Skip to Main content Skip to Navigation

Search by documents

hal-02018168v1  Journal articles
Yuting WangPierre WilkeZhong Shao. An abstract stack based approach to verified compositional compilation to machine code
Proceedings of the ACM on Programming Languages, ACM, 2019, 3 (62), pp.30. ⟨10.1145/3290375⟩
hal-01888300v2  Journal articles
Yves MocquardBruno SericolaEmmanuelle Anceaume. Probabilistic Analysis of Rumor Spreading Time
INFORMS Journal on Computing, Institute for Operations Research and the Management Sciences (INFORMS), 2020, 32 (1), ⟨10.1287/ijoc.2018.0845⟩
hal-03024408v1  Conference papers
Antoine DurandGuillaume HébertKhalifa ToumiGérard MemmiEmmanuelle Anceaume. The StakeCube blockchain : Instantiation, Evaluation & Applications
BCCA 2020 - International Conference on Blockchain Computing and Applications, Nov 2020, Virtual, Turkey. pp.1-8
hal-03115308v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Novelty detection on graph structured data to detect network intrusions
CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Virtual, France
hal-02933668v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. Confiance: detecting vulnerabilities in Java Card applets
International Conference on Availability, Reliability and Security (ARES), Aug 2020, Dublin (effectué en visioconférence), Ireland
hal-02473843v1  Conference papers
Giuseppe Di LunaEmmanuelle AnceaumeSilvia BonomiLeonardo Querzoni. Synchronous Byzantine Lattice Agreement in O(log(f )) Rounds
ICDCS 2020 - 40th IEEE International Conference on Distributed Computing Systems, IEEE, Nov 2020, Singapore, Singapore. pp.1-11
hal-03043681v1  Conference papers
Geoffrey SaunoisFrédérique RobinEmmanuelle AnceaumeBruno Sericola. Permissionless Consensus based on Proof-of-Eligibility
NCA 2020 - 19th IEEE International Symposium on Network Computing and Applications, Nov 2020, Boston (virtual venue), United States
hal-02950490v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs
WTMC 2020 - International Workshop on Traffic Measurements for Cybersecurity, Sep 2020, Genova, Italy. pp.1-9
hal-02313650v1  Conference papers
Routa MoussailebCharles BerrtiGuillaume DeboisdeffreNora CuppensJean-Louis Lanet. Watch Out! Doxware on The Way…
CRiSIS 2019 - 14th International Conference on Risks and Security of Internet and Systems, Oct 2019, Hammamet, Tunisia
hal-02118385v1  Conference papers
Emmanuelle AnceaumeAdeline GuellierRomaric LudinardBruno Sericola. Sycomore : un registre de transactions distribué et public au débit auto-adaptatif
ALGOTEL 2019 - 21èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2019, Saint Laurent de la Cabrerisse, France. pp.1-4
hal-02313656v1  Conference papers
Routa MoussailebNora CuppensJean-Louis LanetHélène Le Bouder. Ransomware Network Traffic Analysis for Pre-Encryption Alert
FPS 2019 : 12th International Symposium on Foundations & Practice of Security, Nov 2019, Toulouse, France
hal-03139240v1  Conference papers
Cédric HerzogValérie TongPierre WilkeJean-Louis Lanet. Malware Windows Evasifs : Impact sur les Antivirus et Possible Contre-mesure
CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Rennes, France. ⟨10.5220/0009816703020309⟩
hal-03137952v1  Conference papers
Cyprien GottsteinPhilippe Raipin ParvedyMichel HurfinHassan ThomasThierry Coupaye. Inverse Space Filling Curve Partitioning Applied to Wide Area Graphs
DMS 2020 - 11th International conference on Database Management Systems, Nov 2020, Zurich, Switzerland. pp.223-241, ⟨10.5121/csit.2020.101417⟩
hal-03066847v1  Conference papers
Pierre GrauxJean-François LalandeValérie Viet Triem TongPierre Wilke. Preventing Serialization Vulnerabilities through Transient Field Detection
SAC 2021 - 36th ACM/SIGAPP Symposium On Applied Computing, Mar 2021, Gwangju / Virtual, South Korea. pp.1-9
hal-01166402v1  Conference papers
Gustav MalisAnnie BlandinGuillaume Piolle. The articulation between the legal and technical means of erasure of data online, from the perspective of the user
6ème Atelier sur la Protection de la Vie Privée (APVP'15), Jun 2015, Mosnes, France
hal-03136790v1  Directions of work or proceedings
Guillaume HietFrédéric TronelJean-Louis Lanet. Preface of the 2nd Workshop on the Security of Software/Hardware Interfaces (SILM 2020)
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Sep 2020, Genoa, IEEE, pp.681, 2020, ⟨10.1109/EuroSPW51379.2020.00097⟩
hal-01183508v1  Conference papers
Ghada ArfaouiJean-François LalandeSaïd GharoutJacques Traoré. Practical and Privacy-Preserving TEE Migration
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
hal-01154374v1  Conference papers
Sébastien GambsJean-François LalandeJacques Traoré. ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France
hal-02877815v1  Conference papers
Pierre GrauxJean-François LalandePierre WilkeValérie Viet Triem Tong. Abusing Android Runtime for Application Obfuscation
SAD 2020 - Workshop on Software Attacks and Defenses, Sep 2020, Genova, Italy. pp.616-624, ⟨10.1109/EuroSPW51379.2020.00089⟩
hal-01993308v1  Books
Steve KremerLudovic MéDidier RémyVincent Roca. Cybersecurity
Inria, pp.172, 2019, Inria white book
hal-01344565v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses
9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Newark, United States. p.1-8, ⟨10.1145/2947626.2947645⟩
hal-01316541v1  Conference papers
Emmanuelle AnceaumeRomaric LudinardBruno Sericola. Relying on Consensus does not Make Bitcoin Safer
Fast Abstract in the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2016, Toulouse, France
hal-01191595v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Detection and Identification of Android Malware Based on Information Flow Monitoring
The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), Nov 2015, New York, United States. ⟨10.1109/cscloud.2015.27⟩