<?xml version="1.0" encoding="utf-8"?>
<raweb xmlns:xlink="http://www.w3.org/1999/xlink" xml:lang="en" year="2018">
  <identification id="cidre" isproject="true">
    <shortname>CIDRE</shortname>
    <projectName>Confidentialité, Intégrité, Disponibilité et Répartition</projectName>
    <theme-de-recherche>Security and Confidentiality</theme-de-recherche>
    <domaine-de-recherche>Algorithmics, Programming, Software and Architecture</domaine-de-recherche>
    <urlTeam>https://team.inria.fr/cidre/</urlTeam>
    <structure_exterieure type="Labs">
      <libelle>Institut de recherche en informatique et systèmes aléatoires (IRISA)</libelle>
    </structure_exterieure>
    <structure_exterieure type="Organism">
      <libelle>CNRS</libelle>
    </structure_exterieure>
    <structure_exterieure type="Organism">
      <libelle>CentraleSupélec</libelle>
    </structure_exterieure>
    <structure_exterieure type="Organism">
      <libelle>Université Rennes 1</libelle>
    </structure_exterieure>
    <header_dates_team>Creation of the Project-Team: 2011 July 01</header_dates_team>
    <LeTypeProjet>Project-Team</LeTypeProjet>
    <keywordsSdN>
      <term>A1.1.8. - Security of architectures</term>
      <term>A1.2.3. - Routing</term>
      <term>A1.2.8. - Network security</term>
      <term>A1.3. - Distributed Systems</term>
      <term>A1.3.3. - Blockchain</term>
      <term>A1.3.4. - Peer to peer</term>
      <term>A1.3.5. - Cloud</term>
      <term>A2.3.1. - Embedded systems</term>
      <term>A3.1.5. - Control access, privacy</term>
      <term>A3.3.1. - On-line analytical processing</term>
      <term>A3.4.1. - Supervised learning</term>
      <term>A3.4.2. - Unsupervised learning</term>
      <term>A3.5.2. - Recommendation systems</term>
      <term>A4.1. - Threat analysis</term>
      <term>A4.1.1. - Malware analysis</term>
      <term>A4.1.2. - Hardware attacks</term>
      <term>A4.4. - Security of equipment and software</term>
      <term>A4.5. - Formal methods for security</term>
      <term>A4.8. - Privacy-enhancing technologies</term>
      <term>A4.9.1. - Intrusion detection</term>
      <term>A4.9.2. - Alert correlation</term>
    </keywordsSdN>
    <keywordsSecteurs>
      <term>B6.3.3. - Network Management</term>
      <term>B6.5. - Information systems</term>
      <term>B9.6.2. - Juridical science</term>
      <term>B9.10. - Privacy</term>
    </keywordsSecteurs>
    <UR name="Rennes"/>
  </identification>
  <team id="uid1">
    <person key="cidre-2018-idp153488">
      <firstname>Emmanuelle</firstname>
      <lastname>Anceaume</lastname>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CNRS, Researcher</moreinfo>
    </person>
    <person key="cidre-2018-idp155952">
      <firstname>Michel</firstname>
      <lastname>Hurfin</lastname>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria, Researcher</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="cidre-2018-idp158848">
      <firstname>Jean-Louis</firstname>
      <lastname>Lanet</lastname>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria, Senior Researcher, from May 2018</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="cidre-2018-idp161712">
      <firstname>Ludovic</firstname>
      <lastname>Mé</lastname>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria,Senior Researcher</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="cidre-2018-idp164560">
      <firstname>Christophe</firstname>
      <lastname>Bidan</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CentraleSupelec, Professor</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="cidre-2018-idp167424">
      <firstname>Gilles</firstname>
      <lastname>Guette</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Univ de Rennes I, Associate Professor</moreinfo>
    </person>
    <person key="cidre-2018-idp169904">
      <firstname>Guillaume</firstname>
      <lastname>Hiet</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CentraleSupelec, Associate Professor</moreinfo>
    </person>
    <person key="cidre-2018-idp172384">
      <firstname>Jean-Francois</firstname>
      <lastname>Lalande</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CentraleSupelec, Associate Professor</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="cidre-2018-idp175248">
      <firstname>Guillaume</firstname>
      <lastname>Piolle</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CentraleSupelec, Associate Professor</moreinfo>
    </person>
    <person key="cidre-2018-idp177728">
      <firstname>Eric</firstname>
      <lastname>Totel</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CentraleSupelec, Professor</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="cidre-2018-idp180592">
      <firstname>Frédéric</firstname>
      <lastname>Tronel</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CentraleSupelec, Associate Professor</moreinfo>
    </person>
    <person key="cidre-2018-idp183072">
      <firstname>Valérie</firstname>
      <lastname>Viet Triem Tong</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Team leader, CentraleSupelec, Associate Professor</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="cidre-2018-idp185952">
      <firstname>Pierre</firstname>
      <lastname>Wilke</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CentraleSupelec, Associate Professor,from september 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp188464">
      <firstname>Ludovic</firstname>
      <lastname>Claudepierre</lastname>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria, from May 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp190928">
      <firstname>Jerome</firstname>
      <lastname>Fellus</lastname>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Univ de Rennes I, from Sep 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp193408">
      <firstname>Mouad</firstname>
      <lastname>Lemoudden</lastname>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria, from Apr 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp195872">
      <firstname>Aimad</firstname>
      <lastname>Berady</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Ministère des Armées, from Nov 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp198368">
      <firstname>Sebanjila</firstname>
      <lastname>Bukasa</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria, from May 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp200800">
      <firstname>Vasile</firstname>
      <lastname>Cazacu</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CNRS</moreinfo>
    </person>
    <person key="cidre-2018-idp203232">
      <firstname>Ronny</firstname>
      <lastname>Chevalier</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Hewlet Packard France</moreinfo>
    </person>
    <person key="cidre-2018-idp205664">
      <firstname>Damien</firstname>
      <lastname>Crémilleux</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CentraleSupelec, until Sep 2018</moreinfo>
    </person>
    <person key="cascade-2018-idp133632">
      <firstname>Aurélien</firstname>
      <lastname>Dupin</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Thales</moreinfo>
    </person>
    <person key="cidre-2018-idp210544">
      <firstname>Mathieu</firstname>
      <lastname>Escouteloup</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria, from Oct 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp212976">
      <firstname>Benoit</firstname>
      <lastname>Fournier</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Univ de Rennes I, from Nov 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp215424">
      <firstname>Cyprien</firstname>
      <lastname>Gottstein</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Orange Labs, from Oct 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp217872">
      <firstname>Pierre</firstname>
      <lastname>Graux</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria</moreinfo>
    </person>
    <person key="cidre-2018-idp220304">
      <firstname>Cedric</firstname>
      <lastname>Herzog</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria, from Nov 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp222736">
      <firstname>David</firstname>
      <lastname>Lanoé</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria</moreinfo>
    </person>
    <person key="cidre-2018-idp225168">
      <firstname>Laetitia</firstname>
      <lastname>Leichtnam</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Ministère de la Défense</moreinfo>
    </person>
    <person key="cidre-2018-idp227632">
      <firstname>Mourad</firstname>
      <lastname>Leslous</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria, until Aug 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp229968">
      <firstname>Pernelle</firstname>
      <lastname>Mensah</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Bell Labs (Alcatel)</moreinfo>
    </person>
    <person key="cidre-2018-idp232400">
      <firstname>Ruta</firstname>
      <lastname>Moussaileb</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>IMT Atlantique, from May 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp234848">
      <firstname>Mounir</firstname>
      <lastname>Nasr Allah</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CentraleSupelec, until Nov 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp237296">
      <firstname>Leopold</firstname>
      <lastname>Ouairy</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria, from May 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp239728">
      <firstname>Thomas</firstname>
      <lastname>Letan</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>ANSSI, until November 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp242176">
      <firstname>Aurelien</firstname>
      <lastname>Palisse</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria, from May 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp244608">
      <firstname>Aurélien</firstname>
      <lastname>Trulla</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria, until Aug 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp247040">
      <firstname>Charles Arya</firstname>
      <lastname>Xosanavongsa</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Thales</moreinfo>
    </person>
    <person key="cidre-2018-idp249472">
      <firstname>Antoine</firstname>
      <lastname>Guellier</lastname>
      <categoryPro>Technique</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CNRS, until Feb 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp251936">
      <firstname>Souhir</firstname>
      <lastname>Laribi</lastname>
      <categoryPro>Technique</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria, from Nov 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp254400">
      <firstname>Samuel</firstname>
      <lastname>Pipet</lastname>
      <categoryPro>Stagiaire</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CentraleSupelec, from Jun 2018 until Jul 2018</moreinfo>
    </person>
    <person key="cidre-2018-idp256896">
      <firstname>Raj Krishnan</firstname>
      <lastname>Vijayaraj</lastname>
      <categoryPro>Stagiaire</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>CentraleSupelec, from May 2018 until Jul 2018</moreinfo>
    </person>
    <person key="celtique-2018-idp195840">
      <firstname>Lydie</firstname>
      <lastname>Mabil</lastname>
      <categoryPro>Assistant</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Inria</moreinfo>
    </person>
    <person key="cidre-2018-idp261856">
      <firstname>Carlos Alberto</firstname>
      <lastname>Maziero</lastname>
      <categoryPro>Visiteur</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>Professor at Federal University of Parana (Curitiba, Brazil)</moreinfo>
    </person>
    <person key="cidre-2018-idp264368">
      <firstname>Frédéric</firstname>
      <lastname>Majorczyk</lastname>
      <categoryPro>CollaborateurExterieur</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>DGA</moreinfo>
    </person>
    <person key="cidre-2018-idp266848">
      <firstname>Sébastien</firstname>
      <lastname>Gambs</lastname>
      <categoryPro>CollaborateurExterieur</categoryPro>
      <research-centre>Rennes</research-centre>
      <moreinfo>UQAM</moreinfo>
      <hdr>oui</hdr>
    </person>
  </team>
  <presentation id="uid2">
    <bodyTitle>Overall Objectives</bodyTitle>
    <subsection id="uid3" level="1">
      <bodyTitle>CIDRE in Brief</bodyTitle>
      <p>The Cidre team is concerned with security and privacy issues. Our long-term ambition is to contribute to the construction of widely used systems that are trustworthy and respectful of privacy, even when parts of the system are targeted by attackers.</p>
      <p>With this objective in mind, the CIDRE team focuses mainly on the three following topics:</p>
      <simplelist>
        <li id="uid4">
          <p noindent="true">
            <b>Attack comprehension</b>
          </p>
        </li>
        <li id="uid5">
          <p noindent="true">
            <b>Attack detection</b>
          </p>
        </li>
        <li id="uid6">
          <p noindent="true">
            <b>Attack resistance</b>
          </p>
        </li>
      </simplelist>
    </subsection>
  </presentation>
  <fondements id="uid7">
    <bodyTitle>Research Program</bodyTitle>
    <subsection id="uid8" level="1">
      <bodyTitle>Our perspective</bodyTitle>
      <p>For many aspects of our daily lives, we rely heavily on computer systems, many of which are based on massively interconnected devices that support a population of interacting and cooperating entities. As these systems become more open and complex, accidental and intentional failures become much more frequent and serious.
We believe that the purpose of attacks against these systems is expressed at a high level (compromise of sensitive data, unavailability of services). However, these attacks are often carried out at a very low level (exploitation of vulnerabilities by malicious code, hardware attacks).</p>
      <p>The CIDRE team is specialized in the defense of computer systems. We argue that to properly protect these systems we must have a complete understanding of the attacker's concrete capabilities. In other words, <b>to defend properly we must understand the attack</b>.</p>
      <p>The CIDRE team therefore strives to have a global expertise in information systems: from hardware to distributed architectures. Our objective is to highlight security issues and propose preventive or reactive countermeasures in widely used and privacy-friendly systems.</p>
    </subsection>
    <subsection id="uid9" level="1">
      <bodyTitle>Attack Comprehension</bodyTitle>
      <p>The first step before being able to offer secure systems is to
understand and measure the real capabilities of the attacker. It's a cat and
mouse game and in this game, the attacker is always one step ahead of the
defender. The attacker is able to exploit for his own benefit all the services, machines, codes that are accessible to him, even on systems that seem highly protected.</p>
      <p>Our first research axis therefore aims at highlighting both the effective
attacker's means and the way an attack unfolds and spreads.</p>
      <p>This knowledge is valuable for security experts who must react quickly during an attack. They need effective ways to understand how their systems may have been compromised.</p>
      <p>The main scientific challenge is to be able to adapt to all the attacker's
protections against automatic analysis that the attacker could imagine.</p>
      <p>In this context, we are particularly interested in</p>
      <simplelist>
        <li id="uid10">
          <p noindent="true"><b>highlighting attacks</b> on hardware that affect software security</p>
        </li>
        <li id="uid11">
          <p noindent="true">
            <b>providing expert support</b>
          </p>
          <simplelist>
            <li id="uid12">
              <p noindent="true">to analyze malicious code</p>
            </li>
            <li id="uid13">
              <p noindent="true">to quickly investigate an intrusion on a system monitored by an intrusion detection system</p>
            </li>
          </simplelist>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid14" level="1">
      <bodyTitle>Attack Detection</bodyTitle>
      <p>An attack has several phases. A first major phase is the approach phase,
during which the attacker enters the system, locates the target and makes
himself persistent, the attack is at this point a simple intrusion. In a second phase, the attack is actually launched.</p>
      <p>The main objective of intrusion detection is to be able to detect the attacker
during the first approach phase. For that purpose, an intrusion detection
system (IDS) is based on probes that continuously monitor the system. These
probes generate low level alerts (warnings) for any observation of an event that
could be a sign of an intrusion. These low-level alerts are very numerous and
their semantic value is low. In other words, an IDS generates a huge amount of
low-level alerts that bring only few information and overwhelm the security
analyst. In addition, many of these alerts are actually false positives,
<i>i.e.</i> alerts raised when there is no real intrusion.</p>
      <p>However, these low-level alerts can themselves be considered as security events
by a higher-level IDS: an alert correlation system. These higher-level IDS seek
to exploit known relationships between low-level alerts to generate meta-alerts
with greater semantic value, <i>i.e.</i> with higher-level meaning. An alert
correlation system allows to reduce the number of alerts (and especially, false
positives) and to return to the security analysts a higher level analysis of the
situation.</p>
      <p>There are mainly two approaches to detect intrusions. The misuse-based detection and the anomaly-based detection. A misuse-based detection is actually a signature-based detection approach: it allows to detect only the attacks whose signature is available. From our point of view, while useful in practice, misuse-detection is intrinsically limited. Indeed, it requires to continuously update the database of signatures. We follow the alternative approach, namely the anomaly approach, which consists in detecting any deviation from a reference behavior. The main difficulty is thus to compute a model of this reference behavior. Such a model is only useful if it is sufficiently accurate. Otherwise, if the model is an over-approximation, it will be a source of false negatives, <i>i.e.</i> real intrusions not detected. If the model is a under-approximation, it will be a source of false positives, <i>i.e.</i> normal behaviors seen as intrusions.</p>
      <p>In this context, our contributions in intrusion detection systems follow two separate axes: anomaly-based IDS and alert correlation systems.
Our contribution in anomaly-based intrusion detection relies on:</p>
      <simplelist>
        <li id="uid15">
          <p noindent="true"><b>Illegal Information Flow Detection:</b> we have proposed to detect information flows in the monitored system (either a node or a set of trusted nodes) that are allowed by the access control mechanism, but are illegal from the security policy point of view. This approach is particularly appealing to detect intrusions in a standalone node.</p>
        </li>
        <li id="uid16">
          <p noindent="true"><b>Anomaly-Based Detection in Distributed Applications:</b> our goal is to specify the normal behavior based on either a formal specification of the distributed application, or previous executions. This approach is particularly appealing to detect intrusions in industrial control systems since these systems exhibit well-defined behaviors at different levels: network level (network communication patterns, protocol specifications, etc.), control level (continuous and discrete process control laws), or even the state of the local resources (memory or CPU).</p>
        </li>
        <li id="uid17">
          <p noindent="true"><b>Online data analytics:</b> our goal is to estimate on the fly different statistics or metrics on distributed input streams to detect abnormal behavior with respect to a well-defined criterion such as the distance between different streams, their correlation or their entropy.</p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid18" level="1">
      <bodyTitle>Attack Resistance</bodyTitle>
      <p>The first two axes of the team allowed us to measure the concrete technical
means of the attacker. We claim that the attacker can always avoid the measures
put in place to secure a system. We believe that another way to offer more
secure systems is to take into account from the design phase that these systems will operate in the presence of an omnipotent attacker. The last research axis of the CIDRE team is focused on offering systems that are resistant to attackers, <i>i.e.</i> they can provide the expected services even in the presence of an attacker.</p>
      <p>To achieve this goal, we explore two approaches:</p>
      <simplelist>
        <li id="uid19">
          <p noindent="true">be able to take into account all possible actions of the attacker</p>
        </li>
        <li id="uid20">
          <p noindent="true">provide services based on the collaboration of a set of nodes that are not
affected by the presence in minority of malicious nodes</p>
        </li>
      </simplelist>
      <p>We are interested in massively-used systems that are essential building blocks of security or privacy.</p>
    </subsection>
  </fondements>
  <domaine id="uid21">
    <bodyTitle>Application Domains</bodyTitle>
    <subsection id="uid22" level="1">
      <bodyTitle>Security is required everywhere</bodyTitle>
      <p>With the infiltration of computers and software in almost all aspects of our
modern life, security can nowadays be seen as an absolutely general concern. As
such, the results of the research targeted by CIDRE apply to a wide range of
domains. It is clear that critical systems, in which security (and safety) is a
major concern, can benefit from ideas such as dynamic security policy
monitoring. On the other hand, systems used by the general public (basically,
the internet and services such as web or cloud services, social networks,
location-based services, etc.) can also benefit from the results obtained by
CIDRE, in particular to solve some of the privacy issues raised by these systems
that manipulate huge amounts of personal data. In addition, systems are getting more and more complex, decentralized, distributed, or spontaneous. Cloud computing, in particular, brings many challenges that could benefit from ideas, approaches and solutions studied by CIDRE in the context of distributed systems.</p>
      <p>Industrial Control Systems (ICS) and in particular Supervisory Control and Data
Acquisition are also new application domains for intrusion detection. The
Stuxnet attack has emphasized the vulnerability of such critical systems which
are not totally isolated anymore. Securing ICS is challenging since
modifications of the systems, for example to patch them, are often not possible.
