Skip to Main content Skip to Navigation

Search by documents



...
hal-03024408v1  Conference papers
Antoine DurandGuillaume HébertKhalifa ToumiGérard MemmiEmmanuelle Anceaume. The StakeCube blockchain : Instantiation, Evaluation & Applications
BCCA 2020 - International Conference on Blockchain Computing and Applications, Nov 2020, Virtual, Turkey. pp.1-8
...
hal-03115308v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Novelty detection on graph structured data to detect network intrusions
CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Virtual, France
...
hal-02933668v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. Confiance: detecting vulnerabilities in Java Card applets
International Conference on Availability, Reliability and Security (ARES), Aug 2020, Dublin (effectué en visioconférence), Ireland
...
hal-02473843v1  Conference papers
Giuseppe Di LunaEmmanuelle AnceaumeSilvia BonomiLeonardo Querzoni. Synchronous Byzantine Lattice Agreement in O(log(f )) Rounds
ICDCS 2020 - 40th IEEE International Conference on Distributed Computing Systems, IEEE, Nov 2020, Singapore, Singapore. pp.1-11
...
hal-03043681v1  Conference papers
Geoffrey SaunoisFrédérique RobinEmmanuelle AnceaumeBruno Sericola. Permissionless Consensus based on Proof-of-Eligibility
NCA 2020 - 19th IEEE International Symposium on Network Computing and Applications, Nov 2020, Boston (virtual venue), United States
...
hal-02950490v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs
WTMC 2020 - International Workshop on Traffic Measurements for Cybersecurity, Sep 2020, Genova, Italy. pp.1-9
...
hal-02313650v1  Conference papers
Routa MoussailebCharles BerrtiGuillaume DeboisdeffreNora CuppensJean-Louis Lanet. Watch Out! Doxware on The Way…
CRiSIS 2019 - 14th International Conference on Risks and Security of Internet and Systems, Oct 2019, Hammamet, Tunisia
...
hal-02118385v1  Conference papers
Emmanuelle AnceaumeAdeline GuellierRomaric LudinardBruno Sericola. Sycomore : un registre de transactions distribué et public au débit auto-adaptatif
ALGOTEL 2019 - 21èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2019, Saint Laurent de la Cabrerisse, France. pp.1-4
...
hal-02313656v1  Conference papers
Routa MoussailebNora CuppensJean-Louis LanetHélène Le Bouder. Ransomware Network Traffic Analysis for Pre-Encryption Alert
FPS 2019 : 12th International Symposium on Foundations & Practice of Security, Nov 2019, Toulouse, France
...
hal-03139240v1  Conference papers
Cédric HerzogValérie TongPierre WilkeJean-Louis Lanet. Malware Windows Evasifs : Impact sur les Antivirus et Possible Contre-mesure
CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Rennes, France. ⟨10.5220/0009816703020309⟩
...
hal-03137952v1  Conference papers
Cyprien GottsteinPhilippe Raipin ParvedyMichel HurfinHassan ThomasThierry Coupaye. Inverse Space Filling Curve Partitioning Applied to Wide Area Graphs
DMS 2020 - 11th International conference on Database Management Systems, Nov 2020, Zurich, Switzerland. pp.223-241, ⟨10.5121/csit.2020.101417⟩
...
hal-03066847v1  Conference papers
Pierre GrauxJean-François LalandeValérie Viet Triem TongPierre Wilke. Preventing Serialization Vulnerabilities through Transient Field Detection
SAC 2021 - 36th ACM/SIGAPP Symposium On Applied Computing, Mar 2021, Gwangju / Virtual, South Korea. pp.1-9
hal-01166402v1  Conference papers
Gustav MalisAnnie BlandinGuillaume Piolle. The articulation between the legal and technical means of erasure of data online, from the perspective of the user
6ème Atelier sur la Protection de la Vie Privée (APVP'15), Jun 2015, Mosnes, France
...
