Publications of the year

Articles in International Peer-Reviewed Journals

  • 1F. Biondi, M. A. Enescu, T. Given-Wilson, A. Legay, L. Noureddine, V. Verma.

    Effective, Efficient, and Robust Packing Detection and Classification, in: Computers and Security, 2018, pp. 1-15.

  • 2J. Duchene, C. Le Guernic, E. Alata, V. Nicomette, M. Kaâniche.

    State of the art of network protocol reverse engineering tools, in: Journal of Computer Virology and Hacking Techniques, February 2018, vol. 14, no 1, pp. 53-68. [ DOI : 10.1007/s11416-016-0289-8 ]

  • 3J. L. Fiadeiro, A. Lopes, B. Delahaye, A. Legay.

    Dynamic networks of heterogeneous timed machines, in: Mathematical Structures in Computer Science, June 2018, vol. 28, no 06, pp. 800 - 855. [ DOI : 10.1017/S0960129517000135 ]

  • 4T. Given-Wilson, A. Heuser, N. Jafri, A. Legay.

    An automated and scalable formal process for detecting fault injection vulnerabilities in binaries, in: Concurrency and Computation: Practice and Experience, September 2018, pp. 1-12. [ DOI : 10.1002/cpe.4794 ]

  • 5T. Given-Wilson, A. Legay.

    On the Expressiveness of Joining and Splitting, in: Journal in honour of Bernhard Steffen's 60th, November 2018.

  • 6T. Given-Wilson, A. Legay, S. Sedwards, O. Zendra.

    Group Abstraction for Assisted Navigation of Social Activities in Intelligent Environments, in: Journal of Reliable Intelligent Environments, May 2018, vol. 4, no 2, pp. 107–120. [ DOI : 10.1007/s40860-018-0058-1 ]

  • 7A. Nouri, B. L. Mediouni, M. Bozga, J. Combaz, S. Bensalem, A. Legay.

    Performance Evaluation of Stochastic Real-Time Systems with the SBIP Framework, in: International Journal of Critical Computer-Based Systems, 2018, pp. 1-33.

  • 8S. Picek, A. Heuser, A. Jovic, S. Bhasin, F. Regazzoni.

    The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations, in: IACR Transactions on Cryptographic Hardware and Embedded Systems, November 2018, vol. 2019, no 1, pp. 1-29. [ DOI : 10.13154/tches.v2019.i1.209-237 ]

  • 9È. de Chèrisey, S. Guilley, A. Heuser, O. Rioul.

    On the optimality and practicability of mutual information analysis in some scenarios, in: Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , January 2018, vol. 10, no 1, pp. 101 - 121. [ DOI : 10.1007/s12095-017-0241-x ]


International Conferences with Proceedings

  • 10S. Arora, A. Legay, T. Richmond, L.-M. Traonouez.

    Statistical Model Checking of Incomplete Stochastic Systems, in: ISoLA 2018 - International Symposium on Leveraging Applications of Formal Methods, Limassol, Cyprus, LNCS, Springer, November 2018, vol. 11245, pp. 354-371. [ DOI : 10.1007/978-3-030-03421-4_23 ]

  • 11F. Biondi, T. Given-Wilson, A. Legay, C. Puodzius, J. Quilbeuf.

    Tutorial: an Overview of Malware Detection and Evasion Techniques, in: ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, Limassol, Cyprus, October 2018, pp. 1-23.

  • 12S. K. Bukasa, R. Lashermes, J.-L. Lanet, A. Legay.

    Let's shock our IoT's heart: ARMv7-M under (fault) attacks, in: ARES 2018 - 13th International Conference on Availability, Reliability and Security, Hambourg, Germany, ACM Press, August 2018, pp. 1-6. [ DOI : 10.1145/3230833.3230842 ]

  • 13V. Dragoi, T. Richmond, D. Bucerzan, A. Legay.

    Survey on cryptanalysis of code-based cryptography: From theoretical to physical attacks, in: ICCCC 2018 - 7th International Conference on Computers Communications and Control, Oradea, Romania, IEEE, May 2018, pp. 215-223. [ DOI : 10.1109/ICCCC.2018.8390461 ]

  • 14K. Drira, F. Oquendo, A. Legay, T. Batista.

    Editorial Message Track on Software-intensive Systems-of-Systems (SiSoS) of the 33rd ACM/SIGAPP Symposium On Applied Computing (SAC 2018), in: SAC 2018 - The 33rd ACM/SIGAPP Symposium On Applied Computing, Pau, France, April 2018, pp. 1-3.

  • 15J. Duchene, E. Alata, V. Nicomette, M. Kaâniche, C. Le Guernic.

    Specification-Based Protocol Obfuscation, in: DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg City, Luxembourg, IEEE, June 2018, pp. 1-12, https://arxiv.org/abs/1807.09464. [ DOI : 10.1109/DSN.2018.00056 ]

  • 16S. Picek, A. Heuser, A. Jovic, K. Knezevic, T. Richmond.

    Improving Side-Channel Analysis through Semi-Supervised Learning, in: 17th Smart Card Research and Advanced Application Conference (CARDIS 2018), Montpellier, France, November 2018.

  • 17S. Picek, I. P. Samiotis, A. Heuser, J. Kim, S. Bhasin, A. Legay.

    On the Performance of Convolutional Neural Networks for Side-channel Analysis, in: SPACE 2018 - International Conference on Security, Privacy, and Applied Cryptography Engineering, Kanpur, India, LNCS, Springer, December 2018, vol. 11348, pp. 157-176.

  • 18S. Sebastio, R. Ghosh, A. Gupta, T. Mukherjee.

