Personnel
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

[1]
Á. García-Recuero.
Discouraging abusive behavior in privacy-preserving decentralized online social networks, Université Rennes 1, May 2017.
https://tel.archives-ouvertes.fr/tel-01548658
[2]
C. Grothoff.
The GNUnet System, Université de Rennes 1, October 2017, Habilitation à diriger des recherches.
https://hal.inria.fr/tel-01654244

Articles in International Peer-Reviewed Journals

[3]
A. Arnold, M. Baleani, A. Ferrari, M. Marazza, V. Senni, A. Legay, J. Quilbeuf, C. Etzien.
An Application of SMC to continuous validation of heterogeneous systems, in: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, February 2017, vol. 4, no 10, pp. 1-19. [ DOI : 10.4108/eai.1-2-2017.152154 ]
https://hal.inria.fr/hal-01630523
[4]
F. Biondi, S. Josse, A. Legay, T. Sirvent.
Effectiveness of Synthesis in Concolic Deobfuscation, in: Computers and Security, September 2017, vol. 70, pp. 500-515. [ DOI : 10.1016/j.cose.2017.07.006 ]
https://hal.inria.fr/hal-01241356
[5]
Y. Cheherazed, J.-L. Lanet, M. Mezghiche, K. Tamine.
Machine Learning Techniques to Predict Sensitive Patterns to Fault Attack in the Java Card Application, in: Journal of Experimental and Theoretical Artificial Intelligence, 2017, forthcoming.
https://hal.inria.fr/hal-01645392
[6]
X. Devroey, G. Perrouin, M. Cordy, H. Samih, A. Legay, P.-Y. Schobbens, P. Heymans.
Statistical Prioritization for Software Product Line Testing: an Experience Report, in: Software and Systems Modeling, February 2017.
https://hal.inria.fr/hal-01642289
[7]
F. Dold, C. Grothoff.
Byzantine set-union consensus using efficient set reconciliation, in: EURASIP Journal on Information Security, December 2017, vol. 2017, no 1, pp. 1-18. [ DOI : 10.1186/s13635-017-0066-3 ]
https://hal.inria.fr/hal-01657397
[8]
J. Duchêne, C. Le Guernic, E. Alata, V. Nicomette, M. Kaâniche.
State of the art of network protocol reverse engineering tools, in: Journal of Computer Virology and Hacking Techniques, 2017, 27 p. [ DOI : 10.1007/s11416-016-0289-8 ]
https://hal.inria.fr/hal-01496958
[9]
N. El Mrabet, A. Mrabet, R. Lashermes, J.-B. Rigaud, B. Bouallegue, S. Mesnager, M. Machhout.
A scalable and systolic architectures of montgomery modular multiplication for public key cryptosystems based on dsps, in: Journal Hardware and Systems Security, 2017.
https://hal.archives-ouvertes.fr/hal-01579811
[10]
A. Heuser, S. Picek, S. Guilley, N. Mentens.
Lightweight Ciphers and their Side-channel Resilience, in: IEEE Transactions on Computers, August 2017, pp. 1-16. [ DOI : 10.1109/TC.2017.2757921 ]
https://hal.archives-ouvertes.fr/hal-01629886
[11]
J.-L. Lanet, H. Le Bouder, M. Benattou, A. Legay.
When time meets test, in: International Journal of Information Security, 2017. [ DOI : 10.1007/s10207-017-0371-3 ]
https://hal.inria.fr/hal-01645395
[12]
J.-L. Lanet, A. Mesbah, M. Mezghiche.
Reverse engineering a Java Card memory management algorithm, in: Computers & Security, May 2017, vol. 66, pp. 97 - 114. [ DOI : 10.1016/j.cose.2017.01.005 ]
https://hal.inria.fr/hal-01645393
[13]
R. Lounas, J.-L. Lanet, M. Mezghiche.
A Formal Verification of Dynamic Updating in a Java-based embedded System, in: International Journal of Critical Computer-Based Systems, 2017, forthcoming.
https://hal.inria.fr/hal-01645401
[14]
B. Nicolas, C. Carlet, S. Guilley, A. Heuser, E. Prouff, O. Rioul.
Stochastic Collision Attack, in: IEEE Transactions on Information Forensics and Security, April 2017, vol. 12, no 9, pp. 2090 - 2104. [ DOI : 10.1109/TIFS.2017.2697401 ]
https://hal.archives-ouvertes.fr/hal-01629880
[15]
B. Nicolas, S. Guilley, A. Heuser, M. Damien, O. Rioul.
Optimal side-channel attacks for multivariate leakages and multiple models, in: Journal of Cryptographic Engineering, August 2017, vol. 7, no 4, pp. 331–341. [ DOI : 10.1007/s13389-017-0170-9 ]
https://hal.archives-ouvertes.fr/hal-01629885
[16]
S. Picek, A. Heuser, S. Guilley.
Template attack versus Bayes classifier, in: Journal of Cryptographic Engineering, September 2017, vol. 7, no 4, pp. 343–351. [ DOI : 10.1007/s13389-017-0172-7 ]
https://hal.archives-ouvertes.fr/hal-01629884
[17]
È. de Chèrisey, S. Guilley, A. Heuser, O. Rioul.
On the optimality and practicability of mutual information analysis in some scenarios, in: Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , June 2017.
https://hal.archives-ouvertes.fr/hal-01645127

