Recherche - CIDRE - Confidentialité, Intégrité, Disponibilité et REpartition Accéder directement au contenu

Filtrer vos résultats

481 résultats
Image document

Isolating malicious code in Android malware in the wild

Valérie Viet Triem Tong , Cédric Herzog , Tomás Concepción Miranda , Pierre Graux , Jean-François Lalande , et al.
MALCON 2019 - 14th International Conference on Malicious and Unwanted Software, Oct 2019, Nantucket, United States
Communication dans un congrès hal-02288116v1
Image document

Compiling Sandboxes: Formally Verified Software Fault Isolation

Frédéric Besson , Sandrine Blazy , Alexandre Dang , Thomas Jensen , Pierre Wilke
ESOP 2019 - 28th European Symposium on Programming, Apr 2019, Prague, Czech Republic. pp.499-524, ⟨10.1007/978-3-030-17184-1_18⟩
Communication dans un congrès hal-02316189v1
Image document

Brief: Explicit and Tight Bounds of the Convergence Time of Average-based Population Protocols

Yves Mocquard , Bruno Sericola , Emmanuelle Anceaume
SIROCCO 2019 - 26th International Colloquium Structural Information and Communication Complexity, Jul 2019, L'Aquila, Italy. pp.1-4, ⟨10.1007/978-3-030-24922-9_29⟩
Communication dans un congrès hal-02380422v1

Classification of ransomwares using Artificial Neural Networks and Bayesian Networks

Noura Ourdi , Aurélien Palisse , Jean-Louis Lanet
Third International Conference on Intelligent Computing in Data Sciences, Nov 2019, Marrakech, Morocco
Communication dans un congrès hal-02416086v1

Formalization of Blockchain Properties

Emmanuelle Anceaume , Antonio Fernández Anta , Chryssis Georgiou , Nicolas Nicolaou , Maria Potop-Butucaru
Principles of Blockchain Systems, 2021
Chapitre d'ouvrage hal-03439073v1
Image document

Malware Windows Evasifs : Impact sur les Antivirus et Possible Contre-mesure

Cédric Herzog , Valérie Viet Triem Tong , Pierre Wilke , Jean-Louis Lanet
C&ESAR 2020 - Computer & Electronics Security Applications Rendez-vous, Dec 2020, Rennes, France
Communication dans un congrès hal-03139240v1
Image document

TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking

Guillaume Brogi , Valérie Viet Triem Tong
8th IFIP International Conference on New Technologies, Mobility and Security, Nov 2016, Larnaca, Cyprus. ⟨10.1109/ntms.2016.7792480⟩
Communication dans un congrès hal-01417612v1
Image document

The complexity of unsupervised learning of lexicographic preferences

Hélène Fargier , Pierre-François Gimenez , Jérôme Mengin , Bao Ngoc Le Nguyen
MPREF 2022 - 13th Multidisciplinary Workshop on Advances in Preference Handling, Jul 2022, Vienne, Austria. pp.1-8
Communication dans un congrès hal-03784693v1

Finding MNEMON: Reviving Memories of Node Embeddings

Yun Shen , Yufei Han , Zhikun Zhang , Min Chen , Ting Yu , et al.
CCS 2022 - ACM SIGSAC Conference on Computer and Communications Security, Nov 2022, Los Angeles CA, United States. pp.2643-2657, ⟨10.1145/3548606.3559358⟩
Communication dans un congrès hal-03893484v1
Image document

Stochastic Analysis of Average Based Distributed Algorithms

Yves Mocquard , Bruno Sericola , Frédérique Robin , Emmanuelle Anceaume
Journal of Applied Probability, 2021, 58 (2), pp.394 - 410. ⟨10.1017/jpr.2020.97⟩
Article dans une revue hal-02473856v1
Image document

Information flows at OS level unmask sophisticated Android malware

Valérie Viet Triem Tong , Aurélien Trulla , Mourad Leslous , Jean-François Lalande
14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.578-585, ⟨10.5220/0006476705780585⟩
Communication dans un congrès hal-01535678v1
Image document

Handling Bitcoin Conflicts Through a Glimpse of Structure

Thibaut Lajoie-Mazenc , Romaric Ludinard , Emmanuelle Anceaume
Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing, Apr 2017, Marrakesh, Morocco. ⟨10.1145/3019612.3019657⟩
Communication dans un congrès hal-01634368v1
Image document

Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode

Ronny Chevalier , Maugan Villatel , David Plaquin , Guillaume Hiet
ACSAC 2017 - 33rd Annual Computer Security Applications Conference, Dec 2017, Orlando, United States. pp.399-411, ⟨10.1145/3134600.3134622⟩
Communication dans un congrès hal-01634566v1
Image document

