Skip to Main content Skip to Navigation

Search by documents

hal-03206297v1  Directions of work or proceedings
F de VieillevilleS MayA LagrangeA DupuisR Ruiloba et al.  Actes de la conférence CAID 2020
CAID 2020 - Second Conference on Artificial Intelligence for Defence, Dec 2020, Rennes, France. 2021
tel-03164744v1  Theses
Pierre Graux. Challenges of native android applications : obfuscation and vulnerabilities
Cryptography and Security [cs.CR]. Université Rennes 1, 2020. English. ⟨NNT : 2020REN1S047⟩
hal-03115308v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Novelty detection on graph structured data to detect network intrusions
CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Virtual, France
hal-03139240v1  Conference papers
Cédric HerzogValérie TongPierre WilkeJean-Louis Lanet. Malware Windows Evasifs : Impact sur les Antivirus et Possible Contre-mesure
CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Rennes, France. ⟨10.5220/0009816703020309⟩
hal-03137952v1  Conference papers
Cyprien GottsteinPhilippe Raipin ParvedyMichel HurfinHassan ThomasThierry Coupaye. Inverse Space Filling Curve Partitioning Applied to Wide Area Graphs
DMS 2020 - 11th International conference on Database Management Systems, Nov 2020, Zurich, Switzerland. pp.223-241, ⟨10.5121/csit.2020.101417⟩
hal-03136790v1  Directions of work or proceedings
Guillaume HietFrédéric TronelJean-Louis Lanet. Preface of the 2nd Workshop on the Security of Software/Hardware Interfaces (SILM 2020)
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Sep 2020, Genoa, IEEE, pp.681, 2020, ⟨10.1109/EuroSPW51379.2020.00097⟩
hal-03128242v1  Conference papers
Mathieu EscouteloupRonan LashermesJean-Louis LanetJacques Jean-Alain Fournier. Recommendations for a radically secure ISA
CARRV 2020 - Workshop on Computer Architecture Research with RISC-V, May 2020, Valence (virtual), Spain. pp.1-22
hal-03066847v1  Conference papers
Pierre GrauxJean-François LalandeValérie Viet Triem TongPierre Wilke. Preventing Serialization Vulnerabilities through Transient Field Detection
SAC 2021 - 36th ACM/SIGAPP Symposium On Applied Computing, Mar 2021, Gwangju / Virtual, South Korea. pp.1-9
hal-03131262v1  Journal articles
Aimad BeradyMathieu JaumeValérie Viet Triem TongGilles Guette. From TTP to IoC: Advanced Persistent Graphs for Threat Hunting
IEEE Transactions on Network and Service Management, IEEE, 2021, Latest Developments for Security Management of Networks and Services, Special Issue, pp.1-13. ⟨10.1109/TNSM.2021.3056999⟩
hal-03114583v1  Conference papers
Yuting WangXiangzhen XuPierre WilkeZhong Shao. CompCertELF: Verified Separate Compilation of C Programs into ELF Object Files
PACMPL 2020 - Proceedings of the ACM on Programming Languages, Nov 2020, Chicago, United States. pp.1-28
hal-03085774v1  Journal articles
Ronny ChevalierDavid PlaquinChris DaltonGuillaume Hiet. Intrusion Survivability for Commodity Operating Systems
Digital Threats: Research and Practice, Association for Computing Machinery, 2020, 1 (4), pp.1-30. ⟨10.1145/3419471⟩
hal-03043681v1  Conference papers
Geoffrey SaunoisFrédérique RobinEmmanuelle AnceaumeBruno Sericola. Permissionless Consensus based on Proof-of-Eligibility
NCA 2020 - 19th IEEE International Symposium on Network Computing and Applications, Nov 2020, Boston (virtual venue), United States
hal-03024408v1  Conference papers
Antoine DurandGuillaume HébertKhalifa ToumiGérard MemmiEmmanuelle Anceaume. The StakeCube blockchain : Instantiation, Evaluation & Applications
BCCA 2020 - International Conference on Blockchain Computing and Applications, Nov 2020, Virtual, Turkey. pp.1-8
hal-02988140v1  Directions of work or proceedings
Steffen WendzelLuca CaviglioneAlessandro CheccoAleksandra MilevaJean-François Lalande et al.  Information Security Methodology, Replication Studies and Information Security Education
Journal of Universal Computer Science, 26 (7), pp.762-763, 2020, Special issue of Journal of Universal Computer Science
hal-02950490v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs
WTMC 2020 - International Workshop on Traffic Measurements for Cybersecurity, Sep 2020, Genova, Italy. pp.1-9
hal-02950489v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data
DIMVA 2020 - 17th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Jun 2020, Lisbon, Portugal. pp.1-20
hal-02949067v1  Conference papers
Cédric HerzogValérie Viet Triem TongPierre WilkeArnaud van StraatenJean-Louis Lanet. Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures
SECRYPT 2020 - 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.302-309, ⟨10.5220/0009816703020309⟩
hal-02933668v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. Confiance: detecting vulnerabilities in Java Card applets
International Conference on Availability, Reliability and Security (ARES), Aug 2020, Dublin (effectué en visioconférence), Ireland
hal-02913112v1  Conference papers
Jean-François LalandeMathieu SimonValérie Viet Triem Tong. GroDDViewer: Dynamic Dual View of Android Malware
GraMSec 2020 - 7th Seventh International Workshop on Graphical Models for Security, Jun 2020, Virtual Conference, France. pp.127-139, ⟨10.1007/978-3-030-62230-5_7⟩