Team, Visitors, External Collaborators
Overall Objectives
Research Program
Application Domains
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

[1]
T. Letan.
Specifying and Verifying Hardware-based Security Enforcement Mechanisms, CentraleSupélec, October 2018.
https://hal.inria.fr/tel-01989940

Articles in International Peer-Reviewed Journals

[2]
E. Anceaume, J.-M. Prima.
Améliorer le Bitcoin ... à coup de fourches, in: Emergences Inria, September 2018.
https://hal.archives-ouvertes.fr/hal-01888309
[3]
A. Mesbah, J.-L. Lanet, M. Mezghiche.
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM,, in: International Journal of Information Security, February 2018, pp. 1-16. [ DOI : 10.1007/s10207-018-0401-9 ]
https://hal.inria.fr/hal-01887577
[4]
Y. Mocquard, B. Sericola, E. Anceaume.
Probabilistic Analysis of Rumor Spreading Time, in: INFORMS Journal on Computing, July 2018, pp. 1-20. [ DOI : 10.1287/xxxx.0000.0000 ]
https://hal.archives-ouvertes.fr/hal-01888300
[5]
Y. Wang, P. Wilke, Z. Shao.
An abstract stack based approach to verified compositional compilation to machine code, in: Proceedings of the ACM on Programming Languages, January 2019, vol. 3, no 62, 30 p.
https://hal.archives-ouvertes.fr/hal-02018168

Invited Conferences

[6]
E. Anceaume.
Sycomore, a Directed Acyclic Graph of Blocks, in: The International Industrial & Academic Conference on Blockchain Technology - Chain-In, Porto, France, July 2018, Invited talk.
https://hal.archives-ouvertes.fr/hal-01888302
[7]
J.-F. Lalande.
Android Malware Analysis: from technical difficulties to scientific challenges, in: SecITC 2018 - International Conference on Information Technology and Communications Security, Bucharest, Romania, LNCS, November 2018, pp. 1-54.
https://hal-centralesupelec.archives-ouvertes.fr/hal-01906318
[8]
J.-F. Lalande, V. Viet Triem Tong, M. Leslous, P. Graux.
Challenges for Reliable and Large Scale Evaluation of Android Malware Analysis, in: SHPCS 2018 - International Workshop on Security and High Performance Computing Systems, Orléans, France, IEEE Computer Society, July 2018, pp. 1068-1070. [ DOI : 10.1109/HPCS.2018.00173 ]
https://hal-centralesupelec.archives-ouvertes.fr/hal-01844312
[9]
G. Piolle.
The robustness of security and privacy properties in decentralized applications, in: Surveillance, Resilience & Privacy Conference 2018, Paris, France, December 2018.
https://hal.inria.fr/hal-01988306