High availability requirements also often conflict with preventive approaches.
In this case, security monitoring is appealing to protect such systems against
malicious activities. Intrusion detection in ICS is not fundamentally different
from traditional approaches. However, new hypotheses and constraints need to be
taken into account, which also bring interesting new research challenges.
</p>
    </subsection>
  </domaine>
  <logiciels id="uid23">
    <bodyTitle>New Software and Platforms</bodyTitle>
    <subsection id="uid24" level="1">
      <bodyTitle>Blare</bodyTitle>
      <p>
        <i>To detect intrusion using information flows</i>
      </p>
      <p noindent="true"><span class="smallcap" align="left">Keywords:</span> Cybersecurity - Intrusion Detection Systems (IDS) - Data Leakage Protection</p>
      <p noindent="true"><span class="smallcap" align="left">Scientific Description:</span> Blare implements our approach of illegal information flow detection for a single node (Android and Linux kernel, JVM) and a set of nodes (monitoring of flows between linux machines).</p>
      <p noindent="true"><span class="smallcap" align="left">Functional Description:</span> Blare IDS is a set of tools that implements our approach to illegal information flow detection for a single node and a set of nodes.</p>
      <p noindent="true"><span class="smallcap" align="left">News Of The Year:</span> During this year, Laurent Georget has modified the implementation of Blare in order to correctly monitor the kernel system calls with LSM hooks. He add also ported this new version of Blare to the Lollipop Android emulator.</p>
      <simplelist>
        <li id="uid25">
          <p noindent="true">Partner: CentraleSupélec</p>
        </li>
        <li id="uid26">
          <p noindent="true">Contact: Frédéric Tronel</p>
        </li>
        <li id="uid27">
          <p noindent="true">Publications: <ref xlink:href="https://hal.inria.fr/hal-01535949" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory</ref> -
<ref xlink:href="https://hal.inria.fr/hal-01535862" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux</ref> -
<ref xlink:href="https://hal.inria.fr/hal-00268408" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Monitoring both OS and program level information flows to detect intrusions against network servers</ref> -
<ref xlink:href="https://hal.inria.fr/hal-00356441" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Experimenting a Policy-Based HIDS Based on an Information Flow Control Model</ref> -
<ref xlink:href="https://hal.inria.fr/hal-00356484" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Introducing reference flow control for intrusion detection at the OS level</ref> -
<ref xlink:href="https://hal.inria.fr/hal-00420117" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy</ref> -
<ref xlink:href="https://hal.inria.fr/hal-00875211" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Diagnosing intrusions in Android operating system using system flow graph</ref> -
<ref xlink:href="https://hal.inria.fr/hal-00840338" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Intrusion detection in distributed systems, an approach based on taint marking</ref> -
<ref xlink:href="https://hal.inria.fr/hal-00909400" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">BSPL: A Language to Specify and Compose Fine-grained Information Flow Policies</ref> -
<ref xlink:href="https://hal.inria.fr/hal-00862468" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Information Flow Policies vs Malware</ref> -
<ref xlink:href="https://hal.inria.fr/hal-00736045" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">A taint marking approach to confidentiality violation detection</ref> -
<ref xlink:href="https://hal.inria.fr/hal-00736034" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Designing information flow policies for Android's operating system</ref> -
<ref xlink:href="https://hal.inria.fr/hal-00647116" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Information Flow Control for Intrusion Detection derived from MAC Policy</ref> -
<ref xlink:href="https://hal.inria.fr/hal-00647170" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Flow based interpretation of access control: Detection of illegal information flows</ref> -
<ref xlink:href="https://hal.inria.fr/hal-00736045" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">A taint marking approach to confidentiality violation detection</ref></p>
        </li>
        <li id="uid28">
          <p noindent="true">URL: <ref xlink:href="http://www.blare-ids.org" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>www.<allowbreak/>blare-ids.<allowbreak/>org</ref></p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid29" level="1">
      <bodyTitle>GNG</bodyTitle>
      <p>
        <i>Security Supervision by Alert Correlation</i>
      </p>
      <p noindent="true"><span class="smallcap" align="left">Keywords:</span> Intrusion Detection Systems (IDS) - SIEM</p>
      <p noindent="true"><span class="smallcap" align="left">Scientific Description:</span> GNG is an intrusion detection system that correlates different sources (such as different logs) in order to identify attacks against the system. The attack scenarios are defined using the Attack Description Langage (ADeLe) proposed by our team, and are internally translated to attack recognition automatons. GNG intends to define time efficient algorithms based on these automatons to recognize complex attack scenarios.</p>
      <simplelist>
        <li id="uid30">
          <p noindent="true">Partner: CentraleSupélec</p>
        </li>
        <li id="uid31">
          <p noindent="true">Contact: Eric Totel</p>
        </li>
        <li id="uid32">
          <p noindent="true">Publication: <ref xlink:href="https://hal.inria.fr/hal-00356409" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">A Language Driven Intrusion Detection System for Events and Alerts Correlation</ref></p>
        </li>
        <li id="uid33">
          <p noindent="true">URL: <ref xlink:href="http://www.rennes.supelec.fr/ren/perso/etotel/GNG/index.html" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>www.<allowbreak/>rennes.<allowbreak/>supelec.<allowbreak/>fr/<allowbreak/>ren/<allowbreak/>perso/<allowbreak/>etotel/<allowbreak/>GNG/<allowbreak/>index.<allowbreak/>html</ref></p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid34" level="1">
      <bodyTitle>GroddDroid</bodyTitle>
      <p><span class="smallcap" align="left">Keywords:</span> Android - Detection - Malware</p>
      <p noindent="true"><span class="smallcap" align="left">Scientific Description:</span> GroddDroid automates the dynamic analysis of a malware. When a piece of suspicious code is detected, groddDroid interacts with the user interface and eventually forces the execution of the identified code. Using Blare (Information Flow Monitor), GroddDroid monitors how an execution contaminates the operating system.
The output of GroddDroid can be visualized in an web browser. GroddDroid is used by the Kharon software.</p>
      <p noindent="true"><span class="smallcap" align="left">Functional Description:</span> GroddDroid
1 - locates suspicious code in Android application
2 - computes execution paths towards suspicious code
3 - forces executions of suspicious code
4 - automate the execution of a malware or a regular Android application</p>
      <p noindent="true"><span class="smallcap" align="left">News Of The Year:</span> In 2017, GroddDroid has integrated the work of Mourad Leslous, who have implemented GFinder. GPFinder improves the computation of control flow paths by taking into account the Android framework. The end of the year has been used to clean the code and to improves the graphical interface.</p>
      <simplelist>
        <li id="uid35">
          <p noindent="true">Partners: CentraleSupélec - Insa Centre Val-de-Loire</p>
        </li>
        <li id="uid36">
          <p noindent="true">Contact: Valérie Viet Triem Tong</p>
        </li>
        <li id="uid37">
          <p noindent="true">Publications: <ref xlink:href="https://hal.inria.fr/hal-01311917" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Kharon dataset: Android malware under a microscope</ref> -
<ref xlink:href="https://hal.inria.fr/hal-01201743" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">GroddDroid: a Gorilla for Triggering Malicious Behaviors</ref> -
<ref xlink:href="https://hal.inria.fr/hal-01584989" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">GPFinder: Tracking the Invisible in Android Malware</ref> -
<ref xlink:href="https://hal.inria.fr/hal-01535678" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Information flows at OS level unmask sophisticated Android malware</ref></p>
        </li>
        <li id="uid38">
          <p noindent="true">URL: <ref xlink:href="http://kharon.gforge.inria.fr/grodddroid.html" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>kharon.<allowbreak/>gforge.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>grodddroid.<allowbreak/>html</ref></p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid39" level="1">
      <bodyTitle>Kharon</bodyTitle>
      <p><span class="smallcap" align="left">Keywords:</span> Android - Malware - Dynamic Analysis</p>
      <p noindent="true"><span class="smallcap" align="left">Functional Description:</span> Kharon is a software for managing Android application analysis. Kharon uses the results of the GroddDroid software. The user can submit one or several applications to Kharon and get a graph of the innformation flows that occured at system level and that have been caused by the application.</p>
      <p>Kharon is used in the Kharon platform for the analysis of malicious applications. This platform is deployed at the high security laboratory (LHS) of Rennes.</p>
      <simplelist>
        <li id="uid40">
          <p noindent="true">Author: Sébastien Campion</p>
        </li>
        <li id="uid41">
          <p noindent="true">Partners: CentraleSupélec - Insa Centre Val-de-Loire</p>
        </li>
        <li id="uid42">
          <p noindent="true">Contact: Valérie Viet Triem Tong</p>
        </li>
        <li id="uid43">
          <p noindent="true">URL: <ref xlink:href="http://kharon.gforge.inria.fr/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>kharon.<allowbreak/>gforge.<allowbreak/>inria.<allowbreak/>fr/</ref></p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid44" level="1">
      <bodyTitle>StarLord</bodyTitle>
      <p><span class="smallcap" align="left">Keywords:</span> Security - SIEM</p>
      <p noindent="true"><span class="smallcap" align="left">Functional Description:</span> In the domain of security event visualisation, we have developed a prototype called StarLord. Basically, this software is able to parse heterogeneous logs, and to extract from each line of logs a set of security objects. Moreover, some of these objects appears in several lines of different logs. These lines are thus linked by the sharing of one or more security objects. When we analyse the lines of logs, we are thus able to generate graphs that represents the links between the different objects discovered in the logs. These graphs are thus displayed in 3D in order for the administrator to investigate easily the relations between the logs and the relations between the logs and some particular indicators of compromission. The tool permits to discover visually the activity of an attacker on the supervised system.</p>
      <simplelist>
        <li id="uid45">
          <p noindent="true">Authors: Ludovic Mé, Eric Totel, Nicolas Prigent and Laetitia Leichtnam</p>
        </li>
        <li id="uid46">
          <p noindent="true">Contact: Eric Totel</p>
        </li>
        <li id="uid47">
          <p noindent="true">Publication: <ref xlink:href="https://hal.inria.fr/hal-01619234" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">STARLORD: Linked Security Data Exploration in a 3D Graph</ref></p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid48" level="1">
      <bodyTitle>SpecCert</bodyTitle>
      <p><span class="smallcap" align="left">Keywords:</span> Formal methods - Coq</p>
      <p noindent="true"><span class="smallcap" align="left">Functional Description:</span> SpecCert is a framework for specifying and verifying Hardware-based Security Enforcement (HSE) mechanisms against hardware architecture models. HSE mechanisms form a class of security enforcement mechanism such that a set of trusted software components relies on hardware functions to enforce a security policy.</p>
      <simplelist>
        <li id="uid49">
          <p noindent="true">Participant: Thomas Letan</p>
        </li>
        <li id="uid50">
          <p noindent="true">Partners: ANSSI - CentraleSupélec</p>
        </li>
        <li id="uid51">
          <p noindent="true">Contact: Guillaume Hiet</p>
        </li>
        <li id="uid52">
          <p noindent="true">Publications: <ref xlink:href="https://hal.inria.fr/hal-01356690" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">SpecCert: Specifying and Verifying Hardware-based Security Enforcement</ref> -
<ref xlink:href="https://hal.inria.fr/hal-01361422" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">SpecCert: Specifying and Verifying Hardware-based Software Enforcement</ref></p>
        </li>
        <li id="uid53">
          <p noindent="true">URL: <ref xlink:href="https://github.com/lethom/speccert" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>github.<allowbreak/>com/<allowbreak/>lethom/<allowbreak/>speccert</ref></p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid54" level="1">
      <bodyTitle>HardBlare</bodyTitle>
      <p><span class="smallcap" align="left">Keywords:</span> Intrusion Detection Systems (IDS) - FPGA - Static analysis</p>
      <p noindent="true"><span class="smallcap" align="left">Functional Description:</span> HardBlare is a hardware/software framework to implement hardware DIFC on Xilinx Zynq Platform.
HardBlare consists of three components : 1) the VHDL code of the coprocessor, 2) a modified LLVM compiler to compute the static analysis, and 3) a dedicated Linux kernel. This last component is a specific version of the Blare monitor.</p>
      <simplelist>
        <li id="uid55">
          <p noindent="true">Partners: CentraleSupélec - Lab-STICC</p>
        </li>
        <li id="uid56">
          <p noindent="true">Contact: Guillaume Hiet</p>
        </li>
        <li id="uid57">
          <p noindent="true">Publications: <ref xlink:href="https://hal.inria.fr/hal-01558473" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">ARMHEx: A hardware extension for DIFT on ARM-based SoCs</ref> -
<ref xlink:href="https://hal.inria.fr/hal-01558475" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">ARMHEx: a framework for efficient DIFT in real-world SoCs</ref> -
<ref xlink:href="https://hal.inria.fr/hal-01558155" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">ARMHEx: embedded security through hardware-enhanced information flow tracking</ref> -
<ref xlink:href="https://hal.inria.fr/hal-01311032" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">HardBlare: a Hardware-Assisted Approach for Dynamic Information Flow Tracking</ref> -
<ref xlink:href="https://hal.inria.fr/hal-01311045" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">A portable approach for SoC-based Dynamic Information Flow Tracking implementations</ref> -
<ref xlink:href="https://hal.inria.fr/hal-01337579" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Towards a hardware-assisted information flow tracking ecosystem for ARM processors</ref> -
<ref xlink:href="https://hal.inria.fr/hal-01252597" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">HardBlare: an efficient hardware-assisted DIFC for non-modified embedded processors</ref></p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid58" level="1">
      <bodyTitle>Conductor</bodyTitle>
      <p><span class="smallcap" align="left">Keywords:</span> Intrusion Detection Systems (IDS) - Static analysis - Instrumentation</p>
      <p noindent="true"><span class="smallcap" align="left">Functional Description:</span> Conductor contains three main components: a static analysis to extract the expected behavior of the target, an instrumentation module to add instructions to the target's code in order to send messages to the co-processor, and an intrusion detection engine executed on the co-processor. The latter processes the messages sent by the instrumented target, describing its current behavior. This behavior is then compared against the expected behavior previously extracted by the static analysis.</p>
      <simplelist>
        <li id="uid59">
          <p noindent="true">Participants: Ronny Chevalier, Guillaume Hiet, Maugan Villatel and David Plaquin</p>
        </li>
        <li id="uid60">
          <p noindent="true">Partners: CentraleSupélec - HP Labs</p>
        </li>
        <li id="uid61">
          <p noindent="true">Contact: Ronny Chevalier</p>
        </li>
        <li id="uid62">
          <p noindent="true">Publication: <ref xlink:href="https://hal.inria.fr/hal-01634566" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode</ref></p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid63" level="1">
      <bodyTitle>Platforms</bodyTitle>
      <subsection id="uid64" level="2">
        <bodyTitle>Kharon platform</bodyTitle>
        <p>The Kharon platform is under development in the LHS of Rennes and should be ready to use in the beginning of 2018. This experimental platform aims to analyze Android malware using a set of software developed by the CIDRE team. Software that are involved are:</p>
        <simplelist>
          <li id="uid65">
            <p noindent="true">The Blare IDS <ref xlink:href="http://www.blare-ids.org/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>www.<allowbreak/>blare-ids.<allowbreak/>org/</ref>, and in particular the AndroBlare version, for tracking information flows of malware;</p>
          </li>
          <li id="uid66">
            <p noindent="true">The GroddDroid software <ref xlink:href="http://kharon.gforge.inria.fr/grodddroid.html" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>kharon.<allowbreak/>gforge.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>grodddroid.<allowbreak/>html</ref>, for manipulating the malware statically and dynamically;</p>
          </li>
          <li id="uid67">
            <p noindent="true">The GPFinder software <ref xlink:href="http://kharon.gforge.inria.fr/gpfinder.html" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>kharon.<allowbreak/>gforge.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>gpfinder.<allowbreak/>html</ref>, for computing paths in the malware's control flow;</p>
          </li>
          <li id="uid68">
            <p noindent="true">The kharon software that handles the orchestration of a bunch of malware, the server and a set of smartphones.</p>
          </li>
        </simplelist>
        <p>The Kharon platform will be used for analysing malware as soon as they appear in the wild. The analysis results will be stored for further experiments and statistics.</p>
      </subsection>
    </subsection>
  </logiciels>
  <resultats id="uid69">
    <bodyTitle>New Results</bodyTitle>
    <subsection id="uid70" level="1">
      <bodyTitle>Axis 1 : Attack comprehension</bodyTitle>
      <subsection id="uid71" level="2">
        <bodyTitle>Attacks stay possible even when programs seem not vulnerable</bodyTitle>
        <p>The protection of any software starts at the hardware level. In ,K. Bukasa, L. Claudepierre, J.-L. Lanet, in collaboration with R. Lashermes from SED Inria Rennes – Bretagne Atlantique, explore how Electromagnetic Fault Injection (EMFI) can disturb the behavior of a chip and undermine the security of the information handled by the target. They demonstrate the possibilities to create software vulnerabilities with hardware fault injection (with EM pulses), not against crypto-systems but targeting regular software running on IoT devices. Experimentations are conducted on an ARMv7-M (Cortex-M3) microcontroller, present at the heart of a wide-range of embedded systems, to prove that a fault attack is able to create a vulnerability in a code where there is none in the usual software security meaning. Protecting against vulnerabilities must thus encompass protecting against both software and hardware attacks.
</p>
      </subsection>
    </subsection>
    <subsection id="uid72" level="1">
      <bodyTitle>Axis 2 : Attack detection</bodyTitle>
      <subsection id="uid73" level="2">
        <bodyTitle>Intrusion detection in sequential control systems.</bodyTitle>
        <p>Sophisticated process-aware attacks targeting industrial control systems require
adequate detection measures taking into account the physical process. In
<ref xlink:href="#cidre-2018-bid0" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we propose an approach relying on automatically
mined process specifications to detect attacks on sequential control systems.
