Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 5F. Besson, S. Blazy, P. Wilke.

    CompCertS: A Memory-Aware Verified C Compiler using a Pointer as Integer Semantics, in: Journal of Automated Reasoning, August 2019, vol. 63, no 2, pp. 369-392. [ DOI : 10.1007/s10817-018-9496-y ]

  • 6S. Hamadouche, M. Mezghiche, J.-L. Lanet.

    Hiding a fault enabled virus through code construction, in: Journal of Computer Virology and Hacking Techniques, 2019, pp. 1-22. [ DOI : 10.1007/s11416-019-00340-z ]

  • 7K. Heydemann, J.-F. Lalande, P. Berthomé.

    Formally verified software countermeasures for control-flow integrity of smart card C code, in: Computers and Security, August 2019, vol. 85, pp. 202-224. [ DOI : 10.1016/j.cose.2019.05.004 ]

  • 8C. Kirchner, L. .

    Défis de la recherche scientifique en cyber-sécurité, in: Annales des Mines - Enjeux Numériques, December 2019, pp. 1-15.

  • 9Y. Mocquard, B. Sericola, E. Anceaume.

    Probabilistic Analysis of Rumor Spreading Time, in: INFORMS Journal on Computing, July 2019, pp. 1-20. [ DOI : 10.1287/ijoc.2018.0845 ]


Invited Conferences

International Conferences with Proceedings

  • 12E. Anceaume, A. D. Pozzo, R. Ludinard, M. Potop-Butucaru, S. Tucci-Piergiovanni.

    Blockchain Abstract Data Type, in: SPAA 2019 - 31st ACM Symposium on Parallelism in Algorithms and Architectures, Phoenix, United States, ACM, June 2019, pp. 1-11. [ DOI : 10.1145/3323165.3323183 ]

  • 13A. Berady, V. Viet Triem Tong, G. Guette, C. Bidan, G. Carat.

    Modeling the Operational Phases of APT Campaigns, in: CSCI 2019 - 6th Annual Conf. on Computational Science & Computational Intelligence, Las Vegas, United States, December 2019, pp. 1-6.

  • 14F. Besson, S. Blazy, A. Dang, T. Jensen, P. Wilke.

    Compiling Sandboxes: Formally Verified Software Fault Isolation, in: ESOP 2019 - 28th European Symposium on Programming, Prague, Czech Republic, LNCS, Springer, April 2019, vol. 11423, pp. 499-524. [ DOI : 10.1007/978-3-030-17184-1_18 ]

  • 15E. Boespflug, R. Gourier, J.-L. Lanet.

    Predicting the Effect of Hardware Fault Injection, in: IWBIS 2019 - 4th IEEE International Workshop on Big Data and Information Security, Bali, Indonesia, IEEE, October 2019, pp. 103-108. [ DOI : 10.1109/IWBIS.2019.8935864 ]

  • 16R. Chevalier, S. Cristalli, C. Hauser, Y. Shoshitaishvili, R. Wang, C. Kruegel, G. Vigna, D. Bruschi, A. Lanzi.

    BootKeeper: Validating Software Integrity Properties on Boot Firmware Images, in: CODASPY 2019 - Conference on Data and Application Security and Privacy, Dallas, United States, ACM Press, March 2019, pp. 1-11, https://arxiv.org/abs/1903.12505. [ DOI : 10.1145/3292006.3300026 ]

  • 17R. Chevalier, D. Plaquin, C. Dalton, G. Hiet.

    Survivor: A Fine-Grained Intrusion Response and Recovery Approach for Commodity Operating Systems, in: ACSAC 2019 - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, Proceedings of the 35th Annual Computer Security Applications Conference, December 2019, vol. 2019, https://arxiv.org/abs/1912.06863. [ DOI : 10.1145/3359789.3359792 ]

  • 18G. A. Di Luna, E. Anceaume, L. Querzoni.

    Byzantine Generalized Lattice Agreement, in: Proceedings of the 34th IEEE International Parallel and Distributed Processing Symposium (IPDPS 2020), New Orleans, Louisiana, United States, IEEE, May 2020.

  • 19A. Durand, E. Anceaume, R. Ludinard.

    STAKECUBE: Combining Sharding and Proof-of-Stake to build Fork-free Secure Permissionless Distributed Ledgers, in: International conference on networked systems (NETYS), Marrakesh, Morocco, June 2019.

  • 20J.-F. Lalande, P. Graux, T. Concepción Miranda.

    Orchestrating Android Malware Experiments, in: MASCOTS 2019 - 27th IEEE International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Rennes, France, IEEE Computer societry, October 2019, pp. 1-2.

  • 21J.-F. Lalande, V. Viet Triem Tong, P. Graux, G. Hiet, W. Mazurczyk, H. Chaoui, P. Berthomé.

    Teaching Android Mobile Security, in: SIGCSE '19 - 50th ACM Technical Symposium on Computer Science Education, Minneapolis, United States, Proceedings of the 50th ACM Technical Symposium on Computer Science Education, ACM Press, February 2019, pp. 232-238. [ DOI : 10.1145/3287324.3287406 ]

  • 22D. Lanoe, M. Hurfin, E. Totel, C. Maziero.

    An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications, in: SEC 2019 - 34th IFIP International Conference on ICT Systems Security and Privacy Protection, Lisbonne, Portugal, Springer, June 2019, pp. 49-63. [ DOI : 10.1007/978-3-030-22312-0_4 ]

  • 23T. Letan, Y. Régis-Gianas.