International Conferences with Proceedings

[10]
M. Abdul Wahab, P. Cotret, M. Nasr Allah, G. Hiet, A. Kumar Biswas, V. Lapotre, G. Guy.
A small and adaptive coprocessor for information flow tracking in ARM SoCs, in: ReConFig 2018 - International Conference on Reconfigurable Computing and FPGAs, Cancun, Mexico, Proceedings of the 2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig), December 2018, pp. 1-17.
https://hal.archives-ouvertes.fr/hal-01911619
[11]
M. Abdul Wahab, P. Cotret, M. Nasr Allah, G. Hiet, V. Lapotre, G. Guy, A. Kumar Biswas.
A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components, in: AsianHOST 2018 - Asian Hardware Oriented Security and Trust Symposium, Hong Kong, China, Proceedings of the 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), December 2018, pp. 1-13.
https://hal.archives-ouvertes.fr/hal-01911621
[12]
E. Anceaume, Y. Busnel, V. Cazacu.
Finding Top-k Most Frequent Items in Distributed Streams in the Time-Sliding Window Model, in: DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg, Luxembourg, IEEE, June 2018, pp. 1-2. [ DOI : 10.1109/DSN-W.2018.00030 ]
https://hal-imt-atlantique.archives-ouvertes.fr/hal-01839930
[13]
E. Anceaume, Y. Busnel, V. Cazacu.
On the Fly Detection of the Top-k Items in the Distributed Sliding Window Model, in: NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications, Boston, United States, IEEE, November 2018, pp. 1-8. [ DOI : 10.1109/NCA.2018.8548097 ]
https://hal.archives-ouvertes.fr/hal-01888298
[14]
E. Anceaume, A. Guellier, R. Ludinard.
UTXOs as a proof of membership for Byzantine Agreement based Cryptocurrencies, in: IEEE Symposium on Recent Advances on Blockchain and Its Applications, Halifax, Canada, Proceedings of the 2018 IEEE Confs on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, Congress on Cybermatics, IEEE, July 2018, pp. 1-8.
https://hal.archives-ouvertes.fr/hal-01768190
[15]
E. Anceaume, A. Guellier, R. Ludinard, B. Sericola.
Sycomore : a Permissionless Distributed Ledger that self-adapts to Transactions Demand, in: NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications, Boston, United States, IEEE, November 2018, pp. 1-8. [ DOI : 10.1109/NCA.2018.8548053 ]
https://hal.archives-ouvertes.fr/hal-01888265
[16]
S. Bukasa, L. Claudepierre, R. Lashermes, J.-L. Lanet.
When fault injection collides with hardware complexity, in: FPS 2018 - 11th International Symposium on Foundations & Practice of Security, Montréal, Canada, November 2018, pp. 1-16.
https://hal.inria.fr/hal-01950931
[17]
S. K. Bukasa, R. Lashermes, J.-L. Lanet, A. Legay.
Let's shock our IoT's heart: ARMv7-M under (fault) attacks, in: ARES 2018 - 13th International Conference on Availability, Reliability and Security, Hambourg, Germany, ACM Press, August 2018, pp. 1-6. [ DOI : 10.1145/3230833.3230842 ]
https://hal.inria.fr/hal-01950842
[18]
D. Crémilleux, C. Bidan, F. Majorczyk, N. Prigent.
Enhancing Collaboration between Security Analysts in Security Operations Centers, in: CRISIS 2018 - 13th International Conference on Risks and Security of Internet and Systems, Arcachon, France, A. Zemmari, M. Mosbah, N. Cuppens-Boulahia, F. Cuppens (editors), Proceedings of the 13th International Conference on Risks and Security of Internet and Systems, Springer, October 2018, pp. 1-6.
https://hal.inria.fr/hal-01992346
[19]
F. Grandhomme, G. Guette, A. Ksentini, T. Plesse.
Alternatives to Binary Routing Policies Applied to a Military MANET Coalition, in: IWCMC 2018 - 14th International Wireless Communications & Mobile Computing Conference, Limassol, Cyprus, Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, IEEE, June 2018, pp. 1-6. [ DOI : 10.1109/IWCMC.2018.8450393 ]
https://hal.archives-ouvertes.fr/hal-01851409
[20]
O. Koucham, S. Mocanu, G. Hiet, J.-M. Thiriet, F. Majorczyk.
Efficient Mining of Temporal Safety Properties for Intrusion Detection in Industrial Control Systems, in: SAFEPROCESS 2018 - 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, Warsaw, Poland, August 2018, pp. 1-8.
https://hal.archives-ouvertes.fr/hal-01877109
[21]
J.-F. Lalande, V. Viet Triem Tong, P. Graux, G. Hiet, W. Mazurczyk, H. Chaoui, P. Berthomé.
Teaching Android Mobile Security, in: 50th ACM Technical Symposium on Computer Science Education, Minneapolis, United States, Proceedings of the 50th ACM Technical Symposium on Computer Science Education, March 2019.
https://hal-centralesupelec.archives-ouvertes.fr/hal-01940652
[22]
D. Lanoe, M. Hurfin, E. Totel.
A Scalable and Efficient Correlation Engine to Detect Multi-step Attacks in Distributed Systems, in: SRDS 2018 - 37th IEEE International Symposium on Reliable Distributed Systems, Salvador, Brazil, IEEE, October 2018, pp. 1-10.
https://hal.inria.fr/hal-01949183
[23]
H. Le Bouder, G. Thomas, E. Bourget, M. Graa, N. Cuppens-Boulahia, J.-L. Lanet.
Theoretical security evaluation of the Human Semantic Authentication protocol, in: SECRYPT 2018 - 15th International Conference on Security and Cryptography, Porto, Portugal, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, July 2018, vol. 1, pp. 332-339. [ DOI : 10.5220/0006841704980505 ]
https://hal-imt-atlantique.archives-ouvertes.fr/hal-01894470
[24]
T. Letan, Y. Régis-Gianas, P. Chifflier, G. Hiet.
Modular Verification of Programs with Effects and Effect Handlers in Coq, in: FM 2018 - 22nd International Symposium on Formal Methods, Oxford, United Kingdom, LNCS, Springer, July 2018, vol. 10951, pp. 338-354. [ DOI : 10.1007/978-3-319-95582-7_20 ]
https://hal.inria.fr/hal-01799712
[25]
Y. Mocquard, B. Sericola, E. Anceaume.
Balanced allocations and global clock in population protocols: An accurate analysis, in: SIROCCO 2018 - 25th International Colloquium on Structural Information and Communication Complexity, Ma'ale HaHamisha, Israel, June 2018.
https://hal.archives-ouvertes.fr/hal-01888301
[26]
Y. Mocquard, B. Sericola, E. Anceaume.
Population Protocols with Convergence Detection, in: NCA 2018 - 17th IEEE International Symposium on Network Computing and Applications (NCA), Boston, United States, IEEE, November 2018, pp. 1-8. [ DOI : 10.1109/NCA.2018.8548344 ]
https://hal.archives-ouvertes.fr/hal-01849441
[27]
R. Moussaileb, B. Bouget, A. Palisse, H. Le Bouder, N. Cuppens-Boulahia, J.-L. Lanet.
Ransomware's Early Mitigation Mechanisms, in: ARES 2018 - 13th International Conference on Availability, Reliability and Security, Hambourg, Germany, Proceedings of the 13th International Conference on Availability, Reliability and Security, August 2018. [ DOI : 10.1145/3230833.3234691 ]
https://hal.archives-ouvertes.fr/hal-01894500
[28]
L. Ouairy, H. Le Bouder, J.-L. Lanet.
Normalization of Java source codes, in: SECITC 2018 - 11th International Conference on Security for Information Technology and Communications, Bucarest, Romania, November 2018, pp. 1-11.
https://hal.inria.fr/hal-01976747
[29]
L. Ouairy, H. Le Bouder, J.-L. Lanet.
Protection of systems against fuzzing attacks, in: FPS 2018 - 11th International Symposium on Foundations & Practice of Security, Montréal, Canada, November 2018, pp. 1-16.
https://hal.inria.fr/hal-01976753
[30]
L. Ouairy, H. Le Bouder, J.-L. Lanet.
Protection of systems against fuzzing attacks, in: 2018 - European Cyber Week, Rennes, France, November 2018, pp. 1-16.
https://hal.inria.fr/hal-01950822