The specifications are synthesized as monitors that read the execution traces
and report violations to the operator. In contrast to other approaches, a
central aspect of our method consists in reducing the number of mined
specifications suffering from redundancies. We evaluate our approach on a
hardware-in-the-loop testbed with a complex physical process model and discuss
the mining efficiency and attack detection capabilities of our approach.</p>
      </subsection>
      <subsection id="uid74" level="2">
        <bodyTitle>Hardware-based Information Flow Tracking</bodyTitle>
        <p>The HardBlare project proposes a software/hardware co-design methodology to ensure that security properties are preserved all along the execution of the system but also during files storage. It is based on the Dynamic Information Flow Tracking (DIFT) that generally consists in attaching tags to denote the type of information that are saved or generated within the system. These tags are then propagated when the system evolves and information flow control is performed in order to guarantee the safe execution and storage within the system monitored by security policies.</p>
        <p>Existing hardware DIFT approaches have not been widely used neither by research community nor by hardware vendors. It is due to two major reasons: current hardware DIFT solutions lack support for multi-threaded applications and implementations for hardcore processors. In <ref xlink:href="#cidre-2018-bid1" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/> we addresse both issues by introducing an approach with some unique features: DIFT for multi-threaded software, virtual memory protection (rather than physical memory as in related works) and Linux kernel support using an information flow monitor called RFBlare. These goals are accomplished by taking advantage of a notable feature of ARM CoreSight components (context ID) combined with a custom DIFT coprocessor and RFBlare. The communication time overhead, major source of slowdown in total DIFT time overhead, is divided by a factor 3.8 compared to existing solutions with similar software constraints as in this work. The area overhead of this work is lower than 1% and power overhead is 16.2% on a middle-class Xilinx Zynq SoC.</p>
        <p>Most of hardware-assisted solutions for software security, program monitoring, and event-checking approaches require instrumentation of the target software, an operation which can be performed using an SBI (Static Binary Instrumentation) or a DBI (Dynamic Binary Instrumentation) framework. Hardware-assisted instrumentation can use one of these two solutions to instrument data to a memory-mapped register. Both these approaches require an in-depth knowledge of frameworks and an important amount of software modifications in order to instrument a whole application. In <ref xlink:href="#cidre-2018-bid2" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/> we propose a novel way to instrument an application, at the source code level, taking advantage of underlying hardware debug components such as CS (CoreSight) components available on Xilinx Zynq SoCs. As an example, the instrumentation approach proposed in this work is used to detect a double free security attack. Furthermore, it is evaluated in terms of runtime and area overhead.</p>
      </subsection>
      <subsection id="uid75" level="2">
        <bodyTitle>Alert correlation in intrusion detection.</bodyTitle>
        <p>In distributed systems and in particular in industrial SCADA environments, alert
correlation systems are necessary to identify complex multi-step attacks within
the huge amount of alerts and events. In <ref xlink:href="#cidre-2018-bid3" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/> we describe
an automata-based correlation engine developed in the context of a European
project where the main stakeholder was an energy distribution company. The
behavior of the engine is extended to fit new requirements. In the proposed
solution, a fully automated process generates thousands of correlation rules.
Despite this major scalability challenge, the designed correlation engine
exhibits good performance. Expected rates of incoming low level alerts
approaching several hundreds of elements per second are tolerated. Moreover, the
data structures chosen allow to quickly handle dynamic changes of the set of
correlation rules. As some attack steps are not observed, the correlation engine
can be tuned to raise an alert when all the attack steps except <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>k</mi></math></formula> of them have
been detected. To be able to react to an ongoing attack by taking
countermeasures, alerts must also be raised as soon as a significant prefix of
an attack scenario is recognized. Fulfilling these additional requirements leads
to an increase in the memory consumption. Therefore purge mechanisms are also
proposed and analyzed. An evaluation of the tool is conducted in the context of
a SCADA environment.</p>
      </subsection>
      <subsection id="uid76" level="2">
        <bodyTitle>Most recent and frequent items in distributed streams for DDoS detection.</bodyTitle>
        <p>The need to analyze in real time large-scale and distributed data streams has
recently became tremendously important to detect attacks (DDoS), anomalies or
performance issues. In particular the identification of recent heavy-hitters (or
hot items) is essential but highly challenging. Actually, this problem has been
heavily studied during the last decades with both exact and probabilistic
solutions. While simple to state and fundamental for advanced analysis,
answering this issue over a sliding time window and among distributed nodes is
still an active research field. The distributed detection of frequent items over
a sliding time window presents two extra challenging aspects with respect to the
centralized detection of frequent items since the inception of the stream: (i)
Treat time decaying items as they enter and exit the sliding window; (ii)
Produce mergeable local stream summaries in order to obtain a system-wide
summary. In <ref xlink:href="#cidre-2018-bid4" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we propose a sliding window-based
solution of the top <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>k</mi></math></formula> most frequent items based on a deterministic counting of
the most over-represented items in the data streams, which are themselves
probabilistically identified using a dynamically defined threshold. Performance
of our new algorithm are astonishingly good, despite any items order
manipulation or distributed execution.</p>
      </subsection>
      <subsection id="uid77" level="2">
        <bodyTitle>Propagation of information.</bodyTitle>
        <p>Together with Yves Mocquard and Bruno Sericola, we have worked on the well
studied dissemination of information in large scale distributed networks through
pairwise interactions. The information to be propagated can simply be a bit of
information to any code, including viruses. This problem, originally called
rumor mongering, and then rumor spreading has mainly been investigated in the
synchronous model. This model relies on the assumption that all the nodes of the
network act in synchrony, that is, at each round of the protocol, each node is
allowed to contact a random neighbor. In this paper, we drop this assumption
under the argument that it is not realistic in large scale systems. We thus
consider the asynchronous variant, where at random times, nodes successively
interact by pairs exchanging their information on the rumor. In a previous
paper, we performed a study of the total number of interactions needed for all
the nodes of the network to discover the rumor. While most of the existing
results involve huge constants that do not allow us to compare different
protocols, we provided a thorough analysis of the distribution of this total
number of interactions together with its asymptotic
behavior <ref xlink:href="#cidre-2018-bid5" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. In addition to this study, we have
proposed an algorithm that allows, through simple pairwise interactions, each
node of the large scale and dynamic system to build a global clock which allows
any node to maintain with high probability a common temporal
referential <ref xlink:href="#cidre-2018-bid6" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. By combining this global clock
together with the rumor spreading algorithm, we have proposed a mechanism that
allows each node to locally detect that the system has converged to a sought
configuration with high probability. We have also shown the applicability of our
convergence detection mechanism to many other pairwise interaction-based
protocols. For instance, our construction can be applied to a leader election
protocol provided that its convergence time is known with high
probability <ref xlink:href="#cidre-2018-bid7" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.
</p>
      </subsection>
    </subsection>
    <subsection id="uid78" level="1">
      <bodyTitle>Axis 3 : Attack resistance</bodyTitle>
      <subsection id="uid79" level="2">
        <bodyTitle>Connectivity in an inter-MANET network.</bodyTitle>
        <p>New generation radio equipment, used by soldiers and vehicles on the battlefield, form ad hoc networks and specifically, Mobile Ad hoc NETworks (MANET). The battlefields where these equipments are deployed include a majority of coalition communication. Each group on the battleground may communicate with other members of the coalition and establish inter-MANET links. These inter-MANET links are governed by routing policies that can be summarized as Allowed or Denied link. However, if more than two groups form a coalition, blocked multi-hop communications and non-desired transmissions due to these restrictive policies would appear. In <ref xlink:href="#cidre-2018-bid8" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we present these blocking cases and theoretically evaluate their apparition frequency. Then, we present two alternatives to extend the binary policies and decrease the number of blocking cases. Finally, we describe an experimental scenario containing a blocking case and evaluate our propositions and their performance.</p>
      </subsection>
      <subsection id="uid80" level="2">
        <bodyTitle>Permissionless ledgers for decentralized cryptocurrency systems (blockchain).</bodyTitle>
        <p>The goal of decentralized cryptocurrency systems is to offer a medium of exchange secured by cryptography, without the need of a centralized banking authority. An increasing number of distributed cryptocurrency systems are emerging, and among them Bitcoin, which is often designated as the pioneer of this kind of systems. Bitcoin circumvents the absence of a global trusted third-party by relying on a blockchain, an append-only data-structure, publicly readable and writable, in which all the valid transactions ever issued in the system are progressively appended through the creation of cryptographically linked blocks. In <ref xlink:href="#cidre-2018-bid9" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we propose a new way to organise both transactions and blocks in a distributed ledger to address the performance issues of permissionless ledgers. In contrast to most of the existing solutions in which the ledger is a chain of blocks extracted from a tree or a graph of chains, we present a distributed ledger whose structure is a balanced directed acyclic graph of blocks. We call this specific graph a SYC-DAG. We show that a SYC-DAG allows us to keep all the remarkable properties of the Bitcoin blockchain in terms of security, immutability, and transparency, while enjoying higher throughput and self-adaptivity to transactions demand.</p>
      </subsection>
      <subsection id="uid81" level="2">
        <bodyTitle>Modular verification of Programs with Effects and Effect Handlers in Coq</bodyTitle>
        <p>Modern computing systems have grown in complexity, and the attack surface has increased accordingly. Even though system components are generally carefully designed and even verified by different groups of people, the composition of these components is often regarded with less attention. This paves the way for architectural attacks, a class of security vulnerabilities where the attacker is able to threaten the security of the system even if each of its components continues to act as expected. In <ref xlink:href="#cidre-2018-bid10" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we introduce FreeSpec, a formalism built upon the key idea that components can be modelled as programs with algebraic effects to be realized by other components. FreeSpec allows for the modular modelling of a complex system, by defining idealized components connected together, and the modular verification of the properties of their composition. In addition, we have implemented a framework for the Coq proof assistant based on FreeSpec.</p>
      </subsection>
    </subsection>
  </resultats>
  <contrats id="uid82">
    <bodyTitle>Bilateral Contracts and Grants with Industry</bodyTitle>
    <subsection id="uid83" level="1">
      <bodyTitle>Bilateral Contracts with Industry</bodyTitle>
      <simplelist>
        <li id="uid84">
          <p noindent="true"><b>HP (2013-2019): Embedded Systems Security</b>
We aim at researching and prototyping low-level intrusion detection mechanisms in embedded system software. This involves mechanisms in continuation of previous work realized by our team as well as investigating new techniques more directly tied to specific HP device architectures. Our main objective is to monitor low-level software (firmware, OS kernels, hypervisors) thanks to a dedicated external co-processor. Ronny Chevalier is doing is PhD in the context of this project. Being under NDA, details about this research program cannot be provided.</p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid85" level="1">
      <bodyTitle>Bilateral Grants with Industry</bodyTitle>
      <simplelist>
        <li id="uid86">
          <p noindent="true"><b>ANSSI: Security of Low-level Components</b> Thomas Letan has started his PhD thesis in the context of a contract between CentraleSupelec and the French National Computer Security Agency (ANSSI). His work consists in using formal methods to specify hardware/software security mechanisms and to verify that they correctly enforce some security policies.</p>
        </li>
        <li id="uid87">
          <p noindent="true"><b>DGA: Visualization for security events monitoring</b>
Damien Crémilleux has started his PhD thesis in October 2015 in the context of a cooperation with DGA-MI. The subject of the PhD is to define
relevant representations to allow front-line security operators to monitors systems from a security perspective. A first proposal was made that led to a tool, VEGAS, that allows to monitor large quantities of alerts in real time and to dispatch these alerts in a relevant way to security analysts.</p>
        </li>
        <li id="uid88">
          <p noindent="true"><b>DGA: Intrusion Detection in Distributed Applications</b>
David Lanoé has started his PhD thesis in October 2016 in the context of a cooperation with DGA-MI. His work is focussing on the construction of behavioral models (during a learning phase) and their use to detect intrusions during an execution of the modelled distributed application.</p>
        </li>
        <li id="uid89">
          <p noindent="true"><b>DGA: Protection against fuzzing attack</b>
Aurelien Palisse has started his PhD in October 2015 in the context of a cooperation with DGA-MI. The subject of the PhD is to propose
a detection mechanism and a mitigation procedure to counter ransomware attacks. He designed a low cost Windows driver that use
a Markov chain as a model for an anomaly detection system. The technology has been patented by both Inria and DGA.</p>
        </li>
        <li id="uid90">
          <p noindent="true"><b>Idemia: Hardware Security for Embeded Devices</b>
Kevin Bukasa has started his PhD in January 2016 in a bilateral contract between Inria and Idemia. He explored fault injection attacks using EM probes on two
different kind of devices: microcontroller (representing IoT) and SoC (representing Smart phone). He demonstrated the vulnerability of both architectures on
this kind of attack. On IoT device he has developped an attack allowing to take a full control on the device. He discovered also new fault attacks never
described in the litterature.</p>
        </li>
        <li id="uid91">
          <p noindent="true"><b>Idemia: Protection against fuzzing attack</b>
Leopold Ouairy has started his PhD in October 2017 in a bilateral contract between Inria and Idemia. The context is related with security testing of Java
applications to avoid fuzzing attack. The approach is based on AI to design automatically a model use for the oracle. He used machine learning to serach
in a corpus of applicatons methods having the same semantics. Then in a second step, after convertir the source code into a vector he compute a similarity
value which is related with absence of conditions evaluation.</p>
        </li>
        <li id="uid92">
          <p noindent="true"><b>Ministry of Defence: Visualisation for the characterization of security events</b>
Laetitia Leichtnam has started his PhD thesis in November 2016 in the context of a contract between CentraleSupelec and the French Ministry of Defence. His work consists in presenting events appearing in heterogeneous logs as a dependency graph between the lines of logs. This permits to the administrator to investigate easily the logs to discover the different steps that has performed an attack in the supervised system.</p>
        </li>
        <li id="uid93">
          <p noindent="true"><b>Ministry of Defence: Characterization of an attacker</b>
Aïmad Berady has started his PhD thesis in November 2018 in the context of a contract between CentraleSupelec and the French Ministry of Defence. His work is to highlight the characteristics of an attacker performing a targeted and long-term attack on an information system.</p>
        </li>
        <li id="uid94">
          <p noindent="true"><b>Nokia: Risk-aware security policies adaptation in modern communication infrastructures</b>
Pernelle Mensah was hired in January 2016 on this CIFRE funding in
order to work on unexplored aspects of information security, and in
particular response strategies to complex attacks, in the context of
cloud computing architectures. The use case proposed by our
industrial partner is a multi-tenant cloud computing platform
involving software-defined networking in order to provide further
flexibility and responsiveness in architecture management. The topic
of the thesis is to adapt and improve the current risk-aware
reactive response tools, based on attack graphs and adaptive
security policies, to this specific environment, taking into account
the heterogeneity of actors, platforms, policies and remediation
options.</p>
        </li>
        <li id="uid95">
          <p noindent="true"><b>Orange LAb's: Storage and query in a massive distributed graph for the web of things</b>
Cyprien Gottstein has started his PhD thesis in October 2018 in the context of a collaboration between Inria and Orange (I/O Lab). In this thesis, we consider storage and query problems that arise when massive distributed graphs are used to represent the web of things. In particular, access to the data and partitioning of the graph are studied to propose efficient geographical services.</p>
        </li>
        <li id="uid96">
          <p noindent="true"><b>Thales: Privacy and Secure Multi-party Computation</b>
Aurélien Dupin has started his PhD thesis in January 2016 within the context of a CIFRE contract with Thales. His PhD subject concerns secure multi-party computation. Secure two-party computation provides a way for two parties to compute a function, that depends on the two parties' inputs, while keeping them private. Known since the 1980s, Yao's garbled circuits appear to be a general solution to this problem, in the semi-honest model.
Decades of optimizations have made this tool a very practical solution.
However, it is well known that a malicious adversary could modify a garbled circuit before submitting it.
Many protocols, mostly based on cut-&amp;-choose, have been proposed to secure Yao's garbled circuits in the presence of malicious adversaries.
Nevertheless, how much an adversary can modify a circuit and make it still executable have not been studied. In the context of his PhD, Aurélien Dupin is interested by such a question.</p>
        </li>
        <li id="uid97">
          <p noindent="true"><b>Thales: Combining Attack Specification and Dynamic Learning from traces for correlation rule generation</b>
Charles Xosanavongsa has started his PhD thesis in December 2016 in the context of a CIFRE with Thales. His work will focus on the construction of correlation rules.
In previous work on correlation rule generation, the usual approach is static. It always relies on the description of the supervised system using a knowledge base of the system. The use of correlation trees is an appealing solution because it allows to have a precise description of the attacks and can handle any kind of IDS. But in practice, the behavior of each IDS is quite difficult to predict, in particular for anomaly based IDS. To manage automatically the correlation rules (and adapt them if necessary), we plan to analyze synthetic traces containing both anomaly based and misused based IDS alerts resulting from an attack.</p>
        </li>
      </simplelist>
    </subsection>
  </contrats>
  <partenariat id="uid98">
    <bodyTitle>Partnerships and Cooperations</bodyTitle>
    <subsection id="uid99" level="1">
      <bodyTitle>Regional Initiatives</bodyTitle>
      <simplelist>
        <li id="uid100">
          <p noindent="true"><b>Region Bretagne ARED Grant :</b>
the PhD of Mourad Leslous on malicious codes in Android applications is supported by a grant from the Région Bretagne.</p>
        </li>
        <li id="uid101">
          <p noindent="true">
            <b>Labex COMINLABS contract (2014-2018):
”Kharon-Security“ - <ref xlink:href="http://kharon.gforge.inria.fr" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>kharon.<allowbreak/>gforge.<allowbreak/>inria.<allowbreak/>fr</ref></b>
          </p>
          <p>Google Play offers more than 800’000 applications (apps), and this number increases every day. Google play users have performed more than 25 billion app downloads. These applications vary from games to music, video, books, tools, etc. Unfortunately, each of these application is an attack vector on Android. The number of malicious applications (pieces of malware) discovered during the first six months of 2013 exceeds the number of pieces of malware discovered during the 2010 to 2012 period, more than 700 thousand malicious and risky applications were found in the wild. In this context, we propose the Kharon-Security project to stem the progression of Android pieces of malware. We propose to combine static and dynamic monitoring to compute a behavioral signature of Android malware. Behavioral signatures are helpful to understand how malware infect the devices and how they spread information in the Android operating system. Static analysis is essential to understand which particular event or callback triggers malware payload.</p>
          <p>In the project we have already developed GroddDroid a tool dedicated to automatic identification and execution of suspicious code. We have also built a dataset of Android malware. In this dataset, all malware are entirely manually reverse and documented. We have also developed an analysis platform. This platform is been deployed at the High Research Laboratory.</p>
        </li>
        <li id="uid102">
          <p noindent="true">
            <b>Labex COMINLABS contract (2015-2018):
”HardBlare-Security“ - <ref xlink:href="https://hardblare.cominlabs.u-bretagneloire.fr/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hardblare.<allowbreak/>cominlabs.<allowbreak/>u-bretagneloire.<allowbreak/>fr/</ref></b>
          </p>
          <p>The general context of the HardBlare project is to address Dynamic Information Flow Tracking (DIFT) that generally consists in attaching marks to denote the type of information that is saved or generated within the system. These marks are then propagated when the system evolves and information flow control is performed in order to guarantee a safe execution and storage within the system. Existing solutions imply a large overhead induced by the monitoring process. Some attempts rely on a hardware-software approach where DIFT operations are delegated to a coprocessor. Nevertheless, such approaches are based on modified processors. Beyond the fact hardware-assisted DIFT is hardly adopted, existing works do not take care of coprocessor security and multicore/multiprocessor embedded systems.</p>
          <p>We plan to implement DIFT mechanisms on boards including a non-modified ARM processor and a FPGA such as those based on the Xilinx Zynq family. The HardBlare project is a multidisciplinary project between CentraleSupélec IETR SCEE research team, CentraleSupélec Inria CIDRE research team and UBS Lab-STICC laboratory. Mounir Nasr Allah is doing his PhD in the context of this project. The main objective of this PhD is to study how hybrid analysis could improve hardware assisted DIFT using static analysis performed at compile-time. Another objective is to manage labels for persistent memory (i.e., files) using a modified OS kernel.</p>
        </li>
        <li id="uid103">
          <p noindent="true">
            <b>Labex COMINLABS contract (2016-2019): “BigClin” - <ref xlink:href="https://bigclin.cominlabs.u-bretagneloire.fr/fr" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>bigclin.<allowbreak/>cominlabs.<allowbreak/>u-bretagneloire.<allowbreak/>fr/<allowbreak/>fr</ref></b>
          </p>
          <p>Health Big Data (HBD) is more than just a very large amount of data or a large number of data sources. The data collected or produced during the clinical care process can be exploited at different levels and across different domains, especially concerning questions related to clinical and translational research. To leverage these big, heterogeneous, sensitive and multi-domain clinical data, new infrastructures are arising in most of the academic hospitals, which are intended to integrate, reuse and share data for research.</p>
          <p>Yet, a well-known challenge for secondary use of HBD is that much of detailed patient information is embedded in narrative text, mostly stored as unstructured data. The lack of efficient Natural Language Processing (NLP) resources dedicated to clinical narratives, especially for French, leads to the development of ad-hoc NLP tools with limited targeted purposes. Moreover, the scalability and real-time issues are rarely taken into account for these possibly costly NLP tools, which make them inappropriate in real-world scenarios.
