Skip to Main content Skip to Navigation

Search by documents



...
hal-02018168v1  Journal articles
Yuting WangPierre WilkeZhong Shao. An abstract stack based approach to verified compositional compilation to machine code
Proceedings of the ACM on Programming Languages, ACM, 2019, 3 (62), pp.30. ⟨10.1145/3290375⟩
hal-03136790v1  Directions of work or proceedings
Guillaume HietFrédéric TronelJean-Louis Lanet. Preface of the 2nd Workshop on the Security of Software/Hardware Interfaces (SILM 2020)
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Sep 2020, Genoa, IEEE, pp.681, 2020, ⟨10.1109/EuroSPW51379.2020.00097⟩
...
tel-01342243v1  Habilitation à diriger des recherches
Valérie Viet Triem Tong. Apport du suivi de flux d'information pour la sécurité des systèmes
Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2015
...
hal-01009516v1  Conference papers
Ghada ArfaouiGuillaume DabosvilleSébastien GambsPatrick LacharmeJean-François Lalande. Un pass de transport anonyme et intraçable pour mobile NFC
Atelier sur la Protection de la Vie Privée 2014, Jun 2014, Cabourg, France
...
hal-00875098v1  Conference papers
Ghada ArfaouiSébastien GambsPatrick LacharmeJean-François LalandeLescuyer Roch et al.  A Privacy-Preserving Contactless Transport Service for NFC Smartphones
Fifth International Conference on Mobile Computing, Applications and Services, Nov 2013, Paris, France. pp.282-285, ⟨10.1007/978-3-319-05452-0_24⟩
hal-01361081v1  Conference papers
Oualid KouchamStéphane MocanuGuillaume HietJean-Marc ThirietFrédéric Majorczyk. Detecting Process-Aware Attacks in Sequential Control Systems
21st Nordic Conference on Secure IT Systems (NordSec 2016), Nov 2016, Oulu, Finland. p.20-36, ⟨10.1007/978-3-319-47560-8_2⟩
...
hal-01091576v1  Journal articles
Ghada ArfaouiGuillaume DabosvilleSébastien GambsPatrick LacharmeJean-François Lalande. A Privacy-Preserving NFC Mobile Pass for Transport Systems
EAI Endorsed Transactions on Mobile Communications and Applications, ICST, 2014, 14 (5), pp.e4. ⟨10.4108/mca.2.5.e4⟩
hal-01587915v1  Conference papers
Oualid KouchamStéphane MocanuGuillaume HietJean-Marc ThirietFrédéric Majorczyk. Classification des approches de détection d'intrusions dans les systèmes de contrôle industriels et axes d'amélioration
Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), May 2016, Toulouse, France
...
hal-01635125v1  Conference papers
Guillaume FournierPaul Audren de KerdrelPascal CotretValérie Viet Triem Tong. DroneJack: Kiss your drones goodbye!
SSTIC 2017 - Symposium sur la sécurité des technologies de l'information et des communications, Jun 2017, Rennes, France. pp.1-8
hal-02415350v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Comparison of Inter-MANET routing protocol evaluation tools
2016 13th International Conference on New Technologies for Distributed Systems (NOTERE), Jul 2016, Paris, France. pp.1-6, ⟨10.1109/NOTERE.2016.7745822⟩
...
hal-01584989v1  Conference papers
Mourad LeslousValérie Viet Triem TongJean-François LalandeThomas Genet. GPFinder: Tracking the Invisible in Android Malware
12th International Conference on Malicious and Unwanted Software, Oct 2017, Fajardo, Puerto Rico. pp.39-46, ⟨10.1109/MALWARE.2017.8323955⟩
...
hal-01535937v1  Conference papers
Laurent GeorgetMathieu JaumeGuillaume PiolleFrédéric TronelValérie Viet Triem Tong. Suivi de flux d'information correct sous Linux
16èmes journées AFADL (Approches formelles dans l'assistance au développement de logiciels), Jun 2017, Montpellier, France. pp.19-26
hal-02416070v1  Conference papers
Jean-Louis Lanet. Ransomware can always be detected but at which cost ?
