Members
Overall Objectives
Research Program
Application Domains
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
[1]
E. Anceaume, R. Ludinard, B. Sericola.
Performance evaluation of large-scale dynamic systems, in: ACM SIGMETRICS Performance Evaluation Review, April 2012, vol. 39, no 4, pp. 108-117. [ DOI : 10.1145/2185395.2185447 ]
http://hal.archives-ouvertes.fr/hal-00736918
[2]
M. A. Ayachi, C. Bidan, N. Prigent.
A Trust-Based IDS for the AODV Protocol, in: Proc. of the 12th international conference on Information and communications security (ICICS 2010), Barcelona, Spain, December 2010.
[3]
M. Ben Ghorbel-Talbi, F. Cuppens, N. Cuppens-Boulahia, D. Le Métayer, G. Piolle.
Delegation of Obligations and Responsibility, in: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference (SEC2011), J. Camenisch, S. Fischer-Hübner, Y. Murayama, A. Portmann, C. Rieder (editors), IFIP AICT, Springer, 2011, vol. 354, pp. 197–209.
[4]
J. C. Demay, F. Majorczyk, E. Totel, F. Tronel.
Detecting illegal system calls using a data-oriented detection model, in: Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011.
[5]
S. Gambs, B. Kégl, E. Aïmeur.
Privacy-preserving boosting, in: Data Mining and Knowledge Discovery, 2007, vol. 14, no 1, pp. 131-170.
[6]
G. Hiet, V. Viet Triem Tong, L. , B. Morin.
Policy-based intrusion detection in web applications by monitoring Java information flows, in: International Journal of Information and Computer Security, 2009, vol. 3, no 3/4, pp. 265–279.
[7]
L. , H. Debar.
New Directions in Intrusion Detection and Alert Correlation, in: The Information - Interaction - Intelligence (I3) Journal, 2010, vol. 10, no 1.
[8]
G. Piolle, Y. Demazeau.
Representing privacy regulations with deontico-temporal operators, in: Web Intelligence and Agent Systems, Jul 2011, vol. 9, no 3, pp. 209-226.
[9]
E. Totel, F. Majorczyk, L. .
COTS Diversity based Intrusion Detection and Application to Web Servers, in: Proc. of the International Symposium on Recent Advances in Intrusion Detection (RAID'2005), Seattle, USA, September 2005.
[10]
D. Zou, N. Prigent, J. Bloom.
Compressed Video Stream Watermarking for Peer-to-Peer-Based Content Distribution Network, in: Proc. of the IEEE International Conference on Multimedia and Expo (IEEE ICME), New York City, USA, June 2009.
Publications of the year

Doctoral Dissertations and Habilitation Theses

[11]
R. Andriatsimandefitra.
Characterization and detection of android malware based on information flows, Supélec, December 2014.
https://hal.inria.fr/tel-01095994