International Conferences with Proceedings

[18]
F. Biondi, M. Chadli, T. Given-Wilson, A. Legay.
Information Leakage as a Scheduling Resource, in: International Workshop on Formal Methods for Industrial Critical Systems and Automated Verification of Critical Systems, Turin, Italy, September 2017.
https://hal.inria.fr/hal-01382052
[19]
F. Biondi, F. Déchelle, A. Legay.
MASSE: Modular Automated Syntactic Signature Extraction, in: ISSRE 2017 - The 28th International Symposium on Software Reliability Engineering - IEEE, Toulouse, France, IEEE, October 2017, pp. 1-2.
https://hal.inria.fr/hal-01629035
[20]
F. Biondi, Y. Kawamoto, A. Legay, L.-M. Traonouez.
HyLeak: Hybrid Analysis Tool for Information Leakage, in: ATVA 2017 - Fifteenth International Symposium on Automated Technology for Verification and Analysis, Pune, India, October 2017, 14 p.
https://hal.inria.fr/hal-01546817
[21]
A. Bkakria, M. Graa, N. Cuppens-Boulahia, F. Cuppens, J.-L. Lanet.
Real-time detection and reaction to Activity hijacking attacks in Android smartphones, in: PST 2017, Privacy, Security, and Trust - 15th International Conference, Calgary, Canada, August 2017.
https://hal.inria.fr/hal-01645399
[22]
Q. Cappart, C. Limbrée, P. Schaus, J. Quilbeuf, L.-M. Traonouez, A. Legay.
Verification of Interlocking Systems Using Statistical Model Checking, in: 18th IEEE International Symposium on High Assurance Systems Engineering (HASE), Singapore, Singapore, 18th IEEE International Symposium on High Assurance Systems Engineering (HASE), January 2017, pp. 61 - 68. [ DOI : 10.1109/HASE.2017.10 ]
https://hal.archives-ouvertes.fr/hal-01591338
[23]
C. Carlet, A. Heuser, S. Picek.
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience, in: ACNS 2017 - International Conference on Applied Cryptography and Network Security, Kanazawa, Japan, LNCS, Springer, July 2017, vol. 10355, pp. 393-414. [ DOI : 10.1007/978-3-319-61204-1_20 ]
https://hal.archives-ouvertes.fr/hal-01629879
[24]
M. Contini, G. Di Natale, A. Heuser, T. Poppelmann, N. Mentens.
Do we need a holistic approach for the design of secure IoT systems?, in: Computing Frontiers Conference, Siena, Italy, May 2017.
https://hal.archives-ouvertes.fr/hal-01628683
[25]
X. Devroey, G. Perrouin, M. Papadakis, A. Legay, P.-Y. Schobbens, P. Heymans.
Automata Language Equivalence vs. Simulations for Model-based Mutant Equivalence: An Empirical Evaluation, in: ICST 2017 - International Conference on Software Testing, Verification and Validation, tokyo, Japan, March 2017.
https://hal.inria.fr/hal-01640101
[26]
T. Given-Wilson, N. JAFRI, J.-L. Lanet, A. Legay.
An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT, in: 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 2017, pp. 293 - 300. [ DOI : 10.1109/Trustcom/BigDataSE/ICESS.2017.250 ]
https://hal.inria.fr/hal-01629098
[27]
T. Given-Wilson, A. Legay, S. Sedwards.
Information Security, Privacy, and Trust in Social Robotic Assistants for Older Adults, in: HAS 2017 - International Conference on Human Aspects of Information Security, Privacy, and Trust, Vancouver, Canada, T. Tryfonas (editor), LNCS, Springer, July 2017, vol. 10292, pp. 90-109. [ DOI : 10.1007/978-3-319-58460-7_7 ]
https://hal.inria.fr/hal-01629094
[28]
P. Gjøl Jensen, K. G. Larsen, A. Legay, D. B. Poulsen.
Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata, in: GraMSec 2017 - The Fourth International Workshop on Graphical Models for Security, Santa Barbara , United States, August 2017.
