichon, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>the 9th Workshop SSPREW<\/i>, Dec 2019, San Juan, United States. pp.1-8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3371307.3371309\">&#x27E8;10.1145\/3371307.3371309&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/3371307.3371309\" target=\"_blank\" >10.1145\/3371307.3371309<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-02573099v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03178806v1\" target=\"_blank\" >LockerGoga quickly reversed<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Corentin Jannier, Jean-Yves Marion, Fabrice Sabatier<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>MALCON 2019 14th International Conference on Malicious and Unwanted Software<\/i>, Oct 2019, Nantucket, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03178806\/file\/lockergoga.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03178806\/file\/lockergoga.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03178806\/file\/lockergoga.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03178806v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02499318v1\" target=\"_blank\" >Tiered complexity at higher order<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Emmanuel Hainry, Bruce Kapron, Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>DICE-FOPARA 2019 &#8211; Joint international workshop on Developments in Implicit Computational complExity and Foundational and Practical Aspects of Resource Analysis<\/i>, Apr 2019, Praha, Czech Republic<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02499318\/file\/paper%209.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02499318\/file\/paper%209.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02499318\/file\/paper%209.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02499318v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02499348v1\" target=\"_blank\" >Tiered complexity at higher order<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Emmanuel Hainry, Bruce Kapron, Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>MLA&#8217;2019 &#8211; Third Workshop on Mathematical Logic and its Applications<\/i>, Mar 2019, Nancy, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-02499348v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2018<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03167513v1\" target=\"_blank\" >Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Binlin Cheng, Jiang Ming, Jianmin Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CCS &#8217;18: 2018 ACM SIGSAC Conference on Computer and Communications Security<\/i>, Oct 2018, Toronto, Canada. pp.395-411, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3243734.3243771\">&#x27E8;10.1145\/3243734.3243771&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/3243734.3243771\" target=\"_blank\" >10.1145\/3243734.3243771<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-03167513v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Special issue<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01869014v1\" target=\"_blank\" >Foundations and Practice of Security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, revised selected papers<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdessamad Imine, Jos\u00e9 M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquin Garcia-Alfaro<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>FPS 2017 &#8211; 10th International Symposium on Foundations and Practice of Security<\/i>, Oct 2017, Nancy, France. <i>Lecture Notes in Computer Science<\/i>, 10723, pp.319, 2018, FPS: International Symposium on Foundations and Practice of Security, 978-3-319-75649-3. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-75650-9\">&#x27E8;10.1007\/978-3-319-75650-9&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Special issue<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-319-75650-9\" target=\"_blank\" >10.1007\/978-3-319-75650-9<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-01869014v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2017<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03167600v1\" target=\"_blank\" >A construction of a self-modifiying language with a formal correction proof<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Hubert Godfroy, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2017 12th International Conference on Malicious and Unwanted Software (MALWARE)<\/i>, Oct 2017, Fajardo, United States. pp.99-106, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/MALWARE.2017.8323962\">&#x27E8;10.1109\/MALWARE.2017.8323962&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/MALWARE.2017.8323962\" target=\"_blank\" >10.1109\/MALWARE.2017.8323962<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-03167600v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03167660v1\" target=\"_blank\" >Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">S\u00e9bastien Bardin, Robin David, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2017 IEEE Symposium on Security and Privacy (SP)<\/i>, May 2017, San Jose, CA, United States. pp.633-651, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SP.2017.36\">&#x27E8;10.1109\/SP.2017.36&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/SP.2017.36\" target=\"_blank\" >10.1109\/SP.2017.36<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-03167660v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2016<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01113342v1\" target=\"_blank\" >Two function algebras defining functions in NC k boolean circuits<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Reinhard Kahle, Jean-Yves Marion, Isabel Oitavem<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Information and Computation<\/i>, 2016, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.ic.2015.12.009\">&#x27E8;10.1016\/j.ic.2015.12.009&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.ic.2015.12.009\" target=\"_blank\" >10.1016\/j.ic.2015.12.009<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01113342\/file\/nc.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01113342\/file\/nc.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01113342\/file\/nc.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01113342v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01721492v1\" target=\"_blank\" >Specification of Concretization and Symbolization Policies in Symbolic Execution<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Robin David, S\u00e9bastien Bardin, Josselin Feist, Laurent Mounier, Marie-Laure Potet, Thanh Dinh Ta, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ISSTA 2016 &#8211; The International Symposium on Software Testing and Analysis <\/i>, Jul 2016, Saarland, Germany. pp.1-11<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01721492\/file\/issta-2016.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01721492\/file\/issta-2016.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01721492\/file\/issta-2016.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01721492v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01721502v1\" target=\"_blank\" >BINSEC\/SE: A Dynamic Symbolic Execution Toolkit for Binary-level Analysis<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Robin David, S\u00e9bastien Bardin, Thanh Dinh Ta, Josselin Feist, Laurent Mounier, Marie-Laure Potet, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>3rd IEEE International Conference on Software Analysis, Evolution, and Reengineering<\/i>, Mar 2016, Osaka, Japan<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01721502\/file\/2016-saner.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01721502\/file\/2016-saner.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01721502\/file\/2016-saner.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01721502v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01390838v1\" target=\"_blank\" >Abstract Self Modifying Machines<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Hubert Godfroy, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2016<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Preprints, Working Papers, &#8230;<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01390838\/file\/lola.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01390838\/file\/lola.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01390838\/file\/lola.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01390838v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01394263v1\" target=\"_blank\" >A theory of reflexive computation based on soft intuitionistic logic<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Hubert Godfroy, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2016<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Preprints, Working Papers, &#8230;<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01394263\/file\/SilSC.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01394263\/file\/SilSC.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01394263\/file\/SilSC.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01394263v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2015<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01263123v1\" target=\"_blank\" >Gorille sniffs code similarities, the case study of Qwerty versus Regin<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Malware Conference<\/i>, Oct 2015, Fajardo, Puerto Rico. pp.8<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01263123\/file\/malware2015.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01263123\/file\/malware2015.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01263123\/file\/malware2015.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01263123v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01257908v1\" target=\"_blank\" >CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jose Fernandez, Jean-Yves Marion, Benjamin Rouxel, Fabrice Sabatier, Aur\u00e9lien Thierry<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>22nd ACM Conference on Computer and Communications Security<\/i>, Oct 2015, Denver, United States. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2810103.2813627\">&#x27E8;10.1145\/2810103.2813627&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/2810103.2813627\" target=\"_blank\" >10.1145\/2810103.2813627<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01257908\/file\/codisasm.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01257908\/file\/codisasm.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01257908\/file\/codisasm.