Articles in International Peer-Reviewed Journals

[12]
E. Anceaume, Y. Busnel.
A Distributed Information Divergence Estimation over Data Streams, in: IEEE Transactions on Parallel and Distributed Systems, February 2014, vol. 25, no 2, pp. 478-487. [ DOI : 10.1109/TPDS.2013.101 ]
https://hal.archives-ouvertes.fr/hal-00998708
[13]
E. Anceaume, F. Castella, B. Sericola.
Analysis of a large number of Markov chains competing for transitions, in: International Journal of Systems Science, March 2014, vol. 45, no 3, pp. 232–240. [ DOI : 10.1080/00207721.2012.704090 ]
https://hal.archives-ouvertes.fr/hal-00736916
[14]
R. Andriatsimandefitra, V. Viet Triem Tong.
Information Flow Policies vs Malware – Final Battle –, in: Journal of Information Assurance and Security, 2014, vol. 9, no 2, pp. 72-82.
https://hal.inria.fr/hal-01062313
[15]
G. Arfaoui, G. Dabosville, S. Gambs, P. Lacharme, J.-F. Lalande.
A Privacy-Preserving NFC Mobile Pass for Transport Systems, in: EAI Endorsed Transactions on Mobile Communications and Applications, December 2014, vol. 2, no 5, pp. 1-18. [ DOI : 10.4108/mca.2.5.e4 ]
https://hal.inria.fr/hal-01091576
[16]
J. Friginal, S. Gambs, J. Guiochet, M.-O. Killijian.
Towards privacy-driven design of a dynamic carpooling system, in: Pervasive and Mobile Computing, October 2014, vol. 14, 11 p. [ DOI : 10.1016/j.pmcj.2014.05.009 ]
https://hal.inria.fr/hal-01089918
[17]
S. Gambs, M.-O. Killijian, M. Nunez Del Prado Cortez.
De-anonymization attack on geolocated data, in: Journal of Computer and System Sciences, December 2014, vol. 80, no 8, 17 p. [ DOI : 10.1016/j.jcss.2014.04.024 ]
https://hal.inria.fr/hal-01089883
[18]
C. Li, M. Hurfin, Y. Wang.
Approximate Byzantine consensus in sparse, mobile ad-hoc networks, in: Journal of Parallel and Distributed Computing, September 2014, vol. 74, no 9, 12 p. [ DOI : 10.1016/j.jpdc.2014.05.005 ]
https://hal.inria.fr/hal-01083553
[19]
R. Ludinard, E. Totel, F. Tronel, V. Nicomette, M. Kaâniche, É. Alata, R. Akrout, Y. Bachy.
An Invariant-based Approach for Detecting Attacks against Data in Web Applications, in: International Journal of Secure Software Engineering, June 2014, vol. 5, no 1, pp. 19-38. [ DOI : 10.4018/ijsse.2014010102 ]
https://hal.inria.fr/hal-01083296
[20]
L. Zeghache, N. Badache, M. Hurfin, I. Moise.
Reliable mobile agents with transactional behaviour, in: International Journal of Communication Networks and Distributed Systems, 2014, vol. 13, no 1, 27 p. [ DOI : 10.1504/IJCNDS.2014.063977 ]
https://hal.inria.fr/hal-01083544

Invited Conferences

[21]
J.-F. Lalande.
Un titre de transport sur mobile NFC respectueux de la vie privée, in: Colloque International sur la Sécurité des Systèmes d'Information, Kénitra, Morocco, March 2014.
https://hal.inria.fr/hal-00967463

