Personnel
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 6E. Anceaume, Y. Busnel.
    Lightweight Metric Computation for Distributed Massive Data Streams, in: Transactions on Large-Scale Data- and Knowledge-Centered Systems, April 2017, vol. 10430, no 33, pp. 1–39. [ DOI : 10.1007/978-3-662-55696-2_1 ]
    https://hal.archives-ouvertes.fr/hal-01634353

International Conferences with Proceedings

  • 7E. Anceaume, R. Ludinard, M. Potop-Butucaru, F. Tronel.
    Bitcoin a Distributed Shared Register, in: SSS 2017 - 19th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Boston, MA, United States, Lecture Notes in Computer Science, Springer, November 2017, vol. 10616, pp. 456-468. [ DOI : 10.1007/978-3-319-69084-1_34 ]
    https://hal.archives-ouvertes.fr/hal-01522360
  • 8M. Assaf, D. A. Naumann, J. Signoles, E. Totel, F. Tronel.
    Hypercollecting Semantics and its Application to Static Analysis of Information Flow, in: POPL 2017 - ACM Symposium on Principles of Programming Languages, Paris, France, ACM SIGPLAN Notices - POPL '17, ACM, January 2017, vol. 52, no 1, pp. 874-887. [ DOI : 10.1145/3009837.3009889 ]
    https://hal.inria.fr/hal-01618360
  • 9I. Boureanu, D. Gerault, P. Lafourcade, C. Onete.
    Breaking and fixing the HB+DB protocol, in: Wisec 2017 - Conference on Security and Privacy in Wireless and Mobile Networks, Boston, United States, July 2017, pp. 241 - 246. [ DOI : 10.1145/3098243.3098263 ]
    https://hal.archives-ouvertes.fr/hal-01588562
  • 10R. Chevalier, M. Villatel, D. Plaquin, G. Hiet.
    Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode, in: ACSAC 2017 - 33rd Annual Computer Security Applications Conference, Orlando, United States, Proceedings of the 33rd Annual Computer Security Applications Conference, ACM, December 2017, vol. 2017, pp. 399-411. [ DOI : 10.1145/3134600.3134622 ]
    https://hal.inria.fr/hal-01634566
  • 12L. Georget, M. Jaume, G. Piolle, F. Tronel, V. Viet Triem Tong.
    Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux, in: 5th International FME Workshop on Formal Methods in Software Engineering, Buenos Aires, Argentina, IEEE Press, May 2017, pp. 10-16. [ DOI : 10.1109/FormaliSE.2017.1 ]
    https://hal.inria.fr/hal-01535862
  • 13T. Lajoie-Mazenc, R. Ludinard, E. Anceaume.
    Handling Bitcoin Conflicts Through a Glimpse of Structure, in: Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing, Marrakesh, Morocco, Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing, April 2017. [ DOI : 10.1145/3019612.3019657 ]
    https://hal.archives-ouvertes.fr/hal-01634368
  • 14L. Leichtnam, E. Totel, N. Prigent, L. .
    STARLORD: Linked Security Data Exploration in a 3D Graph, in: VizSec - IEEE Symposium on Visualization for Cyber Security, Phoenix, United States, October 2017, pp. 1 - 4. [ DOI : 10.1109/VIZSEC.2017.8062203 ]
    https://hal.inria.fr/hal-01619234
  • 15M. Leslous, V. Viet Triem Tong, J.-F. Lalande, T. Genet.
    GPFinder: Tracking the Invisible in Android Malware, in: 12th International Conference on Malicious and Unwanted Software, Fajardo, Puerto Rico, IEEE Conputer Society, October 2017.
    https://hal-centralesupelec.archives-ouvertes.fr/hal-01584989
  • 16P. Mensah, S. Dubus, W. Kanoun, C. Morin, G. Piolle, E. Totel.
    Connectivity Extraction in Cloud Infrastructures, in: CNSM 2017 - 13th International Conference on Network and Service Management, Tokyo, Japan, November 2017, pp. 1-5.
    https://hal.inria.fr/hal-01593346
  • 17P. Mensah, S. Dubus, W. Kanoun, C. Morin, G. Piolle, E. Totel.
    Connectivity Graph Reconstruction for Networking Cloud Infrastructures, in: NCA 2017 - 16th IEEE International Symposium on Network Computing and Applications, Cambridge, MA, United States, October 2017.
    https://hal.inria.fr/hal-01612988
  • 18Y. Mocquard, B. Sericola, E. Anceaume.
    Probabilistic Analysis of Counting Protocols in Large-scale Asynchronous and Anonymous Systems, in: Proceedings of the 16th IEEE International Conference on Network Computing and Applications, Boston, United States, October 2017.
    https://hal.archives-ouvertes.fr/hal-01580275
  • 19V. Viet Triem Tong, A. Trulla, M. Leslous, J.-F. Lalande.
    Information flows at OS level unmask sophisticated Android malware, in: 14th International Conference on Security and Cryptography, Madrid, Spain, SciTePress, July 2017, vol. 6, pp. 578-585. [ DOI : 10.5220/0006476705780585 ]
    https://hal-centralesupelec.archives-ouvertes.fr/hal-01535678
  • 20M. A. Wahab, P. Cotret, M. N. Allah, G. Hiet, V. Lapotre, G. Gogniat.
    ARMHEx: A hardware extension for DIFT on ARM-based SoCs, in: Field Programmable Logic (FPL), Ghent, Belgium, September 2017.
    https://hal.archives-ouvertes.fr/hal-01558473
  • 21M. A. Wahab, P. Cotret, M. Nasr ALLAH, G. Hiet, V. Lapotre, G. Gogniat.
    ARMHEx: a framework for efficient DIFT in real-world SoCs, in: Field Programmable Logic (FPL), Ghent, Belgium, September 2017.
    https://hal.archives-ouvertes.fr/hal-01558475