https://hal.inria.fr/hal-01640091
[29]
M. Graa, N. Cuppens-Boulahia, F. Cuppens, J.-L. Lanet, R. Moussaileb.
Detection of Side Channel Attacks Based on Data Tainting in Android Systems, in: SEC 2017 - 32th IFIP International Conference on ICT Systems Security and Privacy Protection, Rome, Italy, S. D. C. di Vimercati, F. Martinelli (editors), ICT Systems Security and Privacy Protection, Springer International Publishing, May 2017, vol. AICT-502, pp. 205-218, Part 4: Operating System and Firmware Security. [ DOI : 10.1007/978-3-319-58469-0_14 ]
https://hal.inria.fr/hal-01648994
[30]
S. Guilley, A. Heuser, O. Rioul.
Codes for Side-Channel Attacks and Protections, in: C2SI 2017 - International Conference on Codes, Cryptology, and Information Security, Rabat, Morocco, LNCS, April 2017, vol. 10194, pp. 35-55. [ DOI : 10.1007/978-3-319-55589-8_3 ]
https://hal.archives-ouvertes.fr/hal-01629876
[31]
B. Kevin, R. Lashermes, J.-L. Lanet, H. Le Bouder, A. Legay.
How TrustZone could be bypassed: Side-Channel Attacks on a modern System-on-Chip, in: Wistp'17, International Conference on Information Security Theory and Practice, Heraklion, Greece, September 2017.
https://hal.inria.fr/hal-01645398
[32]
A. Kunnappilly, A. Legay, T. Margaria, C. Seceleanu, B. Steffen, L.-M. Traonouez.
Analyzing Ambient Assisted Living Solutions: A Research Perspective, in: 12th International Conference on Desig &Technology of Integrated Systems In Nanoscale Era (DTIS), Palma de Mallorca, Spain, 12th International Conference on Desig &Technology of Integrated Systems In Nanoscale Era (DTIS), April 2017, pp. 1 - 7. [ DOI : 10.1109/DTIS.2017.7930168 ]
https://hal.archives-ouvertes.fr/hal-01591347
[33]
J.-L. Lanet.
Experimenting similarity-based hijacking attacks detection and response in Android Systems, in: ICISS, International Conference on Information Systems Security, Bombay, India, December 2017.
https://hal.inria.fr/hal-01645400
[34]
J.-L. Lanet, A. Palisse.
When data reveals ransomware activity, in: 4th International Conference on Operational Planning, Technological Innovations and Mathematical Applications,, Athen, Greece, May 2017.
https://hal.inria.fr/hal-01645396
[35]
C. Le Guernic.
Toward a Sound Analysis of Guarded LTI Loops with Inputs by Abstract Acceleration (extended version), in: Static Analysis Symposium, New York, United States, Lecture Notes in Computer Science, August 2017, vol. 10422.
https://hal.inria.fr/hal-01550767
[36]
G. Li, P. M. Jensen, K. G. Larsen, A. Legay, D. B. Poulsen.
Practical Controller Synthesis for MTL0,, in: International SPIN Symposium on Model Checking of Software, Santa barbara , United States, July 2017.
https://hal.inria.fr/hal-01642162
[37]
G. Perrouin, P. Heymans, A. Legay, X. Devroey, M. Cordy, P.-Y. Schobbens.
On Featured Transition Systems, in: SOFSEM 2017 - 43rd International Conference on Current Trends in Theory and Practice of Informatics, Limerick , Ireland, January 2017.
https://hal.inria.fr/hal-01640267
[38]
S. Picek, A. Heuser, A. Jovic, A. Legay.
Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks, in: AFRICACRYPT 2017 - International Conference on Cryptology in Africa, Dakar, Senegal, LNCS, Springer, May 2017, vol. 10239, pp. 61-78. [ DOI : 10.1007/978-3-319-57339-7_4 ]
https://hal.archives-ouvertes.fr/hal-01629878