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01257908v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01198594v1\" target=\"_blank\" >WaveAtlas: surfing through the landscape of current malware packers<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Joan Calvet, Lalonde Fanny, Jos\u00e9 M. Fernandez, Jean-Yves Marion, Traourouder Erwann, Menet Fran\u00e7ois<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Virus Bulletin<\/i>, Sep 2015, Prague, Czech Republic<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-01198594v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/cea.hal.science\/cea-01836560v1\" target=\"_blank\" >Sound and quasi-complete detection of infeasible test requirements<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Sebastien Bardin, Mickael Delahaye, Robin David, Nikolai Kosmatov, Mike Papadakis, Yves Le Traon, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ICST 2015 &#8211; IEEE 8th International Conference on Software Testing, Verification and Validation<\/i>, Apr 2015, Graz, Austria. pp.1-10, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICST.2015.7102607\">&#x27E8;10.1109\/ICST.2015.7102607&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/ICST.2015.7102607\" target=\"_blank\" >10.1109\/ICST.2015.7102607<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/cea.hal.science\/cea-01836560v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2014<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01099692v1\" target=\"_blank\" >Malware Message Classification by Dynamic Analysis<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion, Thanh Dinh Ta<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The 7th International Symposium on Foundations and Practice of Security<\/i>, Nov 2014, Montreal, Canada. pp.16<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-01099692v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01084043v1\" target=\"_blank\" >Complexity Information Flow in a Multi-threaded Imperative Language<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>TAMC 2014<\/i>, Apr 2014, Chennai, India. pp.124 &#8211; 140, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-06089-7_9\">&#x27E8;10.1007\/978-3-319-06089-7_9&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-319-06089-7_9\" target=\"_blank\" >10.1007\/978-3-319-06089-7_9<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01084043\/file\/hulotte.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01084043\/file\/hulotte.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01084043\/file\/hulotte.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01084043v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Books<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01264784v1\" target=\"_blank\" >Foundations and practice of security : 6th international symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, revised selected papers<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">Springer, 8352, pp.444, 2014, Lecture Notes in Computer Science, Lecture Notes in Computer Science, 978-3-319-05302-8<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Books<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-01264784v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2013<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00925517v1\" target=\"_blank\" >Analysis and Diversion of Duqu&#8217;s Driver<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aur\u00e9lien Thierry<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Malware 2013 &#8211; 8th International Conference on Malicious and Unwanted Software<\/i>, Oct 2013, Fajardo, Puerto Rico<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00925517\/file\/malware2013.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00925517\/file\/malware2013.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00925517\/file\/malware2013.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00925517v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00939484v1\" target=\"_blank\" >Evolving graph-structures and their implicit computational complexity<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Daniel Leivant, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ICALP<\/i>, Jul 2013, RIGA, Latvia. pp.349-360<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00939484\/file\/LeivantMarion.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00939484\/file\/LeivantMarion.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00939484\/file\/LeivantMarion.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00939484v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00925184v1\" target=\"_blank\" >Duqu contre Duqu : Analyse et d\u00e9tournement du driver de Duqu<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aur\u00e9lien Thierry<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>SSTIC &#8211; Symposium sur la s\u00e9curit\u00e9 des technologies de l&#8217;information et des communications<\/i>, Jun 2013, Rennes, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00925184\/file\/SSTIC2013-Duqu-contre-Duqu-papier.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00925184\/file\/SSTIC2013-Duqu-contre-Duqu-papier.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00925184\/file\/SSTIC2013-Duqu-contre-Duqu-papier.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00925184v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00755450v2\" target=\"_blank\" >Type-based complexity analysis for fork processes<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Emmanuel Hainry, Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>16th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS)<\/i>, Mar 2013, Rome, Italy. pp.305-320, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-37075-5_20\">&#x27E8;10.1007\/978-3-642-37075-5_20&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-642-37075-5_20\" target=\"_blank\" >10.1007\/978-3-642-37075-5_20<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00755450\/file\/fossacs.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00755450\/file\/fossacs.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00755450\/file\/fossacs.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00755450v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01122860v1\" target=\"_blank\" >Implicit Computational Complexity and Applications: Resource Control, Security, Real-Number Computation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Akitoshi Kawamura, Jean-Yves Marion, David Nowak<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] 2013-13, National Institute of Informatics. 2013, pp.16<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-01122860v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00803412v1\" target=\"_blank\" >Behavior Analysis of Malicious Code by Weighted Behavior Abstraction<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] 2013<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00803412\/file\/pondere-hal.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00803412\/file\/pondere-hal.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00803412\/file\/pondere-hal.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00803412v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2012<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00763683v1\" target=\"_blank\" >Les Mac r\u00e9sistent-ils mieux aux virus que les PC ?<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Pour la science<\/i>, 2012, 420<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-00763683v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00763646v1\" target=\"_blank\" >Theoretical Aspects of Computer Science<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Thomas Schwentick<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theory of Computing Systems<\/i>, 2012, 51 (2), pp.123-124. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s00224-012-9401-8\">&#x27E8;10.1007\/s00224-012-9401-8&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/s00224-012-9401-8\" target=\"_blank\" >10.1007\/s00224-012-9401-8<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-00763646v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00591868v1\" target=\"_blank\" >An Implicit Characterization of PSPACE<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Marco Gaboardi, Jean-Yves Marion, Simona Ronchi Della Rocca<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ACM Transactions on Computational Logic<\/i>, 2012, 13 (2), pp.Article 18. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2159531.2159540\">&#x27E8;10.1145\/2159531.2159540&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/2159531.2159540\" target=\"_blank\" >10.1145\/2159531.2159540<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-00591868\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00591868\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00591868\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00591868v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00762918v1\" target=\"_blank\" >Viruses in Turing&#8217;s Garden<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ERCIM News<\/i>, 2012, 2012 (91)<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00762918\/file\/ErcimVirus.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00762918\/file\/ErcimVirus.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00762918\/file\/ErcimVirus.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00762918v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00762923v1\" target=\"_blank\" >From Turing machines to computer viruses<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences<\/i>, 2012, 370 (1971), pp.3319-3339. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1098\/rsta.2011.0332\">&#x27E8;10.1098\/rsta.2011.0332&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1098\/rsta.2011.0332\" target=\"_blank\" >10.1098\/rsta.2011.0332<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-00762923v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00762924v1\" target=\"_blank\" >Aligot: cryptographic function identification in obfuscated binary programs<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Joan Calvet, Jos\u00e9 Fernandez, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ACM Conference on Computer and Communications Security<\/i>, Oct 2012, Raleigh, United States. pp.169-182<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00762924\/file\/fp008-calvet.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00762924\/file\/fp008-calvet.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00762924\/file\/fp008-calvet.