Bibliography
Publications of the year
Doctoral Dissertations and Habilitation Theses
-
1E. Godefroy.
Definition and assessment of a mechanism for the generation of environment-specific correlation rules, CentraleSupélec, September 2016.
https://hal.archives-ouvertes.fr/tel-01415703 -
2J. Lolive.
Interleaving identification mechanisms and respect of privacy for the protection of outsourced content, Télécom Bretagne, May 2016.
https://hal.inria.fr/tel-01355495 -
3P. O. Meye.
Dependability in Cloud Storage, Université Rennes 1, December 2016.
https://hal.archives-ouvertes.fr/tel-01413001
Articles in International Peer-Reviewed Journals
-
4E. Anceaume, Y. Busnel, E. Schulte-Geers, B. Sericola.
Optimization Results for a Generalized Coupon Collector Problem, in: Journal of Applied Probability, 2016, vol. 53, no 2.
https://hal.inria.fr/hal-01397403 -
5L. Caviglione, M. Gaggero, J.-F. Lalande, W. Mazurczyk, M. Urbanski.
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence, in: IEEE Transactions on Information Forensics and Security, April 2016, vol. 11, no 4, pp. 799-810. [ DOI : 10.1109/TIFS.2015.2510825 ]
https://hal.archives-ouvertes.fr/hal-01247495
Invited Conferences
-
6E. Totel, M. Hkimi, M. Hurfin, M. Leslous, Y. Labiche.
Anomaly Based Intrusion Detection in Distributed Applications without global clock, in: SEC2 2016 - Deuxième atelier sur la Sécurité dans les Clouds, Lorient, France, July 2016.
https://hal.inria.fr/hal-01334608
International Conferences with Proceedings
-
7M. Abdul Wahab, P. Cotret, M. Nasr Allah, G. Hiet, V. Lapotre, G. Gogniat.
Towards a hardware-assisted information flow tracking ecosystem for ARM processors, in: 26th International Conference on Field-Programmable Logic and Applications (FPL 2016), Lausanne, Switzerland, August 2016.
https://hal.archives-ouvertes.fr/hal-01337579 -
8E. Anceaume, Y. Busnel, N. Rivetti, B. Sericola.
Identifier des icebergs parmi des flux de données distribués, in: ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Bayonne, France, ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2016.
https://hal.archives-ouvertes.fr/hal-01303873 -
9E. Anceaume, T. Lajoie-Mazenc, R. Ludinard, B. Sericola.
Safety Analysis of Bitcoin Improvement Proposals, in: IEEE Symposium on Network Computing and Applications, Boston, United States, IEEE, October 2016.
https://hal.archives-ouvertes.fr/hal-01397685 -
10E. Anceaume, R. Ludinard, B. Sericola.
L'empire romain ne doit pas être géré comme une petite île grecque, in: ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Bayonne, France, May 2016.
https://hal.archives-ouvertes.fr/hal-01305334 -
11G. Brogi, V. Viet Triem Tong.
TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking, in: 8th IFIP International Conference on New Technologies, Mobility and Security, Larnaca , Cyprus, November 2016.
https://hal.inria.fr/hal-01417612 -
12D. Crémilleux, C. Bidan, F. Majorczyk, N. Prigent.
VEGAS: Visualizing, exploring and grouping alerts, in: IEEE/IFIP International Workshop on Analytics for Network and Service Management, Istanbul, Turkey, April 2016, pp. 1097 - 1100. [ DOI : 10.1109/NOMS.2016.7502968 ]
https://hal.archives-ouvertes.fr/hal-01416464 -
13W. De Groef, D. Subramanian, J. Martin, F. Piessens, D. Lieven.
Ensuring Endpoint Authenticity in WebRTC Peer-to-Peer Communication, in: 31st Annual ACM Symposium on Applied Computing (SAC 2016), New York, United States, April 2016.
https://hal.inria.fr/hal-01344572 -
14F. Grandhomme, G. Guette, A. Ksentini, T. Plesse.
Comparing inter-domain routing protocol assessment tools for MANET, in: 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016 IEEE International Conference on Communications (ICC), May 2016.
https://hal.inria.fr/hal-01355402 -
15F. Grandhomme, G. Guette, A. Ksentini, T. Plesse.