Conferences without Proceedings

[39]
S. Guilley, A. Heuser, M. Tang, O. Rioul.
Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition, in: SecITC 2017, Bucharest, Romania, June 2017.
https://hal.archives-ouvertes.fr/hal-01628679
[40]
J.-L. Lanet.
Formal Methods and the Dark Side of the Force, in: Journée Approches Formelles des Systèmes Embarqués Communicants, Paris, France, June 2017.
https://hal.inria.fr/hal-01645403
[41]
J.-L. Lanet, A. Mesbah.
The Express Laundry - from black box to white box, in: Workshop InS3PECT: Ingénierie Système de Services Sécurisés Pour objEts ConnecTé, Nice, France, December 2017.
https://hal.inria.fr/hal-01645404
[42]
A. Legay, L.-M. Traonouez.
Plasma Lab Statistical Model Checker: Architecture, Usage and Extension, in: SOFSEM 2017 - 43rd International Conference on Current Trends in Theory and Practice of Computer Science, Limerick, Ireland, January 2017.
https://hal.archives-ouvertes.fr/hal-01613581
[43]
A. Mesbah, J.-L. Lanet, M. Mezghiche.
Reverse Engineering a Code without the Code, in: 1st Reversing and Offensive-oriented Trends Symposium 2017, Vienna, Austria, Sergey Bratus (Dartmouth College), November 2017.
https://hal.inria.fr/hal-01591926
[44]
A. Mesbah, M. Mezghiche, J.-L. Lanet.
Persistant Fault Injection Attack, From White-box to Black-box, in: The 5th International Conference on Electrical Engineering - ICEE 2017, Boumedrès, Algeria, October 2017.
https://hal.inria.fr/hal-01591931
[45]
A. Palisse, A. Durand, H. Le Bouder, C. Le Guernic, J.-L. Lanet.
Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure,, in: NordSec 2017, Tartu, Estonia, November 2017.
https://hal.inria.fr/hal-01591939
[46]
S. Picek, A. Heuser, A. Jovic, S. Ludwig, S. Guilley, D. Jakobović, N. Mentens.
Side-channel analysis and machine learning: A practical perspective, in: International Joint Conference on Neural Networks (IJCNN), Anchorage, United States, May 2017.
https://hal.archives-ouvertes.fr/hal-01628681

Books or Proceedings Editing

[47]
M. Duranton, K. De Bosschere, C. Gamrat, J. Maebe, H. Munk, O. Zendra (editors)
The HiPEAC Vision 2017, HiPEAC network of excellence, January 2017, 138 p.
https://hal.inria.fr/hal-01491758
[48]
F. Oquendo, K. Drira, A. Legay, T. Batista (editors)
Proceedings of the 1st ACM SAC Conference Track on Software-intensive Systems-of-Systems (SiSoS 2017): 32nd ACM SIGAPP Symposium On Applied Computing, ACM, Marrakesh, Morocco, April 2017.
https://hal.archives-ouvertes.fr/hal-01445350

Scientific Popularization

[49]
A. Palisse, J. Jongwane.
Quelles solutions pour se protéger des logiciels de rançon ?, in: Interstices, October 2017.
https://hal.inria.fr/hal-01688779