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00762924v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00764286v1\" target=\"_blank\" >Code synchronization by morphological analysis<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion, Fabrice Sabatier, Aur\u00e9lien Thierry<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>MALWARE 2012 &#8211; 7th International Conference on Malicious and Unwanted Software<\/i>, Oct 2012, Fajardo, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00764286\/file\/malware2012.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00764286\/file\/malware2012.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00764286\/file\/malware2012.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00764286v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00762252v1\" target=\"_blank\" >Abstraction-based Malware Analysis Using Rewriting and Model Checking<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ESORICS &#8211; 17th European Symposium on Research in Computer Security &#8211; 2012<\/i>, Sep 2012, Pisa, Italy. pp.806-823, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-33167-1\">&#x27E8;10.1007\/978-3-642-33167-1&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-642-33167-1\" target=\"_blank\" >10.1007\/978-3-642-33167-1<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00762252\/file\/esorics-definitif.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00762252\/file\/esorics-definitif.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00762252\/file\/esorics-definitif.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00762252v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00684026v1\" target=\"_blank\" >Complexity Information Flow in a Multi-threaded Imperative Language<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] 2012, pp.16<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00684026\/file\/hulotte.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00684026\/file\/hulotte.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00684026\/file\/hulotte.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00684026v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2011<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00591862v1\" target=\"_blank\" >Quasi-interpretations a way to control resources<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion, Jean-Yves Moyen<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theoretical Computer Science<\/i>, 2011, 412 (25), pp.2776-2796. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.tcs.2011.02.007\">&#x27E8;10.1016\/j.tcs.2011.02.007&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.tcs.2011.02.007\" target=\"_blank\" >10.1016\/j.tcs.2011.02.007<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-00591862\/file\/tcs.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00591862\/file\/tcs.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00591862\/file\/tcs.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00591862v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00591075v1\" target=\"_blank\" >Informatique et soci\u00e9t\u00e9 : Un laboratoire de haute s\u00e9curit\u00e9 en informatique : entretien avec Jean-Yves Marion<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Les Cahiers de l&#8217;INRIA &#8211; La Recherche<\/i>, 2011, Les 10 d\u00e9couvertes de l&#8217;ann\u00e9e, 448 janvier 2011<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00591075\/file\/Un_laboratoire_de_haute_sA_curite_en_informatique.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00591075\/file\/Un_laboratoire_de_haute_sA_curite_en_informatique.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00591075\/file\/Un_laboratoire_de_haute_sA_curite_en_informatique.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00591075v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00591853v1\" target=\"_blank\" >A type system for complexity flow analysis<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Twenty-Sixth Annual IEEE Symposium on Logic in Computer Science &#8211; LICS 2011<\/i>, Jun 2011, Toronto, Canada<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-00591853\/file\/effraie.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00591853\/file\/effraie.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00591853\/file\/effraie.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00591853v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00594396v1\" target=\"_blank\" >Behavior Analysis of Malware by Rewriting-based Abstraction &#8211; Extended Version<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] 2011<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00594396\/file\/fmcad-extended.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00594396\/file\/fmcad-extended.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00594396\/file\/fmcad-extended.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00594396v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2010<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01350161v1\" target=\"_blank\" >\u00c0 propos de la virologie informatique<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Joanna Jongwane<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Interstices<\/i>, 2010<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-01350161v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00506082v1\" target=\"_blank\" >Boulevard du cybercrime<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Matthieu Kaczmarek<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Pour la Science. Dossier<\/i>, 2010, 66, pp.78-85<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00506082v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00536706v1\" target=\"_blank\" >The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Joan Calvet, Carlton R. Davis, Jos\u00e9 M. Fernandez, Jean-Yves Marion, Pier-Luc St-Onge, Wadie Guizani, Pierre-Marc Bureau, Somayaji Anil<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Annual Computer Security Applications Conference<\/i>, Dec 2010, Austin, Texas, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00536706\/file\/article_acsac04v3.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00536706\/file\/article_acsac04v3.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00536706\/file\/article_acsac04v3.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00536706v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00536500v1\" target=\"_blank\" >Behavior Abstraction in Malware Analysis<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>1st International Conference on Runtime Verification<\/i>, Howard Barringer, Klaus Havelund, Insup Lee, Nov 2010, St. Julians, Malta. pp.168-182, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-16612-9_14\">&#x27E8;10.1007\/978-3-642-16612-9_14&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-642-16612-9_14\" target=\"_blank\" >10.1007\/978-3-642-16612-9_14<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00536500\/file\/RV-preprint.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00536500\/file\/RV-preprint.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00536500\/file\/RV-preprint.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00536500v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00536717v1\" target=\"_blank\" >Large-scale Malware Experiments: Why, How, and So What?<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Joan Calvet, Jos\u00e9 M. Fernandez, Pierre-Marc Bureau, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Virus Bulletin 2010<\/i>, Sep 2010, Vancouver, Canada. pp.241&#8211;247<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00536717v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00536712v1\" target=\"_blank\" >Isolated virtualised clusters: testbeds for high-risk security experimentation and training<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Joan Calvet, Carlton Davis, Jos\u00e9 M. Fernandez, Wadie Guizani, Matthieu Kaczmarek, Jean-Yves Marion, Pier-Luc St-Onge<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>3rd Workshop on Cyber Security Experimentation and Test (CSET &#8217;10)<\/i>, Aug 2010, Washington DC, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00536712\/file\/article5.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00536712\/file\/article5.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00536712\/file\/article5.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00536712v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00549418v1\" target=\"_blank\" >Analyse de Programmes par Tra\u00e7age<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Wadie Guizani, Jean-Yves Marion, Daniel Reynaud<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>8\u00e8me Symposium sur la S\u00e9curit\u00e9 des Technologies de l&#8217;Information et des Communications &#8211; SSTIC 2010<\/i>, Jun 2010, Rennes, France. pp.125-138<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00549418\/file\/document_actes.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00549418\/file\/document_actes.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00549418\/file\/document_actes.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00549418v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Book sections<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00549416v1\" target=\"_blank\" >D\u00e9cidabilit\u00e9 et Complexit\u00e9<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Gilles Dowek, R\u00e9mi Gilleron, Serge Grigorieff, Jean-Yves Marion, Simon Perdrix, Sophie Tison<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">Pierre Marquis, Odile Papini and Henri Prade. <i>IA Handbook<\/i>, C\u00e9padu\u00e8s, pp.1-63, 2010<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Book sections<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00549416\/file\/Chapitre_DecidabiliteComplexite.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00549416\/file\/Chapitre_DecidabiliteComplexite.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00549416\/file\/Chapitre_DecidabiliteComplexite.