International Conferences with Proceedings

[22]
E. Anceaume, Y. Busnel.
Deviation Estimation between Distributed Data Streams, in: 10th European Dependable Computing Conference (EDCC 2014), Newcastle, United Kingdom, May 2014, pp. 35-45. [ DOI : 10.1109/EDCC.2014.27 ]
https://hal.archives-ouvertes.fr/hal-00998702
[23]
E. Anceaume, Y. Busnel, E. Le Merrer, R. Ludinard, J.-L. Marchand, B. Sericola.
Anomaly Characterization in Large Scale Networks, in: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta, United States, June 2014.
https://hal.inria.fr/hal-00948135
[24]
E. Anceaume, Y. Busnel, B. Sericola.
Service d'échantillonage uniforme résiliant aux comportments malveillants, in: ALGOTEL 2014 – 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, France, June 2014, pp. 1–4.
https://hal.archives-ouvertes.fr/hal-00985631
[25]
R. Andriatsimandefitra, V. Viet Triem Tong.
Capturing Android Malware Behaviour using System Flow Graph, in: NSS 2014 - The 8th International Conference on Network and System Security, Xi'an, China, October 2014.
https://hal.inria.fr/hal-01018611
[26]
D. Augot, P.-A. Fouque, P. Karpman.
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation, in: Selected Areas in Cryptology, Montreal, Canada, A. Joux, A. Youssef (editors), Selected Areas in Cryptology - SAC 2014, Springer, August 2014, vol. LNCS 8781, pp. 243-260. [ DOI : 10.1007/978-3-319-13051-4_15 ]
https://hal.inria.fr/hal-01094085
[27]
Best Paper
R. Balu, T. Furon, S. Gambs.
Challenging differential privacy: the case of non-interactive mechanisms, in: European Symposium on Research in Computer Security, Wroclaw, Poland, LNCS, Springer-Verlag, September 2014, vol. 8657, Best Student Paper Award. [ DOI : 10.1007/978-3-319-11212-1_9 ]
https://hal.inria.fr/hal-01011346
[28]
G. Bossert, F. Guihéry, G. Hiet.
Towards Automated Protocol Reverse Engineering Using Semantic Information, in: ASIA CCS '14, Kyoto, Japan, June 2014, pp. 51-62, 12 pages. [ DOI : 10.1145/2590296.2590346 ]
https://hal-supelec.archives-ouvertes.fr/hal-01009283
[29]
M. De Saint Léger, S. Gambs, B. Juanals, J.-F. Lalande, J.-L. Minel.
Privacy and Mobile Technologies: the Need to Build a Digital Culture, in: Digital Intelligence 2014, Nantes, France, September 2014, pp. 100-105.
https://halshs.archives-ouvertes.fr/halshs-01065840
[30]
C. Fontaine, S. Gambs, J. Lolive, C. Onete.
Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes, in: Third International Conference on Cryptology and Information Security in Latin America (Latincrypt'14), Florianopolis, Brazil, September 2014.
https://hal.inria.fr/hal-01090053
[31]
P.-A. Fouque, A. Joux, C. Mavromati.
Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE (Full version * ), in: Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, Springer, December 2014, vol. LNCS 8873, 20 p.
https://hal.inria.fr/hal-01094051
[32]
S. Gambs, M.-O. Killijian, C. Lauradoux, C. Onete, M. Roy, M. Traoré.
VSSDB: A Verifiable Secret-Sharing and Distance-Bounding protocol, in: International Conference on Cryptography and Information security (BalkanCryptSec'14), Istanbul, Turkey, October 2014.
https://hal.inria.fr/hal-01090056
[33]
S. Gambs, C. Onete, J.-M. Robert.
Prover anonymous and deniable distance-bounding authentication, in: ASIACCS'14, Kyoto, Japan, Proceedings of the 9th ACM symposium on Information, computer and communications security (ASIACCS'14), June 2014. [ DOI : 10.1145/2590296.2590331 ]
https://hal.inria.fr/hal-01089793
[34]
S. Gambs, S. Ranellucci, A. Tapp.
The crypto-democracy and the Trustworthy, in: Data Privacy Management (DPM'14), Wroclaw, Poland, September 2014.
https://hal.inria.fr/hal-01090047
[35]
S. Gambs, M. Traoré, M. Roy, M.-O. Killijian.
PROPS : A PRivacy-preserving lOcation Proof System, in: 33rd IEEE Symposium on Reliable Distributed Systems (SRDS'14), Nara, Japan, October 2014.
https://hal.inria.fr/hal-01090049
[36]
E. Godefroy, E. Totel, M. Hurfin, F. Majorczyk.
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios, in: 2014 International Conference on Information Assurance and Security (IAS 2014), Okinawa, Japan, IEEE, November 2014, 6 p.
https://hal.inria.fr/hal-01091385
[37]
A. Guellier, C. Bidan, N. Prigent.
Homomorphic Cryptography-based Privacy-Preserving Network Communications, in: Applications and Techniques in Information Security, Deakin University, Melbourne, VIC, Australia, France, L. Batten, G. Li, W. Niu, M. Warren (editors), Communications in Computer and Information Science, Springer Berlin Heidelberg, November 2014, vol. 490, pp. 159-170. [ DOI : 10.1007/978-3-662-45670-5_15 ]
https://hal.inria.fr/hal-01088441
[38]
C. Humphries, N. Prigent, C. Bidan, F. Majorczyk.
Catégorisation par objectifs de la visualisation pour la sécurité, in: CESAR, Rennes, France, November 2014.
https://hal.inria.fr/hal-01096337
[39]
C. Humphries, N. Prigent, C. Bidan, F. Majorczyk.
CORGI: Combination, Organization and Reconstruction through Graphical Interactions, in: VizSec, Paris, France, November 2014. [ DOI : 10.1145/2671491.2671494 ]
https://hal.inria.fr/hal-01096331
[40]
J.-F. Lalande, K. Heydemann, P. Berthomé.
Software countermeasures for control flow integrity of smart card C codes, in: ESORICS - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, M. Kutyłowski, J. Vaidya (editors), LNCS, Springer International Publishing, September 2014, vol. 8713, pp. 200-218. [ DOI : 10.1007/978-3-319-11212-1_12 ]
https://hal.inria.fr/hal-01059201
[41]
C. Li, Y. Wang, M. Hurfin.
Clock Synchronization in Mobile Ad Hoc Networks Based on an Iterative Approximate Byzantine Consensus Protocol, in: 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), Victoria, Canada, May 2014, 8 p. [ DOI : 10.1109/AINA.2014.30 ]
https://hal.inria.fr/hal-01083573
[42]
R. Ludinard, E. Anceaume, Y. Busnel, E. Le Merrer, J.-L. Marchand, B. Sericola, G. Straub.
Anomaly Characterization Problems, in: ALGOTEL 2014 – 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, France, June 2014, pp. 1–4.
https://hal.archives-ouvertes.fr/hal-00985641
[43]
P. Meye, P. Raipin, F. Tronel, E. Anceaume.
A secure two-phase data deduplication scheme, in: 6th International Symposium on Cyberspace Safety and Security (CSS), Paris, France, August 2014.
https://hal.archives-ouvertes.fr/hal-01076918
[44]
P. Meye, P. Raipin, F. Tronel, E. Anceaume.
Mistore: A distributed storage system leveraging the DSL infrastructure of an ISP, in: HPCS - International Conference on High Performance Computing & Simulation, Bologne, Italy, July 2014, pp. 260 - 267. [ DOI : 10.1109/HPCSim.2014.6903694 ]
https://hal.archives-ouvertes.fr/hal-01076907
[45]
P. Meye, P. Raïpin-Parvédy, F. Tronel, E. Anceaume.
Toward a distributed storage system leveraging the DSL infrastructure of an ISP, in: 11th IEEE Consumer Communications and Networking Conference, United States, January 2014, 2 p.
https://hal.archives-ouvertes.fr/hal-00924051
[46]
R. Paiva Melo Marin, G. Piolle, C. Bidan.
Equity-preserving Management of Privacy Conflicts in Social Network Systems, in: PASSAT 2014, Cambridge, United States, Academy of Science and Engineering, December 2014.
https://hal-supelec.archives-ouvertes.fr/hal-01090668

