Skip to Main content Skip to Navigation

Search by documents



...
hal-01183508v1  Conference papers
Ghada ArfaouiJean-François LalandeSaïd GharoutJacques Traoré. Practical and Privacy-Preserving TEE Migration
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
...
hal-01154374v1  Conference papers
Sébastien GambsJean-François LalandeJacques Traoré. ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France
...
tel-01413001v2  Theses
Pierre Obame Meye. Dependability in cloud storage
Distributed, Parallel, and Cluster Computing [cs.DC]. Université Rennes 1, 2016. English. ⟨NNT : 2016REN1S091⟩
hal-01182303v1  Conference papers
Luca CaviglioneJean-François LalandeWojciech MazurczykSteffen Wendzel. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
HAS - 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Aug 2015, Los Angeles, United States. ⟨10.1007/978-3-319-20376-8_15⟩
...
hal-00718763v2  Conference papers
Sébastien GambsMarc-Olivier KillijianMiguel Nuñez del Prado Cortez. De-anonymization attack on geolocated datasets
The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13), Jul 2013, Melbourne, Australia. 9p
...
hal-02313980v1  Conference papers
Ludovic ClaudepierrePhilippe Besnier. Microcontroller Sensitivity to Fault-Injection Induced by Near-Field Electromagnetic Interference
APEMC 2019 - Asia-Pacific International Symposium on Electromagnetic Compatibility, Jun 2019, Sapporo, Japan. pp.1-4
hal-00736950v1  Journal articles
Yves DeswarteSébastien Gambs. Cyber-attaques et cyber-défenses: problématique et évolution
La Revue de l'électricité et de l'électronique, Société de l'Électricité, de l'Électronique et des Technologies de l'Information et de la Communication, 2012, pp.23-35
...
hal-01247495v1  Journal articles
Luca CaviglioneMauro GaggeroJean-François LalandeWojciech MazurczykMarcin Urbanski. Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2016, 11 (4), pp.799-810. ⟨10.1109/TIFS.2015.2510825⟩
...
tel-01657148v2  Theses
Laurent Georget. Suivi de flux d'information correct pour les systèmes d'exploitation Linux
Système d'exploitation [cs.OS]. Université Rennes 1, 2017. Français. ⟨NNT : 2017REN1S040⟩
...
hal-03128242v1  Conference papers
Mathieu EscouteloupRonan LashermesJean-Louis LanetJacques Jean-Alain Fournier. Recommendations for a radically secure ISA
CARRV 2020 - Workshop on Computer Architecture Research with RISC-V, May 2020, Valence (virtual), Spain. pp.1-22
...
hal-03206297v1  Directions of work or proceedings
François de VieillevilleStéphane MayAdrien LagrangeA DupuisRosa Ruiloba et al.  Actes de la conférence CAID 2020
CAID 2020 - Second Conference on Artificial Intelligence for Defence, Dec 2020, Rennes, France. 2021
...
hal-01355122v1  Journal articles
Valérie Viet Triem TongJean-François LalandeMourad Leslous. Challenges in Android Malware Analysis
ERCIM News, ERCIM, 2016, Special Theme: Cybersecurity, pp.42-43
...
hal-01940652v1  Conference papers
Jean-François LalandeValérie Viet Triem TongPierre GrauxGuillaume HietWojciech Mazurczyk et al.  Teaching Android Mobile Security
SIGCSE '19 - 50th ACM Technical Symposium on Computer Science Education, Feb 2019, Minneapolis, United States. pp.232-238, ⟨10.1145/3287324.3287406⟩
...
hal-01311917v1  Conference papers
Nicolas KissJean-François LalandeMourad LeslousValérie Viet Triem Tong. Kharon dataset: Android malware under a microscope
The Learning from Authoritative Security Experiment Results (LASER) workshop, May 2016, San Jose, United States. pp.1-12
hal-01136768v1  Conference papers
Jean-François Lalande. Sécurité Android: exemples de malware
Colloque International sur la Sécurité des Systèmes d'Information, Mar 2015, Kénitra, Maroc
...
hal-02912301v1  Conference papers
Pierre-Yves PéneauLudovic ClaudepierreDamien HardyErven Rohou. NOP-Oriented Programming: Should we Care?
Sécurité des Interfaces Logiciel/Matériel, Sep 2020, Genoa (virtual), Italy. ⟨10.1109/EuroSPW51379.2020.00100⟩
...
hal-02913112v1  Conference papers
Jean-François LalandeMathieu SimonValérie Viet Triem Tong. GroDDViewer: Dynamic Dual View of Android Malware
GraMSec 2020 - 7th Seventh International Workshop on Graphical Models for Security, Jun 2020, Virtual Conference, France. pp.127-139, ⟨10.1007/978-3-030-62230-5_7⟩
...
hal-01154368v1  Conference papers
Radoniaina Andriatsimandefitra RatsisahananaThomas GenetLaurent GuilloJean-François LalandeDavid Pichardie et al.  Kharon : Découvrir, comprendre et reconnaître des malware Android par suivi de flux d'information
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France
...
hal-01168354v1  Poster communications
Adrien AbrahamRadoniaina Andriatsimandefitra RatsisahananaNicolas KissJean-François LalandeValérie Viet Triem Tong. Towards Automatic Triggering of Android Malware
12th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Jul 2015, Milano, Italy
hal-02415350v1  Conference papers
Florian GrandhommeGilles GuetteAdlen KsentiniThierry Plesse. Comparison of Inter-MANET routing protocol evaluation tools
2016 13th International Conference on New Technologies for Distributed Systems (NOTERE), Jul 2016, Paris, France. pp.1-6, ⟨10.1109/NOTERE.2016.7745822⟩