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00549416v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00999661v1\" target=\"_blank\" >D\u00e9cidabilit\u00e9 et Complexit\u00e9<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Gilles Dowek, R\u00e9mi Gilleron, Serge Grigorieff, Jean-Yves Marion, Simon Perdrix, Sophie Tison<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IA Handbook<\/i>, C\u00e9padu\u00e8s, pp.1-63, 2010<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Book sections<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00999661v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Documents associated with scientific events<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00549415v1\" target=\"_blank\" >27th International Symposium on Theoretical Aspects of Computer Science (STACS)<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Thomas Schwentick<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">Schloss Dagstuhl &#8211; Leibniz-Zentrum fuer Informatik, LIPIcs. <i>27th International Symposium on Theoretical Aspects of Computer Science &#8211; STACS 2010<\/i>, Mar 2010, Nancy, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Documents associated with scientific events<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00549415\/file\/Foreword.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00549415\/file\/Foreword.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00549415\/file\/Foreword.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00549415v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00547884v3\" target=\"_blank\" >Abstraction by Term Rewriting for Malware Behavior Analysis &#8211; Extended Version<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] 2010<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00547884\/file\/article-extended.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00547884\/file\/article-extended.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00547884\/file\/article-extended.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00547884v3\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00509486v2\" target=\"_blank\" >Behavior Abstraction in Malware Analysis &#8211; Extended Version<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2010<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Preprints, Working Papers, &#8230;<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00509486\/file\/rv-HAL-V2.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00509486\/file\/rv-HAL-V2.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00509486\/file\/rv-HAL-V2.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00509486v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2009<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00446057v1\" target=\"_blank\" >Sup-interpretations, a semantic method for static analysis of program resources<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ACM Transactions on Computational Logic<\/i>, 2009, 10 (4), 30 p. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/1555746.1555751\">&#x27E8;10.1145\/1555746.1555751&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/1555746.1555751\" target=\"_blank\" >10.1145\/1555746.1555751<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00446057\/file\/333pechoux.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00446057\/file\/333pechoux.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00446057\/file\/333pechoux.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00446057v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00439624v1\" target=\"_blank\" >On tiered small jump operators<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Logical Methods in Computer Science<\/i>, 2009, 5 (1), pp.1-19. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.2168\/LMCS-5(1:7)2009\">&#x27E8;10.2168\/LMCS-5(1:7)2009&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.2168\/LMCS-5(1:7)2009\" target=\"_blank\" >10.2168\/LMCS-5(1:7)2009<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/arxiv.org\/pdf\/0903.2410\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/0903.2410\" src=\"https:\/\/haltools.inria.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00439624v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00330022v1\" target=\"_blank\" >Architecture of a Morphological Malware Detector<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal in Computer Virology<\/i>, 2009, 5 (3), pp.263-270. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s11416-008-0102-4\">&#x27E8;10.1007\/s11416-008-0102-4&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/s11416-008-0102-4\" target=\"_blank\" >10.1007\/s11416-008-0102-4<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00330022\/file\/flowgraph.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00330022\/file\/flowgraph.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00330022\/file\/flowgraph.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00330022v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00433472v1\" target=\"_blank\" >A computability perspective on self-modifying programs<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion, Daniel Reynaud<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>7th IEEE International Conference on Software Engineering and Formal Methods &#8211; SEFM 2009<\/i>, Nov 2009, Hanoi, Vietnam<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00433472\/file\/automodificateur.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00433472\/file\/automodificateur.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00433472\/file\/automodificateur.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00433472v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00431666v1\" target=\"_blank\" >Dynamic Binary Instrumentation for Deobfuscation and Unpacking<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Daniel Reynaud, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IN-DEPTH SECURITY CONFERENCE 2009 EUROPE<\/i>, Nov 2009, Vienne, Austria<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00431666v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00425554v1\" target=\"_blank\" >Server-Side Dynamic Code Analysis<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Wadie Guizani, Jean-Yves Marion, Daniel Reynaud<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>4th International Conference on Malicious and Unwanted Software &#8211; Malware 2009<\/i>, Fernando C. Colon Osorio, Oct 2009, Montr\u00e9al, Canada. pp.55-62<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00425554\/file\/Server-Side_Dynamic_Code_Analysis.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00425554\/file\/Server-Side_Dynamic_Code_Analysis.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00425554\/file\/Server-Side_Dynamic_Code_Analysis.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00425554v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00758423v1\" target=\"_blank\" >On behavioral detection<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Philippe Beaucamps, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>18th EICAR Annual Conference 2009<\/i>, May 2009, Berlin, Germany<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-00758423v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00758451v1\" target=\"_blank\" >On the use of Internet Voting on Compromised Computers<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Philippe Beaucamps, Daniel Reynaud-Plantey, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>4th International conference on i-Warfare &#038; Security &#8211; ICIW 2009<\/i>, Mar 2009, Cape Town, South Africa<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-00758451v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00425584v1\" target=\"_blank\" >On the Impact of Malware on Internet Voting<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Philippe Beaucamps, Eric Filiol, Jean-Yves Marion, Daniel Reynaud<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>1st Luxembourg Day on Security and Reliability<\/i>, Feb 2009, Luxembourg, Luxembourg<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00425584v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Documents associated with scientific events<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00434332v1\" target=\"_blank\" >26th International Symposium on Theoretical Aspects of Computer Science (STACS)<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Susanne Albers, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">Schloss Dagstuhl &#8211; Leibniz-Zentrum fuer Informatik, Germany, LIPIcs. <i>STACS &#8211; 2009<\/i>, Feb 2009, FREIBURG, Germany. 090001, pp.1-7, 2009, Dagstuhl Seminar Proceedings<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Documents associated with scientific events<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00434332\/file\/09001.SWM.1858.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00434332\/file\/09001.SWM.1858.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00434332\/file\/09001.SWM.1858.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00434332v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00378667v1\" target=\"_blank\" >Surfing Code Waves<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Daniel Reynaud<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] 2009<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00378667v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2008<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00342320v1\" target=\"_blank\" >Soft Linear Logic and Polynomial Complexity Classes<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Marco Gaboardi, Jean-Yves Marion, Simona Ronchi Della Rocca<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Electronic Notes in Theoretical Computer Science<\/i>, 2008, 205 (6), pp.67-87. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.entcs.2008.03.066\">&#x27E8;10.1016\/j.entcs.2008.03.066&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.entcs.2008.03.066\" target=\"_blank\" >10.1016\/j.entcs.2008.03.066<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-00342320\/file\/GaboardiMarionRonchi08lsfa.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00342320\/file\/GaboardiMarionRonchi08lsfa.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00342320\/file\/GaboardiMarionRonchi08lsfa.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00342320v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00342331v1\" target=\"_blank\" >Learning discrete categorial grammars from structures<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Besombes, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>RAIRO &#8211; Theoretical Informatics and Applications (RAIRO: ITA)<\/i>, 2008, 42 (1), pp.165-182. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1051\/ita:2007055\">&#x27E8;10.1051\/ita:2007055&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1051\/ita:2007055\" target=\"_blank\" >10.1051\/ita:2007055<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-00342331\/file\/BesombesMarion.