hal-01183508v1  Conference papers
Ghada ArfaouiJean-François LalandeSaïd GharoutJacques Traoré. Practical and Privacy-Preserving TEE Migration
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
...
hal-01154374v1  Conference papers
Sébastien GambsJean-François LalandeJacques Traoré. ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France
...
hal-02877815v1  Conference papers
Pierre GrauxJean-François LalandePierre WilkeValérie Viet Triem Tong. Abusing Android Runtime for Application Obfuscation
SAD 2020 - Workshop on Software Attacks and Defenses, Sep 2020, Genova, Italy. pp.616-624, ⟨10.1109/EuroSPW51379.2020.00089⟩
hal-01344565v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses
9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Newark, United States. p.1-8, ⟨10.1145/2947626.2947645⟩
...
hal-01316541v1  Conference papers
Emmanuelle AnceaumeRomaric LudinardBruno Sericola. Relying on Consensus does not Make Bitcoin Safer
Fast Abstract in the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2016, Toulouse, France
...
hal-01191595v1  Conference papers
Radoniaina AndriatsimandefitraValérie Viet Triem Tong. Detection and Identification of Android Malware Based on Information Flow Monitoring
The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), Nov 2015, New York, United States. ⟨10.1109/cscloud.2015.27⟩
...
hal-01634566v1  Conference papers
Ronny ChevalierMaugan VillatelDavid PlaquinGuillaume Hiet. Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode
ACSAC 2017 - 33rd Annual Computer Security Applications Conference, Dec 2017, Orlando, United States. pp.399-411, ⟨10.1145/3134600.3134622⟩
hal-01241810v1  Conference papers
Erwan GodefroyEric TotelMichel HurfinFrédéric Majorczyk. Assessment of an Automatic Correlation Rules Generator
11th International Conference on Information Systems Security (ICISS 2015), Dec 2015, Kolkata, India. ⟨10.1007/978-3-319-26961-0_13⟩
...
hal-01398192v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. A self-correcting information flow control model for the web-browser
FPS 2016 - The 9th International Symposium on Foundations & Practice of Security, Oct 2016, Québec City, Canada. pp.285-301, ⟨10.1007/978-3-319-51966-1_19⟩
hal-01241492v1  Conference papers
Sébastien GambsGuillaume Piolle. Les techniques d'effacement des données
Le droit à l'oubli numérique, enjeux et perspectives, Institut de l'Ouest : Droit et Europe, Mar 2015, Rennes, France
...
hal-01794252v1  Conference papers
Pierre GrauxJean-François LalandeValérie Viet Triem Tong. Etat de l'Art des Techniques d'Unpacking pour les Applications Android
RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2018, Nancy / La Bresse, France. pp.1-3
hal-01344572v1  Conference papers
Willem de GroefDeepak SubramanianJohns MartinFrank PiessensDesmet Lieven. Ensuring Endpoint Authenticity in WebRTC Peer-to-Peer Communication
31st Annual ACM Symposium on Applied Computing (SAC 2016), Apr 2016, Pisa, Italy. p.2103-2110, ⟨10.1145/2851613.2851804⟩
hal-01355407v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Comparaison d'outils d'évaluation de performance des protocoles de routage inter-MANET
13ème Conference Francophone sur les Nouvelles Technologies de la Répartition (NOTERE 2016), Jul 2016, Paris, France
...
hal-02385216v1  Conference papers
Kévin Le BonByron HawkinsErven RohouGuillaume HietFrédéric Tronel. Plateforme de protection de binaires configurable et dynamiquement adaptative
RESSI 2019 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1-3
...
hal-01851409v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Alternatives to Binary Routing Policies Applied to a Military MANET Coalition
IWCMC 2018 - 14th International Wireless Communications & Mobile Computing Conference, Jun 2018, Limassol, Cyprus. pp.1-6, ⟨10.1109/IWCMC.2018.8450393⟩