ITMAN: An Inter Tactical Mobile Ad Hoc Network Routing Protocol, in: MILCOM2016, Baltimore, United States, November 2016.
https://hal.inria.fr/hal-01397710 -
16K. HE, C. Bidan, G. Le Guelvouit.
Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms, in: 9th International Conference on Security of Information and Networks (SIN 2016), Rutgers University, New Jersey, United States, July 2016.
https://hal.inria.fr/hal-01344469 -
17K. HE, C. Bidan, G. Le Guelvouit.
Privacy Protection for JPEG Content on Image-Sharing Platforms, in: 4th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC 2016), Vigo, Galicia, Spain, June 2016.
https://hal.inria.fr/hal-01344472 -
18K. HE, C. Bidan, G. Le Guelvouit.
Robust and Secure Image Encryption Schemes During JPEG Compression Process, in: 2016 IS&T International Symposium on Electronic Imaging (EI 2016), San Francisco, California, United States, February 2016.
https://hal.inria.fr/hal-01344471 -
19N. Kiss, J.-F. Lalande, M. Leslous, V. Viet Triem Tong.
Kharon dataset: Android malware under a microscope, in: The Learning from Authoritative Security Experiment Results (LASER) workshop, San Jose, United States, USENIX Association, May 2016, pp. 1-12.
https://hal-centralesupelec.archives-ouvertes.fr/hal-01311917 -
20O. Koucham, S. Mocanu, G. Hiet, J.-M. Thiriet, F. Majorczyk.
Detecting Process-Aware Attacks in Sequential Control Systems, in: 21st Nordic Conference on Secure IT Systems (NordSec 2016), Oulu, Finland, November 2016.
https://hal.inria.fr/hal-01361081 -
21T. Letan, P. Chifflier, G. Hiet, P. Néron, B. Morin.
SpecCert: Specifying and Verifying Hardware-based Software Enforcement, in: 21st International Symposium on Formal Methods (FM 2016), Limassol, Cyprus, 21st International Symposium on Formal Methods (FM 2016), Springer, November 2016.
https://hal.inria.fr/hal-01361422 -
22C. Li, M. Hurfin, Y. Wang, L. Yu.
Towards a Restrained Use of Non-equivocation for Achieving Iterative Approximate Byzantine Consensus, in: 30th IEEE International Parallel and Distributed Processing Symposium (IPDPS), Chicago, United States, May 2016, 10 p. [ DOI : 10.1109/IPDPS.2016.62 ]
https://hal.inria.fr/hal-01339477 -
23Y. Mocquard, E. Anceaume, B. Sericola.
Optimal Proportion Computation with Population Protocols, in: Symposium on Network Computing and Applications, Boston, United States, IEEE, October 2016.
https://hal.archives-ouvertes.fr/hal-01354352 -
25N. Rivetti, E. Anceaume, Y. Busnel, L. Querzoni, B. Sericola.
Online Scheduling for Shuffle Grouping in Distributed Stream Processing Systems Research Paper, in: ACM/IFIP/USENIX Middleware 2016, Trento, Italy, ACM/IFIP/USENIX, December 2016. [ DOI : 10.1145/2988336.2988347 ]
https://hal.archives-ouvertes.fr/hal-01397658 -
26N. Rivetti, L. Querzoni, E. Anceaume, Y. Busnel, B. Sericola.
Groupement de clés efficace pour un équilibrage de charge quasi-optimal dans les systèmes de traitement de flux, in: ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Bayonne, France, ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2016.
https://hal.archives-ouvertes.fr/hal-01303887 -
27D. Subramanian, G. Hiet, C. Bidan.
A self-correcting information flow control model for the web-browser, in: The 9th International Symposium on Foundations & Practice of Security (FPS'2016), Québec City, Canada, October 2016.
https://hal.inria.fr/hal-01398192 -
29E. Totel, M. Hkimi, M. Hurfin, M. Leslous, Y. Labiche.
Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection, in: 12th European Dependable Computing Conference, Gothenburg, Sweden, Proceedings of the 12th European Dependable Computing Conference, September 2016.
https://hal.inria.fr/hal-01334596
Conferences without Proceedings
-
30M. Abdul Wahab, P. Cotret, M. Nasr Allah, G. Hiet, V. Lapotre, G. Cogniat.