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00342331\/file\/BesombesMarion.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00342331\/file\/BesombesMarion.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00342331v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00332550v1\" target=\"_blank\" >Analyzing the Implicit Computational Complexity of object-oriented programs<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Annual Conference on Foundations of Software Technology and Theoretical Computer Science &#8211; FSTTCS 2008<\/i>, IARCS, the Indian Association for Research in Computing Science, Dec 2008, Bangalore, India<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00332550\/file\/paper28.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00332550\/file\/paper28.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00332550\/file\/paper28.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00332550v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00330021v1\" target=\"_blank\" >Morphological Detection of Malware<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Conference on Malicious and Unwanted Software<\/i>, Fernando C. Colon Osorio, Oct 2008, Alexendria VA, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00330021\/file\/flowgraph.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00330021\/file\/flowgraph.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00330021\/file\/flowgraph.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00330021v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00342366v1\" target=\"_blank\" >Recursion Schemata for NCk<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Reinhard Kahle, Jean-Yves Marion, Isabel Oitavem<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>22nd International Workshop, CSL 2008, 17th Annual Conference of the EACSL, Bertinoro, Italy, September 16-19, 2008. Proceedings<\/i>, Sep 2008, Bertinoro, Italy. pp.49-63, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-87531-4_6\">&#x27E8;10.1007\/978-3-540-87531-4_6&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-540-87531-4_6\" target=\"_blank\" >10.1007\/978-3-540-87531-4_6<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-00342366\/file\/CSL08BKMO.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00342366\/file\/CSL08BKMO.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00342366\/file\/CSL08BKMO.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00342366v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00332389v1\" target=\"_blank\" >Characterizations of Polynomial Complexity Classes with a Better Intensionality<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Proceedings of the 10th international ACM SIGPLAN conference on Principles and Practice of Declarative Programming &#8211; PPDP 2008<\/i>, Universidad Polytechnica, Jul 2008, Valencia, Spain. pp.79-88, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/1389449.1389460\">&#x27E8;10.1145\/1389449.1389460&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/1389449.1389460\" target=\"_blank\" >10.1145\/1389449.1389460<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00332389\/file\/ppdp09-pechoux.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00332389\/file\/ppdp09-pechoux.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00332389\/file\/ppdp09-pechoux.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00332389v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00335590v1\" target=\"_blank\" >An implementation of morphological malware detection<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>EICAR<\/i>, May 2008, Laval, France. pp.49&#8211;62<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00335590v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00332390v1\" target=\"_blank\" >A Characterization of NCk by First Order Functional Programs<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>5th International Conference on Theory and Applications of Models of Computation &#8211; TAMC 2008<\/i>, Xidian University, Apr 2008, Xian, China. pp.136-147, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-79228-4\">&#x27E8;10.1007\/978-3-540-79228-4&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-540-79228-4\" target=\"_blank\" >10.1007\/978-3-540-79228-4<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00332390\/file\/paper69.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00332390\/file\/paper69.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00332390\/file\/paper69.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00332390v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00342323v1\" target=\"_blank\" >A Logical Account of PSPACE<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Marco Gaboardi, Jean-Yves Marion, Simona Ronchi Della Rocca<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Symposium on Principles of Programming Languages &#8211; POPL&#8217;08<\/i>, Jan 2008, San Francisco, United States. pp.121-131<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-00342323\/file\/poplGMR.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00342323\/file\/poplGMR.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00342323\/file\/poplGMR.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00342323v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00337523v1\" target=\"_blank\" >Obfuscation by Interpretation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Daniel Reynaud, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>3rd International Workshop on the Theory of Computer Viruses &#8211; TCV 08<\/i>, 2008, Nancy, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00337523v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2007<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00184985v1\" target=\"_blank\" >On the defence notion<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Anne Bonfante, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal in Computer Virology<\/i>, 2007, 3 (4), pp.247-251. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s11416-007-0058-9\">&#x27E8;10.1007\/s11416-007-0058-9&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/s11416-007-0058-9\" target=\"_blank\" >10.1007\/s11416-007-0058-9<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-00184985\/file\/bmg.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00184985\/file\/bmg.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00184985\/file\/bmg.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00184985v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00175415v1\" target=\"_blank\" >Learning tree languages from positive examples and membership queries<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Besombes, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theoretical Computer Science<\/i>, 2007, 382 (3), pp.183-197. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.tcs.2007.03.038\">&#x27E8;10.1016\/j.tcs.2007.03.038&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.tcs.2007.03.038\" target=\"_blank\" >10.1016\/j.tcs.2007.03.038<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00175415v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00184983v1\" target=\"_blank\" >La virologie informatique &#8211; les virus, ennemis utiles<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Eric Filiol, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Pour la science<\/i>, 2007, 55, pp.60-64<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00184983v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00184987v1\" target=\"_blank\" >Foreword of WTCV 06<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal in Computer Virology<\/i>, 2007, 3 (1), pp.1-2. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s11416-007-0038-0\">&#x27E8;10.1007\/s11416-007-0038-0&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/s11416-007-0038-0\" target=\"_blank\" >10.1007\/s11416-007-0038-0<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00184987v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00176241v1\" target=\"_blank\" >Control Flow to Detect Malware<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Inter-Regional Workshop on Rigorous System Development and Analysis 2007<\/i>, Pascal Fontaine; Stephan Merz, Oct 2007, Nancy, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00176241\/file\/IRWRSDA.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00176241\/file\/IRWRSDA.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00176241\/file\/IRWRSDA.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00176241v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00130920v1\" target=\"_blank\" >Quasi-interpretation Synthesis by Decomposition : An application to higher-order programs<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ICTAC<\/i>, Sep 2007, Macao, China<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00130920\/file\/modu.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00130920\/file\/modu.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00130920\/file\/modu.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00130920v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00155288v1\" target=\"_blank\" >Resource control of object-oriented programs<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The International Workshop on Logic and Computational Complexity &#8211; LCC 2007<\/i>, Jul 2007, Wroclaw\/Poland, Poland<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00155288\/file\/objet.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00155288\/file\/objet.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00155288\/file\/objet.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00155288v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00175412v1\" target=\"_blank\" >Predicative Analysis of Feasibility and Diagonalization<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Typed Lambda Calculi and Applications, 8th International Conference &#8211; TLCA 2007<\/i>, Jun 2007, Paris, France. pp.290-304<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00175412v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00175301v1\" target=\"_blank\" >A Classification of Viruses through Recursion Theorems<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Computability in Europe<\/i>, Jun 2007, Sienna, Italy. pp.73-82, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-73001-9_8\">&#x27E8;10.1007\/978-3-540-73001-9_8&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-540-73001-9_8\" target=\"_blank\" >10.1007\/978-3-540-73001-9_8<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00175301\/file\/bonfante.a_classification_of_computer_viruses_through_recursion_theorems.