Bibliography
Publications of the year
Doctoral Dissertations and Habilitation Theses
-
1S. Brunet.
Design of Anonymous Accreditation and Data Anonymization Mechanisms, Université de Rennes 1 [UR1], November 2017.
https://hal-centralesupelec.archives-ouvertes.fr/tel-01655322 -
2L. Georget.
Correct information flow tracking for Linux operating systems, Université Rennes 1, September 2017.
https://hal.inria.fr/tel-01657148 -
3F. Grandhomme.
Inter-domain routing studies (BGP-like) for tactical mobile ad hoc networks : feasibility and performances, Universite de Rennes 1, November 2017.
https://hal.archives-ouvertes.fr/tel-01654631 -
4A. Guellier.
Strongly Private Communications in a Homogeneous Network, Centrale Supélec, May 2017.
https://hal-centralesupelec.archives-ouvertes.fr/tel-01644172 -
5K. HE.
Content Privacy and Access Control on Image-Sharing Platforms, CentraleSupélec, September 2017.
https://hal-centralesupelec.archives-ouvertes.fr/tel-01636207
Articles in International Peer-Reviewed Journals
-
6E. Anceaume, Y. Busnel.
Lightweight Metric Computation for Distributed Massive Data Streams, in: Transactions on Large-Scale Data- and Knowledge-Centered Systems, April 2017, vol. 10430, no 33, pp. 1–39. [ DOI : 10.1007/978-3-662-55696-2_1 ]
https://hal.archives-ouvertes.fr/hal-01634353
International Conferences with Proceedings
-
7E. Anceaume, R. Ludinard, M. Potop-Butucaru, F. Tronel.
Bitcoin a Distributed Shared Register, in: SSS 2017 - 19th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Boston, MA, United States, Lecture Notes in Computer Science, Springer, November 2017, vol. 10616, pp. 456-468. [ DOI : 10.1007/978-3-319-69084-1_34 ]
https://hal.archives-ouvertes.fr/hal-01522360 -
8M. Assaf, D. A. Naumann, J. Signoles, E. Totel, F. Tronel.
Hypercollecting Semantics and its Application to Static Analysis of Information Flow, in: POPL 2017 - ACM Symposium on Principles of Programming Languages, Paris, France, ACM SIGPLAN Notices - POPL '17, ACM, January 2017, vol. 52, no 1, pp. 874-887. [ DOI : 10.1145/3009837.3009889 ]
https://hal.inria.fr/hal-01618360 -
9I. Boureanu, D. Gerault, P. Lafourcade, C. Onete.
Breaking and fixing the HB+DB protocol, in: Wisec 2017 - Conference on Security and Privacy in Wireless and Mobile Networks, Boston, United States, July 2017, pp. 241 - 246. [ DOI : 10.1145/3098243.3098263 ]
https://hal.archives-ouvertes.fr/hal-01588562 -
10R. Chevalier, M. Villatel, D. Plaquin, G. Hiet.
Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode, in: ACSAC 2017 - 33rd Annual Computer Security Applications Conference, Orlando, United States, Proceedings of the 33rd Annual Computer Security Applications Conference, ACM, December 2017, vol. 2017, pp. 399-411. [ DOI : 10.1145/3134600.3134622 ]
https://hal.inria.fr/hal-01634566 -
12L. Georget, M. Jaume, G. Piolle, F. Tronel, V. Viet Triem Tong.
Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux, in: 5th International FME Workshop on Formal Methods in Software Engineering, Buenos Aires, Argentina, IEEE Press, May 2017, pp. 10-16. [ DOI : 10.1109/FormaliSE.2017.1 ]
https://hal.inria.fr/hal-01535862 -
13T. Lajoie-Mazenc, R. Ludinard, E. Anceaume.
Handling Bitcoin Conflicts Through a Glimpse of Structure, in: Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing, Marrakesh, Morocco, Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing, April 2017. [ DOI : 10.1145/3019612.3019657 ]
https://hal.archives-ouvertes.fr/hal-01634368 -
14L. Leichtnam, E. Totel, N. Prigent, L. Mé.
STARLORD: Linked Security Data Exploration in a 3D Graph, in: VizSec - IEEE Symposium on Visualization for Cyber Security, Phoenix, United States, October 2017, pp. 1 - 4. [ DOI : 10.1109/VIZSEC.2017.8062203 ]
https://hal.inria.fr/hal-01619234 -
15M. Leslous, V. Viet Triem Tong, J.-F. Lalande, T. Genet.
GPFinder: Tracking the Invisible in Android Malware, in: 12th International Conference on Malicious and Unwanted Software, Fajardo, Puerto Rico, IEEE Conputer Society, October 2017.
https://hal-centralesupelec.archives-ouvertes.fr/hal-01584989 -
16P. Mensah, S. Dubus, W. Kanoun, C. Morin, G. Piolle, E. Totel.
