Recherche - CIDRE - Confidentialité, Intégrité, Disponibilité et REpartition Accéder directement au contenu

Filtrer vos résultats

481 résultats
Image document

Se protéger d'une pandémie numérique

Valérie Viet Triem Tong , Jean-Louis Lanet
2023
Autre publication scientifique hal-04547827v1
Image document

Sharding in permissionless systems in presence of an adaptive adversary

Emmanuelle Anceaume , Davide Frey , Arthur Rauch
2024
Pré-publication, Document de travail hal-04477243v1
Image document

MIMIR: Modelling user Intentions with Markov chains for Intention Recommendations

Romain Brisse , Simon Boche , Frédéric Majorczyk , Jean-François Lalande
ICDF 2024 - Twentieth Annual IFIP WG 11.9 International Conference on Digital Forensics, Jan 2024, New Delhi, India. pp.1-23
Communication dans un congrès hal-04440805v1
Image document

CVE representation to build attack positions graphs

Manuel Poisson , Valérie Viet Triem Tong , Gilles Guette , Frédéric Guihéry , Damien Crémilleux
CyberHunt 2023 - 6th Annual Workshop on Cyber Threat Intelligence and Hunting, IEEE BigData, Dec 2023, Sorrento, Italy. pp.1-5
Communication dans un congrès hal-04317023v1
Image document

Humans vs. Machines in Malware Classification

Simone Aonzo , Yufei Han , Alessandro Mantovani , Davide Balzarotti
USENIX Security 2023 - 32nd Usenix Security Symposium, Aug 2023, Anaheim (CA), United States
Communication dans un congrès hal-04321950v1
Image document

BadVFL: Backdoor Attacks in Vertical Federated Learning

Mohammad Naseri , Yufei Han , Emiliano de Cristofaro
SP 2024 - IEEE Symposium on Security and Privacy, May 2024, San Francisco, United States. pp.1-8
Communication dans un congrès hal-04321905v1
Image document

Decoding the Secrets of Machine Learning in Windows Malware Classification: A Deep Dive into Datasets, Features, and Model Performance

Savino Dambra , Yufei Han , Simone Aonzo , Platon Kotzias , Antonino Vitale , et al.
CCS 2023 - 30th ACM Conference on Computer and Communications Security, Nov 2023, Copenhagen, Denmark. pp.60-74, ⟨10.1145/3576915.3616589⟩
Communication dans un congrès hal-04321280v1
Image document

URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures

Pierre-Victor Besson , Valérie Viet Triem Tong , Gilles Guette , Guillaume Piolle , Erwann Abgrall
FPS 2023 - 16th International Symposium on Foundations & Practice of Security, Dec 2023, Bordeaux, France. pp.1-16
Communication dans un congrès hal-04317073v1
Image document

Attacking at non-harmonic frequencies in screaming-channel attacks

Jeremy Guillaume , Maxime Pelcat , Amor Nafkha , Ruben Salvador
22nd Smart Card Research and Advanced Application Conference (CARDIS 2023), Nov 2023, Amsterdam, Netherlands. pp.1--20
Communication dans un congrès hal-04309083v2
Image document

Abstractions to Build Permissionless Systems

Emmanuelle Anceaume
Computer Science [cs]. Université de Rennes 1, 2019
HDR tel-04313136v1

Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS) - 2023

Yackolley Amoussou-Guenou , Emmanuelle Anceaume , Emmanuel Bertin , Antonella Del Pozzo , Axel Küpper
Proceedings/Recueil des communications hal-04306801v1
Image document

High-Level Synthesis-Based On-board Payload Data Processing considering the Roofline Model

Seungah Lee , Ruben Salvador , Angeliki Kritikakou , Olivier Sentieys , Julien Galizzi , et al.
EDHPC 2023 - European Data Handling & Data Processing Conference, European Space Agency (ESA), Oct 2023, Juan-Les-Pins, France. pp.1-10
Communication dans un congrès hal-04294305v1
Image document

CERBERE: Cybersecurity Exercise for Red and Blue team Entertainment, REproducibility

Pierre-Victor Besson , Romain Brisse , Hélène Orsini , Natan Talon , Jean-François Lalande , et al.
CyberHunt 2023 - 6th Annual Workshop on Cyber Threat Intelligence and Hunting, Dec 2023, Sorrento, Italy. pp.2980-2988, ⟨10.1109/BigData59044.2023.10386953⟩
Communication dans un congrès hal-04285565v1
Image document

OATs’inside : Retrieving Object Behaviors From Native-based Obfuscated Android Applications

Pierre Graux , Jean-François Lalande , Valérie Viet Triem Tong , Pierre Wilke
Digital Threats: Research and Practice, 2023, 4 (2), pp.1-27. ⟨10.1145/3584975⟩
Article dans une revue hal-04279351v1
Image document

Continuous-Time Stochastic Analysis of Rumor Spreading with Multiple Operations

François Castella , Bruno Sericola , Emmanuelle Anceaume , Yves Mocquard
Methodology and Computing in Applied Probability, 2023, 25 (4), pp.82. ⟨10.1007/s11009-023-10058-7⟩
Article dans une revue hal-04255487v1
Image document

Towards understanding alerts raised by unsupervised network intrusion detection systems