Alternatives to Binary Routing Policies Applied to a Military MANET Coalition

Florian Grandhomme , Gilles Guette , Adlen Ksentini , Thierry Plesse
IWCMC 2018 - 14th International Wireless Communications & Mobile Computing Conference, Jun 2018, Limassol, Cyprus. pp.1-6, ⟨10.1109/IWCMC.2018.8450393⟩
Communication dans un congrès hal-01851409v1

Sycomore, a Directed Acyclic Graph of Blocks

Emmanuelle Anceaume
The International Industrial & Academic Conference on Blockchain Technology - Chain-In, Jul 2018, Porto, Portugal
Communication dans un congrès hal-01888302v1
Image document

Sharing and replaying attack scenarios with Moirai

Guillaume Brogi , Valérie Viet Triem Tong
RESSI 2017: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2017, Autrans, France
Communication dans un congrès hal-01533275v1
Image document

Abusing Android Runtime for Application Obfuscation

Pierre Graux , Jean-François Lalande , Pierre Wilke , Valérie Viet Triem Tong
SAD 2020 - Workshop on Software Attacks and Defenses, Sep 2020, Genova, Italy. pp.616-624, ⟨10.1109/EuroSPW51379.2020.00089⟩
Communication dans un congrès hal-02877815v1
Image document

DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification

Camille Le Bon , Erven Rohou , Frédéric Tronel , Guillaume Hiet
SILM 2021 - Workshop on the Security of Software / Hardware Interfaces, Sep 2021, digital event, Austria. pp.86-95, ⟨10.1109/EuroSPW54576.2021.00016⟩
Communication dans un congrès hal-03340008v1
Image document

An Information Divergence Estimation over Data Streams

Emmanuelle Anceaume , Yann Busnel
11th IEEE International Symposium on Network Computing and Applications (IEEE NCA12), Aug 2012, Cambridge, MA, United States. pp.Number 72
Communication dans un congrès hal-00725097v1
Image document

Identifying Global Icebergs in Distributed Streams

Emmanuelle Anceaume , Yann Busnel , Nicolò Rivetti , Bruno Sericola
34th International Symposium on Reliable Distributed Systems (SRDS), Sep 2015, Montreal, Canada. pp.10, ⟨10.1109/SRDS.2015.19⟩
Communication dans un congrès hal-01194511v1
Image document

Identifier des icebergs parmi des flux de données distribués

Emmanuelle Anceaume , Yann Busnel , Nicoló Rivetti , Bruno Sericola
ALGOTEL 2016 - 18èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2016, Bayonne, France
Communication dans un congrès hal-01303873v1
Image document

Safety Analysis of Bitcoin Improvement Proposals

Emmanuelle Anceaume , Thibaut Lajoie-Mazenc , Romaric Ludinard , Bruno Sericola
2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), IEEE, Oct 2016, Cambridge, United States
Communication dans un congrès hal-01397685v1
Image document

FixMe : détection répartie de défaillances isolées

Emmanuelle Anceaume , Erwan Le Merrer , Romaric Ludinard , Bruno Sericola , Gilles Straub
15èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), May 2013, Pornic, France. pp.1-4
Communication dans un congrès hal-00818650v1

Scalable and Secure Polling in Dynamic Distributed Networks

Sébastien Gambs , Guerraoui Rachid , Harkous Hamza , Florian Huc , Anne-Marie Kermarrec
31st International Symposium on Reliable Distributed Systems (SRDS), Oct 2012, Irvine, California, United States
Communication dans un congrès hal-00723566v1
Image document

Markov Chains Competing for Transitions: Application to Large-Scale Distributed Systems

Emmanuelle Anceaume , François Castella , Romaric Ludinard , Bruno Sericola
Methodology and Computing in Applied Probability, 2013, 15 (2), pp.305--332. ⟨10.1007/s11009-011-9239-6⟩
Article dans une revue hal-00650081v1

Information Flow Policies vs Malware

Radoniaina Andriatsimandefitra , Thomas Saliou , Valérie Viet Triem Tong
IAS - Information assurance and security - 2013, 2013, Yassmine Hammamet, Tunisia
Communication dans un congrès hal-00909406v1

The Hecate Attack

Nathanaël Aubert , Mohamed Ali Ayachi , Christophe Bidan , Nicolas Prigent
SAR-SSI 2013, Sep 2013, Mont de Marsan, France. pp.205-215
Communication dans un congrès hal-00919227v1

A proactive routing protocol for wireless ad hoc networks assuring some privacy

Jean-Marc Robert , Christophe Bidan
HotWiSec '13, Apr 2013, Budapest, Hungary. pp.25-30, ⟨10.1145/2463183.2463190⟩
Communication dans un congrès hal-00920036v1
Image document

ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact

Sébastien Gambs , Jean-François Lalande , Jacques Traoré
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France
Communication dans un congrès hal-01154374v1
Image document

La protection des données personnelles, un enjeu organisationnel et technique

Guillaume Piolle
Flux - Cahiers scientifiques internationaux Réseaux et territoires, 2013, 274, pp.VIII-IX
Article dans une revue hal-00845803v1