Connectivity Extraction in Cloud Infrastructures, in: CNSM 2017 - 13th International Conference on Network and Service Management, Tokyo, Japan, November 2017, pp. 1-5.
https://hal.inria.fr/hal-01593346 -
17P. Mensah, S. Dubus, W. Kanoun, C. Morin, G. Piolle, E. Totel.
Connectivity Graph Reconstruction for Networking Cloud Infrastructures, in: NCA 2017 - 16th IEEE International Symposium on Network Computing and Applications, Cambridge, MA, United States, October 2017.
https://hal.inria.fr/hal-01612988 -
18Y. Mocquard, B. Sericola, E. Anceaume.
Probabilistic Analysis of Counting Protocols in Large-scale Asynchronous and Anonymous Systems, in: Proceedings of the 16th IEEE International Conference on Network Computing and Applications, Boston, United States, October 2017.
https://hal.archives-ouvertes.fr/hal-01580275 -
19V. Viet Triem Tong, A. Trulla, M. Leslous, J.-F. Lalande.
Information flows at OS level unmask sophisticated Android malware, in: 14th International Conference on Security and Cryptography, Madrid, Spain, SciTePress, July 2017, vol. 6, pp. 578-585. [ DOI : 10.5220/0006476705780585 ]
https://hal-centralesupelec.archives-ouvertes.fr/hal-01535678 -
20M. A. Wahab, P. Cotret, M. N. Allah, G. Hiet, V. Lapotre, G. Gogniat.
ARMHEx: A hardware extension for DIFT on ARM-based SoCs, in: Field Programmable Logic (FPL), Ghent, Belgium, September 2017.
https://hal.archives-ouvertes.fr/hal-01558473 -
21M. A. Wahab, P. Cotret, M. Nasr ALLAH, G. Hiet, V. Lapotre, G. Gogniat.
ARMHEx: a framework for efficient DIFT in real-world SoCs, in: Field Programmable Logic (FPL), Ghent, Belgium, September 2017.
https://hal.archives-ouvertes.fr/hal-01558475
National Conferences with Proceedings
-
22G. Brogi, V. Viet Triem Tong.
Sharing and replaying attack scenarios with Moirai, in: RESSI 2017: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Autrans, France, May 2017.
https://hal.archives-ouvertes.fr/hal-01533275 -
23G. Fournier, P. Audren De Kerdrel, P. Cotret, V. Viet Triem Tong.
DroneJack: Kiss your drones goodbye!, in: SSTIC 2017 - Symposium sur la sécurité des technologies de l'information et des communications, Rennes, France, June 2017, pp. 1-8.
https://hal.inria.fr/hal-01635125 -
24L. Georget, M. Jaume, G. Piolle, F. Tronel, V. Viet Triem Tong.
Suivi de flux d'information correct sous Linux, in: 16èmes journées AFADL (Approches formelles dans l'assistance au développement de logiciels), Montpellier, France, A. Idani, N. Kosmatov (editors), June 2017, pp. 19-26.
http://hal.upmc.fr/hal-01535937 -
25N. Rivetti, E. Anceaume, Y. Busnel, L. Querzoni, B. Sericola.
Ordonnancement dynamique pour un équilibrage de charge quasi-optimal dans les systèmes de traitement de flux, in: ALGOTEL 2017 - 19èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Quiberon, France, May 2017.
https://hal.archives-ouvertes.fr/hal-01519432 -
26M. A. –. Wahab, P. Cotret, M. –. Nasr Allah, G. –. Hiet, V. Lapotre, G. –. Gogniat.
ARMHEx: embedded security through hardware-enhanced information flow tracking, in: RESSI 2017 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Grenoble (Autrans), France, May 2017.
https://hal.archives-ouvertes.fr/hal-01558155
Other Publications
-
27E. Anceaume, Y. Busnel.
Byzantine-tolerant Uniform Node Sampling Service, November 2017, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01634363 -
28Y. Mocquard, B. Sericola, E. Anceaume.
Probabilistic Analysis of Rumor Spreading Time, November 2017, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01652777
-
29G. Brogi, V. Viet Triem Tong.
TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking, in: 8th IFIP International Conference on New Technologies, Mobility and Security, Larnaca , Cyprus, November 2016.
https://hal.inria.fr/hal-01417612 -
30N. Kiss, J.-F. Lalande, M. Leslous, V. Viet Triem Tong.
Kharon dataset: Android malware under a microscope, in: The Learning from Authoritative Security Experiment Results (LASER) workshop, San Jose, United States, The USENIX Association, May 2016.
https://hal-centralesupelec.archives-ouvertes.fr/hal-01311917