Maxime Lanvin , Pierre-François Gimenez , Yufei Han , Frédéric Majorczyk , Ludovic Mé , et al.
The 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID ), Oct 2023, Hong Kong China, France. pp.135-150, ⟨10.1145/3607199.3607247⟩
Communication dans un congrès hal-04172470v1
Image document

Stochastic analysis of rumor spreading with multiple pull operations in presence of non-cooperative nodes

Sébastien Kilian , Emmanuelle Anceaume , Bruno Sericola
ASMTA 2023 - 27th International Conference on Analytical & Stochastic Modelling Techniques & Applications, Jun 2023, Florence, Italy. pp.1-15
Communication dans un congrès hal-04166945v1
Image document

Extending The Boundaries and Exploring The Limits Of Blockchain Compression

Anurag Jain , Emmanuelle Anceaume , Sujit Gujar
SRDS 2023 - 42nd International Symposium on Reliable Distributed Systems, IEEE, Sep 2023, Marrackech, Morocco. pp.1-11
Communication dans un congrès hal-04166932v1
Image document

Extending The Boundaries and Exploring The Limits Of Blockchain Compression

Anurag Jain , Emmanuelle Anceaume , Sujit Gujar
2022
Pré-publication, Document de travail hal-03866741v2
Image document

Modélisation et test des ambiguïtés de recouvrement de données pour l'obtention des politiques de ré-assemblage dans les protocoles réseaux

Lucas Aubard , Johan Mazel , Gilles Guette , Pierre Chifflier , Olivier Levillain , et al.
RESSI 2023 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France. pp.1-3
Communication dans un congrès hal-04165396v1
Image document

Unveiling stealth attack paths in Windows Environments using AWARE

Manuel Poisson , Valérie Viet Triem Tong , Gilles Guette , Erwan Abgrall , Frédéric Guihéry , et al.
CSNet 2023 - 7th Cyber Security in Networking Conference, IEEE ComSoc, Oct 2023, Montreal, Canada. pp.1-7
Communication dans un congrès hal-04163780v1
Image document

Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections

Nicolas Gaudin , Jean-Loup Hatchikian-Houdot , Frédéric Besson , Pascal Cotret , Gogniat Guy , et al.
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Jul 2023, Delft, Netherlands. pp.1-7
Communication dans un congrès hal-04155139v1
Image document

A generic framework to develop and verify security mechanisms at the microarchitectural level: application to control-flow integrity

Matthieu Baty , Pierre Wilke , Guillaume Hiet , Arnaud Fontaine , Alix Trieu
CSF 2023 - 36th IEEE Computer Security Foundations Symposium, Jul 2023, Dubrovnik, France. pp.1-16
Communication dans un congrès hal-04118645v1
Image document

BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports

Vincent Raulin , Pierre-François Gimenez , Yufei Han , Valérie Viet Triem Tong
SECRYPT 2023 - 20th International conference on security and cryptography, Jul 2023, Rome, Italy. pp.1-8
Communication dans un congrès hal-04102144v1
Image document

Imbalanced Classification with TPG Genetic Programming: Impact of Problem Imbalance and Selection Mechanisms

Nicolas Sourbier , Justine Bonnot , Karol Desnos , Frédéric Majorczyk , Olivier Gesny , et al.
GECCO 2022 - Genetic and Evolutionary Computation Conference, Jul 2022, Boston, United States. pp.1-4, ⟨10.1145/3520304.3529008⟩
Communication dans un congrès hal-03699228v2
Image document

Comprendre les menaces sophistiquées : Intentions, moyens, manières et connaissances convergentes des adversaires

Aimad Berady
Cryptographie et sécurité [cs.CR]. CentraleSupélec, 2022. Français. ⟨NNT : 2022CSUP0004⟩
Thèse tel-03861429v2
Image document

Assessing the opportunity of combining state-of-the-art Android malware detectors

Nadia Daoudi , Kevin Allix , Tegawendé Bissyandé , Jacques Klein
Empirical Software Engineering, 2022, 28 (2), pp.22. ⟨10.1007/s10664-022-10249-9⟩
Article dans une revue hal-03925375v1
Image document

AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs

Helene Orsini , Hongyan Bao , Yujun Zhou , Xiangrui Xu , Yufei Han , et al.
BigData 2022 - IEEE International Conference on Big Data, Dec 2022, Osaka, Japan. pp.1-13
Communication dans un congrès hal-03893496v1

Cerberus: Exploring Federated Prediction of Security Events

Mohammad Naseri , Yufei Han , Enrico Mariconti , Yun Shen , Gianluca Stringhini , et al.
CCS '22 - ACM SIGSAC Conference on Computer and Communications Security, Nov 2022, Los Angeles CA, United States. pp.2337-2351, ⟨10.1145/3548606.3560580⟩
Communication dans un congrès hal-03893491v1

Finding MNEMON: Reviving Memories of Node Embeddings

Yun Shen , Yufei Han , Zhikun Zhang , Min Chen , Ting Yu , et al.
CCS 2022 - ACM SIGSAC Conference on Computer and Communications Security, Nov 2022, Los Angeles CA, United States. pp.2643-2657, ⟨10.1145/3548606.3559358⟩
Communication dans un congrès hal-03893484v1