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00175301\/file\/bonfante.a_classification_of_computer_viruses_through_recursion_theorems.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00175301\/file\/bonfante.a_classification_of_computer_viruses_through_recursion_theorems.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00175301v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00176235v1\" target=\"_blank\" >Control Flow Graphs as Malware Signatures<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Workshop on the Theory of Computer Viruses<\/i>, Matthieu Kaczmarek; Guillaume Bonfante, May 2007, Nancy, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00176235\/file\/tcv07b.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00176235\/file\/tcv07b.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00176235\/file\/tcv07b.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00176235v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00155287v1\" target=\"_blank\" >A characterization of polynomial complexity classes using dependency pairs<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] 2007, pp.12<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00155287\/file\/dependency.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00155287\/file\/dependency.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00155287\/file\/dependency.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00155287v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2006<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00184984v1\" target=\"_blank\" >Les paradoxes de la d\u00e9fense virale : Le cas bradley<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Anne Bonfante<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>MISC &#8211; Le journal de la s\u00e9curit\u00e9 informatique<\/i>, 2006, 28, pp.4-7<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00184984v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000516v1\" target=\"_blank\" >Implicit Complexity over an Arbitrary Structure: Quantifier Alternations<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Felipe Cucker, Paulin Jacob\u00e9 de Naurois, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Information and Computation<\/i>, 2006, 204 (2), pp.210&#8211;230<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00000516v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00115199v1\" target=\"_blank\" >On Abstract Computer Virology from a Recursion-theoretic Perspective<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal in Computer Virology<\/i>, 2006, 1 (3-4), pp.45&#8211;54. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s11416-005-0007-4\">&#x27E8;10.1007\/s11416-005-0007-4&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/s11416-005-0007-4\" target=\"_blank\" >10.1007\/s11416-005-0007-4<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00115199\/file\/jcv06.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00115199\/file\/jcv06.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00115199\/file\/jcv06.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00115199v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00110014v1\" target=\"_blank\" >A characterization of Alternating log time by first order functional programs<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Romain P\u00e9choux, Jean-Yves Marion, Guillaume Bonfante<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>13th International Conference on Logic for Programming Artificial Intelligence and Reasoning &#8211; LPAR-13<\/i>, Nov 2006, Phnom Penh\/Cambodia<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00110014\/file\/44.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00110014\/file\/44.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00110014\/file\/44.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00110014v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00110245v1\" target=\"_blank\" >Quasi-friendly sup-interpretations<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>8th International Workshop on Logic and Computational Complexity &#8211; LCC 2006 &#8211; LICS affiliated Workshop<\/i>, James Royer, Aug 2006, Seattle\/Etats-Unis<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00110245\/file\/lcc2006.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00110245\/file\/lcc2006.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00110245\/file\/lcc2006.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00110245v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000661v2\" target=\"_blank\" >Resource analysis by sup-interpretation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Eighth International Symposium on Functional and Logic Programming &#8211; FLOPS 2006<\/i>, Apr 2006, Fuji Susono, Japan. pp.163&#8211;176, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/11737414_12\">&#x27E8;10.1007\/11737414_12&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/11737414_12\" target=\"_blank\" >10.1007\/11737414_12<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00000661\/file\/fullpaper.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00000661\/file\/fullpaper.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00000661\/file\/fullpaper.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00000661v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00001088v1\" target=\"_blank\" >Expressiveness + Automation + Soundness: Towards Combining SMT Solvers and Interactive Proof Assistants<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Pascal Fontaine, Jean-Yves Marion, Stephan Merz, Leonor Prensa Nieto, Alwen Tiu<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>12th International Conference on Tools and Algorithms for the Construction and Analysis of Systems &#8211; TACAS&#8217;06<\/i>, Mar 2006, Vienna\/Austria, pp.167-181, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/11691372_11\">&#x27E8;10.1007\/11691372_11&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/11691372_11\" target=\"_blank\" >10.1007\/11691372_11<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00001088v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Documents associated with scientific events<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00434330v1\" target=\"_blank\" >Special issue on implicit computational complexity<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Patrick Baillot, Jean-Yves Marion, Simona Ronchi Della Rocca<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">ACM Trans. Comput. Log. (10)4. <i>Workshop on Implicit Computational Complexity &#8211; Geometry of Computation (GEOCAL&#8217;06)<\/i>, Feb 2006, Marseille, France. 10 (4), 2 p., 2009, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/1555746.1555747\">&#x27E8;10.1145\/1555746.1555747&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Documents associated with scientific events<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/1555746.1555747\" target=\"_blank\" >10.1145\/1555746.1555747<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00434330\/file\/IntroTOCL.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00434330\/file\/IntroTOCL.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00434330\/file\/IntroTOCL.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00434330v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00067838v1\" target=\"_blank\" >Heap-size analysis for assembly programs<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Jean-Yves Moyen<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2006<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Preprints, Working Papers, &#8230;<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-00067838\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00067838\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00067838\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00067838v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2005<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00102942v1\" target=\"_blank\" >Implicit Complexity Over an Arbitrary Structure: Sequential and Parallel Polynomial Time.<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Felipe Cucker, Paulin Jacob\u00e9 de Naurois, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Logic and Computation<\/i>, 2005, 15 (1), pp.41&#8211;58<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00102942v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00115208v1\" target=\"_blank\" >Toward an abstract computer virology<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Second International Colloquium on Theoretical Aspects of Computing &#8211; ICTAC 2005<\/i>, Oct 2005, Hano\u00ef\/Vietnam, pp.579-593, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/11560647_38\">&#x27E8;10.1007\/11560647_38&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/11560647_38\" target=\"_blank\" >10.1007\/11560647_38<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00115208\/file\/ictac05.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00115208\/file\/ictac05.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00115208\/file\/ictac05.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00115208v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000519v1\" target=\"_blank\" >Logical Characterizations of $P_\\mathcal{K}$ and $NP_\\mathcal{K}$ Over an Arbitrary Structure $K$<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Felipe Cucker, Paulin Jacob\u00e9 de Naurois, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>3rd APPSEM II Workshop &#8211; APPSEM&#8217;05<\/i>, Sep 2005, Frauenchiemsee\/Germany<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00000519v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00115368v1\" target=\"_blank\" >Abstract Detection of Computer Viruses<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Third Workshop on Applied Semantics &#8211; APPSEM&#8217;05<\/i>, Sep 2005, Frauenchiemsee, Germany<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00115368\/file\/APPSEM05.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00115368\/file\/APPSEM05.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00115368\/file\/APPSEM05.