Skip to Main content Skip to Navigation

Search by documents



...
hal-02018168v1  Journal articles
Yuting WangPierre WilkeZhong Shao. An abstract stack based approach to verified compositional compilation to machine code
Proceedings of the ACM on Programming Languages, ACM, 2019, 3 (62), pp.30. ⟨10.1145/3290375⟩
...
hal-02118385v1  Conference papers
Emmanuelle AnceaumeAdeline GuellierRomaric LudinardBruno Sericola. Sycomore : un registre de transactions distribué et public au débit auto-adaptatif
ALGOTEL 2019 - 21èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2019, Saint Laurent de la Cabrerisse, France. pp.1-4
...
hal-01839930v1  Conference papers
Emmanuelle AnceaumeYann BusnelVasile Cazacu. Finding Top-k Most Frequent Items in Distributed Streams in the Time-Sliding Window Model
DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg, Luxembourg. pp.1-2, ⟨10.1109/DSN-W.2018.00030⟩
...
hal-03340008v1  Conference papers
Camille Le BonErven RohouFrédéric TronelGuillaume Hiet. DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification
SILM 2021 - Workshop on the Security of Software / Hardware Interfaces, Sep 2021, digital event, Austria. pp.1-10
...
tel-01657148v2  Theses
Laurent Georget. Suivi de flux d'information correct pour les systèmes d'exploitation Linux
Système d'exploitation [cs.OS]. Université Rennes 1, 2017. Français. ⟨NNT : 2017REN1S040⟩
...
hal-01618360v1  Conference papers
Mounir AssafDavid NaumannJulien SignolesEric TotelFrédéric Tronel. Hypercollecting Semantics and its Application to Static Analysis of Information Flow
POPL 2017 - ACM Symposium on Principles of Programming Languages, Jan 2017, Paris, France. pp.874-887, ⟨10.1145/3009837.3009889⟩
...
hal-01976747v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. Normalization of Java source codes
SECITC 2018 : 11th International Conference on Security for Information Technology and Communications, Nov 2018, Bucarest, Romania. pp.29-40, ⟨10.1007/978-3-030-12942-2_4⟩
...
hal-01888298v1  Conference papers
Emmanuelle AnceaumeYann BusnelVasile Cazacu. On the Fly Detection of the Top-k Items in the Distributed Sliding Window Model
NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications, IEEE, Nov 2018, Boston, United States. pp.1-8, ⟨10.1109/NCA.2018.8548097⟩
...
hal-01768190v1  Conference papers
Emmanuelle AnceaumeAntoine GuellierRomaric Ludinard. UTXOs as a proof of membership for Byzantine Agreement based Cryptocurrencies
IEEE Symposium on Recent Advances on Blockchain and Its Applications, Jul 2018, Halifax, Canada. pp.1-8, ⟨10.1109/Cybermatics_2018.2018.00248⟩
...
tel-02132759v1  Theses
Mourad Leslous. Highlight and execute suspicious paths in Android malware
Cryptography and Security [cs.CR]. Université Rennes 1, 2018. English. ⟨NNT : 2018REN1S090⟩
hal-01894500v1  Conference papers
Routa MoussailebBenjamin BougetAurélien PalisseHélène Le BouderNora Cuppens-Boulahia et al.  Ransomware's Early Mitigation Mechanisms
ARES 2018 - 13th International Conference on Availability, Reliability and Security, Aug 2018, Hambourg, Germany. ⟨10.1145/3230833.3234691⟩
...
hal-01976753v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. Protection of systems against fuzzing attacks
FPS 2018 - 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montréal, Canada. p.156-172, ⟨10.1007/978-3-030-18419-3_11⟩
...
hal-01950822v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. JavaNeighbors: Improving ChuckyJava’s neighborhood discovery algorithm
EUSPN 2019 : 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, Nov 2019, Coimbra, Portugal. pp.70-76, ⟨10.1016/j.procs.2019.09.445⟩
...
tel-01655322v1  Theses
Solenn Brunet. Conception de mécanismes d’accréditations anonymes et d’anonymisation de données
Cryptographie et sécurité [cs.CR]. Université de Rennes 1 [UR1], 2017. Français
...
hal-02380364v1  Conference papers
Emmanuelle AnceaumeAntonella del PozzoRomaric LudinardMaria Potop-ButucaruSara Tucci-Piergiovanni. Blockchain Abstract Data Type
SPAA 2019 - 31st ACM Symposium on Parallelism in Algorithms and Architectures, Jun 2019, Phoenix, Arizona, United States. pp.349-358, ⟨10.1145/3323165.3323183⟩
...
hal-01877109v1  Conference papers
Oualid KouchamStéphane MocanuGuillaume HietJean-Marc ThirietFrédéric Majorczyk. Efficient Mining of Temporal Safety Properties for Intrusion Detection in Industrial Control Systems
SAFEPROCESS 2018 - 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, Aug 2018, Warsaw, Poland. pp.1-8
...
tel-01636207v1  Theses
Kun He. Content Privacy and Access Control on Image-Sharing Platforms
Cryptography and Security [cs.CR]. CentraleSupélec, 2017. English
...
hal-01718480v2  Reports
Emmanuelle AnceaumeAntonella del PozzoRomaric LudinardMaria Potop-ButucaruSara Tucci-Piergiovanni. Blockchain Abstract Data Type
[Research Report] Sorbonne Université, CNRS, Laboratoire d'Informatique de Paris 6, LIP6, Paris, France. 2018, pp.1-30
...
hal-02352861v1  Conference papers
Yassine LemmouHélène Le BouderJean-Louis Lanet. Discriminating Unknown Software Using Distance Model
ICACSIS 2019 : 11th International Conference on Advanced Computer Science and Information Systems, Oct 2019, Bali, Indonesia. ⟨10.1109/ICACSIS47736.2019.8979970⟩
...
tel-01989940v1  Theses
Thomas Letan. Specifying and Verifying Hardware-based Security Enforcement Mechanisms
Computer Science [cs]. CentraleSupélec, 2018. English
...
hal-01888265v1  Conference papers
Emmanuelle AnceaumeAntoine GuellierRomaric LudinardBruno Sericola. Sycomore : a Permissionless Distributed Ledger that self-adapts to Transactions Demand
NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications, IEEE, Nov 2018, Boston, United States. pp.1-8, ⟨10.1109/NCA.2018.8548053⟩
...
hal-01988364v1  Poster communications
Emmanuelle AnceaumeAntonella del PozzoRomaric LudinardMaria Potop-ButucaruSara Tucci-Piergiovanni. POSTER: Blockchain Abstract Data Type
24th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming (PPoPP 2019), Feb 2019, Washington DC, United States. ACM, 24th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, pp.1-2, ⟨10.1145/3293883.3303705⟩
...
hal-02118367v2  Conference papers
Emmanuelle AnceaumeYann BusnelVasile Cazacu. L'art d'extraire des éléments du top-k en temps réel sur des fenêtres glissantes réparties
ALGOTEL 2019 - 21èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2019, Saint Laurent de la Cabrerisse, France. pp.1-4
...
hal-01894470v1  Conference papers
Hélène Le BouderGaël ThomasEdwin BourgetMariem GraaNora Cuppens-Boulahia et al.  Theoretical security evaluation of the Human Semantic Authentication protocol
SECRYPT 2018 - 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.332-339, ⟨10.5220/0006841704980505⟩