Skip to Main content Skip to Navigation

Search by documents



hal-01344565v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses
9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Newark, United States. p.1-8, ⟨10.1145/2947626.2947645⟩
...
hal-01316541v1  Conference papers
Emmanuelle AnceaumeRomaric LudinardBruno Sericola. Relying on Consensus does not Make Bitcoin Safer
Fast Abstract in the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2016, Toulouse, France
...
hal-01311970v1  Reports
Nicoló RivettiEmmanuelle AnceaumeYann BusnelLeonardo QuerzoniBruno Sericola. Load-Aware Shedding in Stream Processing Systems
[Research Report] LINA-University of Nantes; Sapienza Università di Roma (Italie); Irisa; Inria Rennes. 2016
...
hal-01634566v1  Conference papers
Ronny ChevalierMaugan VillatelDavid PlaquinGuillaume Hiet. Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode
ACSAC 2017 - 33rd Annual Computer Security Applications Conference, Dec 2017, Orlando, United States. pp.399-411, ⟨10.1145/3134600.3134622⟩
...
hal-01398192v1  Conference papers
Deepak SubramanianGuillaume HietChristophe Bidan. A self-correcting information flow control model for the web-browser
FPS 2016 - The 9th International Symposium on Foundations & Practice of Security, Oct 2016, Québec City, Canada. pp.285-301, ⟨10.1007/978-3-319-51966-1_19⟩
...
hal-01356690v1  Reports
Thomas LetanPierre ChifflierGuillaume HietPierre NéronBenjamin Morin. SpecCert: Specifying and Verifying Hardware-based Security Enforcement
[Technical Report] CentraleSupélec; Agence Nationale de Sécurité des Systèmes d’Information. 2016, pp.20
...
tel-01636207v1  Theses
Kun He. Content Privacy and Access Control on Image-Sharing Platforms
Cryptography and Security [cs.CR]. CentraleSupélec, 2017. English
hal-01344572v1  Conference papers
Willem de GroefDeepak SubramanianJohns MartinFrank PiessensDesmet Lieven. Ensuring Endpoint Authenticity in WebRTC Peer-to-Peer Communication
31st Annual ACM Symposium on Applied Computing (SAC 2016), Apr 2016, Pisa, Italy. p.2103-2110, ⟨10.1145/2851613.2851804⟩
hal-01355407v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Comparaison d'outils d'évaluation de performance des protocoles de routage inter-MANET
13ème Conference Francophone sur les Nouvelles Technologies de la Répartition (NOTERE 2016), Jul 2016, Paris, France
...
tel-01413001v2  Theses
Pierre Obame Meye. Dependability in cloud storage
Distributed, Parallel, and Cluster Computing [cs.DC]. Université Rennes 1, 2016. English. ⟨NNT : 2016REN1S091⟩
hal-01344472v1  Conference papers
Kun HeChristophe BidanGaëtan Le Guelvouit. Privacy Protection for JPEG Content on Image-Sharing Platforms
4th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC 2016), Jun 2016, Vigo, Spain. p.185-186, ⟨10.1145/2909827.2933195⟩
...
hal-01305334v1  Conference papers
Emmanuelle AnceaumeRomaric LudinardBruno Sericola. L'empire romain ne doit pas être géré comme une petite île grecque
ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2016, Bayonne, France
hal-01355402v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Comparing inter-domain routing protocol assessment tools for MANET
2016 IEEE International Conference on Communications (ICC), May 2016, Kuala Lumpur, Malaysia. ⟨10.1109/icc.2016.7511313⟩
hal-01344471v1  Conference papers
Kun HeChristophe BidanGaëtan Le Guelvouit. Robust and Secure Image Encryption Schemes During JPEG Compression Process
2016 IS&T International Symposium on Electronic Imaging (EI 2016), Feb 2016, San Francisco, California, United States
hal-01361081v1  Conference papers
Oualid KouchamStéphane MocanuGuillaume HietJean-Marc ThirietFrédéric Majorczyk. Detecting Process-Aware Attacks in Sequential Control Systems
21st Nordic Conference on Secure IT Systems (NordSec 2016), Nov 2016, Oulu, Finland. p.20-36, ⟨10.1007/978-3-319-47560-8_2⟩
hal-01334612v1  Poster communications
Mouna Hkimi. Apprentissage d'un modèle comportemental d'une application distribuée pour la détection d'intrusion
Rendez-Vous de la Recherche et de l'enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), May 2016, Toulouse, France
...
hal-01519432v1  Conference papers
Nicolò RivettiEmmanuelle AnceaumeYann BusnelLeonardo QuerzoniBruno Sericola. Ordonnancement dynamique pour un équilibrage de charge quasi-optimal dans les systèmes de traitement de flux
ALGOTEL 2017 - 19èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2017, Quiberon, France
...
hal-01247495v1  Journal articles
Luca CaviglioneMauro GaggeroJean-François LalandeWojciech MazurczykMarcin Urbanski. Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2016, 11 (4), pp.799-810. ⟨10.1109/TIFS.2015.2510825⟩
...
tel-01657148v2  Theses
Laurent Georget. Suivi de flux d'information correct pour les systèmes d'exploitation Linux
Système d'exploitation [cs.OS]. Université Rennes 1, 2017. Français. ⟨NNT : 2017REN1S040⟩
...
hal-01397685v1  Conference papers
Emmanuelle AnceaumeThibaut Lajoie-MazencRomaric LudinardBruno Sericola. Safety Analysis of Bitcoin Improvement Proposals
2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), IEEE, Oct 2016, Cambridge, United States
...
hal-01634368v1  Conference papers
Thibaut Lajoie-MazencRomaric LudinardEmmanuelle Anceaume. Handling Bitcoin Conflicts Through a Glimpse of Structure
Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing, Apr 2017, Marrakesh, Morocco. ⟨10.1145/3019612.3019657⟩
...
hal-01522360v2  Conference papers
Emmanuelle AnceaumeRomaric LudinardMaria Potop-ButucaruFrédéric Tronel. Bitcoin a Distributed Shared Register
SSS 2017 - 19th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Nov 2017, Boston, MA, United States. pp.456-468, ⟨10.1007/978-3-319-69084-1_34⟩
hal-01587915v1  Conference papers
Oualid KouchamStéphane MocanuGuillaume HietJean-Marc ThirietFrédéric Majorczyk. Classification des approches de détection d'intrusions dans les systèmes de contrôle industriels et axes d'amélioration
Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), May 2016, Toulouse, France