Some other today’s challenges when reusing Health data are still not resolved: data quality assessment for research purposes, scalability issues when integrating heterogeneous HBD or patient data privacy and data protection. These barriers are completely interwoven with unstructured data reuse and thus constitute an overall issue which must be addressed globally.</p>
          <p>In this project, we plan to develop distributed methods to ensure both the scalability and the online processing of these NLP/IR and data mining techniques;
In a second step, we will evaluate the added value of these methods in several real clinical data and on real use-cases, including epidemilology and pharmaco-vigilance, clinical practice assessment and health care quality research, clinical trials.</p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid104" level="1">
      <bodyTitle>National Initiatives</bodyTitle>
      <subsection id="uid105" level="2">
        <bodyTitle>ANR</bodyTitle>
        <simplelist>
          <li id="uid106">
            <p noindent="true">
              <b>ANR Project: PAMELA (2016-2020) -
<ref xlink:href="https://project.inria.fr/pamela/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>project.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>pamela/</ref></b>
            </p>
            <p>PAMELA is a collaborative ANR project involving Rennes 1 university
(ASAP and CIDRE teams in Rennes), Inria Lille (MAGNET team), LIP6
(MLIA team) and two start-ups, Mediego and Snips. It aims at
developing machine learning theories and algorithms in order to learn
local and personalized models from data distributed over networked
infrastructures. The project seeks to provide first answers to modern
information systems built by interconnecting many personal devices
holding private user data in the search of personalized suggestions
and recommendations. More precisely, we will focus on learning in a
collaborative way with the help of neighbors in a network. We aim to
lay the first blocks of a scientific foundation for these new types of
systems, in effect moving from graphs of data to graphs of data and
learned models. CIDRE's contribution in this project involves the
design of adversary models and privacy metrics suitable to the
privacy-related issues of this distributed learning paradigm.</p>
          </li>
        </simplelist>
      </subsection>
    </subsection>
    <subsection id="uid107" level="1">
      <bodyTitle>International Research Visitors</bodyTitle>
      <subsection id="uid108" level="2">
        <bodyTitle>Visits of International Scientists</bodyTitle>
        <p>Carlos Maziero, Professor at the Federal University of Parana (Curitiba, Brazil) has visited our team from January 2018 till December 2018. During his stay, he has worked on models of normal behaviours in distributed applications.</p>
        <subsection id="uid109" level="3">
          <bodyTitle>Research Stays Abroad</bodyTitle>
          <p>Mourad Leslous did an international
mobility of three months in the team of Lorenzo Cavallaro in the Information Security Group (ISG) at Royal Holloway, University of London. This
mobility was part of the program of EIT Digital Doctoral School, a
European institute that promotes entrepreneurship and innovation among
PhD students. During this mobility, he worked on control flow
and data flow dependencies in order to detect the malicious code inside Android
applications.</p>
        </subsection>
      </subsection>
    </subsection>
  </partenariat>
  <diffusion id="uid110">
    <bodyTitle>Dissemination</bodyTitle>
    <subsection id="uid111" level="1">
      <bodyTitle>Promoting Scientific Activities</bodyTitle>
      <subsection id="uid112" level="2">
        <bodyTitle>Scientific Events Organisation</bodyTitle>
        <subsection id="uid113" level="3">
          <bodyTitle>General Chair, Scientific Chair</bodyTitle>
          <p>Jean-Louis Lanet served as general chair of the 13rd International Conference on Risks and Security of Internet and Systems CRiSIS 2018, Bordeaux France and general chair of the
11th International Conference on Information Technology and Communication Security, Bucharest, Romania,</p>
        </subsection>
        <subsection id="uid114" level="3">
          <bodyTitle>Member of the Organizing Committees</bodyTitle>
          <sanspuceslist>
            <li id="uid115">
              <p noindent="true">Christophe Bidan served as a member of the organization committee of C&amp;ESAR 2018 (25rd Computers &amp; Electronics Security Applications Rendez-vous), November 2018, Rennes, France.</p>
            </li>
            <li id="uid116">
              <p noindent="true">Frédéric Tronel served as a member of the organization committee of SSTIC 2018 (Symposium sur la sécurité des technologies de l'information et des communications) that took place
in Rennes, France in June, where it gathered more than 600 participants.</p>
            </li>
            <li id="uid117">
              <p noindent="true">Gilles Guette served as a member of the organization committee of InOut18, annual event on new mobility that took place in Rennes, France in March.</p>
            </li>
          </sanspuceslist>
        </subsection>
      </subsection>
      <subsection id="uid118" level="2">
        <bodyTitle>Scientific Events Selection</bodyTitle>
        <subsection id="uid119" level="3">
          <bodyTitle>Chair of Conference Program Committees</bodyTitle>
          <p>Eric Totel chaired the Program Committee of the 2018 French conference RESSI (Rendez-Vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information).</p>
        </subsection>
        <subsection id="uid120" level="3">
          <bodyTitle>Member of the Conference Program Committees</bodyTitle>
          <sanspuceslist>
            <li id="uid121">
              <p noindent="true">Frédéric Tronel and Valérie Viet Triem Tong served as a member of the program committee of SSTIC 2017 (Symposium sur la sécurité des technologies de l'information et des communications) June 2018, Rennes, France.</p>
            </li>
            <li id="uid122">
              <p noindent="true">Valérie Viet Triem Tong served as a member of the program committee of SECITC (International conference on Information Technology and Communications Security), october 2018, Bucharest, Romania.</p>
            </li>
            <li id="uid123">
              <p noindent="true">Jean-François Lalande served as a member of the program committee of the international conferences CECC 2018, IEEE AINS 2018, IEEE HPCS 2018 and of the international workshops SHPCS 2018, IWCC 2018, CUING 2018, BioSTAR 2018, WTMC 2018, DACSW 2018.</p>
            </li>
            <li id="uid124">
              <p noindent="true">Michel Hurfin acts as a member of the program committee of the African Conference on Research in Computer Science and Applied Mathematics (CARI 2018), South Africa, October 2018.</p>
            </li>
            <li id="uid125">
              <p noindent="true">Emmanuelle Anceaume served as a member of the program committee of the following international conferences: ICDCN 2018, NCA 2018 CryBlock 2018, DEBS 2018, PEC 2018, BSCT 2018, and ADSN 2018.</p>
            </li>
            <li id="uid126">
              <p noindent="true">Ludovic Mé served as a member of the 2018 MSPN (International Conference on Mobile, Secure and Programmable Networking) and CARI (Colloque Africain sur la Recherche en Informatique et Mathématiques Appliquées 2018) program Committees.</p>
            </li>
            <li id="uid127">
              <p noindent="true">Guillaume Piolle served as a member of the 2018 APVP (Atelier sur la Protection de la Vie Privée) and EGC-IA (Extraction et Gestion des Connaissances - Intelligence Artificielle) program committees.</p>
            </li>
            <li id="uid128">
              <p noindent="true">Gilles Guette served as a member of the program committee of the International Conference on Information Systems Security and Privacy, ICISSP 2018.</p>
            </li>
          </sanspuceslist>
        </subsection>
        <subsection id="uid129" level="3">
          <bodyTitle>Reviewer</bodyTitle>
          <sanspuceslist>
            <li id="uid130">
              <p noindent="true">Valérie Viet Triem Tong served as a reviewer for the African Conference on Research in Computer Science and Applied Mathematics, October 2018, South Africa, Stellenbosch.</p>
            </li>
            <li id="uid131">
              <p noindent="true">Jean-François Lalande served as a reviewer for ICISSP 2018, APVP 2018.</p>
            </li>
          </sanspuceslist>
        </subsection>
      </subsection>
      <subsection id="uid132" level="2">
        <bodyTitle>Journal</bodyTitle>
        <subsection id="uid133" level="3">
          <bodyTitle>Member of the Editorial Boards</bodyTitle>
          <sanspuceslist>
            <li id="uid134">
              <p noindent="true">Jean-François Lalande served as a member of the editorial board of IARIA International Journal on Advances in Security.</p>
            </li>
            <li id="uid135">
              <p noindent="true">Michel Hurfin serves as a member of the editorial board of the JISA Journal (Journal of Internet Services and Applications - Springer).</p>
            </li>
          </sanspuceslist>
        </subsection>
        <subsection id="uid136" level="3">
          <bodyTitle>Reviewer - Reviewing Activities</bodyTitle>
          <sanspuceslist>
            <li id="uid137">
              <p noindent="true">Jean-François Lalande served as a reviewer for Journal of Universal Computer Science, Elsevier FGCS, IEEE TIFS, MDPI Future Internet, MDPI Sensors, Elsevier Computer Commmunications.</p>
            </li>
            <li id="uid138">
              <p noindent="true">Michel Hurfin served as a reviewer for the IEEE TDSC Journal (Transactions on Dependable and Secure Computing), the Springer TOCS Journal (Theory of Computing Systems), and the Taylor &amp; Francis International Journal of Control.</p>
            </li>
            <li id="uid139">
              <p noindent="true">Emmanuelle Anceaume served as a reviewer of the following journals: IEEE TPDS, and ACM TAAS.</p>
            </li>
            <li id="uid140">
              <p noindent="true">Jean Louis Lanet served as reviewer for the Journal of Computer Security.</p>
            </li>
            <li id="uid141">
              <p noindent="true">Guillaume Piolle served as a reviewer for the RIA (Revue d'Intelligence Artificielle) journal.</p>
            </li>
            <li id="uid142">
              <p noindent="true">Guillaume Hiet served as a reviewer for the Journal of Computer Security.</p>
            </li>
            <li id="uid143">
              <p noindent="true">Gilles Guette served as a reviewer for the IEEE JSAC-SI-NETSOFT-ENABLERS and for the IEEE Networking Letters.</p>
            </li>
          </sanspuceslist>
        </subsection>
      </subsection>
      <subsection id="uid144" level="2">
        <bodyTitle>Invited Talks</bodyTitle>
        <sanspuceslist>
          <li id="uid145">
            <p noindent="true">Emmanuelle Anceaume gave several talks:</p>
            <simplelist>
              <li id="uid146">
                <p noindent="true"><i>UTXOs as a proof of membership for Byzantine Agreement based Cryptocurrencies</i> during the National Days of the pre-GDR on security, june 2018.</p>
              </li>
              <li id="uid147">
                <p noindent="true"><i>Beyond the block: A lego blockumentary</i> during “Journées scientifiques de l'Inria”.</p>
              </li>
              <li id="uid148">
                <p noindent="true"><i>Sycomore, a Directed Acyclic Graph of Blocks</i>, Chain-in conference, Porto, Portugal, July 2018, <ref xlink:href="#cidre-2018-bid11" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, also on Youtube “https://www.youtube.com/watch?v=YLW-iHjsWo0”.</p>
              </li>
            </simplelist>
          </li>
          <li id="uid149">
            <p noindent="true">Valérie Viet Triem Tong gives a talk about <i>information flow monitoring at the operating system level</i> during the National Days of the pre-GDR on security, june 2018.</p>
          </li>
          <li id="uid150">
            <p noindent="true">Jean-François Lalande was invited as keynote speaker at SecITC'2018 <ref xlink:href="#cidre-2018-bid12" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
          </li>
          <li id="uid151">
            <p noindent="true">Jean-François Lalande was an invited speaker of the workshop SHPCS 2018 <ref xlink:href="#cidre-2018-bid13" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
          </li>
          <li id="uid152">
            <p noindent="true">Guillaume Piolle was an invited speaker at the <i>Surveillance Resilience, &amp; Privacy</i> conference (Paris, December 2018).</p>
          </li>
        </sanspuceslist>
      </subsection>
      <subsection id="uid153" level="2">
        <bodyTitle>Scientific Expertise</bodyTitle>
        <p>Ludovic Mé has served the Scientific Council of the LIRIMA (Laboratoire International de Recherche en Informatique et Mathématiques Appliquées).</p>
        <p>Ludovic Mé has chaired the group of experts dedicated to the evaluation of the security of French computer science research labs (PPST S/C 7).</p>
        <p>Ludovic Mé has chaired the Steering Committee of the annual French conference RESSI (Rendez-Vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information).</p>
        <p>Eric Totel has served the Steering Committee of the annual French conference RESSI (Rendez-Vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information).</p>
        <p>Valérie Viet Triem Tong has participated in the scientific evaluation comity <i>Global Security and Cybersecurity</i> (CES 39) of the French Research Agency (ANR).</p>
      </subsection>
      <subsection id="uid154" level="2">
        <bodyTitle>Research Administration</bodyTitle>
        <p>Ludovic Mé acts as Scientific Officer for the Rennes - Bretagne Atlantic Inria Research Center. As such, he is also a member of the Evaluation Commission and of the Internal Scientific Council of Inria.</p>
        <p>Ludovic Mé was the president of a recruitment committee for an assistant professor position at the CNAM (Conservatoire national des arts et métier, Paris). He also served a recruitment committee for an assistant professor position at CentraleSupélec, Rennes.</p>
        <p>Valérie Viet Triem Tong was a member of a recruitment committee for an assistant professor position at CentraleSupélec, Rennes.
