Team, Visitors, External Collaborators
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Articles in International Peer-Reviewed Journals

  • 1F. Biondi, M. A. Enescu, T. Given-Wilson, A. Legay, L. Noureddine, V. Verma.
    Effective, Efficient, and Robust Packing Detection and Classification, in: Computers and Security, 2018, pp. 1-15.
    https://hal.inria.fr/hal-01967597
  • 2J. Duchene, C. Le Guernic, E. Alata, V. Nicomette, M. Kaâniche.
    State of the art of network protocol reverse engineering tools, in: Journal of Computer Virology and Hacking Techniques, February 2018, vol. 14, no 1, pp. 53-68. [ DOI : 10.1007/s11416-016-0289-8 ]
    https://hal.inria.fr/hal-01496958
  • 3J. L. Fiadeiro, A. Lopes, B. Delahaye, A. Legay.
    Dynamic networks of heterogeneous timed machines, in: Mathematical Structures in Computer Science, June 2018, vol. 28, no 06, pp. 800 - 855. [ DOI : 10.1017/S0960129517000135 ]
    https://hal.archives-ouvertes.fr/hal-01917079
  • 4T. Given-Wilson, A. Heuser, N. Jafri, A. Legay.
    An automated and scalable formal process for detecting fault injection vulnerabilities in binaries, in: Concurrency and Computation: Practice and Experience, September 2018, pp. 1-12. [ DOI : 10.1002/cpe.4794 ]
    https://hal.inria.fr/hal-01960940
  • 5T. Given-Wilson, A. Legay.
    On the Expressiveness of Joining and Splitting, in: Journal in honour of Bernhard Steffen's 60th, November 2018.
    https://hal.inria.fr/hal-01955922
  • 6T. Given-Wilson, A. Legay, S. Sedwards, O. Zendra.
    Group Abstraction for Assisted Navigation of Social Activities in Intelligent Environments, in: Journal of Reliable Intelligent Environments, May 2018, vol. 4, no 2, pp. 107–120. [ DOI : 10.1007/s40860-018-0058-1 ]
    https://hal.inria.fr/hal-01629137
  • 7A. Nouri, B. L. Mediouni, M. Bozga, J. Combaz, S. Bensalem, A. Legay.
    Performance Evaluation of Stochastic Real-Time Systems with the SBIP Framework, in: International Journal of Critical Computer-Based Systems, 2018, pp. 1-33.
    https://hal.archives-ouvertes.fr/hal-01898426
  • 8S. Picek, A. Heuser, A. Jovic, S. Bhasin, F. Regazzoni.
    The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations, in: IACR Transactions on Cryptographic Hardware and Embedded Systems, November 2018, vol. 2019, no 1, pp. 1-29. [ DOI : 10.13154/tches.v2019.i1.209-237 ]
    https://hal.inria.fr/hal-01935318
  • 9È. de Chèrisey, S. Guilley, A. Heuser, O. Rioul.
    On the optimality and practicability of mutual information analysis in some scenarios, in: Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , January 2018, vol. 10, no 1, pp. 101 - 121. [ DOI : 10.1007/s12095-017-0241-x ]
    https://hal.inria.fr/hal-01935303