    FreeSpec: Specifying, Verifying and Executing Impure Computations in Coq, in: 9th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP '20), Nouvelle-Orléans, United States, January 2020. [ DOI : 10.1145/3372885.3373812 ]

  • 24Y. Mocquard, B. Sericola, E. Anceaume.

    Brief: Explicit and Tight Bounds of the Convergence Time of Average-based Population Protocols, in: SIROCCO 2019 - 26th International Colloquium Structural Information and Communication Complexity, L'Aquila, Italy, Springer, July 2019, pp. 1-4. [ DOI : 10.1007/978-3-030-24922-9_29 ]

  • 25L. Ouairy, H. Le Bouder, J.-L. Lanet.

    JavaNeighbors: Improving ChuckyJava’s neighborhood discovery algorithm, in: EUSPN 2019 - 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, Coimbre, Portugal, November 2019, pp. 1-7.

  • 26V. Viet Triem Tong, C. Herzog, T. Concepción Miranda, P. Graux, J.-F. Lalande, P. Wilke.

    Isolating malicious code in Android malware in the wild, in: MALCON 2019 - 14th International Conference on Malicious and Unwanted Software, Nantucket, United States, MALCON 2019, IEEE Computer society, October 2019.


National Conferences with Proceedings

  • 27N. Ourdi, A. Palisse, J.-L. Lanet.

    Classification of ransomwares using Artificial Neural Networks and Bayesian Networks, in: Third International Conference on Intelligent Computing in Data Sciences, Marrakech, Morocco, November 2019.


Conferences without Proceedings

  • 28E. Anceaume, Y. Busnel, V. Cazacu.

    L'art d'extraire des éléments du top-k en temps réel sur des fenêtres glissantes réparties, in: ALGOTEL 2019 - 21èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Saint Laurent de la Cabrerisse, France, June 2019, pp. 1-4.

  • 29E. Anceaume, A. Guellier, R. Ludinard, B. Sericola.

    Sycomore : un registre de transactions distribué et public au débit auto-adaptatif, in: ALGOTEL 2019 - 21èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Saint Laurent de la Cabrerisse, France, June 2019, pp. 1-4.

  • 30L. Claudepierre, P. Besnier.

    Microcontroller Sensitivity to Fault-Injection Induced by Near-Field Electromagnetic Interference, in: APEMC 2019 - Asia-Pacific International Symposium on Electromagnetic Compatibility, Sapporo, Japan, June 2019, pp. 1-4.

  • 31B. Fournier, G. Guette, V. Viet Triem Tong, J.-L. Lanet.

    SEER4US, Secured Energy Efficient Routing for UAV Swarms, in: WiMob 2019 - 15th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Barcelona, France, October 2019, pp. 1-6.

  • 32K. Le Bon, B. Hawkins, E. Rohou, G. Hiet, F. Tronel.

    Plateforme de protection de binaires configurable et dynamiquement adaptative, in: RESSI 2019 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Erquy, France, May 2019, pp. 1-3.

  • 33Y. Lemmou, H. Le Bouder, J.-L. Lanet.

    Discriminating Unknown Software Using Distance Model, in: ICACSIS 2019 - 11th International Conference on Advanced Computer Science and Information Systems, Bali, Indonesia, IEEE, October 2019.

  • 34R. Moussaileb, C. Berrti, G. Deboisdeffre, N. Cuppens, J.-L. Lanet.

    Watch Out! Doxware on The Way…, in: CRiSIS 2019 - 14th International Conference on Risks and Security of Internet and Systems, Hammamet, Tunisia, October 2019.

  • 35R. Moussaileb, N. Cuppens, J.-L. Lanet, H. Le Bouder.

    Ransomware Network Traffic Analysis for Pre-Encryption Alert, in: FPS 2019 - 12th International Symposium on Foundations & Practice of Security, Toulouse, France, November 2019.

  • 36C. Xosanavongsa, E. Totel, O. Bettan.

    Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events, in: EuroS&P 2019 - 4th IEEE European Symposium on Security and Privacy, Stockholm, Sweden, IEEE, June 2019, pp. 340-355. [ DOI : 10.1109/EuroSP.2019.00033 ]


Scientific Books (or Scientific Book chapters)

  • 37S. Kremer, L. , D. Rémy, V. Roca.

    Cybersecurity : Current challenges and Inria's research directions, Inria white book, Inria, January 2019, no 3, 172 p.


Internal Reports

Scientific Popularization

  • 39V. Viet Triem Tong, B. Fournier, G. Fournier, L. Ouairy, P. Cotret.

    Dis, c'est quoi là haut dans le ciel ? C'est un Linux, mon petit, in: MISC - Le journal de la sécurité informatique, July 2019.


Other Publications

  • 40E. Anceaume, A. Del Pozzo, R. Ludinard, M. Potop-Butucaru, S. Tucci-Piergiovanni.

    POSTER: Blockchain Abstract Data Type, ACM, February 2019, pp. 1-2, 24th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming (PPoPP 2019), Poster. [ DOI : 10.1145/3293883.3303705 ]

  • 41E. Anceaume, M. Papatriantafilou, M. Potop-Butucaru, P. Tsigas.

    Distributed Ledger Register: From Safe to Atomic, July 2019, working paper or preprint.