EN FR
EN FR


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 4E. Anceaume, Y. Busnel, E. Schulte-Geers, B. Sericola.

    Optimization Results for a Generalized Coupon Collector Problem, in: Journal of Applied Probability, 2016, vol. 53, no 2.

    https://hal.inria.fr/hal-01397403
  • 5L. Caviglione, M. Gaggero, J.-F. Lalande, W. Mazurczyk, M. Urbanski.

    Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence, in: IEEE Transactions on Information Forensics and Security, April 2016, vol. 11, no 4, pp. 799-810. [ DOI : 10.1109/TIFS.2015.2510825 ]

    https://hal.archives-ouvertes.fr/hal-01247495

Invited Conferences

  • 6E. Totel, M. Hkimi, M. Hurfin, M. Leslous, Y. Labiche.

    Anomaly Based Intrusion Detection in Distributed Applications without global clock, in: SEC2 2016 - Deuxième atelier sur la Sécurité dans les Clouds, Lorient, France, July 2016.

    https://hal.inria.fr/hal-01334608

International Conferences with Proceedings

  • 7M. Abdul Wahab, P. Cotret, M. Nasr Allah, G. Hiet, V. Lapotre, G. Gogniat.

    Towards a hardware-assisted information flow tracking ecosystem for ARM processors, in: 26th International Conference on Field-Programmable Logic and Applications (FPL 2016), Lausanne, Switzerland, August 2016.

    https://hal.archives-ouvertes.fr/hal-01337579
  • 8E. Anceaume, Y. Busnel, N. Rivetti, B. Sericola.

    Identifier des icebergs parmi des flux de données distribués, in: ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Bayonne, France, ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2016.

    https://hal.archives-ouvertes.fr/hal-01303873
  • 9E. Anceaume, T. Lajoie-Mazenc, R. Ludinard, B. Sericola.

    Safety Analysis of Bitcoin Improvement Proposals, in: IEEE Symposium on Network Computing and Applications, Boston, United States, IEEE, October 2016.

    https://hal.archives-ouvertes.fr/hal-01397685
  • 10E. Anceaume, R. Ludinard, B. Sericola.

    L'empire romain ne doit pas être géré comme une petite île grecque, in: ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Bayonne, France, May 2016.

    https://hal.archives-ouvertes.fr/hal-01305334
  • 11G. Brogi, V. Viet Triem Tong.

    TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking, in: 8th IFIP International Conference on New Technologies, Mobility and Security, Larnaca , Cyprus, November 2016.

    https://hal.inria.fr/hal-01417612
  • 12D. Crémilleux, C. Bidan, F. Majorczyk, N. Prigent.

    VEGAS: Visualizing, exploring and grouping alerts, in: IEEE/IFIP International Workshop on Analytics for Network and Service Management, Istanbul, Turkey, April 2016, pp. 1097 - 1100. [ DOI : 10.1109/NOMS.2016.7502968 ]

    https://hal.archives-ouvertes.fr/hal-01416464
  • 13W. De Groef, D. Subramanian, J. Martin, F. Piessens, D. Lieven.

    Ensuring Endpoint Authenticity in WebRTC Peer-to-Peer Communication, in: 31st Annual ACM Symposium on Applied Computing (SAC 2016), New York, United States, April 2016.

    https://hal.inria.fr/hal-01344572
  • 14F. Grandhomme, G. Guette, A. Ksentini, T. Plesse.

    Comparing inter-domain routing protocol assessment tools for MANET, in: 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016 IEEE International Conference on Communications (ICC), May 2016.

    https://hal.inria.fr/hal-01355402
  • 15F. Grandhomme, G. Guette, A. Ksentini, T. Plesse.

    ITMAN: An Inter Tactical Mobile Ad Hoc Network Routing Protocol, in: MILCOM2016, Baltimore, United States, November 2016.

    https://hal.inria.fr/hal-01397710
  • 16K. HE, C. Bidan, G. Le Guelvouit.

    Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms, in: 9th International Conference on Security of Information and Networks (SIN 2016), Rutgers University, New Jersey, United States, July 2016.

    https://hal.inria.fr/hal-01344469
  • 17K. HE, C. Bidan, G. Le Guelvouit.

    Privacy Protection for JPEG Content on Image-Sharing Platforms, in: 4th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC 2016), Vigo, Galicia, Spain, June 2016.

    https://hal.inria.fr/hal-01344472
  • 18K. HE, C. Bidan, G. Le Guelvouit.

    Robust and Secure Image Encryption Schemes During JPEG Compression Process, in: 2016 IS&T International Symposium on Electronic Imaging (EI 2016), San Francisco, California, United States, February 2016.

    https://hal.inria.fr/hal-01344471
  • 19N. Kiss, J.-F. Lalande, M. Leslous, V. Viet Triem Tong.

    Kharon dataset: Android malware under a microscope, in: The Learning from Authoritative Security Experiment Results (LASER) workshop, San Jose, United States, USENIX Association, May 2016, pp. 1-12.

    https://hal-centralesupelec.archives-ouvertes.fr/hal-01311917
  • 20O. Koucham, S. Mocanu, G. Hiet, J.-M. Thiriet, F. Majorczyk.

    Detecting Process-Aware Attacks in Sequential Control Systems, in: 21st Nordic Conference on Secure IT Systems (NordSec 2016), Oulu, Finland, November 2016.

    https://hal.inria.fr/hal-01361081
  • 21T. Letan, P. Chifflier, G. Hiet, P. Néron, B. Morin.

    SpecCert: Specifying and Verifying Hardware-based Software Enforcement, in: 21st International Symposium on Formal Methods (FM 2016), Limassol, Cyprus, 21st International Symposium on Formal Methods (FM 2016), Springer, November 2016.

    https://hal.inria.fr/hal-01361422
  • 22C. Li, M. Hurfin, Y. Wang, L. Yu.

    Towards a Restrained Use of Non-equivocation for Achieving Iterative Approximate Byzantine Consensus, in: 30th IEEE International Parallel and Distributed Processing Symposium (IPDPS), Chicago, United States, May 2016, 10 p. [ DOI : 10.1109/IPDPS.2016.62 ]

    https://hal.inria.fr/hal-01339477
  • 23Y. Mocquard, E. Anceaume, B. Sericola.

    Optimal Proportion Computation with Population Protocols, in: Symposium on Network Computing and Applications, Boston, United States, IEEE, October 2016.

    https://hal.archives-ouvertes.fr/hal-01354352
  • 25N. Rivetti, E. Anceaume, Y. Busnel, L. Querzoni, B. Sericola.

    Online Scheduling for Shuffle Grouping in Distributed Stream Processing Systems Research Paper, in: ACM/IFIP/USENIX Middleware 2016, Trento, Italy, ACM/IFIP/USENIX, December 2016. [ DOI : 10.1145/2988336.2988347 ]

    https://hal.archives-ouvertes.fr/hal-01397658
  • 26N. Rivetti, L. Querzoni, E. Anceaume, Y. Busnel, B. Sericola.

    Groupement de clés efficace pour un équilibrage de charge quasi-optimal dans les systèmes de traitement de flux, in: ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Bayonne, France, ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2016.

    https://hal.archives-ouvertes.fr/hal-01303887
  • 27D. Subramanian, G. Hiet, C. Bidan.

    A self-correcting information flow control model for the web-browser, in: The 9th International Symposium on Foundations & Practice of Security (FPS'2016), Québec City, Canada, October 2016.

    https://hal.inria.fr/hal-01398192
  • 29E. Totel, M. Hkimi, M. Hurfin, M. Leslous, Y. Labiche.

    Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection, in: 12th European Dependable Computing Conference, Gothenburg, Sweden, Proceedings of the 12th European Dependable Computing Conference, September 2016.

    https://hal.inria.fr/hal-01334596

Conferences without Proceedings

  • 30M. Abdul Wahab, P. Cotret, M. Nasr Allah, G. Hiet, V. Lapotre, G. Cogniat.

    A portable approach for SoC-based Dynamic Information Flow Tracking implementations, in: 11ème Colloque du GDR SoC/SiP, Nantes, France, June 2016.

    https://hal-centralesupelec.archives-ouvertes.fr/hal-01311045
  • 31E. Anceaume, R. Ludinard, B. Sericola.

    Relying on Consensus does not Make Bitcoin Safer, in: Fast Abstract in the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Toulouse, France, M. Roy, J. A. Lopez, A. Casimiro (editors), DSN2016-FAST-ABSTRACT, June 2016.

    https://hal.archives-ouvertes.fr/hal-01316541
  • 32M. Assaf, J. Signoles, E. Totel, F. Tronel.

    The Cardinal Abstraction for Quantitative Information Flow, in: Workshop on Foundations of Computer Security 2016 (FCS 2016), Lisbon, Portugal, June 2016.

    https://hal.inria.fr/hal-01334604
  • 33F. Grandhomme, G. Guette, A. Ksentini, T. Plesse.

    Comparaison d'outils d'évaluation de performance des protocoles de routage inter-MANET, in: 13ème Conference Francophone sur les Nouvelles Technologies de la Répartition (NOTERE 2016), Paris, France, July 2016.

    https://hal.inria.fr/hal-01355407
  • 34P. Mensah.

    Dynamic Topology Extraction in Cloud Infrastructures, in: Second workshop on Security in Clouds (SEC2), Lorient, France, July 2016.

    https://hal.inria.fr/hal-01399251

Internal Reports

  • 35E. Anceaume, F. Castella, A. Mostefaoui, B. Sericola.

    Performance Evaluation of a Distributed Synchronization Protocol, Inria ; Irisa ; Lina ; Irmar, March 2016.

    https://hal.inria.fr/hal-01283064
  • 36G. Bonnoron, D. Crémilleux, S. T. Bulusu, X. Zhu, G. Valadon.

    Survey and analysis of DNS infrastructures, CNRS, 2016.

    https://hal.archives-ouvertes.fr/hal-01407640
  • 37T. Letan, P. Chifflier, G. Hiet, P. Néron, B. Morin.

    SpecCert: Specifying and Verifying Hardware-based Security Enforcement, CentraleSupélec ; Agence Nationale de Sécurité des Systèmes d’Information, 2016, 20 p.

    https://hal.inria.fr/hal-01356690
  • 38N. Rivetti, E. Anceaume, Y. Busnel, L. Querzoni, B. Sericola.

    Load-Aware Shedding in Stream Processing Systems, LINA-University of Nantes ; Sapienza Università di Roma (Italie) ; Irisa ; Inria Rennes, May 2016.

    https://hal.inria.fr/hal-01311970

Scientific Popularization

Other Publications

  • 41M. Hkimi.

    Apprentissage d'un modèle comportemental d'une application distribuée pour la détection d'intrusion, May 2016, Rendez-Vous de la Recherche et de l'enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), Poster.

    https://hal.inria.fr/hal-01334612
  • 42M. Leslous, J.-F. Lalande, V. Viet Triem Tong.

    Using Implicit Calls to Improve Malware Dynamic Execution, May 2016, 37th IEEE Symposium on Security and Privacy, Poster.

    https://hal.archives-ouvertes.fr/hal-01304326
  • 43M. Nasr Allah, G. Hiet, M. Abdul Wahab, P. Cotret, G. Gogniat, V. Lapotre.

    HardBlare: a Hardware-Assisted Approach for Dynamic Information Flow Tracking, April 2016, Séminaire des doctorantes et doctorants en informatique de la Société Informatique de France, Poster.

    https://hal-centralesupelec.archives-ouvertes.fr/hal-01311032