</p>
      </subsection>
    </subsection>
    <subsection id="uid155" level="1">
      <bodyTitle>Teaching - Supervision - Juries</bodyTitle>
      <subsection id="uid156" level="2">
        <bodyTitle>Teaching</bodyTitle>
        <sanspuceslist>
          <li id="uid157">
            <p noindent="true">Master: Emmanuelle Anceaume, <i>Research in Computer Science - Distributed Algorithms</i>, 20 hours of lecture, M2; Université Rennes 1, France;</p>
          </li>
          <li id="uid158">
            <p noindent="true">Licence: Christophe Bidan, <i>Algorithms and Data Structures</i>, 36 hours of lecture including 7.5 hours of lectures, L3 - first year of the engineering degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid159">
            <p noindent="true">Licence: Christophe Bidan, <i>Software Engineering</i>, 12 hours, L3 - first year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid160">
            <p noindent="true">Licence: Christophe Bidan, <i>Supervision of student project</i>, 1 project, L3 - first year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid161">
            <p noindent="true">Master: Christophe Bidan is responsible for the module <i>Secured information systems</i>, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid162">
            <p noindent="true">Master: Christophe Bidan, <i>Applied cryptography</i>, 6 hours of lecture, M2 - master 2 degree, University of Rennes 1, France;</p>
          </li>
          <li id="uid163">
            <p noindent="true">Master: Christophe Bidan, <i>Applied cryptography</i>, 15 hours including 6 hours of lecture, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid164">
            <p noindent="true">Master : Christophe Bidan, <i>Cryptographic Protocols</i>, 6 hours of lecture, mastère CS (Cyber Security), CentraleSupélec, France;</p>
          </li>
          <li id="uid165">
            <p noindent="true">Master: Christophe Bidan, <i>Information systems</i>, 4.5 hours, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid166">
            <p noindent="true">Master: Christophe Bidan, <i>Supervision of student project</i>, 2 projects, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid167">
            <p noindent="true">Licence: Gilles Guette, <i>Algorith and Complexity</i>, 36 hours, L1 - Licence, ISTIC/University of Rennes, France;</p>
          </li>
          <li id="uid168">
            <p noindent="true">Licence: Gilles Guette, <i>Network Initiation</i>, 72 hours, L3 - Licence, ISTIC/University of Rennes, France;</p>
          </li>
          <li id="uid169">
            <p noindent="true">Licence: Gilles Guette, <i>Network Initiation</i>, 69 hours, L3 - first year of the engineer degree, ESIR, France;</p>
          </li>
          <li id="uid170">
            <p noindent="true">Master: Gilles Guette, <i>Network Routing</i>, 45 hours, M1 - second year of the engineer degree, ESIR, France;</p>
          </li>
          <li id="uid171">
            <p noindent="true">Master: Gilles Guette, <i>Mobile Network Routing</i>, 5 hours, M1 - second year of the engineer degree, ESIR, France;</p>
          </li>
          <li id="uid172">
            <p noindent="true">Master: Gilles Guette, <i>Advanced Network Services</i>, 13 hours, M1 - second year of the engineer degree, ESIR, France;</p>
          </li>
          <li id="uid173">
            <p noindent="true">Master: Gilles Guette, <i>Network Project</i>, 24 hours, M1 - second year of the engineer degree, ESIR, France;</p>
          </li>
          <li id="uid174">
            <p noindent="true">Master: Gilles Guette, <i>Security</i>, 46 hours, M1 - second year of the engineer degree, ESIR, France;</p>
          </li>
          <li id="uid175">
            <p noindent="true">Master: Gilles Guette, <i>Sensors Network</i>, 28 hours, M2 - Master, ISTIC/University of Rennes, France;</p>
          </li>
          <li id="uid176">
            <p noindent="true">Master: Gilles Guette, <i>Supervision of student</i>, Contrat de professionnalisation, M2 - third year of the engineer degree, ESIR, France;</p>
          </li>
          <li id="uid177">
            <p noindent="true">Master: Gilles Guette, <i>Supervision of student internship</i>, M2 - ISTIC/University of Rennes, France;</p>
          </li>
          <li id="uid178">
            <p noindent="true">Licence: Guillaume Hiet, <i>Algorithms and Data Structures</i>, 12.5 hours, L3 - first year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid179">
            <p noindent="true">Master: Guillaume Hiet, <i>Computer security and privacy for the engineer</i>, 8 hours, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid180">
            <p noindent="true">Master: Guillaume Hiet, <i>Buffer overflow vulnerabilities</i>, 16 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid181">
            <p noindent="true">Master: Guillaume Hiet, <i>Buffer overflow vulnerabilities</i>, 16 hours, M2 - Mastère Spécialisé CS (Cyber Security), CentraleSupélec, France;</p>
          </li>
          <li id="uid182">
            <p noindent="true">Master: Guillaume Hiet, <i>Pentest</i>, 19 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid183">
            <p noindent="true">Master: Guillaume Hiet, <i>Pentest</i>, 3 hours, M2 - Mastère Spécialisé CS (Cyber Security), CentraleSupélec, France;</p>
          </li>
          <li id="uid184">
            <p noindent="true">Master: Guillaume Hiet, <i>Introduction to Linux</i>, 3 hours, M2 - Mastère Spécialisé CS (Cyber Security), CentraleSupélec, France;</p>
          </li>
          <li id="uid185">
            <p noindent="true">Master: Guillaume Hiet, <i>Java Security</i>, 4.5 hours, M2 - Mastère Spécialisé CS, CentraleSupélec, France;</p>
          </li>
          <li id="uid186">
            <p noindent="true">Master: Guillaume Hiet, <i>Linux Security</i>, 18 hours, M2 - Mastère Spécialisé CS , CentraleSupélec, France;</p>
          </li>
          <li id="uid187">
            <p noindent="true">Master: Guillaume Hiet, <i>Linux Security</i>, 7.5 hours, third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid188">
            <p noindent="true">Master: Guillaume Hiet, <i>LDAP</i>, 7.5 hours, third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid189">
            <p noindent="true">Master: Guillaume Hiet, <i>Intrusion Detection</i>, 15 hours, M2 - Mastère Spécialisé CS, CentraleSupélec, France;</p>
          </li>
          <li id="uid190">
            <p noindent="true">Master: Guillaume Hiet, <i>Intrusion Detection</i>, 13.5 hours, M2 - third year of the engineer degree, M2 research degree of University of Rennes 1, CentraleSupélec, France;</p>
          </li>
          <li id="uid191">
            <p noindent="true">Master: Guillaume Hiet, <i>Security Monitoring</i>, 3 hours, M2, cycle "Sécurité Numérique", INHESJ, France;</p>
          </li>
          <li id="uid192">
            <p noindent="true">Master: Guillaume Hiet, <i>Computer Security</i>, 31.5 hours, M2, Mastère Spécialisé Architecte des Systèmes d'Information, CentraleSupélec, France;</p>
          </li>
          <li id="uid193">
            <p noindent="true">Master: Guillaume Hiet, <i>Intrusion Detection</i>, 16 hours, M2, University of Rennes 1, France;</p>
          </li>
          <li id="uid194">
            <p noindent="true">Master: Guillaume Hiet, <i>Intrusion Detection</i>, 10 hours, M2 - third year of the engineer degree, ESIR, France;</p>
          </li>
          <li id="uid195">
            <p noindent="true">Master: Guillaume Hiet, <i>Intrusion Detection</i>, 9 hours, M2, Université of Limoges, France;</p>
          </li>
          <li id="uid196">
            <p noindent="true">Master: Guillaume Hiet, <i>Firewall</i>, 6 hours, M2, University of Rennes 1, France;</p>
          </li>
          <li id="uid197">
            <p noindent="true">Master: Guillaume Hiet, <i>Supervision of student project</i>, 4 projects, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid198">
            <p noindent="true">Master: Guillaume Hiet, <i>Supervision of student project</i>, 2 projects, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid199">
            <p noindent="true">Master: Guillaume Hiet, <i>Supervision of student project</i>, 2 projects, M2 - Mastère Spécialisé CS (Cyber Security), CentraleSupélec, France;</p>
          </li>
          <li id="uid200">
            <p noindent="true">Licence: Jean-François Lalande, <i>Algorithms and data structures</i>, 22 hours, L3 - first year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid201">
            <p noindent="true">Master: Jean-François Lalande, <i>Computer Sciences</i>, 13 hours, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid202">
            <p noindent="true">Master: Jean-François Lalande, <i>Operating System</i>, 7 hours, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid203">
            <p noindent="true">Master: Jean-François Lalande, <i>Legal aspects of information security</i>, 4 hours, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid204">
            <p noindent="true">Master: Jean-François Lalande, <i>Android mobile development</i>, 18 hours, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid205">
            <p noindent="true">Master: Jean-François Lalande, <i>Web development</i>, 18 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid206">
            <p noindent="true">Master: Jean-François Lalande, <i>Supervision of student projects</i>, 7 projects, engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid207">
            <p noindent="true">Licence: Guillaume Piolle, <i>Software engineering</i>, 1.5 hours, L3 - first year of the engineering degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid208">
            <p noindent="true">Master: Guillaume Piolle, <i>Modelling, Algorithms and Programming</i>, 22 hours, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid209">
            <p noindent="true">Master: Guillaume Piolle, <i>Computer security and privacy</i>, 5 hours, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid210">
            <p noindent="true">Master: Guillaume Piolle, <i>Software project</i>, 3.5 hours, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid211">
            <p noindent="true">Master: Guillaume Piolle, <i>Relational databases</i>, 6 hours, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid212">
            <p noindent="true">Master: Guillaume Piolle, <i>Computer networks</i>, 30 hours, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid213">
            <p noindent="true">Master: Guillaume Piolle, <i>Security Policies</i>, 4.5 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid214">
            <p noindent="true">Master: Guillaume Piolle, <i>Java programming</i>, 4.5 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid215">
            <p noindent="true">Master: Guillaume Piolle, <i>Computer networks</i>, 9 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid216">
            <p noindent="true">Master: Guillaume Piolle, <i>Software engineering</i>, 12 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid217">
            <p noindent="true">Master: Guillaume Piolle, <i>Network Access Control</i>, 9 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid218">
            <p noindent="true">Master: Guillaume Piolle, <i>Web development</i>, 32 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid219">
            <p noindent="true">Master: Guillaume Piolle, <i>Privacy protection</i>, 18 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid220">
            <p noindent="true">Master: Guillaume Piolle, <i>Computing project</i>, 60 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid221">
            <p noindent="true">Master: Guillaume Piolle, <i>Legal aspects of information security</i>, 4.5 hours, M2 - master CyberSecurity, CentraleSupélec, France;</p>
          </li>
          <li id="uid222">
            <p noindent="true">Licence : Eric Totel, <i>Foundations of computer science, data structures and algorithms</i>, 9 hours, L3 - first year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid223">
            <p noindent="true">Licence : Eric Totel, <i>Software Modeling</i>, 15 hours, L3 - first year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid224">
            <p noindent="true">Master : Eric Totel, <i>Operating Systems</i>, 30 hours, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid225">
            <p noindent="true">Master : Eric Totel, <i>C language</i>, 24 hours including 6 hours of lecture, M2 - master CS (Cyber Security), CentraleSupélec, France;</p>
          </li>
          <li id="uid226">
            <p noindent="true">Master : Eric Totel, <i>C language and C++ language</i>, 12 hours including 6 hours of lecture, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid227">
            <p noindent="true">Master : Eric Totel, <i>Dependability</i> , 9 hours including 7.5 hours of lecture, M2 - third year of the engineer degree and master research, CentraleSupélec, France;</p>
          </li>
          <li id="uid228">
            <p noindent="true">Master : Eric Totel, <i>Dependability</i>, 3 hours of lecture, M2 - third year of the engineer degree (ingénierie des systèmes automatisés), CentraleSupelec, France;</p>
          </li>
          <li id="uid229">
            <p noindent="true">Master : Eric Totel, <i>Dependability</i>, 4.5 hours of lecture, M2 - post-graduate training (master Architecture des Réseaux de Communication), CentraleSupélec, France;</p>
          </li>
          <li id="uid230">
            <p noindent="true">Master : Eric Totel, <i>Intrusion Detection</i>, 6 hours of lecture, M2 - M2 - master CS (Cyber Security), CentraleSupélec, France;</p>
          </li>
          <li id="uid231">
            <p noindent="true">Master : Eric Totel, <i>Intrusion Detection</i>, 9 hours of lecture, M2 - master 2 degree, University of Rennes 1, France;</p>
          </li>
          <li id="uid232">
            <p noindent="true">Master : Eric Totel, <i>Supervision of student project</i>, 4 projects, M1 - second year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid233">
            <p noindent="true">Master : Eric Totel, <i>Supervision of student project,</i> 1 project, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid234">
            <p noindent="true">Licence: Frédéric Tronel, <i>Software engineering</i>, 40 hours, L3 - first year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid235">
            <p noindent="true">Licence: Frédéric Tronel, <i>Operating Systems</i>, 12 hours, L3 - first year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid236">
            <p noindent="true">Master: Frédéric Tronel, <i>Operating systems</i>, 21 hours hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid237">
            <p noindent="true">Master: Frédéric Tronel, <i>Assembly Language</i>, 6 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid238">
            <p noindent="true">Master: Frédéric Tronel, <i>Buffer overflow vulnerabilities (theory and practice)</i>, 20.5 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid239">
            <p noindent="true">Master: Frédéric Tronel, <i>Firewall</i>, 15 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid240">
            <p noindent="true">Master: Frédéric Tronel, <i>Calculability in distributed systems</i>, 6 hours, M2, jointly with University of Rennes 1 and CentraleSupélec, France;</p>
          </li>
          <li id="uid241">
            <p noindent="true">Master: Frédéric Tronel, <i>Computer network</i>, 8 hours, M2, jointly with University of Rennes 1 and CentraleSupélec, France;</p>
          </li>
          <li id="uid242">
            <p noindent="true">Licence : Valérie Viet Triem Tong, <i>Algorithms and Data Structures</i>, 36 hours of lecture including 7 hours of lectures, L3 - first year of the engineering degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid243">
            <p noindent="true">Licence : Valérie Viet Triem Tong, <i>Supervision of student project</i>, 2 projects of 2nd year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid244">
            <p noindent="true">Master: Valérie Viet Triem Tong is responsible of the M2 degree in <i>CyberSecurity</i> (mastère spécialisé), organized jointly by CentraleSupélec and Institut Mines Télécom (IMT) Atlantique, France;</p>
          </li>
          <li id="uid245">
            <p noindent="true">Master : Valérie Viet Triem Tong, <i>Formal Methods</i>, 9 hours, M2 - third year of the engineering degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid246">
            <p noindent="true">Master : Valérie Viet Triem Tong, <i>Intrusion detection using information flow control</i>, 9 hours, M2 / third year of the engineering degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid247">
            <p noindent="true">Master : Valérie Viet Triem Tong, , <i>Compilers</i>, 18 hours, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid248">
            <p noindent="true">Master : Valérie Viet Triem Tong, <i>Supervision of student project</i>, 2 project, mastere CS (Cyber Security), CentraleSupélec, France;</p>
          </li>
          <li id="uid249">
            <p noindent="true">Master : Valérie Viet Triem Tong, <i>Supervision of student project,</i> 1 project, M2 - third year of the engineer degree, CentraleSupélec, France;</p>
          </li>
          <li id="uid250">
            <p noindent="true">Doctorant : Valérie Viet Triem Tong, <i>Malware analysis</i>, 6 hours, Research week, ENS Lyon, Lyon, France;</p>
          </li>
        </sanspuceslist>
      </subsection>
      <subsection id="uid251" level="2">
        <bodyTitle>Supervision</bodyTitle>
        <subsection id="uid252" level="3">
          <bodyTitle>Thesis defended in 2018</bodyTitle>
          <sanspuceslist>
            <li id="uid253">
              <p noindent="true">PhD: Thomas Letan, <i>Contribution à la sécurité des couches basses des systèmes d’information</i>, novembre 2018, supervised by Guillaume Hiet (50%), Pierre Chifflier (25% - ANSSI), and Ludovic Mé (25%);</p>
            </li>
            <li id="uid254">
              <p noindent="true">PhD: Oualid Koucham, <i>Détection d’intrusions pour les systèmes de contrôle industriels</i>, november 2018, supervised by Stéphane Mocanu (50% - Gipsa-lab), Guillaume Hiet (25%), and Jean-Marc Thiriet (25% - Gipsa-lab);</p>
            </li>
            <li id="uid255">
              <p noindent="true">PhD : Mourad Leslous, <i>Highlighting and executing Android suspicious execution path in Android malware</i>, 18th december 2018, supervised by Thomas Genet (20% - Celtique Inria project), Jean François Lalande (40% - INSA Centre Val de Loire), and Valérie Viet Triem Tong (40%);</p>
            </li>
            <li id="uid256">
              <p noindent="true">PhD : Yves Mocquard, <i>Population protocols</i>, december 2018, supervised by Bruno Sericola (Dyonisos Inria project) and Emmanuelle Anceaume;</p>
            </li>
            <li id="uid257">
              <p noindent="true">PhD : Razika Lounas, <i>Validation des spécifications formelles de la mise à jour dynamique des applications Java Card</i>, December 2018,
supervised by Jean-Louis Lanet (50%) and Mohamed Mezguiche (50%-Limose, Algerie)</p>
            </li>
            <li id="uid258">
              <p noindent="true">PhD : Abdelhak Mesbah, <i>Rétroconeption d'application Java Card</i>, November 2018, supervised by Jean-Louis Lanet (50%) and
Mohamed Mezguiche (50%-Limose, Algerie)</p>
            </li>
          </sanspuceslist>
        </subsection>
        <subsection id="uid259" level="3">
          <bodyTitle>Theses in progress</bodyTitle>
          <sanspuceslist>
            <li id="uid260">
              <p noindent="true">PhD in progress (previously in Tamis): Aurélien Palisse, <i>Detection and early mitigation of ransomware on Windows platforms</i>, started in 2015, supervised by Jean-Louis Lanet and Hélène Le Bouder (IMT Atlantique);</p>
            </li>
            <li id="uid261">
              <p noindent="true">PhD in progress (previously in Tamis): Kevin Bukasa, <i>Vulnerability analysis of a Secure Enclave in Embedded Devices</i>, started in 2016, supervised by Jean-Louis Lanet and Ronan Lashermes (SED Inria);</p>
            </li>
            <li id="uid262">
              <p noindent="true">PhD in progress (previously in Tamis): Leopold Ouairy, <i>Analyse des vulnérabilités dans des systèmes embarqués</i>, started in 2017, supervised by Jean-Louis Lanet;</p>
            </li>
            <li id="uid263">
              <p noindent="true">PhD in progress: Mathieu Escouteloup <i>Micro-architectures Sécurisées</i>, started in 2018, supervised by Jean-Louis Lanet and Jacques Fournier (CEA);</p>
            </li>
            <li id="uid264">
              <p noindent="true">PhD in progress: Damien Crémilleux, <i>Visualisation d’évènements de sécurité pour la supervision</i>, started in October 2015, supervised by Christophe Bidan (30%), Nicolas Prigent (35%), and Frédéric Majorczyk (35% - DGA MI);</p>
            </li>
            <li id="uid265">
              <p noindent="true">PhD in progress: Mounir Nasr Allah, <i>Contrôle de flux d’information par utilisation conjointe d’analyse statique et d’analyse dynamique accélérée matériellement</i>, started in November 2015, supervised by Guillaume Hiet (75%) and Ludovic Mé (25%);</p>
            </li>
            <li id="uid266">
              <p noindent="true">PhD in progress: Pernelle Mensah, <i>Adaptation de la Politique de Sécurité guidée par l’Évaluation du Risque dans les Infrastructures de Communication modernes</i>, started in January 2016, supervised by Eric Totel (25%), Guillaume Piolle (25%), Christine Morin (25% - Myriad Inria project), and Samuel Dubus (25% - Nokia);</p>
            </li>
            <li id="uid267">
              <p noindent="true">PhD in progress: David Lanoë, <i>Détection d’intrusion dans les applications distribuées : l’approche comportementale comme alternative à la corrélation d’alertes</i>, started in october 2016, supervised by Michel Hurfin (50%) and Eric Totel (50%);</p>
            </li>
            <li id="uid268">
              <p noindent="true">PhD in progress : Ronny Chevalier , <i>Enhanced computer platform security through an intrusion-detection approach</i>, started in November 2016, supervised by Guillaume Hiet (50%), Boris Balacheff (25% - HP), and Ludovic Mé (25%);</p>
            </li>
            <li id="uid269">
              <p noindent="true">PhD in progress: Laetitia Leichtnam, <i>Visualisation pour la caractérisation d’événements de sécurité</i>, started in october 2016, supervised by Eric Totel (40%), Nicolas Prigent (30%) and Ludovic Mé (30%);</p>
            </li>
            <li id="uid270">
              <p noindent="true">PhD in progress : Charles Xosanavongsa, <i>Combining Attack Specification and Dynamic Learning from traces for correlation rule generation</i>, started in december 2016, supervised by Eric Totel (50%) and Ludovic Mé (50%);</p>
