Skip to Main content Skip to Navigation

Search by documents

hal-02018168v1  Journal articles
Yuting WangPierre WilkeZhong Shao. An abstract stack based approach to verified compositional compilation to machine code
Proceedings of the ACM on Programming Languages, ACM, 2019, 3 (62), pp.30. ⟨10.1145/3290375⟩
hal-02313650v1  Conference papers
Routa MoussailebCharles BerrtiGuillaume DeboisdeffreNora CuppensJean-Louis Lanet. Watch Out! Doxware on The Way…
CRiSIS 2019 - 14th International Conference on Risks and Security of Internet and Systems, Oct 2019, Hammamet, Tunisia
hal-02118385v1  Conference papers
Emmanuelle AnceaumeAdeline GuellierRomaric LudinardBruno Sericola. Sycomore : un registre de transactions distribué et public au débit auto-adaptatif
ALGOTEL 2019 - 21èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2019, Saint Laurent de la Cabrerisse, France. pp.1-4
hal-02313656v1  Conference papers
Routa MoussailebNora CuppensJean-Louis LanetHélène Le Bouder. Ransomware Network Traffic Analysis for Pre-Encryption Alert
FPS 2019 : 12th International Symposium on Foundations & Practice of Security, Nov 2019, Toulouse, France
tel-02416305v1  Theses
Pernelle Mensah. Generation and Dynamic Update of Attack Graphs in Cloud Providers Infrastructures
Cryptography and Security [cs.CR]. CentraleSupélec, 2019. English
tel-01989940v1  Theses
Thomas Letan. Specifying and Verifying Hardware-based Security Enforcement Mechanisms
Computer Science [cs]. CentraleSupélec, 2018. English
tel-02132759v1  Theses
Mourad Leslous. Highlight and execute suspicious paths in Android malware
Cryptography and Security [cs.CR]. Université Rennes 1, 2018. English. ⟨NNT : 2018REN1S090⟩
hal-01993308v1  Books
Steve KremerLudovic MéDidier RémyVincent Roca. Cybersecurity
Inria, pp.172, 2019, Inria white book
hal-01794252v1  Conference papers
Pierre GrauxJean-François LalandeValérie Viet Triem Tong. Etat de l'Art des Techniques d'Unpacking pour les Applications Android
RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2018, Nancy / La Bresse, France. pp.1-3
hal-02385216v1  Conference papers
Kévin Le BonByron HawkinsErven RohouGuillaume HietFrédéric Tronel. Plateforme de protection de binaires configurable et dynamiquement adaptative
RESSI 2019 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1-3
hal-01851409v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Alternatives to Binary Routing Policies Applied to a Military MANET Coalition
IWCMC 2018 - 14th International Wireless Communications & Mobile Computing Conference, Jun 2018, Limassol, Cyprus. pp.1-6, ⟨10.1109/IWCMC.2018.8450393⟩
hal-01988306v1  Conference papers
Guillaume Piolle. The robustness of security and privacy properties in decentralized applications
Surveillance, Resilience & Privacy Conference 2018, Dec 2018, Paris, France
hal-01992346v1  Conference papers
Damien CrémilleuxChristophe BidanFrédéric MajorczykNicolas Prigent. Enhancing Collaboration between Security Analysts in Security Operations Centers
CRISIS 2018 - 13th International Conference on Risks and Security of Internet and Systems, Oct 2018, Arcachon, France. pp.1-6, ⟨10.1007/978-3-030-12143-3_12⟩
hal-01949183v1  Conference papers
David LanoeMichel HurfinEric Totel. A Scalable and Efficient Correlation Engine to Detect Multi-step Attacks in Distributed Systems
SRDS 2018 - 37th IEEE International Symposium on Reliable Distributed Systems, Oct 2018, Salvador, Brazil. pp.1-10, ⟨10.1109/srds.2018.00014⟩
hal-01906318v1  Conference papers
Jean-François Lalande. Android Malware Analysis: from technical difficulties to scientific challenges
SecITC 2018 - International Conference on Innovative Security Solutions for Information Technology and Communications, Nov 2018, Bucharest, Romania. pp.1-54, ⟨10.1007/978-3-030-12942-2_2⟩
hal-02066420v1  Conference papers
Ronny ChevalierStefano CristalliChristophe HauserYan ShoshitaishviliRuoyu Wang et al.  BootKeeper: Validating Software Integrity Properties on Boot Firmware Images
CODASPY 2019 - Conference on Data and Application Security and Privacy, Mar 2019, Dallas, United States. pp.1-11, ⟨10.1145/3292006.3300026⟩
hal-02313980v1  Conference papers
Ludovic ClaudepierrePhilippe Besnier. Microcontroller Sensitivity to Fault-Injection Induced by Near-Field Electromagnetic Interference
APEMC 2019 - Asia-Pacific International Symposium on Electromagnetic Compatibility, Jun 2019, Sapporo, Japan. pp.1-4
hal-01894500v1  Conference papers
Routa MoussailebBenjamin BougetAurélien PalisseHélène Le BouderNora Cuppens-Boulahia et al.  Ransomware's Early Mitigation Mechanisms
ARES 2018 - 13th International Conference on Availability, Reliability and Security, Aug 2018, Hambourg, Germany. ⟨10.1145/3230833.3234691⟩
hal-02352861v1  Conference papers
Yassine LemmouHélène Le BouderJean-Louis Lanet. Discriminating Unknown Software Using Distance Model
ICACSIS 2019 : 11th International Conference on Advanced Computer Science and Information Systems, Oct 2019, Bali, Indonesia. ⟨10.1109/ICACSIS47736.2019.8979970⟩
hal-02416015v1  Journal articles
Samiya HamadoucheMohamed MezghicheJean-Louis Lanet. Hiding a fault enabled virus through code construction
Journal of Computer Virology and Hacking Techniques, Springer, 2019, pp.1-22. ⟨10.1007/s11416-019-00340-z⟩
hal-01976753v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. Protection of systems against fuzzing attacks
FPS 2018 - 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montréal, Canada. p.156-172, ⟨10.1007/978-3-030-18419-3_11⟩
hal-01950822v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. JavaNeighbors: Improving ChuckyJava’s neighborhood discovery algorithm
EUSPN 2019 : 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, Nov 2019, Coimbra, Portugal. pp.70-76, ⟨10.1016/j.procs.2019.09.445⟩
hal-01894470v1  Conference papers
Hélène Le BouderGaël ThomasEdwin BourgetMariem GraaNora Cuppens-Boulahia et al.  Theoretical security evaluation of the Human Semantic Authentication protocol
SECRYPT 2018 - 15th International Conference on Security and Cryptography, Jul 2018, Porto, Portugal. pp.332-339, ⟨10.5220/0006841704980505⟩
hal-01976747v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. Normalization of Java source codes
SECITC 2018 : 11th International Conference on Security for Information Technology and Communications, Nov 2018, Bucarest, Romania. pp.29-40, ⟨10.1007/978-3-030-12942-2_4⟩
hal-02379869v2  Conference papers
Aimad BeradyValérie Viet Triem TongGilles GuetteChristophe BidanGuillaume Carat. Modeling the Operational Phases of APT Campaigns
CSCI 2019 - 6th Annual Conf. on Computational Science & Computational Intelligence, Dec 2019, Las Vegas, United States. pp.1-6, ⟨10.1109/CSCI49370.2019.00023⟩