    ContAv: a Tool to Assess Availability of Container-Based Systems, in: SOCA 2018 - 11th IEEE International Conference on Service Oriented Computing and Applications, Paris, France, November 2018, pp. 1-8.


National Conferences with Proceedings

  • 19C. Le Guernic, F. Khourbiga.

    Taint-Based Return Oriented Programming, in: SSTIC 2018 - Symposium sur la sécurité des technologies de l'information et des communications, Rennes, France, June 2018, pp. 1-30.


Conferences without Proceedings

  • 20D. Beaulaton, N. Ben Said, I. Cristescu, R. Fleurquin, A. Legay, J. Quilbeuf, S. Sadou.

    A Language for Analyzing Security of IOT Systems, in: SoSE 2018 - 13th Annual Conference on System of Systems Engineering, Paris, France, IEEE, June 2018, pp. 37-44. [ DOI : 10.1109/SYSOSE.2018.8428704 ]

  • 21B. L. Mediouni, A. Nouri, M. Bozga, M. Dellabani, A. Legay, S. Bensalem.

    SBIP 2.0: Statistical Model Checking Stochastic Real-time Systems, in: ATVA 2018 - 16th International Symposium Automated Technology for Verification and Analysis, Los Angeles, CA, United States, October 2018, pp. 1-6.

  • 22J. Quilbeuf, M. Barbier, L. Rummelhard, C. Laugier, A. Legay, B. Baudouin, T. Genevois, J. Ibañez-Guzmán, O. Simonin.

    Statistical Model Checking Applied on Perception and Decision-making Systems for Autonomous Driving, in: PPNIV 2018 - 10th Workshop on Planning, Perception and Navigation for Intelligent Vehicles, Madrid, Spain, October 2018, pp. 1-8.


Scientific Books (or Scientific Book chapters)

  • 23D. Beaulaton, I. Cristescu, A. Legay, J. Quilbeuf.

    A Modeling Language for Security Threats of IoT Systems, in: Formal Methods for Industrial Critical Systems - 23rd International Conference, FMICS 2018, LNCS, Springer, August 2018, vol. 11119, pp. 258-268. [ DOI : 10.1007/978-3-030-00244-2_17 ]

  • 24T. Given-Wilson, N. Jafri, A. Legay.

    The State of Fault Injection Vulnerability Detection, in: Verification and Evaluation of Computer and Communication Systems, August 2018, pp. 3-21. [ DOI : 10.1007/978-3-030-00359-3_1 ]


Books or Proceedings Editing

  • 25N. CUPPENS-BOULAHIA, F. Cuppens, J.-L. Lanet, A. Legay, J. Garcia-Alfaro (editors)

    Risks and security of internet and systems : 12th international conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, revised selected papers, Lecture Notes in Computer Science, Springer, 2018, vol. 10694, 269 p.


Scientific Popularization

Other Publications

  • 27C. Aubert, I. Cristescu.

    History-Preserving Bisimulations on Reversible Calculus of Communicating Systems, April 2018, https://arxiv.org/abs/1804.10355 - working paper or preprint.

  • 28E. Baranov, F. Biondi, O. Decourbe, T. Given-Wilson, A. Legay, C. Puodzius, J. Quilbeuf, S. Sebastio.

    Efficient Extraction of Malware Signatures Through System Calls and Symbolic Execution: An Experience Report, December 2018, working paper or preprint. [ DOI : 10.1145/nnnnnnn.nnnnnnn ]

  • 29D. Beaulaton, N. Ben Said, I. Cristescu, A. Legay, J. Quilbeuf.

    Security Enforcement in IoT Systems using Attack Trees, December 2018, working paper or preprint.

  • 30F. Biondi, T. Given-Wilson, A. Legay.

    Universal Optimality of Apollonian Cell Encoders, February 2018, working paper or preprint.

  • 31F. Biondi, Y. Kawamoto, A. Legay, L.-M. Traonouez.

    Hybrid Statistical Estimation of Mutual Information and its Application to Information Flow, September 2018, working paper or preprint.

  • 32T. Given-Wilson, N. Jafri, A. Legay.

    Bridging Software-Based and Hardware-Based Fault Injection Vulnerability Detection, December 2018, working paper or preprint.

  • 33J. Kim, S. Picek, A. Heuser, S. Bhasin, A. Hanjalic.

    Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis, February 2019, working paper or preprint.

  • 34T. Ninet, A. Legay, R. Maillard, L.-M. Traonouez, O. Zendra.

    The Deviation Attack: A Novel Denial-of-Service Attack Against IKEv2, 2018, working paper or preprint.

  • 35S. Picek, A. Heuser, C. Alippi, F. Regazzoni.

    When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis, February 2019, working paper or preprint.

References in notes
  • 36T. Given-Wilson, A. Heuser, N. Jafri, J.-L. Lanet, A. Legay.

    An Automated and Scalable Formal Process for Detecting Fault Injection Vulnerabilities in Binaries, November 2017, working paper or preprint.

  • 37T. Given-Wilson, N. Jafri, J.-L. Lanet, A. Legay.

    An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT – Extended Version, April 2017, working paper or preprint.

  • 38T. Given-Wilson, N. Jafri, J.-L. Lanet, A. Legay.

    An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT, in: 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 2017, pp. 293 - 300. [ DOI : 10.1109/Trustcom/BigDataSE/ICESS.2017.250 ]

  • 39A. Savary, M. Frappier, M. Leuschel, J. Lanet.

    Model-Based Robustness Testing in Event-B Using Mutation, in: Software Engineering and Formal Methods - 13th International Conference, SEFM 2015, York, UK, September 7-11, 2015. Proceedings, R. Calinescu, B. Rumpe (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9276, pp. 132–147.