National Conferences with Proceedings

[47]
E. Godefroy, E. Totel, M. Hurfin, F. Majorczyk, A. Maaroufi.
Automatiser la construction de règles de corrélation : prérequis et processus, in: C&ESAR 2014 - Détection et réaction face aux attaques informatiques, Rennes, France, November 2014, 9 p.
https://hal.inria.fr/hal-01091327

Conferences without Proceedings

[48]
G. Arfaoui, G. Dabosville, S. Gambs, P. Lacharme, J.-F. Lalande.
Un pass de transport anonyme et intraçable pour mobile NFC, in: Atelier sur la Protection de la Vie Privée 2014, Cabourg, France, June 2014.
https://hal.inria.fr/hal-01009516
[49]
G. Arfaoui, J.-F. Lalande.
A Privacy Preserving Post-Payment Mobile Ticketing Protocol for Transport Systems, in: Atelier sur la Protection de la Vie Privée 2014, Cabourg, France, June 2014.
https://hal.inria.fr/hal-01091597
[50]
E. Godefroy, E. Totel, F. Majorczyk, M. Hurfin.
Génération automatique de règles de corrélation pour la détection d'attaques complexes, in: 9eme conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR-SSI), Lyon, France, May 2014, 10 p.
https://hal.inria.fr/hal-01083699

Scientific Books (or Scientific Book chapters)