National Conferences with Proceedings

  • 22G. Brogi, V. Viet Triem Tong.
    Sharing and replaying attack scenarios with Moirai, in: RESSI 2017: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Autrans, France, May 2017.
    https://hal.archives-ouvertes.fr/hal-01533275
  • 23G. Fournier, P. Audren De Kerdrel, P. Cotret, V. Viet Triem Tong.
    DroneJack: Kiss your drones goodbye!, in: SSTIC 2017 - Symposium sur la sécurité des technologies de l'information et des communications, Rennes, France, June 2017, pp. 1-8.
    https://hal.inria.fr/hal-01635125
  • 24L. Georget, M. Jaume, G. Piolle, F. Tronel, V. Viet Triem Tong.
    Suivi de flux d'information correct sous Linux, in: 16èmes journées AFADL (Approches formelles dans l'assistance au développement de logiciels), Montpellier, France, A. Idani, N. Kosmatov (editors), June 2017, pp. 19-26.
    http://hal.upmc.fr/hal-01535937
  • 25N. Rivetti, E. Anceaume, Y. Busnel, L. Querzoni, B. Sericola.
    Ordonnancement dynamique pour un équilibrage de charge quasi-optimal dans les systèmes de traitement de flux, in: ALGOTEL 2017 - 19èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Quiberon, France, May 2017.
    https://hal.archives-ouvertes.fr/hal-01519432
  • 26M. A. –. Wahab, P. Cotret, M. –. Nasr Allah, G. –. Hiet, V. Lapotre, G. –. Gogniat.
    ARMHEx: embedded security through hardware-enhanced information flow tracking, in: RESSI 2017 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Grenoble (Autrans), France, May 2017.
    https://hal.archives-ouvertes.fr/hal-01558155

Other Publications

References in notes
  • 29G. Brogi, V. Viet Triem Tong.
    TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking, in: 8th IFIP International Conference on New Technologies, Mobility and Security, Larnaca , Cyprus, November 2016.
    https://hal.inria.fr/hal-01417612
  • 30N. Kiss, J.-F. Lalande, M. Leslous, V. Viet Triem Tong.
    Kharon dataset: Android malware under a microscope, in: The Learning from Authoritative Security Experiment Results (LASER) workshop, San Jose, United States, The USENIX Association, May 2016.
    https://hal-centralesupelec.archives-ouvertes.fr/hal-01311917