Skip to Main content Skip to Navigation

Search by documents



...
hal-01191595v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Detection and Identification of Android Malware Based on Information Flow Monitoring
The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), Nov 2015, New York, United States. ⟨10.1109/cscloud.2015.27⟩
hal-00875211v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem TongLudovic Mé. Diagnosing intrusions in Android operating system using system flow graph
Workshop Interdisciplinaire sur la Sécurité Globale, Jan 2013, Troyes, France
hal-00909406v1  Conference papers
Radoniaina AndriatsimandefitraThomas SaliouValérie Viet Triem Tong. Information Flow Policies vs Malware
IAS - Information assurance and security - 2013, 2013, Yassmine Hammamet, Tunisia
hal-00656933v1  Conference papers
Valérie Viet Triem TongRadoniaina AndriatsimandefitraStéphane GellerSimon BocheFrédéric Tronel et al.  Mise en œuvre de politiques de protection des flux d'information dans l'environnement Android
Computer & Electronics Security Applications Rendez-vous (C&ESAR 2011), Nov 2011, Rennes, France
...
hal-01018611v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Capturing Android Malware Behaviour using System Flow Graph
NSS 2014 - The 8th International Conference on Network and System Security, Oct 2014, Xi'an, China. ⟨10.1007/978-3-319-11698-3_43⟩
hal-01083384v1  Conference papers
Mathieu JaumeRadoniaina AndriatsimandefitraValérie Viet Triem TongLudovic Mé. Secure states versus Secure executions: From access control to flow control
ICISS 2013 - 9th International Conference on Information Systems Security, Dec 2013, Calcutta, India. pp.148-162, ⟨10.1007/978-3-642-45204-8_11⟩
...
hal-01201743v2  Conference papers
Adrien AbrahamRadoniaina AndriatsimandefitraAdrien BrunelatJean-François LalandeValérie Viet Triem Tong. GroddDroid: a Gorilla for Triggering Malicious Behaviors
10th International Conference on Malicious and Unwanted Software, Oct 2015, Fajardo, Puerto Rico. pp.119-127, ⟨10.1109/MALWARE.2015.7413692⟩
hal-01062313v1  Journal articles
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Information Flow Policies vs Malware -- Final Battle
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2014, 9 (2), pp.72-82
hal-01083376v1  Poster communications
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Highlighting Easily How Malicious Applications Corrupt Android Devices
Research in Attacks, Intrusions, and Defenses, Sep 2014, Gothenburg, Sweden. Research in Attacks, Intrusions, and Defenses, 2014