Skip to Main content Skip to Navigation

Search by documents



...
hal-02018168v1  Journal articles
Yuting WangPierre WilkeZhong Shao. An abstract stack based approach to verified compositional compilation to machine code
Proceedings of the ACM on Programming Languages, ACM, 2019, 3 (62), pp.30. ⟨10.1145/3290375⟩
...
hal-01888300v2  Journal articles
Yves MocquardBruno SericolaEmmanuelle Anceaume. Probabilistic Analysis of Rumor Spreading Time
INFORMS Journal on Computing, Institute for Operations Research and the Management Sciences (INFORMS), 2020, 32 (1), ⟨10.1287/ijoc.2018.0845⟩
...
hal-03024408v1  Conference papers
Antoine DurandGuillaume HébertKhalifa ToumiGérard MemmiEmmanuelle Anceaume. The StakeCube blockchain : Instantiation, Evaluation & Applications
BCCA 2020 - International Conference on Blockchain Computing and Applications, Nov 2020, Virtual, Turkey. pp.1-8
...
hal-03115308v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Novelty detection on graph structured data to detect network intrusions
CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Virtual, France
...
hal-02933668v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. Confiance: detecting vulnerabilities in Java Card applets
International Conference on Availability, Reliability and Security (ARES), Aug 2020, Dublin (effectué en visioconférence), Ireland
...
hal-02473843v1  Conference papers
Giuseppe Di LunaEmmanuelle AnceaumeSilvia BonomiLeonardo Querzoni. Synchronous Byzantine Lattice Agreement in O(log(f )) Rounds
ICDCS 2020 - 40th IEEE International Conference on Distributed Computing Systems, IEEE, Nov 2020, Singapore, Singapore. pp.1-11
...
hal-03043681v1  Conference papers
Geoffrey SaunoisFrédérique RobinEmmanuelle AnceaumeBruno Sericola. Permissionless Consensus based on Proof-of-Eligibility
NCA 2020 - 19th IEEE International Symposium on Network Computing and Applications, Nov 2020, Boston (virtual venue), United States
...
hal-02950490v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs
WTMC 2020 - International Workshop on Traffic Measurements for Cybersecurity, Sep 2020, Genova, Italy. pp.1-9
...
hal-02313650v1  Conference papers
Routa MoussailebCharles BerrtiGuillaume DeboisdeffreNora CuppensJean-Louis Lanet. Watch Out! Doxware on The Way…
CRiSIS 2019 - 14th International Conference on Risks and Security of Internet and Systems, Oct 2019, Hammamet, Tunisia
...
hal-02118385v1  Conference papers
Emmanuelle AnceaumeAdeline GuellierRomaric LudinardBruno Sericola. Sycomore : un registre de transactions distribué et public au débit auto-adaptatif
ALGOTEL 2019 - 21èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2019, Saint Laurent de la Cabrerisse, France. pp.1-4
...
hal-02313656v1  Conference papers
Routa MoussailebNora CuppensJean-Louis LanetHélène Le Bouder. Ransomware Network Traffic Analysis for Pre-Encryption Alert
FPS 2019 : 12th International Symposium on Foundations & Practice of Security, Nov 2019, Toulouse, France
...
hal-03139240v1  Conference papers
Cédric HerzogValérie TongPierre WilkeJean-Louis Lanet. Malware Windows Evasifs : Impact sur les Antivirus et Possible Contre-mesure
CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Rennes, France. ⟨10.5220/0009816703020309⟩
...
hal-03137952v1  Conference papers
Cyprien GottsteinPhilippe Raipin ParvedyMichel HurfinHassan ThomasThierry Coupaye. Inverse Space Filling Curve Partitioning Applied to Wide Area Graphs
DMS 2020 - 11th International conference on Database Management Systems, Nov 2020, Zurich, Switzerland. pp.223-241, ⟨10.5121/csit.2020.101417⟩
...
tel-02416305v1  Theses
Pernelle Mensah. Generation and Dynamic Update of Attack Graphs in Cloud Providers Infrastructures
Cryptography and Security [cs.CR]. CentraleSupélec, 2019. English
...
hal-02877815v1  Conference papers
Pierre GrauxJean-François LalandePierre WilkeValérie Viet Triem Tong. Abusing Android Runtime for Application Obfuscation
SAD 2020 - Workshop on Software Attacks and Defenses, Sep 2020, Genova, Italy. pp.616-624, ⟨10.1109/EuroSPW51379.2020.00089⟩
...
hal-01993308v1  Books
Steve KremerLudovic MéDidier RémyVincent Roca. Cybersecurity
Inria, pp.172, 2019, Inria white book
...
hal-02385216v1  Conference papers
Kévin Le BonByron HawkinsErven RohouGuillaume HietFrédéric Tronel. Plateforme de protection de binaires configurable et dynamiquement adaptative
RESSI 2019 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1-3
...
hal-02066420v1  Conference papers
Ronny ChevalierStefano CristalliChristophe HauserYan ShoshitaishviliRuoyu Wang et al.  BootKeeper: Validating Software Integrity Properties on Boot Firmware Images
CODASPY 2019 - Conference on Data and Application Security and Privacy, Mar 2019, Dallas, United States. pp.1-11, ⟨10.1145/3292006.3300026⟩
...
hal-02313980v1  Conference papers
Ludovic ClaudepierrePhilippe Besnier. Microcontroller Sensitivity to Fault-Injection Induced by Near-Field Electromagnetic Interference
APEMC 2019 - Asia-Pacific International Symposium on Electromagnetic Compatibility, Jun 2019, Sapporo, Japan. pp.1-4
...
hal-02352861v1  Conference papers
Yassine LemmouHélène Le BouderJean-Louis Lanet. Discriminating Unknown Software Using Distance Model
ICACSIS 2019 : 11th International Conference on Advanced Computer Science and Information Systems, Oct 2019, Bali, Indonesia. ⟨10.1109/ICACSIS47736.2019.8979970⟩
...
hal-02416015v1  Journal articles
Samiya HamadoucheMohamed MezghicheJean-Louis Lanet. Hiding a fault enabled virus through code construction
Journal of Computer Virology and Hacking Techniques, Springer, 2019, pp.1-22. ⟨10.1007/s11416-019-00340-z⟩
...
hal-01950822v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. JavaNeighbors: Improving ChuckyJava’s neighborhood discovery algorithm
EUSPN 2019 : 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, Nov 2019, Coimbra, Portugal. pp.70-76, ⟨10.1016/j.procs.2019.09.445⟩
...
hal-02379869v2  Conference papers
Aimad BeradyValérie Viet Triem TongGilles GuetteChristophe BidanGuillaume Carat. Modeling the Operational Phases of APT Campaigns
CSCI 2019 - 6th Annual Conf. on Computational Science & Computational Intelligence, Dec 2019, Las Vegas, United States. pp.1-6, ⟨10.1109/CSCI49370.2019.00023⟩
...
hal-02949067v1  Conference papers
Cédric HerzogValérie Viet Triem TongPierre WilkeArnaud van StraatenJean-Louis Lanet. Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures
SECRYPT 2020 - 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.302-309, ⟨10.5220/0009816703020309⟩