Skip to Main content Skip to Navigation

Search by documents



...
hal-01888300v2  Journal articles
Yves MocquardBruno SericolaEmmanuelle Anceaume. Probabilistic Analysis of Rumor Spreading Time
INFORMS Journal on Computing, Institute for Operations Research and the Management Sciences (INFORMS), 2020, 32 (1), ⟨10.1287/ijoc.2018.0845⟩
...
hal-03024408v1  Conference papers
Antoine DurandGuillaume HébertKhalifa ToumiGérard MemmiEmmanuelle Anceaume. The StakeCube blockchain : Instantiation, Evaluation & Applications
BCCA 2020 - International Conference on Blockchain Computing and Applications, Nov 2020, Virtual, Turkey. pp.1-8
...
hal-03115308v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Novelty detection on graph structured data to detect network intrusions
CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Virtual, France
...
hal-02933668v1  Conference papers
Léopold OuairyHélène Le BouderJean-Louis Lanet. Confiance: detecting vulnerabilities in Java Card applets
International Conference on Availability, Reliability and Security (ARES), Aug 2020, Dublin (effectué en visioconférence), Ireland
...
hal-02473843v1  Conference papers
Giuseppe Di LunaEmmanuelle AnceaumeSilvia BonomiLeonardo Querzoni. Synchronous Byzantine Lattice Agreement in O(log(f )) Rounds
ICDCS 2020 - 40th IEEE International Conference on Distributed Computing Systems, IEEE, Nov 2020, Singapore, Singapore. pp.1-11
...
hal-03043681v1  Conference papers
Geoffrey SaunoisFrédérique RobinEmmanuelle AnceaumeBruno Sericola. Permissionless Consensus based on Proof-of-Eligibility
NCA 2020 - 19th IEEE International Symposium on Network Computing and Applications, Nov 2020, Boston (virtual venue), United States
...
hal-02950490v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs
WTMC 2020 - International Workshop on Traffic Measurements for Cybersecurity, Sep 2020, Genova, Italy. pp.1-9
...
hal-03139240v1  Conference papers
Cédric HerzogValérie TongPierre WilkeJean-Louis Lanet. Malware Windows Evasifs : Impact sur les Antivirus et Possible Contre-mesure
CAID 2020 - Conference on Artificial Intelligence for Defense, Dec 2020, Rennes, France. ⟨10.5220/0009816703020309⟩
...
hal-03137952v1  Conference papers
Cyprien GottsteinPhilippe Raipin ParvedyMichel HurfinHassan ThomasThierry Coupaye. Inverse Space Filling Curve Partitioning Applied to Wide Area Graphs
DMS 2020 - 11th International conference on Database Management Systems, Nov 2020, Zurich, Switzerland. pp.223-241, ⟨10.5121/csit.2020.101417⟩
...
hal-03066847v1  Conference papers
Pierre GrauxJean-François LalandeValérie Viet Triem TongPierre Wilke. Preventing Serialization Vulnerabilities through Transient Field Detection
SAC 2021 - 36th ACM/SIGAPP Symposium On Applied Computing, Mar 2021, Gwangju / Virtual, South Korea. pp.1-9
...
hal-02877815v1  Conference papers
Pierre GrauxJean-François LalandePierre WilkeValérie Viet Triem Tong. Abusing Android Runtime for Application Obfuscation
SAD 2020 - Workshop on Software Attacks and Defenses, Sep 2020, Genova, Italy. pp.616-624, ⟨10.1109/EuroSPW51379.2020.00089⟩
...
hal-02949067v1  Conference papers
Cédric HerzogValérie Viet Triem TongPierre WilkeArnaud van StraatenJean-Louis Lanet. Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures
SECRYPT 2020 - 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.302-309, ⟨10.5220/0009816703020309⟩
...
hal-02472207v1  Conference papers
Giuseppe Antonio Di LunaEmmanuelle AnceaumeLeonardo Querzoni. Byzantine Generalized Lattice Agreement
Proceedings of the 34th IEEE International Parallel and Distributed Processing Symposium (IPDPS), May 2020, New Orleans, United States
...
hal-03128242v1  Conference papers
Mathieu EscouteloupRonan LashermesJean-Louis LanetJacques Jean-Alain Fournier. Recommendations for a radically secure ISA
CARRV 2020 - Workshop on Computer Architecture Research with RISC-V, May 2020, Valence (virtual), Spain. pp.1-22
...
hal-02912301v1  Conference papers
Pierre-Yves PéneauLudovic ClaudepierreDamien HardyErven Rohou. NOP-Oriented Programming: Should we Care?
Sécurité des Interfaces Logiciel/Matériel, Sep 2020, Genoa (virtual), Italy. ⟨10.1109/EuroSPW51379.2020.00100⟩
...
hal-02913112v1  Conference papers
Jean-François LalandeMathieu SimonValérie Viet Triem Tong. GroDDViewer: Dynamic Dual View of Android Malware
GraMSec 2020 - 7th Seventh International Workshop on Graphical Models for Security, Jun 2020, Virtual Conference, France. pp.127-139, ⟨10.1007/978-3-030-62230-5_7⟩
...
hal-02950489v1  Conference papers
Laetitia LeichtnamEric TotelNicolas PrigentLudovic Mé. Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data
DIMVA 2020 - 17th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Jun 2020, Lisbon, Portugal. pp.1-20
...
hal-03114583v1  Conference papers
Yuting WangXiangzhen XuPierre WilkeZhong Shao. CompCertELF: Verified Separate Compilation of C Programs into ELF Object Files
PACMPL 2020 - Proceedings of the ACM on Programming Languages, Nov 2020, Chicago, United States. pp.1-28
...
hal-02988140v1  Directions of work or proceedings
Steffen WendzelLuca CaviglioneAlessandro CheccoAleksandra MilevaJean-François Lalande et al.  Information Security Methodology, Replication Studies and Information Security Education
Journal of Universal Computer Science, 26 (7), pp.762-763, 2020, Special issue of Journal of Universal Computer Science
...
tel-03164744v1  Theses
Pierre Graux. Challenges of native android applications : obfuscation and vulnerabilities
Cryptography and Security [cs.CR]. Université Rennes 1, 2020. English. ⟨NNT : 2020REN1S047⟩
...
hal-03131262v1  Journal articles
Aimad BeradyMathieu JaumeValérie Viet Triem TongGilles Guette. From TTP to IoC: Advanced Persistent Graphs for Threat Hunting
IEEE Transactions on Network and Service Management, IEEE, 2021, Special Issue on Latest Developments for Security Management of Networks and Services, 18 (2), pp.1321 - 1333. ⟨10.1109/TNSM.2021.3056999⟩
...
hal-03206297v1  Directions of work or proceedings
F de VieillevilleS MayA LagrangeA DupuisR Ruiloba et al.  Actes de la conférence CAID 2020
CAID 2020 - Second Conference on Artificial Intelligence for Defence, Dec 2020, Rennes, France. 2021