Skip to Main content Skip to Navigation


hal-00349883v1  Conference papers
Mehdi TalbiBenjamin MorinValérie Viet Triem TongAdel BouhoulaMohammed Mejri. Spécification Formelle des propriétés des Protocoles de Vote au moyen de la Logique ADM
Conférence sur la sécurité des Architectures Réseaux et des Systèmes d'Information, Oct 2008, Loctudy, France
...
hal-03066847v1  Conference papers
Pierre GrauxJean-François LalandeValérie Viet Triem TongPierre Wilke. Preventing Serialization Vulnerabilities through Transient Field Detection
SAC 2021 - 36th ACM/SIGAPP Symposium On Applied Computing, Mar 2021, Gwangju / Virtual, South Korea. pp.1-9
...
hal-02877815v1  Conference papers
Pierre GrauxJean-François LalandePierre WilkeValérie Viet Triem Tong. Abusing Android Runtime for Application Obfuscation
SAD 2020 - Workshop on Software Attacks and Defenses, Sep 2020, Genova, Italy. pp.616-624, ⟨10.1109/EuroSPW51379.2020.00089⟩
hal-00349878v1  Conference papers
Mehdi TalbiValérie Viet Triem TongAdel Bouhoula. Specification of Anonymity as a Secrecy Property in the ADM Logic – Homomorphic-based Voting Protocols
International Conference on Availability, Reliability and Security, Mar 2009, Fukuoka, Japan
...
hal-01191595v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Detection and Identification of Android Malware Based on Information Flow Monitoring
The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), Nov 2015, New York, United States. ⟨10.1109/cscloud.2015.27⟩
...
hal-01794252v1  Conference papers
Pierre GrauxJean-François LalandeValérie Viet Triem Tong. Etat de l'Art des Techniques d'Unpacking pour les Applications Android
RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2018, Nancy / La Bresse, France. pp.1-3
...
tel-01342243v1  Habilitation à diriger des recherches
Valérie Viet Triem Tong. Apport du suivi de flux d'information pour la sécurité des systèmes
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2015
...
inria-00472287v3  Conference papers
Daniel Le MétayerManuel MaarekEduardo MazzaMarie-Laure PotetStéphane Frénot et al.  Liability in Software Engineering Overview of the LISE Approach and Illustration on a Case Study
ACM/IEEE 32nd International Conf. on Software Engineering (ICSE 2010), ACM/IEEE, May 2010, Cape Town, South Africa. pp.135--144, ⟨10.1145/1806799.1806823⟩
...
hal-02379869v2  Conference papers
Aimad BeradyValérie Viet Triem TongGilles GuetteChristophe BidanGuillaume Carat. Modeling the Operational Phases of APT Campaigns
CSCI 2019 - 6th Annual Conf. on Computational Science & Computational Intelligence, Dec 2019, Las Vegas, United States. pp.1-6, ⟨10.1109/CSCI49370.2019.00023⟩
...
hal-01355122v1  Journal articles
Valérie Viet Triem TongJean-François LalandeMourad Leslous. Challenges in Android Malware Analysis
ERCIM News, ERCIM, 2016, Special Theme: Cybersecurity, pp.42-43
...
hal-01940652v1  Conference papers
Jean-François LalandeValérie Viet Triem TongPierre GrauxGuillaume HietWojciech Mazurczyk et al.  Teaching Android Mobile Security
SIGCSE '19 - 50th ACM Technical Symposium on Computer Science Education, Feb 2019, Minneapolis, United States. pp.232-238, ⟨10.1145/3287324.3287406⟩
...
hal-01311917v1  Conference papers
Nicolas KissJean-François LalandeMourad LeslousValérie Viet Triem Tong. Kharon dataset: Android malware under a microscope
The Learning from Authoritative Security Experiment Results (LASER) workshop, May 2016, San Jose, United States. pp.1-12
...
hal-02913112v1  Conference papers
Jean-François LalandeMathieu SimonValérie Viet Triem Tong. GroDDViewer: Dynamic Dual View of Android Malware
GraMSec 2020 - 7th Seventh International Workshop on Graphical Models for Security, Jun 2020, Virtual Conference, France. pp.127-139, ⟨10.1007/978-3-030-62230-5_7⟩
...
hal-01533275v1  Conference papers
Guillaume BrogiValérie Viet Triem Tong. Sharing and replaying attack scenarios with Moirai
RESSI 2017: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2017, Autrans, France
...
hal-01154368v1  Conference papers
Radoniaina Andriatsimandefitra RatsisahananaThomas GenetLaurent GuilloJean-François LalandeDavid Pichardie et al.  Kharon : Découvrir, comprendre et reconnaître des malware Android par suivi de flux d'information
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France
...
hal-02288116v1  Conference papers
Valérie Viet Triem TongCédric HerzogTomás Concepción MirandaPierre GrauxJean-François Lalande et al.  Isolating malicious code in Android malware in the wild
MALCON 2019 - 14th International Conference on Malicious and Unwanted Software, Oct 2019, Nantucket, United States
...
hal-01168354v1  Poster communications
Adrien AbrahamRadoniaina Andriatsimandefitra RatsisahananaNicolas KissJean-François LalandeValérie Viet Triem Tong. Towards Automatic Triggering of Android Malware
12th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Jul 2015, Milano, Italy
...
hal-02305924v1  Conference papers
Pierre GrauxJean-François LalandeValérie Viet Triem Tong. Obfuscated Android Application Development
CECC 2019 - Central European Cybersecurity Conference, Nov 2019, Munich, Germany. pp.1-6, ⟨10.1145/3360664.3361144⟩
...
hal-01417612v1  Conference papers
Guillaume BrogiValérie Viet Triem Tong. TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking
8th IFIP International Conference on New Technologies, Mobility and Security, Nov 2016, Larnaca, Cyprus. ⟨10.1109/ntms.2016.7792480⟩
...
hal-01635125v1  Conference papers
Guillaume FournierPaul Audren de KerdrelPascal CotretValérie Viet Triem Tong. DroneJack: Kiss your drones goodbye!
SSTIC 2017 - Symposium sur la sécurité des technologies de l'information et des communications, Jun 2017, Rennes, France. pp.1-8
hal-00647170v1  Conference papers
Mathieu JaumeValérie Viet Triem TongLudovic Mé. Flow based interpretation of access control: Detection of illegal information flows
7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩
hal-00761351v1  Journal articles
Mathieu JaumeValérie Viet Triem TongGuillaume Hiet. Spécification et mécanisme de détection de flots d'information illégaux
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2012, 31 (6), pp.713-742. ⟨10.3166/tsi.31.713-742⟩