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00115368v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000660v1\" target=\"_blank\" >Synthesis of Quasi-interpretations<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion, Jean-Yves Moyen, Romain P\u00e9choux<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Seventh International Workshop on Logic and Computational Complexity &#8211; LCC 2005<\/i>, Jun 2005, Chicago\/USA<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00000660\/file\/LCC05.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00000660\/file\/LCC05.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00000660\/file\/LCC05.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00000660v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00001234v1\" target=\"_blank\" >Quasi-interpretations and small space bounds<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion, Jean-Yves Moyen<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] 2005, pp.19<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00001234\/file\/A05-R-007.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf_embargo.png\" border=\"0\" title=\"The file is embargoed until 9999-12-31\" \/> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00001234v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00001257v1\" target=\"_blank\" >Quasi-interpretation: a way to control ressources<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion, Jean-Yves Moyen<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Intern report] 2005, pp.35<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00001257v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2004<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100101v1\" target=\"_blank\" >Editorial : Implicit Computational Complexity (ICC)<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theoretical Computer Science<\/i>, 2004, 318 (1-2), pp.1<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100101v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099896v1\" target=\"_blank\" >Tailoring Recursion to Characterize Non-Deterministic Complexity Classes Over Arbitrary Structures<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Felipe Cucker, Paulin Jacob\u00e9 de Naurois, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>3rd IFIP International Conference on Theoretical Computer Science &#8211; TCS&#8217;2004<\/i>, Aug 2004, Toulouse, France, 14 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099896v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000520v1\" target=\"_blank\" >Tailoring Recursion to Characterize Non-Deterministic Complexity Classes Over Arbitrary Structures<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Felipe Cucker, Paulin Jacob\u00e9 de Naurois, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>In 2nd APPSEM II Workshop &#8211; APPSEM&#8217;04<\/i>, Apr 2004, Tallinn\/Estonia<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00000520v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00101084v1\" target=\"_blank\" >Learning Tree Languages from Positive Examples and Membership Queries<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Besombes, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>15th international conference on Algorithmic Learning Theory &#8211; ALT&#8217;2004<\/i>, 2004, Padova, Italy, pp.440-453<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00101084v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00101085v1\" target=\"_blank\" >Learning Dependency Languages from a Teacher<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Besombes, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>9th conference on Formal Grammar<\/i>, 2004, Nancy, France, 7 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00101085v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00110751v1\" target=\"_blank\" >Learning regular trees with queries<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Besombes, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Intelligent Information Processing and Web Mining, Proceedings of the International IIS: IIPWM&#8217;04<\/i>, 2004, Zakopane, Pologne, pp.181-190<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00110751v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100100v1\" target=\"_blank\" >Apprentissage des grammaires cat\u00e9gorielles \u00e0 partir de structures<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Besombes, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Conf\u00e9rence Francophone d&#8217;Apprentissage &#8211; CAp&#8217;2004<\/i>, 2004, Montpellier, France, pp.315-330<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100100v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00110364v1\" target=\"_blank\" >Resource Analysis by Quasi-Interpretations<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Sixth International Workshop on Logic and Computational Complexity<\/i>, Neil Jones, 2004, Turku, Finlande, 95 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00110364v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00101086v1\" target=\"_blank\" >Learning Reversible Categorial Grammars from Structures<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Besombes, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Categorial Grammars<\/i>, 2004, Montpellier, France, 10 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00101086v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100099v1\" target=\"_blank\" >On complexity analysis by quasi-interpretation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion, Jean-Yves Moyen<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2nd Appsem II workshop &#8211; APPSEM&#8217;04<\/i>, 2004, Tallinn, Estonia, pp.85-95<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100099v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00107811v1\" target=\"_blank\" >Implicit Complexity over an Arbitrary Structure: Quantifier Alternations<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Felipe Cucker, Paulin Jacob\u00e9 de Naurois, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Intern report] A04-R-300 || bournez04e, 2004, 23 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00107811\/file\/A04-R-300.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00107811\/file\/A04-R-300.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00107811\/file\/A04-R-300.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00107811v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2003<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099629v1\" target=\"_blank\" >Apprentissage des langages r\u00e9guliers d&#8217;arbres et applications<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Besombes, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Revue TAL : traitement automatique des langues<\/i>, 2003, 44 (1), pp.121-153<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099629v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099505v1\" target=\"_blank\" >Analysing the implicit complexity of programs<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Information and Computation<\/i>, 2003, 183, pp.2-18<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099505v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099694v1\" target=\"_blank\" >Apprentissage des langages r\u00e9guliers d&#8217;arbres \u00e0 l&#8217;aide d&#8217;un expert<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Besombes, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Conf\u00e9rence d&#8217;Apprentissage &#8211; CAP&#8217;2003<\/i>, Jul 2003, Laval, France, 16 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099694v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099619v1\" target=\"_blank\" >Safe Recursion Over an Arbitrary Structure: PAR, PH and DPH<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Felipe Cucker, Paulin Jacob\u00e9 de Naurois, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Fifth International Workshop on Implicit Computational Complexity &#8211; ICC&#8217;2003<\/i>, Jun 2003, Ottawa, Canada, 13 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099619v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099618v1\" target=\"_blank\" >Computability over an Arbitrary Structure. Sequential and Parallel Polynomial Time<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Felipe Cucker, Paulin Jacob\u00e9 de Naurois, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Foundations of Software Science and Computation Structures &#8211; FOSSACS&#8217;03<\/i>, Apr 2003, Warsaw, Poland, pp.185-199<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099618v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099497v1\" target=\"_blank\" >The QSL platform at LORIA<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mohamed El Habib, Claude Kirchner, H\u00e9l\u00e8ne Kirchner, Jean-Yves Marion, Stephan Merz<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>First QPQ Workshop on Deductive Software Components<\/i>, 2003, Miami, Floride, 3 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00099497\/file\/A03-R-539.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00099497\/file\/A03-R-539.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00099497\/file\/A03-R-539.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00099497v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00147587v1\" target=\"_blank\" >Termination and resource analysis of assembly programs by Petri nets<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Jean-Yves Moyen<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] A03-R-348 || marion03a, 2003, 13 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00147587v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2002<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100709v1\" target=\"_blank\" >Kolmogorov complexity and non-determinism<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Serge Grigorieff, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theoretical Computer Science<\/i>, 2002, 271 (1-2), pp.151-180. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/S0304-3975(01)00038-X\">&#x27E8;10.1016\/S0304-3975(01)00038-X&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/S0304-3975(01)00038-X\" target=\"_blank\" >10.1016\/S0304-3975(01)00038-X<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100709v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100884v1\" target=\"_blank\" >Safe Recursion and Calculus over an Arbitrary Structure<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Paulin de Naurois, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Implicit Computational Complexity &#8211; ICC&#8217;2002<\/i>, Jul 2002, Copenhagen, Denmark, 12 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100884v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00101062v1\" target=\"_blank\" >Learning regular tree languages with positive samples and queries<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Besombes, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Intern report] A02-R-201 || besombes02a, 2002, 10 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00101062v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00101068v1\" target=\"_blank\" >Safe Recursion over an Arbitrary Structure: Deterministic Polynomial Time<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Olivier Bournez, Paulin de Naurois, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Intern report] A02-R-322 || bournez02d, 2002, 24 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00101068v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2001<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100819v1\" target=\"_blank\" >Algorithms with Polynomial Interpretation Termination Proof<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Adam Cichon, Jean-Yves Marion, Helene Touzet<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Functional Programming<\/i>, 2001, 11 (1), pp.33-53<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100819v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100423v1\" target=\"_blank\" >Identification reversible dependency tree languages<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Besombes, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>3rd Learning Language in Logic (LLL) Workshop<\/i>, L. Popelinsky, M. Nepil, Sep 2001, Strasbourg, France, 12 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100423v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100523v1\" target=\"_blank\" >On lexicographic termination ordering with space bound certifications<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Jean-Yves Marion, Jean-Yves Moyen<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Andrei Ershov Memorial Conference &#8211; PSI&#8217;01<\/i>, 2001, Novosibirsk, Russia, pp.482-493<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100523v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100424v1\" target=\"_blank\" >Actual arithmetic and feasibility<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Workshop on Computer Science Logic &#8211; CSl&#8217;2001<\/i>, 2001, Paris, France, pp.115&#8211;129<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100424v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100690v1\" target=\"_blank\" >Une th\u00e9orie informative de l&#8217;apprentissage<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">J\u00e9r\u00f4me Besombes, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Interne] A01-R-014 || besombes01a, 2001, 7 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100690v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2000<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099078v1\" target=\"_blank\" >A characterization of alternating log time by ramified recurrence<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Daniel Leivant, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theoretical Computer Science<\/i>, 2000, 236 (1-2), pp.192-208. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/S0304-3975(99)00209-1\">&#x27E8;10.1016\/S0304-3975(99)00209-1&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/S0304-3975(99)00209-1\" target=\"_blank\" >10.1016\/S0304-3975(99)00209-1<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099078v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099077v1\" target=\"_blank\" >Ramified Recurrence and Computational Complexity IV : Predicative Functionals and Poly-Space<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Daniel Leivant, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Information and Computation<\/i>, 2000, 12 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099077v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099178v1\" target=\"_blank\" >Efficient first order functional program interpreter with time bound certifications<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion, Jean-Yves Moyen<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Conference on Logic Programming &#038; Automated Reasoning &#8211; LPAR&#8217;2000<\/i>, Nov 2000, Reunion Island, France, pp.25-42<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099178v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099238v1\" target=\"_blank\" >The Light Lexicographic path Ordering<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Adam Cichon, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Workshop RULE&#8217;2000<\/i>, Sep 2000, Montr\u00e9al, Canada, 17 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099238v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099327v1\" target=\"_blank\" >A proof theoretic approach to feasible computation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Interne] A00-R-375 || marion00d, 2000, 17 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099327v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>1999<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00098803v1\" target=\"_blank\" >From multiple sequent for Additive Linear Logic to decision procedures for Free Lattices<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theoretical Computer Science<\/i>, 1999, 224 (1-2), pp.157-172. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/S0304-3975(98)00311-9\">&#x27E8;10.1016\/S0304-3975(98)00311-9&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Journal articles<\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/S0304-3975(98)00311-9\" target=\"_blank\" >10.1016\/S0304-3975(98)00311-9<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00098803v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00098750v1\" target=\"_blank\" >Light Multiset path ordering and Ptime &#8211; Two is better than one<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Intern report] 99-R-106 || marion99b, 1999, 19 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00098750\/file\/99-R-106.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00098750\/file\/99-R-106.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00098750\/file\/99-R-106.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00098750v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>1998<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00098689v1\" target=\"_blank\" >Complexity classes and rewrite systems with polynomial interpretation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Guillaume Bonfante, Adam Cichon, Jean-Yves Marion, H\u00e9l\u00e8ne Touzet<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CSl&#8217;98<\/i>, 1998, Brno, R\u00e9publique Tch\u00e8que, pp.372-384<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00098689\/file\/98-R-060.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00098689\/file\/98-R-060.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00098689\/file\/98-R-060.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00098689v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00098563v1\" target=\"_blank\" >An hierarchy of terminating algorithms with semantic interpretation termination proofs<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Intern report] 98-R-273 || marion98a, 1998, 17 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00098563v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00098564v1\" target=\"_blank\" >Kolmogorov complexity and non-determinism<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Serge Grigorieff, Jean-Yves Marion<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Intern report] 98-R-274 || grigorieff98a, 1998, 11 p<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00098564v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl><\/div>\n<p> <\/body> <\/html> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>               var _paq = _paq || [];   _paq.push([&#8216;trackPageView&#8217;]);   _paq.push([&#8216;enableLinkTracking&#8217;]);   (function() {     var u=&#8221;\/\/piwik.inria.fr\/&#8221;;     _paq.push([&#8216;setTrackerUrl&#8217;, u+&#8217;piwik.php&#8217;]);     _paq.push([&#8216;setSiteId&#8217;, 25]);     var d=document, g=d.createElement(&#8216;script&#8217;), s=d.getElementsByTagName(&#8216;script&#8217;)[0];     g.type=&#8217;text\/javascript&#8217;; g.async=true; g.defer=true; g.src=u+&#8217;piwik.js&#8217;; s.parentNode.insertBefore(g,s);   })();  <\/p>\n<p><img decoding=\"async\" src=\"\/\/piwik.inria.fr\/piwik.php?idsite=25\" style=\"border:0;\" alt=\"\" \/><\/p>\n<p>   Publications HAL de  jean-yves marion   <\/p>\n<p class='Rubrique'>2026<\/p>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<p>titre<br \/>\n<a href=\"https:\/\/hal.science\/hal-04914773v2\" target=\"_blank\">Attacking the First-Principle: A Black-Box, Query-Free Targeted Mimicry Attack on Binary Function Classifiers<\/a><br \/>\nauteur<br \/>\nGabriel Sauger, Jean-Yves Marion, Sazzadur Rahaman, Vincent Tourneur, Muaz Ali, Victor Matrat<br \/>\narticle<br \/>\n2026<br \/>\ntypdoc<br \/>\nPreprints, Working Papers, &#8230;<br \/>\nAcc\u00e8s au texte int\u00e9gral et bibtex<br \/>\n <a href=\"https:\/\/hal.science\/hal-04914773\/file\/kelpie_with_authors.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-04914773\/file\/kelpie_with_authors.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-04914773\/file\/kelpie_with_authors.pdf\" \/><\/a> <a href=\"https:\/\/hal.science\/hal-04914773v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/p>\n<p class='Rubrique'>2025<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<p>titre<br \/>\n<a href=\"https:\/\/hal.science\/hal-05555513v1\" target=\"_blank\">Ransomware: Extortion Is My Business<\/a><br \/>\nauteur<br \/>\nJean-Yves Marion<br \/>\narticle<br \/>\n<i>Communications of the ACM<\/i>, <\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"footnotes":""},"class_list":["post-13","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/JYMarion\/wp-json\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/JYMarion\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/members.loria.fr\/JYMarion\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/JYMarion\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/JYMarion\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":23,"href":"https:\/\/members.loria.fr\/JYMarion\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/members.loria.fr\/JYMarion\/wp-json\/wp\/v2\/pages\/13\/revisions\/286"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/JYMarion\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}