Other Publications

[50]
N. Ben Said, T. Abdellatif, M. Bozga, S. Ben Salem, A. Legay.
Orchestration for Secure Multi-party Communications in Web-Services ✩, November 2017, working paper or preprint.
https://hal.inria.fr/hal-01629427
[51]
N. Ben Said, F. Biondi, V. Bontchev, O. Decourbe, T. Given-Wilson, A. Legay, J. Quilbeuf.
Detection of Mirai by Syntactic and Semantic Analysis, November 2017, working paper or preprint.
https://hal.inria.fr/hal-01629040
[52]
F. Biondi, M. A. Enescu, A. Heuser, A. Legay, K. S. Meel, J. Quilbeuf.
Scalable Approximation of Quantitative Information Flow in Programs, November 2017, working paper or preprint.
https://hal.inria.fr/hal-01629131
[53]
F. Biondi, T. Given-Wilson, A. Legay.
Universal Optimality of Apollonian Cell Encoders, October 2017, working paper or preprint.
https://hal.inria.fr/hal-01571226
[54]
F. Biondi, Y. Kawamoto, A. Legay, L.-M. Traonouez.
Hybrid Statistical Estimation of Mutual Information and its Application to Information Flow, November 2017, working paper or preprint.
https://hal.inria.fr/hal-01629033
[55]
M. Chadli, J. H. Kim, K. G. Larsen, A. Legay, S. Naujokat, B. Steffen, L.-M. Traonouez.
High-level Frameworks for the Specification and Verification of Scheduling Problems, October 2017, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01613576
[56]
T. Given-Wilson, A. Heuser, N. JAFRI, J.-L. Lanet, A. Legay.
An Automated and Scalable Formal Process for Detecting Fault Injection Vulnerabilities in Binaries, November 2017, working paper or preprint.
https://hal.inria.fr/hal-01629135
[57]
T. Given-Wilson, N. JAFRI, J.-L. Lanet, A. Legay.
An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT – Extended Version, April 2017, working paper or preprint.
https://hal.inria.fr/hal-01400283
[58]
T. Given-Wilson, A. Legay, S. Sedwards, O. Zendra.
Modelling of Machine-Aided Human Group Motion, November 2017, working paper or preprint.
https://hal.inria.fr/hal-01629137
[59]
A. Heuser, S. Picek, A. Jovic, A. Legay.
On the Relevance of Feature Selection for Profiled Side-channel Attacks, November 2017, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01645128
[60]
A. Heuser, S. Picek, A. Legay, K. Knezevic.
Profiled SCA with a New Twist: Semi-supervised Learning, November 2017, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01645130
[61]
L.-M. Traonouez, A. Legay, D. Nowotka, D. B. Poulsen.
Statistical Model Checking of LLVM Code, November 2017, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01640097
References in notes
[62]
M. Chadli, J. H. Kim, A. Legay, L.-M. Traonouez, S. Naujokat, B. Steffen, K. G. Larsen.
A Model-Based Framework for the Specification and Analysis of Hierarchical Scheduling Systems, in: FMICS-AVoCS, Pise, Italy, Critical Systems: Formal Methods and Automated Verification, Springer, September 2016, vol. 9933, pp. 133 - 141. [ DOI : 10.1007/978-3-319-45943-1_9 ]
https://hal.archives-ouvertes.fr/hal-01241681
[63]
Á. García-Recuero, J. Burdges, C. Grothoff.
Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks, in: 11th International ESORICS Workshop in Data Privacy Management, DPM 2016, Heraklion, Crete, Greece, G. Livraga, V. Torra, A. Aldini, F. Martinelli, N. Suri (editors), Springer Lecture Notes in Computer Science (LNCS) series, Springer, September 2016, vol. 9963, pp. 78-93. [ DOI : 10.1007/978-3-319-47072-6_6 ]
https://hal.inria.fr/hal-01355951
[64]
A. Heuser, S. Picek, S. Guilley, N. Mentens.
Side-channel Analysis of Lightweight Ciphers: Current Status and Future Directions, October 2016, Lightweight Cryptography Workshop 2016.
https://hal.inria.fr/hal-01407264
[65]
A. Heuser, S. Picek, S. Guilley, N. Mentens.
Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?, in: RFIDSec 2016: 12th Workshop on RFID and IoT Security, Hong Kong, Hong Kong SAR China, November 2016.
https://hal.inria.fr/hal-01402238
[66]
A. Savary, M. Frappier, M. Leuschel, J. Lanet.
Model-Based Robustness Testing in Event-B Using Mutation, in: Software Engineering and Formal Methods - 13th International Conference, SEFM 2015, York, UK, September 7-11, 2015. Proceedings, R. Calinescu, B. Rumpe (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9276, pp. 132–147.
http://dx.doi.org/10.1007/978-3-319-22969-0_10
[67]
N. H. Walfield, J. L. Griffin, C. Grothoff.
A Quantitative Analysis of Cell Tower Trace Data for Understanding Human Mobility and Mobile Networks, in: 6th International Workshop on Mobile Entity Localization, Tracking and Analysis (MELT), San Francisco, United States, October 2016. [ DOI : 10.1145/1235 ]
https://hal.inria.fr/hal-01378622