International Conferences with Proceedings

  • 10S. Arora, A. Legay, T. Richmond, L.-M. Traonouez.
    Statistical Model Checking of Incomplete Stochastic Systems, in: ISoLA 2018 - International Symposium on Leveraging Applications of Formal Methods, Limassol, Cyprus, LNCS, Springer, November 2018, vol. 11245, pp. 354-371. [ DOI : 10.1007/978-3-030-03421-4_23 ]
    https://hal.inria.fr/hal-02011309
  • 11F. Biondi, T. Given-Wilson, A. Legay, C. Puodzius, J. Quilbeuf.
    Tutorial: an Overview of Malware Detection and Evasion Techniques, in: ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, Limassol, Cyprus, October 2018, pp. 1-23.
    https://hal.inria.fr/hal-01964222
  • 12S. K. Bukasa, R. Lashermes, J.-L. Lanet, A. Legay.
    Let's shock our IoT's heart: ARMv7-M under (fault) attacks, in: ARES 2018 - 13th International Conference on Availability, Reliability and Security, Hambourg, Germany, ACM Press, August 2018, pp. 1-6. [ DOI : 10.1145/3230833.3230842 ]
    https://hal.inria.fr/hal-01950842
  • 13V. Dragoi, T. Richmond, D. Bucerzan, A. Legay.
    Survey on cryptanalysis of code-based cryptography: From theoretical to physical attacks, in: ICCCC 2018 - 7th International Conference on Computers Communications and Control, Oradea, Romania, IEEE, May 2018, pp. 215-223. [ DOI : 10.1109/ICCCC.2018.8390461 ]
    https://hal.inria.fr/hal-02011334
  • 14K. Drira, F. Oquendo, A. Legay, T. Batista.
    Editorial Message Track on Software-intensive Systems-of-Systems (SiSoS) of the 33rd ACM/SIGAPP Symposium On Applied Computing (SAC 2018), in: SAC 2018 - The 33rd ACM/SIGAPP Symposium On Applied Computing, Pau, France, April 2018, pp. 1-3.
    https://hal.laas.fr/hal-01666389
  • 15J. Duchene, E. Alata, V. Nicomette, M. Kaâniche, C. Le Guernic.
    Specification-Based Protocol Obfuscation, in: DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg City, Luxembourg, IEEE, June 2018, pp. 1-12, https://arxiv.org/abs/1807.09464. [ DOI : 10.1109/DSN.2018.00056 ]
    https://hal.inria.fr/hal-01848573
  • 16S. Picek, A. Heuser, A. Jovic, K. Knezevic, T. Richmond.
    Improving Side-Channel Analysis through Semi-Supervised Learning, in: 17th Smart Card Research and Advanced Application Conference (CARDIS 2018), Montpellier, France, November 2018.
    https://hal.inria.fr/hal-02011351
  • 17S. Picek, I. P. Samiotis, A. Heuser, J. Kim, S. Bhasin, A. Legay.
    On the Performance of Convolutional Neural Networks for Side-channel Analysis, in: SPACE 2018 - International Conference on Security, Privacy, and Applied Cryptography Engineering, Kanpur, India, LNCS, Springer, December 2018, vol. 11348, pp. 157-176.
    https://hal.inria.fr/hal-02010591
  • 18S. Sebastio, R. Ghosh, A. Gupta, T. Mukherjee.
    ContAv: a Tool to Assess Availability of Container-Based Systems, in: SOCA 2018 - 11th IEEE International Conference on Service Oriented Computing and Applications, Paris, France, November 2018, pp. 1-8.
    https://hal.inria.fr/hal-01954455

National Conferences with Proceedings

  • 19C. Le Guernic, F. Khourbiga.
    Taint-Based Return Oriented Programming, in: SSTIC 2018 - Symposium sur la sécurité des technologies de l'information et des communications, Rennes, France, June 2018, pp. 1-30.
    https://hal.inria.fr/hal-01848575

Conferences without Proceedings

  • 20D. Beaulaton, N. Ben Said, I. Cristescu, R. Fleurquin, A. Legay, J. Quilbeuf, S. Sadou.
    A Language for Analyzing Security of IOT Systems, in: SoSE 2018 - 13th Annual Conference on System of Systems Engineering, Paris, France, IEEE, June 2018, pp. 37-44. [ DOI : 10.1109/SYSOSE.2018.8428704 ]
    https://hal.inria.fr/hal-01960860
  • 21B. L. Mediouni, A. Nouri, M. Bozga, M. Dellabani, A. Legay, S. Bensalem.
    SBIP 2.0: Statistical Model Checking Stochastic Real-time Systems, in: ATVA 2018 - 16th International Symposium Automated Technology for Verification and Analysis, Los Angeles, CA, United States, October 2018, pp. 1-6.
    https://hal.archives-ouvertes.fr/hal-01888538
  • 22J. Quilbeuf, M. Barbier, L. Rummelhard, C. Laugier, A. Legay, B. Baudouin, T. Genevois, J. Ibañez-Guzmán, O. Simonin.
    Statistical Model Checking Applied on Perception and Decision-making Systems for Autonomous Driving, in: PPNIV 2018 - 10th Workshop on Planning, Perception and Navigation for Intelligent Vehicles, Madrid, Spain, October 2018, pp. 1-8.
    https://hal.inria.fr/hal-01888556

Scientific Books (or Scientific Book chapters)