            </li>
            <li id="uid271">
              <p noindent="true">PhD in progress : Pierre Graux, <i>Security of Hybrid Mobile Applications</i>, started in october 2017, supervised by Valérie Viet Triem Tong (50%) and Jean-Francçois Lalande (50%);</p>
            </li>
            <li id="uid272">
              <p noindent="true">PhD in progress : Vasile Cazacu, <i>Calcul distribué pour la fouille de données cliniques</i>, started February 2017, supervised by Emmanuelle Anceaume (50%) and Marc Cuggia (50%)</p>
            </li>
            <li id="uid273">
              <p noindent="true">PhD in progress : Aurélien Dupin, <i>Secure multi-partie computations</i>, started February 2016, supervised by Christophe Bidan(40%), David Pointchavalm (30% - ENS) and Renaud Dubois (30% - Thales).</p>
            </li>
            <li id="uid274">
              <p noindent="true">PhD in progress : Cedric Herzog, <i>Simulation d’environnement d’observation afin d’éviter le déploiement de malware sur une station de travail</i>, started in November
2018, supervised by Jean Louis Lanet (50%), Pierre Wilke (25%) and Valérie Viet Triem Tong (25%);</p>
            </li>
            <li id="uid275">
              <p noindent="true">PhD in progress : Benoit Fournier, <i>Secure routing in drone swarms</i>, started in november 2018, supervised by Gilles Guette (50%), Jean Louis Lanet (25%) and Valérie Viet Triem Tong (25%);</p>
            </li>
            <li id="uid276">
              <p noindent="true">PhD in progress : Aimad Berady, <i>Attacker characterization</i>, started in november 2018, supervised by Christophe Bidan (25%), Guillaume Carat (25%),Gilles Guette (25%), and Valérie Viet Triem Tong (25%);</p>
            </li>
            <li id="uid277">
              <p noindent="true">PhD in progress : Cyprien Gottstein, <i>Problématiques de stockage et d’interrogation de très grands graphes répartis dans le contexte de l’internet des objets</i>, started in october 2018, supervised by Michel Hurfin (50%) and Philippe Raipin Parvedy (50%);</p>
            </li>
          </sanspuceslist>
        </subsection>
        <subsection id="uid278" level="3">
          <bodyTitle>Supervision of external PhD candidates</bodyTitle>
          <sanspuceslist>
            <li id="uid279">
              <p noindent="true">LL. D. (Doctor of Laws) in progress: Gustav Malis, <i>Droit à l'effacement des données mises à disposition par les personnes elles-mêmes</i>, started in March 2014, supervised by Annie Blandin (80% - IODE) and Guillaume Piolle (20%);</p>
            </li>
            <li id="uid280">
              <p noindent="true">Ruta Moussaileb, in progress, <i>From Data Signature to Behavior Analysis</i> started January 2018, supervised by Nora Cuppens (50%-) and Jean-Louis Lanet (50%)</p>
            </li>
          </sanspuceslist>
        </subsection>
      </subsection>
      <subsection id="uid281" level="2">
        <bodyTitle>Juries</bodyTitle>
        <p>Valérie Viet Triem Tong has reported the following PhD thesis:</p>
        <sanspuceslist>
          <li id="uid282">
            <p noindent="true">Mickael Salaun, <i>Intégration de l’utilisateur au contrôle d’accès: du processus cloisonné
à l’interface homme-machine de confiance</i>, february 2018.</p>
          </li>
          <li id="uid283">
            <p noindent="true">Alicia Filipiak, <i>Design and formal analysis of security protocols, an application to electronic voting and mobile payment</i>, march 2018.</p>
          </li>
          <li id="uid284">
            <p noindent="true">Anaël Beaugnon, <i>Expert-in-the-Loop Supervised Learning for Computer Security Detection Systems</i>, june 2018.</p>
          </li>
          <li id="uid285">
            <p noindent="true">Steve Muller, <i>Risk Monitoring and Intrusion Detection for Industrial Control System</i>, june 2018</p>
          </li>
          <li id="uid286">
            <p noindent="true">Guilia De Santis, <i>Modeling and Recognizing Network Scanning Activities with Finite Mixture Models and Hidden Markov Models</i>, december 2018.</p>
          </li>
        </sanspuceslist>
        <p>Jean-Louis Lanet has reported the following PhD thesis:</p>
        <sanspuceslist>
          <li id="uid287">
            <p noindent="true">Mark Angoustures, December 2018, <i>Automatic malicious behaviors extraction usable in malware detection</i></p>
          </li>
          <li id="uid288">
            <p noindent="true">Damien Marion, December 2018 <i>Multidimensionality of the Models and the Data in the Side Channel Domain</i></p>
          </li>
        </sanspuceslist>
        <p>Guillaume Hiet was a member of the PhD committee for the following PhD thesis:</p>
        <sanspuceslist>
          <li id="uid289">
            <p noindent="true">Thomas Letan, <i>Specifying and Verifying Hardware-based Security Enforcement Mechanisms</i>, October 2018.</p>
          </li>
          <li id="uid290">
            <p noindent="true">Oualid Koucham, <i>Détection d'intrusions pour les systèmes de contrôle industriels</i>, November 2018.</p>
          </li>
          <li id="uid291">
            <p noindent="true">Muhammad Abdul WAHAB, <i>Support matériel pour l'analyse de sécurité du comportement des applications</i>, December 2018.</p>
          </li>
        </sanspuceslist>
        <p>Valérie Viet Triem Tong was a member of the PhD committee for the following PhD thesis:</p>
        <sanspuceslist>
          <li id="uid292">
            <p noindent="true">Guillaume Brogi, <i>Real-time detection of Advanced Persistent Threats using Information Flow Tracking and Hidden Markov Models</i>, february 2018.</p>
          </li>
          <li id="uid293">
            <p noindent="true">Mourad Leslous, <i>Highlighting and Executing Suspicious Paths in Android Malwar</i>, december 2018.</p>
          </li>
          <li id="uid294">
            <p noindent="true">Mark Angoustures, <i>Extraction automatique de caractéristiques malveillantes et méthode de détection de malware dans un environnement réel</i>, december 2018.</p>
          </li>
        </sanspuceslist>
        <p>Jean-François Lalande has reported the following PhD thesis:</p>
        <sanspuceslist>
          <li id="uid295">
            <p noindent="true">Guillaume Brogi, <i>Détection temps réel de Menaces Persistentes Avancées par Suivi de Flux d’Information et Modèles de Markov Cachés</i>, april 2018.</p>
          </li>
        </sanspuceslist>
        <p>Jean-François Lalande was a member of the PhD committee for the following PhD thesis:</p>
        <sanspuceslist>
          <li id="uid296">
            <p noindent="true">Mourad Leslous, <i>Highlighting and Executing Suspicious Paths in Android Malwar</i>, december 2018.</p>
          </li>
        </sanspuceslist>
        <p>Jean-Louis Lanet was a member of the PhD committee for the following PhD thesis:</p>
        <sanspuceslist>
          <li id="uid297">
            <p noindent="true">Khanh Huu The DAM, 2018, <i>Automatic Learning and Extraction of Malicious Behaviors</i></p>
          </li>
        </sanspuceslist>
        <p>Emmanuelle Anceaume was a member of the grading PhD committee of</p>
        <sanspuceslist>
          <li id="uid298">
            <p noindent="true">Ivan Walulya PhD thesis <i>On design and applicatins of practical concurrent data structures</i>, Chalmers University, Sweden, November 2018.</p>
          </li>
        </sanspuceslist>
        <p>Emmanuelle Anceaume was a member of the PhD committee of</p>
        <sanspuceslist>
          <li id="uid299">
            <p noindent="true">Yves Mocquard, <i>Analyse probabiliste de protocoles de population</i> December, 2018.</p>
          </li>
        </sanspuceslist>
        <p>Ludovic Mé was a member of the PhD committee for the following PhD committee of :</p>
        <sanspuceslist>
          <li id="uid300">
            <p noindent="true">Tan Ngoc Nguyen, <i>A Security Monitoring Plane for Information Centric Networking: application to Named Data Networking</i>, Université de Technologie de Troyes, 2018.</p>
          </li>
        </sanspuceslist>
      </subsection>
    </subsection>
    <subsection id="uid301" level="1">
      <bodyTitle>Popularization</bodyTitle>
      <subsection id="uid302" level="2">
        <bodyTitle>Articles and contents</bodyTitle>
        <simplelist>
          <li id="uid303">
            <p noindent="true">Emmanuelle Anceaume was interviewed by Jean-Michel Prima. This gave rise to an article: "Améliorer le Bitcoin ... à coup de fourches", Emergences Inria, 2018.</p>
          </li>
          <li id="uid304">
            <p noindent="true">Jean François Lalande and Valérie Viet Triem Tong were interviewed by Jean-Michel Prima. This gave rise to an article: "Disséquer automatiquement les malware sous Android", Emergences Inria, 2018.</p>
          </li>
          <li id="uid305">
            <p noindent="true">Emmanuelle Anceaume belonged to the working group “Blockchains challenges” organized by the french governmental group “France Strategie”. This gave rise to a report accessible here: <ref xlink:href="https://www.strategie.gouv.fr/sites/strategie.gouv.fr/files/atoms/files/fs-rapport-blockchain-21-juin-2018.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>www.<allowbreak/>strategie.<allowbreak/>gouv.<allowbreak/>fr/<allowbreak/>sites/<allowbreak/>strategie.<allowbreak/>gouv.<allowbreak/>fr/<allowbreak/>files/<allowbreak/>atoms/<allowbreak/>files/<allowbreak/>fs-rapport-blockchain-21-juin-2018.<allowbreak/>pdf</ref>.</p>
          </li>
        </simplelist>
      </subsection>
      <subsection id="uid306" level="2">
        <bodyTitle>Interventions</bodyTitle>
        <sanspuceslist>
          <li id="uid307">
            <p noindent="true"><b>Interviews, videos and podcasts</b> :</p>
            <sanspuceslist>
              <li id="uid308">
                <p noindent="true">Emmanuelle Anceaume was interviewed by Joanna Jongwane for a <ref xlink:href="https://interstices.info/le-potentiel-revolutionnaire-de-la-technologie-blockchain/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>interstices.<allowbreak/>info/<allowbreak/>le-potentiel-revolutionnaire-de-la-technologie-blockchain/</ref>podcast in online Interstice journal, 2018. (Talk is in french).</p>
              </li>
              <li id="uid309">
                <p noindent="true">Emmanuelle Anceaume was interviewed by the Parliamentary Office For Scientific and Technological Assessment (OPECST) in 2018. The OPECST acts as an intermediary between the political world and the world of research. The goal of this interview was to describe the Bitcoin cryptocurrency system and its associated blockchain, and to discuss on the different vulnerabilities Bitcoin is confronted with.</p>
              </li>
              <li id="uid310">
                <p noindent="true">Emmanuelle Anceaume was interviewed by the <i>mission d'information sur l'usage des blockchains</i>, by the French National Assembly in 2018.</p>
              </li>
            </sanspuceslist>
          </li>
          <li id="uid311">
            <p noindent="true"><b>Demos</b> :
Practical results concerning malware analysis issued from the Kharon project were presented during:</p>
            <sanspuceslist>
              <li id="uid312">
                <p noindent="true"><i>Forum International de la Cybersécurité </i> at Lille in 2018</p>
              </li>
              <li id="uid313">
                <p noindent="true"><i>Fête de la science</i> at Inria in 2018</p>
              </li>
            </sanspuceslist>
            <p>These works also regularly presented during the visits of the <i>Laboratoire Haute Sécurité</i> in the Inria Rennes Bretagne Atlantique center.</p>
          </li>
        </sanspuceslist>
      </subsection>
      <subsection id="uid314" level="2">
        <bodyTitle>Internal action</bodyTitle>
        <simplelist>
          <li id="uid315">
            <p noindent="true">Emmanuelle Anceaume was invited to join the internal meetings at La Cordée Rennes on “Blockchain focus: Cinéma: Quel potential d'innovation”, November the 8th, 2018.</p>
          </li>
        </simplelist>
      </subsection>
    </subsection>
  </diffusion>
  <biblio id="bibliography" html="bibliography" numero="10" titre="Bibliography">
    
    <biblStruct id="cidre-2018-bid15" type="book" rend="year" n="cite:kremer:hal-01993308">
      <identifiant type="hal" value="hal-01993308"/>
      <monogr x-scientific-popularization="no" x-international-audience="yes">
        <title level="m">Cybersecurity: Current challenges and Inria's research directions</title>
        <title level="s">Inria white book</title>
        <author>
          <persName key="pesto-2018-idp118208">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName key="cidre-2018-idp161712">
            <foreName>Ludovic</foreName>
            <surname>Mé</surname>
            <initial>L.</initial>
          </persName>
          <persName key="gallium-2018-idp141248">
            <foreName>Didier</foreName>
            <surname>Rémy</surname>
            <initial>D.</initial>
          </persName>
          <persName key="privatics-2018-idp119024">
            <foreName>Vincent</foreName>
            <surname>Roca</surname>
            <initial>V.</initial>
          </persName>
        </author>
        <imprint>
          <biblScope type="number">3</biblScope>
          <publisher>
            <orgName>Inria</orgName>
          </publisher>
          <dateStruct>
            <month>January</month>
            <year>2019</year>
          </dateStruct>
          <biblScope type="pages">172</biblScope>
          <ref xlink:href="https://hal.inria.fr/hal-01993308" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-01993308</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid17" type="phdthesis" rend="year" n="cite:letan:tel-01989940">
      <identifiant type="hal" value="tel-01989940"/>
      <monogr>
        <title level="m">Specifying and Verifying Hardware-based Security Enforcement Mechanisms</title>
        <author>
          <persName key="cidre-2018-idp239728">
            <foreName>Thomas</foreName>
            <surname>Letan</surname>
            <initial>T.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="school">CentraleSupélec</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2018</year>
          </dateStruct>
          <ref xlink:href="https://hal.inria.fr/tel-01989940" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>tel-01989940</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Theses</note>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid18" type="article" rend="year" n="cite:anceaume:hal-01827608">
      <identifiant type="hal" value="hal-01827608"/>
      <analytic>
        <title level="a">Le potentiel révolutionnaire de la technologie blockchain</title>
        <author>
          <persName key="cidre-2018-idp153488">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Joanna</foreName>
            <surname>Jongwane</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="yes" x-editorial-board="no" x-international-audience="no" id="rid01010">
        <title level="j">Interstices</title>
        <imprint>
          <dateStruct>
            <month>May</month>
            <year>2018</year>
          </dateStruct>
          <ref xlink:href="https://hal.inria.fr/hal-01827608" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-01827608</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid34" type="article" rend="year" n="cite:anceaume:hal-01888309">
      <identifiant type="hal" value="hal-01888309"/>
      <analytic>
        <title level="a">Améliorer le Bitcoin ... à coup de fourches</title>
        <author>
          <persName key="cidre-2018-idp153488">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Jean-Michel</foreName>
            <surname>Prima</surname>
            <initial>J.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-editorial-board="yes" x-international-audience="yes">
        <title level="j">Emergences Inria</title>
        <imprint>
          <dateStruct>
            <month>September</month>
            <year>2018</year>
          </dateStruct>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01888309" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01888309</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid23" type="article" rend="year" n="cite:mesbah:hal-01887577">
      <identifiant type="doi" value="10.1007/s10207-018-0401-9"/>
      <identifiant type="hal" value="hal-01887577"/>
      <analytic>
        <title level="a">Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM,</title>
        <author>
          <persName key="tamis-2018-idp217600">
            <foreName>Abdelhak</foreName>
            <surname>Mesbah</surname>
            <initial>A.</initial>
          </persName>
          <persName key="cidre-2018-idp158848">
            <foreName>Jean-Louis</foreName>
            <surname>Lanet</surname>
            <initial>J.-L.</initial>
          </persName>
          <persName>
            <foreName>Mohamed</foreName>
            <surname>Mezghiche</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-editorial-board="yes" x-international-audience="yes" id="rid00924">
        <idno type="issn">1615-5262</idno>
        <title level="j">International Journal of Information Security</title>
        <imprint>
          <dateStruct>
            <month>February</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-16</biblScope>
          <ref xlink:href="https://hal.inria.fr/hal-01887577" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-01887577</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid5" type="article" rend="year" n="cite:mocquard:hal-01888300">
      <identifiant type="doi" value="10.1287/xxxx.0000.0000"/>
      <identifiant type="hal" value="hal-01888300"/>
      <analytic>
        <title level="a">Probabilistic Analysis of Rumor Spreading Time</title>
        <author>
          <persName key="dionysos-2018-idp157808">
            <foreName>Y</foreName>
            <surname>Mocquard</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="dionysos-2018-idp126288">
            <foreName>B</foreName>
            <surname>Sericola</surname>
            <initial>B.</initial>
          </persName>
          <persName key="cidre-2018-idp153488">
            <foreName>E</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-editorial-board="yes" x-international-audience="yes" id="rid00788">
        <idno type="issn">1091-9856</idno>
        <title level="j">INFORMS Journal on Computing</title>
        <imprint>
          <dateStruct>
            <month>July</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-20</biblScope>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01888300" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01888300</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid37" type="article" rend="year" n="cite:wang:hal-02018168">
      <identifiant type="hal" value="hal-02018168"/>
      <analytic>
        <title level="a">An abstract stack based approach to verified compositional compilation to machine code</title>
        <author>
          <persName>
            <foreName>Yuting</foreName>
            <surname>Wang</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="cidre-2018-idp185952">
            <foreName>Pierre</foreName>
            <surname>Wilke</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Zhong</foreName>
            <surname>Shao</surname>
            <initial>Z.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-editorial-board="yes" x-international-audience="yes" id="rid03212">
        <idno type="issn">2475-1421</idno>
        <title level="j">Proceedings of the ACM on Programming Languages</title>
        <imprint>
          <biblScope type="volume">3</biblScope>
          <biblScope type="number">62</biblScope>
          <dateStruct>
            <month>January</month>
            <year>2019</year>
          </dateStruct>
          <biblScope type="pages">30</biblScope>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-02018168" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-02018168</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid1" type="inproceedings" rend="year" n="cite:abdulwahab:hal-01911619">
      <identifiant type="hal" value="hal-01911619"/>
      <analytic>
        <title level="a">A small and adaptive coprocessor for information flow tracking in ARM SoCs</title>
        <author>
          <persName>
            <foreName>Muhammad</foreName>
            <surname>Abdul Wahab</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Pascal</foreName>
            <surname>Cotret</surname>
            <initial>P.</initial>
          </persName>
          <persName key="cidre-2018-idp234848">
            <foreName>Mounir</foreName>
            <surname>Nasr Allah</surname>
            <initial>M.</initial>
          </persName>
          <persName key="cidre-2018-idp169904">
            <foreName>Guillaume</foreName>
            <surname>Hiet</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Arnab</foreName>
            <surname>Kumar Biswas</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Vianney</foreName>
            <surname>Lapotre</surname>
            <initial>V.</initial>
          </persName>
          <persName>
            <foreName>Gogniat</foreName>
            <surname>Guy</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">ReConFig 2018 - International Conference on Reconfigurable Computing and FPGAs</title>
        <loc>Cancun, Mexico</loc>
        <title level="s">Proceedings of the 2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig)</title>
        <imprint>
          <dateStruct>
            <month>December</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-17</biblScope>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01911619" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01911619</ref>
        </imprint>
        <meeting id="cid298118">
          <title>International Conference on ReConFigurable Computing and FPGAs</title>
          <num>2018</num>
          <abbr type="sigle">ReConFig</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid2" type="inproceedings" rend="year" n="cite:abdulwahab:hal-01911621">
      <identifiant type="hal" value="hal-01911621"/>
      <analytic>
        <title level="a">A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components</title>
        <author>
          <persName>
            <foreName>Muhammad</foreName>
            <surname>Abdul Wahab</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Pascal</foreName>
            <surname>Cotret</surname>
            <initial>P.</initial>
          </persName>
          <persName key="cidre-2018-idp234848">
            <foreName>Mounir</foreName>
