Skip to Main content Skip to Navigation


hal-00761351v1  Journal articles
Mathieu JaumeValérie Viet Triem TongGuillaume Hiet. Spécification et mécanisme de détection de flots d'information illégaux
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2012, 31 (6), pp.713-742. ⟨10.3166/tsi.31.713-742⟩
hal-00647170v1  Conference papers
Mathieu JaumeValérie Viet Triem TongLudovic Mé. Flow based interpretation of access control: Detection of illegal information flows
7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩
hal-00349883v1  Conference papers
Mehdi TalbiBenjamin MorinValérie Viet Triem TongAdel BouhoulaMohammed Mejri. Spécification Formelle des propriétés des Protocoles de Vote au moyen de la Logique ADM
Conférence sur la sécurité des Architectures Réseaux et des Systèmes d'Information, Oct 2008, Loctudy, France
...
hal-03066847v1  Conference papers
Pierre GrauxJean-François LalandeValérie Viet Triem TongPierre Wilke. Preventing Serialization Vulnerabilities through Transient Field Detection
SAC 2021 - 36th ACM/SIGAPP Symposium On Applied Computing, Mar 2021, Gwangju / Virtual, South Korea. pp.1-9
...
hal-00156447v1  Conference papers
Valérie Viet Triem TongHervé SibertJérémy LecoeurMarc Girault. FingerKey, un cryptosystème biométrique pour l'authentification
Conférence sur la Sécurité et Architectures Réseaux, Jun 2007, annecy, France
...
hal-02877815v1  Conference papers
Pierre GrauxJean-François LalandePierre WilkeValérie Viet Triem Tong. Abusing Android Runtime for Application Obfuscation
SAD 2020 - Workshop on Software Attacks and Defenses, Sep 2020, Genova, Italy. pp.616-624, ⟨10.1109/EuroSPW51379.2020.00089⟩
...
hal-01191595v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Detection and Identification of Android Malware Based on Information Flow Monitoring
The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), Nov 2015, New York, United States. ⟨10.1109/cscloud.2015.27⟩
hal-00875211v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem TongLudovic Mé. Diagnosing intrusions in Android operating system using system flow graph
Workshop Interdisciplinaire sur la Sécurité Globale, Jan 2013, Troyes, France
...
hal-01794252v1  Conference papers
Pierre GrauxJean-François LalandeValérie Viet Triem Tong. Etat de l'Art des Techniques d'Unpacking pour les Applications Android
RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2018, Nancy / La Bresse, France. pp.1-3
...
hal-01018611v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Capturing Android Malware Behaviour using System Flow Graph
NSS 2014 - The 8th International Conference on Network and System Security, Oct 2014, Xi'an, China. ⟨10.1007/978-3-319-11698-3_43⟩
...
tel-01342243v1  Habilitation à diriger des recherches
Valérie Viet Triem Tong. Apport du suivi de flux d'information pour la sécurité des systèmes
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2015
hal-00735996v1  Journal articles
Thomas DemongeotEric TotelValérie Viet Triem TongYves Le Traon. User Data Confidentiality in an Orchestration of Web Services
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2012, 7 (1), pp.32-40
hal-01083376v1  Poster communications
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Highlighting Easily How Malicious Applications Corrupt Android Devices
Research in Attacks, Intrusions, and Defenses, Sep 2014, Gothenburg, Sweden. Research in Attacks, Intrusions, and Defenses, 2014
...
inria-00472287v3  Conference papers
Daniel Le MétayerManuel MaarekEduardo MazzaMarie-Laure PotetStéphane Frénot et al.  Liability in Software Engineering Overview of the LISE Approach and Illustration on a Case Study
ACM/IEEE 32nd International Conf. on Software Engineering (ICSE 2010), ACM/IEEE, May 2010, Cape Town, South Africa. pp.135--144, ⟨10.1145/1806799.1806823⟩
...
hal-02379869v2  Conference papers
Aimad BeradyValérie Viet Triem TongGilles GuetteChristophe BidanGuillaume Carat. Modeling the Operational Phases of APT Campaigns
CSCI 2019 - 6th Annual Conf. on Computational Science & Computational Intelligence, Dec 2019, Las Vegas, United States. pp.1-6, ⟨10.1109/CSCI49370.2019.00023⟩
...
hal-00997133v1  Book sections
Emmanuelle AnceaumeGilles GuettePaul Lajoie-MazencThomas SirventValérie Viet Triem Tong. Extending Signatures of Reputation
Hansen, M.; Hoepman, J.-H.; Leenes, R.; Whitehouse, D. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.165-176, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_13⟩
...
hal-00763212v3  Conference papers
Emmanuelle AnceaumeGilles GuettePaul Lajoie-MazencNicolas PrigentValérie Viet Triem Tong. A Privacy Preserving Distributed Reputation Mechanism
International Conference on communications (ICC), Jun 2013, Budapest, France. 6 p
hal-01062313v1  Journal articles
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Information Flow Policies vs Malware -- Final Battle
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2014, 9 (2), pp.72-82
...
hal-01355122v1  Journal articles
Valérie Viet Triem TongJean-François LalandeMourad Leslous. Challenges in Android Malware Analysis
ERCIM News, ERCIM, 2016, Special Theme: Cybersecurity, pp.42-43
...
hal-01940652v1  Conference papers
Jean-François LalandeValérie Viet Triem TongPierre GrauxGuillaume HietWojciech Mazurczyk et al.  Teaching Android Mobile Security
SIGCSE '19 - 50th ACM Technical Symposium on Computer Science Education, Feb 2019, Minneapolis, United States. pp.232-238, ⟨10.1145/3287324.3287406⟩
...
hal-01311917v1  Conference papers
Nicolas KissJean-François LalandeMourad LeslousValérie Viet Triem Tong. Kharon dataset: Android malware under a microscope
The Learning from Authoritative Security Experiment Results (LASER) workshop, May 2016, San Jose, United States. pp.1-12