  • 23D. Beaulaton, I. Cristescu, A. Legay, J. Quilbeuf.
    A Modeling Language for Security Threats of IoT Systems, in: Formal Methods for Industrial Critical Systems - 23rd International Conference, FMICS 2018, LNCS, Springer, August 2018, vol. 11119, pp. 258-268. [ DOI : 10.1007/978-3-030-00244-2_17 ]
    https://hal.inria.fr/hal-01962080
  • 24T. Given-Wilson, N. Jafri, A. Legay.
    The State of Fault Injection Vulnerability Detection, in: Verification and Evaluation of Computer and Communication Systems, August 2018, pp. 3-21. [ DOI : 10.1007/978-3-030-00359-3_1 ]
    https://hal.inria.fr/hal-01960915

Books or Proceedings Editing

  • 25N. CUPPENS-BOULAHIA, F. Cuppens, J.-L. Lanet, A. Legay, J. Garcia-Alfaro (editors)
    Risks and security of internet and systems : 12th international conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, revised selected papers, Lecture Notes in Computer Science, Springer, 2018, vol. 10694, 269 p.
    https://hal.archives-ouvertes.fr/hal-01865019

Scientific Popularization

Other Publications

  • 27C. Aubert, I. Cristescu.
    History-Preserving Bisimulations on Reversible Calculus of Communicating Systems, April 2018, https://arxiv.org/abs/1804.10355 - working paper or preprint.
    https://hal.archives-ouvertes.fr/hal-01778656
  • 28E. Baranov, F. Biondi, O. Decourbe, T. Given-Wilson, A. Legay, C. Puodzius, J. Quilbeuf, S. Sebastio.
    Efficient Extraction of Malware Signatures Through System Calls and Symbolic Execution: An Experience Report, December 2018, working paper or preprint. [ DOI : 10.1145/nnnnnnn.nnnnnnn ]
    https://hal.inria.fr/hal-01954483
  • 29D. Beaulaton, N. Ben Said, I. Cristescu, A. Legay, J. Quilbeuf.
    Security Enforcement in IoT Systems using Attack Trees, December 2018, working paper or preprint.
    https://hal.inria.fr/hal-01962089
  • 30F. Biondi, T. Given-Wilson, A. Legay.
    Universal Optimality of Apollonian Cell Encoders, February 2018, working paper or preprint.
    https://hal.inria.fr/hal-01571226
  • 31F. Biondi, Y. Kawamoto, A. Legay, L.-M. Traonouez.
    Hybrid Statistical Estimation of Mutual Information and its Application to Information Flow, September 2018, working paper or preprint.
    https://hal.inria.fr/hal-01629033
  • 32T. Given-Wilson, N. Jafri, A. Legay.
    Bridging Software-Based and Hardware-Based Fault Injection Vulnerability Detection, December 2018, working paper or preprint.
    https://hal.inria.fr/hal-01961008
  • 33J. Kim, S. Picek, A. Heuser, S. Bhasin, A. Hanjalic.
    Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis, February 2019, working paper or preprint.
    https://hal.inria.fr/hal-02010599
  • 34T. Ninet, A. Legay, R. Maillard, L.-M. Traonouez, O. Zendra.
    The Deviation Attack: A Novel Denial-of-Service Attack Against IKEv2, 2018, working paper or preprint.
    https://hal.inria.fr/hal-01980276
  • 35S. Picek, A. Heuser, C. Alippi, F. Regazzoni.
    When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis, February 2019, working paper or preprint.
    https://hal.inria.fr/hal-02010603
References in notes
  • 36T. Given-Wilson, A. Heuser, N. Jafri, J.-L. Lanet, A. Legay.
    An Automated and Scalable Formal Process for Detecting Fault Injection Vulnerabilities in Binaries, November 2017, working paper or preprint.
    https://hal.inria.fr/hal-01629135
  • 37T. Given-Wilson, N. Jafri, J.-L. Lanet, A. Legay.
    An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT – Extended Version, April 2017, working paper or preprint.
    https://hal.inria.fr/hal-01400283
  • 38T. Given-Wilson, N. Jafri, J.-L. Lanet, A. Legay.
    An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT, in: 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 2017, pp. 293 - 300. [ DOI : 10.1109/Trustcom/BigDataSE/ICESS.2017.250 ]
    https://hal.inria.fr/hal-01629098
  • 39A. Savary, M. Frappier, M. Leuschel, J. Lanet.
    Model-Based Robustness Testing in Event-B Using Mutation, in: Software Engineering and Formal Methods - 13th International Conference, SEFM 2015, York, UK, September 7-11, 2015. Proceedings, R. Calinescu, B. Rumpe (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9276, pp. 132–147.
    http://dx.doi.org/10.1007/978-3-319-22969-0_10