            <surname>Nasr Allah</surname>
            <initial>M.</initial>
          </persName>
          <persName key="cidre-2018-idp169904">
            <foreName>Guillaume</foreName>
            <surname>Hiet</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Vianney</foreName>
            <surname>Lapotre</surname>
            <initial>V.</initial>
          </persName>
          <persName>
            <foreName>Gogniat</foreName>
            <surname>Guy</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Arnab</foreName>
            <surname>Kumar Biswas</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">AsianHOST 2018 - Asian Hardware Oriented Security and Trust Symposium</title>
        <loc>Hong Kong, China</loc>
        <title level="s">Proceedings of the 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)</title>
        <imprint>
          <dateStruct>
            <month>December</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-13</biblScope>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01911621" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01911621</ref>
        </imprint>
        <meeting id="cid626214">
          <title>Asian Hardware Oriented Security and Trust Symposium</title>
          <num>2018</num>
          <abbr type="sigle">AsianHOST</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid11" type="inproceedings" rend="year" n="cite:anceaume:hal-01888302">
      <identifiant type="hal" value="hal-01888302"/>
      <analytic>
        <title level="a">Sycomore, a Directed Acyclic Graph of Blocks</title>
        <author>
          <persName key="cidre-2018-idp153488">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="no" x-invited-conference="yes" x-editorial-board="yes">
        <title level="m">The International Industrial &amp; Academic Conference on Blockchain Technology - Chain-In</title>
        <loc>Porto, France</loc>
        <imprint>
          <dateStruct>
            <month>July</month>
            <year>2018</year>
          </dateStruct>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01888302" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01888302</ref>
        </imprint>
        <meeting id="cid626285">
          <title>International Industrial and Academic Conference on Blockchain Technology</title>
          <num>2018</num>
          <abbr type="sigle">Chain-In</abbr>
        </meeting>
      </monogr>
      <note type="bnote">Invited talk</note>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid4" type="inproceedings" rend="year" n="cite:anceaume:hal-01839930">
      <identifiant type="doi" value="10.1109/DSN-W.2018.00030"/>
      <identifiant type="hal" value="hal-01839930"/>
      <analytic>
        <title level="a">Finding Top-k Most Frequent Items in Distributed Streams in the Time-Sliding Window Model</title>
        <author>
          <persName key="cidre-2018-idp153488">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
          <persName key="dionysos-2018-idp132016">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="cidre-2018-idp200800">
            <foreName>Vasile</foreName>
            <surname>Cazacu</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks</title>
        <loc>Luxembourg, Luxembourg</loc>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <dateStruct>
            <month>June</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-2</biblScope>
          <ref xlink:href="https://hal-imt-atlantique.archives-ouvertes.fr/hal-01839930" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal-imt-atlantique.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01839930</ref>
        </imprint>
        <meeting id="cid31444">
          <title>Annual IEEE/IFIP International Conference on Dependable Systems and Networks</title>
          <num>48</num>
          <abbr type="sigle">DSN</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid32" type="inproceedings" rend="year" n="cite:anceaume:hal-01888298">
      <identifiant type="doi" value="10.1109/NCA.2018.8548097"/>
      <identifiant type="hal" value="hal-01888298"/>
      <analytic>
        <title level="a">On the Fly Detection of the Top-k Items in the Distributed Sliding Window Model</title>
        <author>
          <persName key="cidre-2018-idp153488">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
          <persName key="dionysos-2018-idp132016">
            <foreName>Yann</foreName>
            <surname>Busnel</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="cidre-2018-idp200800">
            <foreName>Vasile</foreName>
            <surname>Cazacu</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications</title>
        <loc>Boston, United States</loc>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <publisher>
            <orgName type="organisation">IEEE</orgName>
          </publisher>
          <dateStruct>
            <month>November</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-8</biblScope>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01888298" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01888298</ref>
        </imprint>
        <meeting id="cid405243">
          <title>IEEE International Symposium on Networking Computing and Applications</title>
          <num>17</num>
          <abbr type="sigle">NCA</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid21" type="inproceedings" rend="year" n="cite:anceaume:hal-01768190">
      <identifiant type="hal" value="hal-01768190"/>
      <analytic>
        <title level="a">UTXOs as a proof of membership for Byzantine Agreement based Cryptocurrencies</title>
        <author>
          <persName key="cidre-2018-idp153488">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
          <persName key="cidre-2018-idp249472">
            <foreName>Antoine</foreName>
            <surname>Guellier</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Romaric</foreName>
            <surname>Ludinard</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">IEEE Symposium on Recent Advances on Blockchain and Its Applications</title>
        <loc>Halifax, Canada</loc>
        <title level="s">Proceedings of the 2018 IEEE Confs on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics</title>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <dateStruct>
            <month>July</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-8</biblScope>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01768190" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01768190</ref>
        </imprint>
        <meeting id="cid626215">
          <title>IEEE International Symposium on Recent Advances on Blockchain and Its Applications</title>
          <num>2018</num>
          <abbr type="sigle">BlockchainApp</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid9" type="inproceedings" rend="year" n="cite:anceaume:hal-01888265">
      <identifiant type="doi" value="10.1109/NCA.2018.8548053"/>
      <identifiant type="hal" value="hal-01888265"/>
      <analytic>
        <title level="a">Sycomore : a Permissionless Distributed Ledger that self-adapts to Transactions Demand</title>
        <author>
          <persName key="cidre-2018-idp153488">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
          <persName key="cidre-2018-idp249472">
            <foreName>Antoine</foreName>
            <surname>Guellier</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Romaric</foreName>
            <surname>Ludinard</surname>
            <initial>R.</initial>
          </persName>
          <persName key="dionysos-2018-idp126288">
            <foreName>Bruno</foreName>
            <surname>Sericola</surname>
            <initial>B.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications</title>
        <loc>Boston, United States</loc>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <publisher>
            <orgName type="organisation">IEEE</orgName>
          </publisher>
          <dateStruct>
            <month>November</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-8</biblScope>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01888265" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01888265</ref>
        </imprint>
        <meeting id="cid405243">
          <title>IEEE International Symposium on Networking Computing and Applications</title>
          <num>17</num>
          <abbr type="sigle">NCA</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid26" type="inproceedings" rend="year" n="cite:bukasa:hal-01950931">
      <identifiant type="hal" value="hal-01950931"/>
      <analytic>
        <title level="a">When fault injection collides with hardware complexity</title>
        <author>
          <persName key="cidre-2018-idp198368">
            <foreName>Sebanjila</foreName>
            <surname>Bukasa</surname>
            <initial>S.</initial>
          </persName>
          <persName key="cidre-2018-idp188464">
            <foreName>Ludovic</foreName>
            <surname>Claudepierre</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Ronan</foreName>
            <surname>Lashermes</surname>
            <initial>R.</initial>
          </persName>
          <persName key="cidre-2018-idp158848">
            <foreName>Jean-Louis</foreName>
            <surname>Lanet</surname>
            <initial>J.-L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">FPS 2018 - 11th International Symposium on Foundations &amp; Practice of Security</title>
        <loc>Montréal, Canada</loc>
        <imprint>
          <dateStruct>
            <month>November</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-16</biblScope>
          <ref xlink:href="https://hal.inria.fr/hal-01950931" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-01950931</ref>
        </imprint>
        <meeting id="cid623692">
          <title>International Symposium on Foundations and Practice of Security</title>
          <num>11</num>
          <abbr type="sigle">FPS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid29" type="inproceedings" rend="year" n="cite:bukasa:hal-01950842">
      <identifiant type="doi" value="10.1145/3230833.3230842"/>
      <identifiant type="hal" value="hal-01950842"/>
      <analytic>
        <title level="a">Let's shock our IoT's heart: ARMv7-M under (fault) attacks</title>
        <author>
          <persName key="cidre-2018-idp198368">
            <foreName>Sebanjila Kevin</foreName>
            <surname>Bukasa</surname>
            <initial>S. K.</initial>
          </persName>
          <persName>
            <foreName>Ronan</foreName>
            <surname>Lashermes</surname>
            <initial>R.</initial>
          </persName>
          <persName key="cidre-2018-idp158848">
            <foreName>Jean-Louis</foreName>
            <surname>Lanet</surname>
            <initial>J.-L.</initial>
          </persName>
          <persName key="tamis-2018-idp110896">
            <foreName>Axel</foreName>
            <surname>Legay</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">ARES 2018 - 13th International Conference on Availability, Reliability and Security</title>
        <loc>Hambourg, Germany</loc>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <month>August</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-6</biblScope>
          <ref xlink:href="https://hal.inria.fr/hal-01950842" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-01950842</ref>
        </imprint>
        <meeting id="cid113094">
          <title>International Conference on Availability, Reliability and Security</title>
          <num>13</num>
          <abbr type="sigle">ARES</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid36" type="inproceedings" rend="year" n="cite:cremilleux:hal-01992346">
      <identifiant type="hal" value="hal-01992346"/>
      <analytic>
        <title level="a">Enhancing Collaboration between Security Analysts in Security Operations Centers</title>
        <author>
          <persName key="cidre-2018-idp205664">
            <foreName>Damien</foreName>
            <surname>Crémilleux</surname>
            <initial>D.</initial>
          </persName>
          <persName key="cidre-2018-idp164560">
            <foreName>Christophe</foreName>
            <surname>Bidan</surname>
            <initial>C.</initial>
          </persName>
          <persName key="cidre-2018-idp264368">
            <foreName>Frédéric</foreName>
            <surname>Majorczyk</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Nicolas</foreName>
            <surname>Prigent</surname>
            <initial>N.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <editor role="editor">
          <persName>
            <foreName>A.</foreName>
            <surname>Zemmari</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>M.</foreName>
            <surname>Mosbah</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Nora</foreName>
            <surname>Cuppens-Boulahia</surname>
            <initial>N.</initial>
          </persName>
          <persName>
            <foreName>F.</foreName>
            <surname>Cuppens</surname>
            <initial>F.</initial>
          </persName>
        </editor>
        <title level="m">CRISIS 2018 - 13th International Conference on Risks and Security of Internet and Systems</title>
        <loc>Arcachon, France</loc>
        <title level="s">Proceedings of the 13th International Conference on Risks and Security of Internet and Systems</title>
        <imprint>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-6</biblScope>
          <ref xlink:href="https://hal.inria.fr/hal-01992346" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-01992346</ref>
        </imprint>
        <meeting id="cid298939">
          <title>International Conference on Risks and Security of Internet and Systems</title>
          <num>13</num>
          <abbr type="sigle">CRISIS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid8" type="inproceedings" rend="year" n="cite:grandhomme:hal-01851409">
      <identifiant type="doi" value="10.1109/IWCMC.2018.8450393"/>
      <identifiant type="hal" value="hal-01851409"/>
      <analytic>
        <title level="a">Alternatives to Binary Routing Policies Applied to a Military MANET Coalition</title>
        <author>
          <persName>
            <foreName>Florian</foreName>
            <surname>Grandhomme</surname>
            <initial>F.</initial>
          </persName>
          <persName key="cidre-2018-idp167424">
            <foreName>Gilles</foreName>
            <surname>Guette</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Adlen</foreName>
            <surname>Ksentini</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Thierry</foreName>
            <surname>Plesse</surname>
            <initial>T.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">IWCMC 2018 - 14th International Wireless Communications &amp; Mobile Computing Conference</title>
        <loc>Limassol, Cyprus</loc>
        <title level="s">Proceedings of the 14th International Wireless Communications &amp; Mobile Computing Conference</title>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <dateStruct>
            <month>June</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-6</biblScope>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01851409" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01851409</ref>
        </imprint>
        <meeting id="cid320241">
          <title>International Wireless Communications and Mobile Computing Conference</title>
          <num>14</num>
          <abbr type="sigle">IWCMC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid19" type="inproceedings" rend="year" n="cite:graux:hal-01794252">
      <identifiant type="hal" value="hal-01794252"/>
      <analytic>
        <title level="a">Etat de l'Art des Techniques d'Unpacking pour les Applications Android</title>
        <author>
          <persName key="cidre-2018-idp217872">
            <foreName>Pierre</foreName>
            <surname>Graux</surname>
            <initial>P.</initial>
          </persName>
          <persName key="cidre-2018-idp172384">
            <foreName>Jean-François</foreName>
            <surname>Lalande</surname>
            <initial>J.-F.</initial>
          </persName>
          <persName key="cidre-2018-idp183072">
            <foreName>Valérie</foreName>
            <surname>Viet Triem Tong</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="no" x-proceedings="no" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information</title>
        <loc>Nancy / La Bresse, France</loc>
        <imprint>
          <dateStruct>
            <month>May</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-3</biblScope>
          <ref xlink:href="https://hal-centralesupelec.archives-ouvertes.fr/hal-01794252" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal-centralesupelec.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01794252</ref>
        </imprint>
        <meeting id="cid624974">
          <title>Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information</title>
          <num>2018</num>
          <abbr type="sigle">RESSI</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid0" type="inproceedings" rend="year" n="cite:koucham:hal-01877109">
      <identifiant type="hal" value="hal-01877109"/>
      <analytic>
        <title level="a">Efficient Mining of Temporal Safety Properties for Intrusion Detection in Industrial Control Systems</title>
        <author>
          <persName>
            <foreName>Oualid</foreName>
            <surname>Koucham</surname>
            <initial>O.</initial>
          </persName>
          <persName key="ctrl-a-2018-idp125856">
            <foreName>Stéphane</foreName>
            <surname>Mocanu</surname>
            <initial>S.</initial>
          </persName>
          <persName key="cidre-2018-idp169904">
            <foreName>Guillaume</foreName>
            <surname>Hiet</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Jean-Marc</foreName>
            <surname>Thiriet</surname>
            <initial>J.-M.</initial>
          </persName>
          <persName key="cidre-2018-idp264368">
            <foreName>Frédéric</foreName>
            <surname>Majorczyk</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">SAFEPROCESS 2018 - 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes</title>
        <loc>Warsaw, Poland</loc>
        <imprint>
          <dateStruct>
            <month>August</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-8</biblScope>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01877109" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01877109</ref>
        </imprint>
        <meeting id="cid98713">
          <title>IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes</title>
          <num>10</num>
          <abbr type="sigle">SafeProcess</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid12" type="inproceedings" rend="year" n="cite:lalande:hal-01906318">
      <identifiant type="hal" value="hal-01906318"/>
      <analytic>
        <title level="a">Android Malware Analysis: from technical difficulties to scientific challenges</title>
        <author>
          <persName key="cidre-2018-idp172384">
            <foreName>Jean-François</foreName>
            <surname>Lalande</surname>
            <initial>J.-F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="yes" x-editorial-board="no">
        <title level="m">SecITC 2018 - International Conference on Information Technology and Communications Security</title>
        <loc>Bucharest, Romania</loc>
        <title level="s">LNCS</title>
        <imprint>
          <dateStruct>
            <month>November</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-54</biblScope>
          <ref xlink:href="https://hal-centralesupelec.archives-ouvertes.fr/hal-01906318" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal-centralesupelec.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01906318</ref>
        </imprint>
        <meeting id="cid625521">
          <title>International Conference on Security for Information Technology and Communications</title>
          <num>2018</num>
          <abbr type="sigle">SecITC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid25" type="inproceedings" rend="year" n="cite:lalande:hal-01940652">
      <identifiant type="hal" value="hal-01940652"/>
      <analytic>
        <title level="a">Teaching Android Mobile Security</title>
        <author>
          <persName key="cidre-2018-idp172384">
            <foreName>Jean-François</foreName>
            <surname>Lalande</surname>
            <initial>J.-F.</initial>
          </persName>
          <persName key="cidre-2018-idp183072">
            <foreName>Valérie</foreName>
            <surname>Viet Triem Tong</surname>
            <initial>V.</initial>
          </persName>
          <persName key="cidre-2018-idp217872">
            <foreName>Pierre</foreName>
            <surname>Graux</surname>
            <initial>P.</initial>
          </persName>
          <persName key="cidre-2018-idp169904">
            <foreName>Guillaume</foreName>
            <surname>Hiet</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Wojciech</foreName>
            <surname>Mazurczyk</surname>
            <initial>W.</initial>
          </persName>
          <persName>
            <foreName>Habiba</foreName>
            <surname>Chaoui</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Pascal</foreName>
            <surname>Berthomé</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">50th ACM Technical Symposium on Computer Science Education</title>
        <loc>Minneapolis, United States</loc>
        <title level="s">Proceedings of the 50th ACM Technical Symposium on Computer Science Education</title>
        <imprint>
          <dateStruct>
            <month>March</month>
            <year>2019</year>
          </dateStruct>
          <ref xlink:href="https://hal-centralesupelec.archives-ouvertes.fr/hal-01940652" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal-centralesupelec.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01940652</ref>
        </imprint>
        <meeting id="cid626213">
          <title>ACM Technical Symposium on Computer Science Education</title>
          <num>50</num>
          <abbr type="sigle">SIGCSE</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid13" type="inproceedings" rend="year" n="cite:lalande:hal-01844312">
      <identifiant type="doi" value="10.1109/HPCS.2018.00173"/>
      <identifiant type="hal" value="hal-01844312"/>
      <analytic>
        <title level="a">Challenges for Reliable and Large Scale Evaluation of Android Malware Analysis</title>
        <author>
          <persName key="cidre-2018-idp172384">
            <foreName>Jean-François</foreName>
            <surname>Lalande</surname>
            <initial>J.-F.</initial>
          </persName>
          <persName key="cidre-2018-idp183072">
            <foreName>Valérie</foreName>
            <surname>Viet Triem Tong</surname>