A portable approach for SoC-based Dynamic Information Flow Tracking implementations, in: 11ème Colloque du GDR SoC/SiP, Nantes, France, June 2016.
https://hal-centralesupelec.archives-ouvertes.fr/hal-01311045 -
31E. Anceaume, R. Ludinard, B. Sericola.
Relying on Consensus does not Make Bitcoin Safer, in: Fast Abstract in the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Toulouse, France, M. Roy, J. A. Lopez, A. Casimiro (editors), DSN2016-FAST-ABSTRACT, June 2016.
https://hal.archives-ouvertes.fr/hal-01316541 -
32M. Assaf, J. Signoles, E. Totel, F. Tronel.
The Cardinal Abstraction for Quantitative Information Flow, in: Workshop on Foundations of Computer Security 2016 (FCS 2016), Lisbon, Portugal, June 2016.
https://hal.inria.fr/hal-01334604 -
33F. Grandhomme, G. Guette, A. Ksentini, T. Plesse.
Comparaison d'outils d'évaluation de performance des protocoles de routage inter-MANET, in: 13ème Conference Francophone sur les Nouvelles Technologies de la Répartition (NOTERE 2016), Paris, France, July 2016.
https://hal.inria.fr/hal-01355407 -
34P. Mensah.
Dynamic Topology Extraction in Cloud Infrastructures, in: Second workshop on Security in Clouds (SEC2), Lorient, France, July 2016.
https://hal.inria.fr/hal-01399251
Internal Reports
-
35E. Anceaume, F. Castella, A. Mostefaoui, B. Sericola.
Performance Evaluation of a Distributed Synchronization Protocol, Inria ; Irisa ; Lina ; Irmar, March 2016.
https://hal.inria.fr/hal-01283064 -
36G. Bonnoron, D. Crémilleux, S. T. Bulusu, X. Zhu, G. Valadon.
Survey and analysis of DNS infrastructures, CNRS, 2016.
https://hal.archives-ouvertes.fr/hal-01407640 -
37T. Letan, P. Chifflier, G. Hiet, P. Néron, B. Morin.
SpecCert: Specifying and Verifying Hardware-based Security Enforcement, CentraleSupélec ; Agence Nationale de Sécurité des Systèmes d’Information, 2016, 20 p.
https://hal.inria.fr/hal-01356690 -
38N. Rivetti, E. Anceaume, Y. Busnel, L. Querzoni, B. Sericola.
Load-Aware Shedding in Stream Processing Systems, LINA-University of Nantes ; Sapienza Università di Roma (Italie) ; Irisa ; Inria Rennes, May 2016.
https://hal.inria.fr/hal-01311970
Scientific Popularization
-
39V. Viet Triem Tong, J.-F. Lalande, M. Leslous.
Challenges in Android Malware Analysis, in: ERCIM News, July 2016, no 106, pp. 42-43.
https://hal-centralesupelec.archives-ouvertes.fr/hal-01355122 -
40V. Viet Triem Tong.
Lutter contre les codes malveillants, in: Interstices, December 2016.
https://hal.inria.fr/hal-01427326
Other Publications
-
41M. Hkimi.
Apprentissage d'un modèle comportemental d'une application distribuée pour la détection d'intrusion, May 2016, Rendez-Vous de la Recherche et de l'enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), Poster.
https://hal.inria.fr/hal-01334612 -
42M. Leslous, J.-F. Lalande, V. Viet Triem Tong.
Using Implicit Calls to Improve Malware Dynamic Execution, May 2016, 37th IEEE Symposium on Security and Privacy, Poster.
https://hal.archives-ouvertes.fr/hal-01304326 -
43M. Nasr Allah, G. Hiet, M. Abdul Wahab, P. Cotret, G. Gogniat, V. Lapotre.
HardBlare: a Hardware-Assisted Approach for Dynamic Information Flow Tracking, April 2016, Séminaire des doctorantes et doctorants en informatique de la Société Informatique de France, Poster.
https://hal-centralesupelec.archives-ouvertes.fr/hal-01311032