[51]
E. Anceaume, G. Guette, P. Lajoie-Mazenc, T. Sirvent, V. Viet Triem Tong.
Extending Signatures of Reputation, in: Privacy and Identity Management for Emerging Services and Technologies, M. Hansen, J.-H. Hoepman, R. Leenes, D. Whitehouse (editors), IFIP Advances in Information and Communication. Vol. 421, Springer, 2014, pp. 165-176, 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013. [ DOI : 10.1007/978-3-642-55137-6_13 ]
https://hal.archives-ouvertes.fr/hal-00997133
[52]
F. Cuppens, C. Garion, G. Piolle, N. Cuppens-Boulahia.
Normes et logique déontique, in: Panorama de l'Intelligence Artificielle : Volume 1. Représentation des connaissances et formalisation des raisonnements, P. Marquis, O. Papini, H. Prade (editors), Cépaduès Editions, 2014, pp. 215-237, ISBN : 9782364930414.
https://hal.inria.fr/hal-00997137

Internal Reports

[53]
E. Anceaume, Y. Busnel, B. Sericola.
New results on a generalized coupon collector problem using Markov chains, February 2014, 14 pages.
https://hal.archives-ouvertes.fr/hal-00950161
[54]
A. Guellier.
Can Homomorphic Cryptography ensure Privacy?, Inria ; IRISA ; Supélec Rennes, équipe Cidre ; Université de Rennes 1, October 2014, no RR-8568, 109 p.
https://hal.inria.fr/hal-01052509

Other Publications

[55]
E. Anceaume, Y. Busnel, B. Sericola.
New results on a generalized coupon collector problem using Markov chains, June 2014, Preliminary version of the paper to appear in JAP (Journal of Applied Probability).
https://hal.archives-ouvertes.fr/hal-01005333
[56]
E. Anceaume, F. Castella, A. Mostéfaoui, B. Sericola.
Randomized Message-Passing Test-and-Set, October 2014.
https://hal.archives-ouvertes.fr/hal-01075650
[57]
R. Andriatsimandefitra, V. Viet Triem Tong.
Highlighting Easily How Malicious Applications Corrupt Android Devices, September 2014, Research in Attacks, Intrusions, and Defenses.
https://hal.inria.fr/hal-01083376
[58]
P. Lajoie-Mazenc, E. Anceaume, G. Guette, T. Sirvent, V. Viet Triem Tong.
Efficient Distributed Privacy-Preserving Reputation Mechanism Handling Non-Monotonic Ratings, January 2015.
https://hal.archives-ouvertes.fr/hal-01104837
References in notes
[59]
E. Anceaume, R. Ludinard, B. Sericola.
Performance evaluation of large-scale dynamic systems, in: ACM SIGMETRICS Performance Evaluation Review, April 2012, vol. 39, no 4, pp. 108-117. [ DOI : 10.1145/2185395.2185447 ]
http://hal.inria.fr/hal-00736918
[60]
J. C. Demay, F. Majorczyk, E. Totel, F. Tronel.
Detecting illegal system calls using a data-oriented detection model, in: In Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011.
[61]
T. Demongeot, E. Totel, V. Viet Triem Tong, Y. Le Traon.
User Data Confidentiality in an Orchestration of Web Services, in: International Journal of Information Assurance and Security, 2012, vol. 7.
http://hal.inria.fr/hal-00735996
[62]
G. Hiet, V. Viet Triem Tong, L. , B. Morin.
Policy-Based Intrusion Detection in Web Applications by Monitoring Java Information Flows, in: 3nd International Conference on Risks and Security of Internet and Systems (CRiSIS), 2008.
[63]
A. Myers, F. Schneider, K. Birman.
Nsf project security and fault tolerance, nsf cybertrust grant 0430161, 2004.
http://www.cs.cornell.edu/Projects/secft/
[64]
G. Piolle, Y. Demazeau.
Obligations with deadlines and maintained interdictions in privacy regulation frameworks, in: Proc. of the 8th IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'08), Sidney, Australia, December 2008, pp. 162–168.
[65]
O. Sarrouy, E. Totel, B. Jouga.
Building an application data behavior model for intrusion detection, in: Proc. of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montreal Canada, 07 2009, pp. 299–306.
[66]
J. Zimmermann, L. , C. Bidan.
An improved reference flow control model for policy-based intrusion detection, in: Proc. of the 8th European Symposium on Research in Computer Security (ESORICS), October 2003.