Skip to Main content Skip to Navigation

Search by documents

tel-01989940v1  Theses
Thomas Letan. Specifying and Verifying Hardware-based Security Enforcement Mechanisms
Computer Science [cs]. CentraleSupélec, 2018. English
tel-02132759v1  Theses
Mourad Leslous. Highlight and execute suspicious paths in Android malware
Cryptography and Security [cs.CR]. Université Rennes 1, 2018. English. ⟨NNT : 2018REN1S090⟩
hal-01634566v1  Conference papers
Ronny ChevalierMaugan VillatelDavid PlaquinGuillaume Hiet. Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode
ACSAC 2017 - 33rd Annual Computer Security Applications Conference, Dec 2017, Orlando, United States. pp.399-411, ⟨10.1145/3134600.3134622⟩
hal-01794252v1  Conference papers
Pierre GrauxJean-François LalandeValérie Viet Triem Tong. Etat de l'Art des Techniques d'Unpacking pour les Applications Android
RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2018, Nancy / La Bresse, France. pp.1-3
tel-01636207v1  Theses
Kun He. Content Privacy and Access Control on Image-Sharing Platforms
Cryptography and Security [cs.CR]. CentraleSupélec, 2017. English
hal-01851409v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Alternatives to Binary Routing Policies Applied to a Military MANET Coalition
IWCMC 2018 - 14th International Wireless Communications & Mobile Computing Conference, Jun 2018, Limassol, Cyprus. pp.1-6, ⟨10.1109/IWCMC.2018.8450393⟩
hal-01988306v1  Conference papers
Guillaume Piolle. The robustness of security and privacy properties in decentralized applications
Surveillance, Resilience & Privacy Conference 2018, Dec 2018, Paris, France
hal-01992346v1  Conference papers
Damien CrémilleuxChristophe BidanFrédéric MajorczykNicolas Prigent. Enhancing Collaboration between Security Analysts in Security Operations Centers
CRISIS 2018 - 13th International Conference on Risks and Security of Internet and Systems, Oct 2018, Arcachon, France. pp.1-6, ⟨10.1007/978-3-030-12143-3_12⟩
hal-01949183v1  Conference papers
David LanoeMichel HurfinEric Totel. A Scalable and Efficient Correlation Engine to Detect Multi-step Attacks in Distributed Systems
SRDS 2018 - 37th IEEE International Symposium on Reliable Distributed Systems, Oct 2018, Salvador, Brazil. pp.1-10, ⟨10.1109/srds.2018.00014⟩
hal-01906318v1  Conference papers
Jean-François Lalande. Android Malware Analysis: from technical difficulties to scientific challenges
SecITC 2018 - International Conference on Innovative Security Solutions for Information Technology and Communications, Nov 2018, Bucharest, Romania. pp.1-54, ⟨10.1007/978-3-030-12942-2_2⟩
hal-01894500v1  Conference papers
Routa MoussailebBenjamin BougetAurélien PalisseHélène Le BouderNora Cuppens-Boulahia et al.  Ransomware's Early Mitigation Mechanisms
ARES 2018 - 13th International Conference on Availability, Reliability and Security, Aug 2018, Hambourg, Germany. ⟨10.1145/3230833.3234691⟩
hal-01519432v1  Conference papers
Nicolò RivettiEmmanuelle AnceaumeYann BusnelLeonardo QuerzoniBruno Sericola. Ordonnancement dynamique pour un équilibrage de charge quasi-optimal dans les systèmes de traitement de flux
ALGOTEL 2017 - 19èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2017, Quiberon, France
hal-01976753v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. Protection of systems against fuzzing attacks
FPS 2018 - 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montréal, Canada. p.156-172, ⟨10.1007/978-3-030-18419-3_11⟩
tel-01657148v2  Theses
Laurent Georget. Suivi de flux d'information correct pour les systèmes d'exploitation Linux
Système d'exploitation [cs.OS]. Université Rennes 1, 2017. Français. ⟨NNT : 2017REN1S040⟩
hal-01894470v1  Conference papers
Hélène Le BouderGaël ThomasEdwin BourgetMariem GraaNora Cuppens-Boulahia et al.  Theoretical security evaluation of the Human Semantic Authentication protocol
SECRYPT 2018 - 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.332-339, ⟨10.5220/0006841704980505⟩
hal-01976747v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. Normalization of Java source codes
SECITC 2018 : 11th International Conference on Security for Information Technology and Communications, Nov 2018, Bucarest, Romania. pp.29-40, ⟨10.1007/978-3-030-12942-2_4⟩
hal-01634368v1  Conference papers
Thibaut Lajoie-MazencRomaric LudinardEmmanuelle Anceaume. Handling Bitcoin Conflicts Through a Glimpse of Structure
Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing, Apr 2017, Marrakesh, Morocco. ⟨10.1145/3019612.3019657⟩
hal-01888298v1  Conference papers
Emmanuelle AnceaumeYann BusnelVasile Cazacu. On the Fly Detection of the Top-k Items in the Distributed Sliding Window Model
NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications, IEEE, Nov 2018, Boston, United States. pp.1-8, ⟨10.1109/NCA.2018.8548097⟩
hal-01888302v1  Conference papers
Emmanuelle Anceaume. Sycomore, a Directed Acyclic Graph of Blocks
The International Industrial & Academic Conference on Blockchain Technology - Chain-In, Jul 2018, Porto, Portugal
hal-01888265v1  Conference papers
Emmanuelle AnceaumeAntoine GuellierRomaric LudinardBruno Sericola. Sycomore : a Permissionless Distributed Ledger that self-adapts to Transactions Demand
NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications, IEEE, Nov 2018, Boston, United States. pp.1-8, ⟨10.1109/NCA.2018.8548053⟩
hal-01768190v1  Conference papers
Emmanuelle AnceaumeAntoine GuellierRomaric Ludinard. UTXOs as a proof of membership for Byzantine Agreement based Cryptocurrencies
IEEE Symposium on Recent Advances on Blockchain and Its Applications, Jul 2018, Halifax, Canada. pp.1-8, ⟨10.1109/Cybermatics_2018.2018.00248⟩
hal-01522360v2  Conference papers
Emmanuelle AnceaumeRomaric LudinardMaria Potop-ButucaruFrédéric Tronel. Bitcoin a Distributed Shared Register
SSS 2017 - 19th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Nov 2017, Boston, MA, United States. pp.456-468, ⟨10.1007/978-3-319-69084-1_34⟩
hal-01875521v1  Conference papers
Sebanjila BukasaRonan LashermesHélène Le BouderJean-Louis LanetAxel Legay. How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip
11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.93-109, ⟨10.1007/978-3-319-93524-9_6⟩