Conferences without Proceedings

[31]
P. Graux, J.-F. Lalande, V. Viet Triem Tong.
Etat de l'Art des Techniques d'Unpacking pour les Applications Android, in: RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Nancy / La Bresse, France, May 2018, pp. 1-3.
https://hal-centralesupelec.archives-ouvertes.fr/hal-01794252
[32]
J.-F. Lalande, V. Viet Triem Tong.
Le projet CominLabs Kharon: aidons les malwares à s'exécuter, in: RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Nancy / La Bresse, France, May 2018, 1 p.
https://hal-centralesupelec.archives-ouvertes.fr/hal-01794223

Scientific Books (or Scientific Book chapters)

[33]
S. Kremer, L. , D. Rémy, V. Roca.
Cybersecurity: Current challenges and Inria's research directions, Inria white book, Inria, January 2019, no 3, 172 p.
https://hal.inria.fr/hal-01993308

Internal Reports

[34]
E. Anceaume, A. D. Pozzo, R. Ludinard, M. Potop-Butucaru, S. Tucci-Piergiovanni.
Blockchain Abstract Data Type, Sorbonne Université, CNRS, Laboratoire d'Informatique de Paris 6, LIP6, Paris, France, February 2018, pp. 1-30, https://arxiv.org/abs/1802.09877.
https://hal.sorbonne-universite.fr/hal-01718480

Scientific Popularization

[35]
E. Anceaume, J. Jongwane.
Le potentiel révolutionnaire de la technologie blockchain, in: Interstices, May 2018.
https://hal.inria.fr/hal-01827608
[36]
E. Anceaume.
Les enjeux des blockchains, June 2018, Rapport du groupe de travail sur les enjeux de la blockchain. Accessible: https://www.strategie.gouv.fr/sites/strategie.gouv.fr/files/atoms/files/fs-rapport-blockchain-21-juin-2018.pdf.
https://hal.archives-ouvertes.fr/hal-01923502

Other Publications

[37]
E. Anceaume, A. D. Pozzo, R. Ludinard, M. Potop-Butucaru, S. Tucci-Piergiovanni.
POSTER: Blockchain Abstract Data Type, February 2019, pp. 1-2, PPoPP 2019 - 24th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, Poster. [ DOI : 10.1145/3293883.3303705 ]
https://hal.archives-ouvertes.fr/hal-01988364
[38]
Y. Mocquard, B. Sericola, E. Anceaume.
Balanced allocations and global clock in population protocols: An accurate analysis (Full version), May 2018, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01790973