JATNA'04, Nov 2019, Oujda, Morocco
hal-02416086v1  Conference papers
Noura OurdiAurélien PalisseJean-Louis Lanet. Classification of ransomwares using Artificial Neural Networks and Bayesian Networks
Third International Conference on Intelligent Computing in Data Sciences, Nov 2019, Marrakech, Morocco
hal-00911238v1  Conference papers
Sébastien GambsMarc-Olivier KillijianIzabela MoiseMiguel Nuñez del Prado Cortez. MapReducing GEPETO or Towards Conducting a Privacy Analysis on Millions of Mobility Traces
2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, May 2013, Cambridge, United States. pp.1937-1946, ⟨10.1109/IPDPSW.2013.180⟩
hal-00660055v1  Journal articles
Sébastien GambsMarc-Olivier KillijianMiguel Nuñez del Prado Cortez. Show me how you move and I will tell you who you are
Transactions on Data Privacy, IIIA-CSIC, 2011, 4 (2), pp.103-126
hal-00765530v1  Conference papers
Sébastien GambsMarc-Olivier KillijianMatthieu RoyMoussa Traoré. Locanyms: Towards privacy-preserving location-based services
Atelier Protection de la Vie Privée (APVP 2012), 3ième édition, Jun 2012, Ile de Groix, France
hal-00736944v1  Book sections
Yves DeswarteSébastien Gambs. The challenges raised by the privacy-preserving identity card
David Naccache. Cryptography and Security: From Theory to Applications, 6805, Springer, pp.383-404, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28368-0⟩
hal-00736950v1  Journal articles
Yves DeswarteSébastien Gambs. Cyber-attaques et cyber-défenses: problématique et évolution
La Revue de l'électricité et de l'électronique, Société de l'Électricité, de l'Électronique et des Technologies de l'Information et de la Communication, 2012, pp.23-35
hal-00736947v1  Conference papers
Sébastien GambsMarc-Olivier KillijianMiguel Nuñez del Prado Cortez. Next place prediction using mobility Markov chains
MPM - EuroSys 2012 Workshop on Measurement, Privacy, and Mobility - 2012, Apr 2012, Bern, Switzerland
hal-00735997v1  Conference papers
Romaric LudinardEric TotelFrédéric TronelVincent NicometteMohamed Kaâniche et al.  Detecting Attacks Against Data in Web Applications
CRiSIS 2012 - 7th International Conference on Risks and Security of Internet and Systems, Oct 2012, Cork, Ireland. pp.1-8
...
hal-00699742v1  Conference papers
Sébastien GambsMarc-Olivier KillijianMatthieu RoyMoussa Traoré. Locanyms: Towards Privacy-Preserving Location-Based Services
1st European Workshop on AppRoaches to MObiquiTous Resilience, May 2012, Sibiu, Romania. pp.6
hal-01090053v1  Conference papers
Caroline FontaineSébastien GambsJulien LoliveCristina Onete. Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes
Third International Conference on Cryptology and Information Security in Latin America (Latincrypt'14), Sep 2014, Florianopolis, Brazil
...
hal-01252597v1  Poster communications
Pascal CotretGuillaume HietGogniat GuyVianney Lapotre. HardBlare: an efficient hardware-assisted DIFC for non-modified embedded processors
CHES 2015 - Workshop on Cryptographic Hardware and Embedded Systems, Sep 2015, Saint-Malo, France. 2015
hal-00997137v1  Book sections
Frédéric CuppensChristophe GarionGuillaume PiolleNora Cuppens-Boulahia. Normes et logique déontique
Pierre Marquis; Odile Papini; Henri Prade. Panorama de l'Intelligence Artificielle : Volume 1. Représentation des connaissances et formalisation des raisonnements, Cépaduès Editions, pp.215-237, 2014
...
hal-01311032v1  Poster communications
Mounir Nasr AllahGuillaume HietMuhammad Abdul WahabPascal CotretGogniat Guy et al.  HardBlare: a Hardware-Assisted Approach for Dynamic Information Flow Tracking
Séminaire des doctorantes et doctorants en informatique de la Société Informatique de France, Apr 2016, Paris, France. 2016
...
hal-01337579v1  Conference papers
Muhammad Abdul WahabPascal CotretMounir Nasr AllahGuillaume HietVianney Lapotre et al.  Towards a hardware-assisted information flow tracking ecosystem for ARM processors
26th International Conference on Field-Programmable Logic and Applications (FPL 2016), Aug 2016, Lausanne, Switzerland. ⟨10.1109/fpl.2016.7577396⟩