            <initial>V.</initial>
          </persName>
          <persName key="cidre-2018-idp227632">
            <foreName>Mourad</foreName>
            <surname>Leslous</surname>
            <initial>M.</initial>
          </persName>
          <persName key="cidre-2018-idp217872">
            <foreName>Pierre</foreName>
            <surname>Graux</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="yes" x-editorial-board="no">
        <title level="m">SHPCS 2018 - International Workshop on Security and High Performance Computing Systems</title>
        <loc>Orléans, France</loc>
        <imprint>
          <publisher>
            <orgName>IEEE Computer Society</orgName>
          </publisher>
          <dateStruct>
            <month>July</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1068-1070</biblScope>
          <ref xlink:href="https://hal-centralesupelec.archives-ouvertes.fr/hal-01844312" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal-centralesupelec.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01844312</ref>
        </imprint>
        <meeting id="cid626211">
          <title>International Workshop on Security and High Performance Computing Systems</title>
          <num>13</num>
          <abbr type="sigle">SHPCS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid20" type="inproceedings" rend="year" n="cite:lalande:hal-01794223">
      <identifiant type="hal" value="hal-01794223"/>
      <analytic>
        <title level="a">Le projet CominLabs Kharon: aidons les malwares à s'exécuter</title>
        <author>
          <persName key="cidre-2018-idp172384">
            <foreName>Jean-François</foreName>
            <surname>Lalande</surname>
            <initial>J.-F.</initial>
          </persName>
          <persName key="cidre-2018-idp183072">
            <foreName>Valérie</foreName>
            <surname>Viet Triem Tong</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="no" x-proceedings="no" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information</title>
        <loc>Nancy / La Bresse, France</loc>
        <imprint>
          <dateStruct>
            <month>May</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1</biblScope>
          <ref xlink:href="https://hal-centralesupelec.archives-ouvertes.fr/hal-01794223" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal-centralesupelec.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01794223</ref>
        </imprint>
        <meeting id="cid624974">
          <title>Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information</title>
          <num>2018</num>
          <abbr type="sigle">RESSI</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid3" type="inproceedings" rend="year" n="cite:lanoe:hal-01949183">
      <identifiant type="hal" value="hal-01949183"/>
      <analytic>
        <title level="a">A Scalable and Efficient Correlation Engine to Detect Multi-step Attacks in Distributed Systems</title>
        <author>
          <persName key="cidre-2018-idp222736">
            <foreName>David</foreName>
            <surname>Lanoe</surname>
            <initial>D.</initial>
          </persName>
          <persName key="cidre-2018-idp155952">
            <foreName>Michel</foreName>
            <surname>Hurfin</surname>
            <initial>M.</initial>
          </persName>
          <persName key="cidre-2018-idp177728">
            <foreName>Eric</foreName>
            <surname>Totel</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">SRDS 2018 - 37th IEEE International Symposium on Reliable Distributed Systems</title>
        <loc>Salvador, Brazil</loc>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-10</biblScope>
          <ref xlink:href="https://hal.inria.fr/hal-01949183" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-01949183</ref>
        </imprint>
        <meeting id="cid90324">
          <title>IEEE International Symposium on Reliable Distributed Systems</title>
          <num>37</num>
          <abbr type="sigle">SRDS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid33" type="inproceedings" rend="year" n="cite:lebouder:hal-01894470">
      <identifiant type="doi" value="10.5220/0006841704980505"/>
      <identifiant type="hal" value="hal-01894470"/>
      <analytic>
        <title level="a">Theoretical security evaluation of the Human Semantic Authentication protocol</title>
        <author>
          <persName>
            <foreName>Hélène</foreName>
            <surname>Le Bouder</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Gaël</foreName>
            <surname>Thomas</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Edwin</foreName>
            <surname>Bourget</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Mariem</foreName>
            <surname>Graa</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Nora</foreName>
            <surname>Cuppens-Boulahia</surname>
            <initial>N.</initial>
          </persName>
          <persName key="cidre-2018-idp158848">
            <foreName>Jean-Louis</foreName>
            <surname>Lanet</surname>
            <initial>J.-L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">SECRYPT 2018 - 15th International Conference on Security and Cryptography</title>
        <loc>Porto, Portugal</loc>
        <title level="s">Proceedings of the 15th International Joint Conference on e-Business and Telecommunications</title>
        <imprint>
          <biblScope type="volume">1</biblScope>
          <dateStruct>
            <month>July</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">332-339</biblScope>
          <ref xlink:href="https://hal-imt-atlantique.archives-ouvertes.fr/hal-01894470" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal-imt-atlantique.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01894470</ref>
        </imprint>
        <meeting id="cid623598">
          <title>International Conference on Security and Cryptography</title>
          <num>15</num>
          <abbr type="sigle">SECRYPT</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid10" type="inproceedings" rend="year" n="cite:letan:hal-01799712">
      <identifiant type="doi" value="10.1007/978-3-319-95582-7_20"/>
      <identifiant type="hal" value="hal-01799712"/>
      <analytic>
        <title level="a">Modular Verification of Programs with Effects and Effect Handlers in Coq</title>
        <author>
          <persName key="cidre-2018-idp239728">
            <foreName>Thomas</foreName>
            <surname>Letan</surname>
            <initial>T.</initial>
          </persName>
          <persName key="pi.r2-2018-idp166944">
            <foreName>Yann</foreName>
            <surname>Régis-Gianas</surname>
            <initial>Y.</initial>
          </persName>
          <persName>
            <foreName>Pierre</foreName>
            <surname>Chifflier</surname>
            <initial>P.</initial>
          </persName>
          <persName key="cidre-2018-idp169904">
            <foreName>Guillaume</foreName>
            <surname>Hiet</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">FM 2018 - 22nd International Symposium on Formal Methods</title>
        <loc>Oxford, United Kingdom</loc>
        <title level="s">LNCS</title>
        <imprint>
          <biblScope type="volume">10951</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>July</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">338-354</biblScope>
          <ref xlink:href="https://hal.inria.fr/hal-01799712" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-01799712</ref>
        </imprint>
        <meeting id="cid314773">
          <title>International Symposium on Formal Methods</title>
          <num>22</num>
          <abbr type="sigle">FM</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid6" type="inproceedings" rend="year" n="cite:mocquard:hal-01888301">
      <identifiant type="hal" value="hal-01888301"/>
      <analytic>
        <title level="a">Balanced allocations and global clock in population protocols: An accurate analysis</title>
        <author>
          <persName key="dionysos-2018-idp157808">
            <foreName>Yves</foreName>
            <surname>Mocquard</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="dionysos-2018-idp126288">
            <foreName>Bruno</foreName>
            <surname>Sericola</surname>
            <initial>B.</initial>
          </persName>
          <persName key="cidre-2018-idp153488">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">SIROCCO 2018 - 25th International Colloquium on Structural Information and Communication Complexity</title>
        <loc>Ma'ale HaHamisha, Israel</loc>
        <imprint>
          <dateStruct>
            <month>June</month>
            <year>2018</year>
          </dateStruct>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01888301" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01888301</ref>
        </imprint>
        <meeting id="cid106365">
          <title>International Colloquium on Structural Information and Communication Complexity</title>
          <num>25</num>
          <abbr type="sigle">Sirocco</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid7" type="inproceedings" rend="year" n="cite:mocquard:hal-01849441">
      <identifiant type="doi" value="10.1109/NCA.2018.8548344"/>
      <identifiant type="hal" value="hal-01849441"/>
      <analytic>
        <title level="a">Population Protocols with Convergence Detection</title>
        <author>
          <persName key="dionysos-2018-idp157808">
            <foreName>Yves</foreName>
            <surname>Mocquard</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="dionysos-2018-idp126288">
            <foreName>Bruno</foreName>
            <surname>Sericola</surname>
            <initial>B.</initial>
          </persName>
          <persName key="cidre-2018-idp153488">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications (NCA)</title>
        <loc>Boston, United States</loc>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <dateStruct>
            <month>November</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-8</biblScope>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01849441" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01849441</ref>
        </imprint>
        <meeting id="cid405243">
          <title>IEEE International Symposium on Networking Computing and Applications</title>
          <num>17</num>
          <abbr type="sigle">NCA</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid22" type="inproceedings" rend="year" n="cite:moussaileb:hal-01894500">
      <identifiant type="doi" value="10.1145/3230833.3234691"/>
      <identifiant type="hal" value="hal-01894500"/>
      <analytic>
        <title level="a">Ransomware's Early Mitigation Mechanisms</title>
        <author>
          <persName>
            <foreName>Routa</foreName>
            <surname>Moussaileb</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Benjamin</foreName>
            <surname>Bouget</surname>
            <initial>B.</initial>
          </persName>
          <persName key="cidre-2018-idp242176">
            <foreName>Aurélien</foreName>
            <surname>Palisse</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Hélène</foreName>
            <surname>Le Bouder</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Nora</foreName>
            <surname>Cuppens-Boulahia</surname>
            <initial>N.</initial>
          </persName>
          <persName key="cidre-2018-idp158848">
            <foreName>Jean-Louis</foreName>
            <surname>Lanet</surname>
            <initial>J.-L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">ARES 2018 - 13th International Conference on Availability, Reliability and Security</title>
        <loc>Hambourg, Germany</loc>
        <title level="s">Proceedings of the 13th International Conference on Availability, Reliability and Security</title>
        <imprint>
          <dateStruct>
            <month>August</month>
            <year>2018</year>
          </dateStruct>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01894500" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01894500</ref>
        </imprint>
        <meeting id="cid113094">
          <title>International Conference on Availability, Reliability and Security</title>
          <num>13</num>
          <abbr type="sigle">ARES</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid30" type="inproceedings" rend="year" n="cite:ouairy:hal-01976747">
      <identifiant type="hal" value="hal-01976747"/>
      <analytic>
        <title level="a">Normalization of Java source codes</title>
        <author>
          <persName key="cidre-2018-idp237296">
            <foreName>Léopold</foreName>
            <surname>Ouairy</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Hélène</foreName>
            <surname>Le Bouder</surname>
            <initial>H.</initial>
          </persName>
          <persName key="cidre-2018-idp158848">
            <foreName>Jean-Louis</foreName>
            <surname>Lanet</surname>
            <initial>J.-L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">SECITC 2018 - 11th International Conference on Security for Information Technology and Communications</title>
        <loc>Bucarest, Romania</loc>
        <imprint>
          <dateStruct>
            <month>November</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-11</biblScope>
          <ref xlink:href="https://hal.inria.fr/hal-01976747" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-01976747</ref>
        </imprint>
        <meeting id="cid625521">
          <title>International Conference on Security for Information Technology and Communications</title>
          <num>2018</num>
          <abbr type="sigle">SecITC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid27" type="inproceedings" rend="year" n="cite:ouairy:hal-01976753">
      <identifiant type="hal" value="hal-01976753"/>
      <analytic>
        <title level="a">Protection of systems against fuzzing attacks</title>
        <author>
          <persName key="cidre-2018-idp237296">
            <foreName>Léopold</foreName>
            <surname>Ouairy</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Hélène</foreName>
            <surname>Le Bouder</surname>
            <initial>H.</initial>
          </persName>
          <persName key="cidre-2018-idp158848">
            <foreName>Jean-Louis</foreName>
            <surname>Lanet</surname>
            <initial>J.-L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">FPS 2018 - 11th International Symposium on Foundations &amp; Practice of Security</title>
        <loc>Montréal, Canada</loc>
        <imprint>
          <dateStruct>
            <month>November</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-16</biblScope>
          <ref xlink:href="https://hal.inria.fr/hal-01976753" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-01976753</ref>
        </imprint>
        <meeting id="cid623692">
          <title>International Symposium on Foundations and Practice of Security</title>
          <num>11</num>
          <abbr type="sigle">FPS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid28" type="inproceedings" rend="year" n="cite:ouairy:hal-01950822">
      <identifiant type="hal" value="hal-01950822"/>
      <analytic>
        <title level="a">Protection of systems against fuzzing attacks</title>
        <author>
          <persName key="cidre-2018-idp237296">
            <foreName>Léopold</foreName>
            <surname>Ouairy</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Hélène</foreName>
            <surname>Le Bouder</surname>
            <initial>H.</initial>
          </persName>
          <persName key="cidre-2018-idp158848">
            <foreName>Jean-Louis</foreName>
            <surname>Lanet</surname>
            <initial>J.-L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="yes" x-invited-conference="no" x-editorial-board="yes">
        <title level="m">2018 - European Cyber Week</title>
        <loc>Rennes, France</loc>
        <imprint>
          <dateStruct>
            <month>November</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-16</biblScope>
          <ref xlink:href="https://hal.inria.fr/hal-01950822" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-01950822</ref>
        </imprint>
        <meeting id="cid626212">
          <title>European Cyber Week</title>
          <num>3</num>
          <abbr type="sigle">ECW</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid16" type="inproceedings" rend="year" n="cite:piolle:hal-01988306">
      <identifiant type="hal" value="hal-01988306"/>
      <analytic>
        <title level="a">The robustness of security and privacy properties in decentralized applications</title>
        <author>
          <persName key="cidre-2018-idp175248">
            <foreName>Guillaume</foreName>
            <surname>Piolle</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-scientific-popularization="no" x-international-audience="yes" x-proceedings="no" x-invited-conference="yes" x-editorial-board="yes">
        <title level="m">Surveillance, Resilience &amp; Privacy Conference 2018</title>
        <loc>Paris, France</loc>
        <imprint>
          <dateStruct>
            <month>December</month>
            <year>2018</year>
          </dateStruct>
          <ref xlink:href="https://hal.inria.fr/hal-01988306" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-01988306</ref>
        </imprint>
        <meeting id="cid626210">
          <title>Surveillance, Resilience and Privacy Conference</title>
          <num>2018</num>
          <abbr type="sigle"/>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid14" type="techreport" rend="year" n="cite:anceaume:hal-01718480">
      <identifiant type="hal" value="hal-01718480"/>
      <monogr>
        <title level="m">Blockchain Abstract Data Type</title>
        <author>
          <persName key="cidre-2018-idp153488">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Antonella Del</foreName>
            <surname>Pozzo</surname>
            <initial>A. D.</initial>
          </persName>
          <persName>
            <foreName>Romaric</foreName>
            <surname>Ludinard</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Maria</foreName>
            <surname>Potop-Butucaru</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Sara</foreName>
            <surname>Tucci-Piergiovanni</surname>
            <initial>S.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">Sorbonne Université, CNRS, Laboratoire d'Informatique de Paris 6, LIP6, Paris, France</orgName>
          </publisher>
          <dateStruct>
            <month>February</month>
            <year>2018</year>
          </dateStruct>
          <biblScope type="pages">1-30</biblScope>
          <ref xlink:href="https://hal.sorbonne-universite.fr/hal-01718480" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>sorbonne-universite.<allowbreak/>fr/<allowbreak/>hal-01718480</ref>
        </imprint>
      </monogr>
      <note type="bnote">
        <ref xlink:href="https://arxiv.org/abs/1802.09877" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>arxiv.<allowbreak/>org/<allowbreak/>abs/<allowbreak/>1802.<allowbreak/>09877</ref>
      </note>
      <note type="typdoc">Research Report</note>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid35" type="misc" rend="year" n="cite:anceaume:hal-01923502">
      <identifiant type="hal" value="hal-01923502"/>
      <monogr x-scientific-popularization="yes">
        <title level="m">Les enjeux des blockchains</title>
        <author>
          <persName key="cidre-2018-idp153488">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>June</month>
            <year>2018</year>
          </dateStruct>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01923502" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01923502</ref>
        </imprint>
      </monogr>
      <note type="bnote">Rapport du groupe de travail sur les enjeux de la blockchain. Accessible: https://www.strategie.gouv.fr/sites/strategie.gouv.fr/files/atoms/files/fs-rapport-blockchain-21-juin-2018.pdf</note>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid24" type="misc" rend="year" n="cite:anceaume:hal-01988364">
      <identifiant type="doi" value="10.1145/3293883.3303705"/>
      <identifiant type="hal" value="hal-01988364"/>
      <monogr x-scientific-popularization="no" x-editorial-board="yes" x-international-audience="yes" x-proceedings="no" x-invited-conference="no">
        <title level="m">POSTER: Blockchain Abstract Data Type</title>
        <author>
          <persName key="cidre-2018-idp153488">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Antonella Del</foreName>
            <surname>Pozzo</surname>
            <initial>A. D.</initial>
          </persName>
          <persName>
            <foreName>Romaric</foreName>
            <surname>Ludinard</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Maria</foreName>
            <surname>Potop-Butucaru</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Sara</foreName>
            <surname>Tucci-Piergiovanni</surname>
            <initial>S.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>February</month>
            <year>2019</year>
          </dateStruct>
          <biblScope type="pages">1-2</biblScope>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01988364" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01988364</ref>
        </imprint>
      </monogr>
      <note type="howpublished">PPoPP 2019 - 24th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming</note>
      <note type="bnote">Poster</note>
    </biblStruct>
    
    <biblStruct id="cidre-2018-bid31" type="unpublished" rend="year" n="cite:mocquard:hal-01790973">
      <identifiant type="hal" value="hal-01790973"/>
      <monogr>
        <title level="m">Balanced allocations and global clock in population protocols: An accurate analysis (Full version)</title>
        <author>
          <persName key="dionysos-2018-idp157808">
            <foreName>Yves</foreName>
            <surname>Mocquard</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="dionysos-2018-idp126288">
            <foreName>Bruno</foreName>
            <surname>Sericola</surname>
            <initial>B.</initial>
          </persName>
          <persName key="cidre-2018-idp153488">
            <foreName>Emmanuelle</foreName>
            <surname>Anceaume</surname>
            <initial>E.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>May</month>
            <year>2018</year>
          </dateStruct>
          <ref xlink:href="https://hal.archives-ouvertes.fr/hal-01790973" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>hal.<allowbreak/>archives-ouvertes.<allowbreak/>fr/<allowbreak/>hal-01790973</ref>
        </imprint>
      </monogr>
      <note type="bnote">working paper or preprint</note>
    </biblStruct>
  </biblio>
</raweb>
