Team, Visitors, External Collaborators
Overall Objectives
Research Program
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

[1]
S. K. Bukasa.
Vulnerability analysis of embedded systems against physical attacks, Université Rennes 1, July 2019.
https://tel.archives-ouvertes.fr/tel-02418822
[2]
R. Chevalier.
Detecting and Surviving Intrusions: Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches, CentraleSupélec, December 2019.
https://hal.inria.fr/tel-02417644
[3]
P. Mensah.
Generation and Dynamic Update of Attack Graphs in Cloud Providers Infrastructures, CentraleSupélec, June 2019.
https://hal.inria.fr/tel-02416305
[4]
A. Palisse.
Analysis and detection of ransomware, Université de Rennes 1 ; Inria, March 2019.
https://hal.archives-ouvertes.fr/tel-02415976

Articles in International Peer-Reviewed Journals

[5]
F. Besson, S. Blazy, P. Wilke.
CompCertS: A Memory-Aware Verified C Compiler using a Pointer as Integer Semantics, in: Journal of Automated Reasoning, August 2019, vol. 63, no 2, pp. 369-392. [ DOI : 10.1007/s10817-018-9496-y ]
https://hal.inria.fr/hal-02401182
[6]
S. Hamadouche, M. Mezghiche, J.-L. Lanet.
Hiding a fault enabled virus through code construction, in: Journal of Computer Virology and Hacking Techniques, 2019, pp. 1-22. [ DOI : 10.1007/s11416-019-00340-z ]
https://hal.inria.fr/hal-02416015
[7]
K. Heydemann, J.-F. Lalande, P. Berthomé.
Formally verified software countermeasures for control-flow integrity of smart card C code, in: Computers and Security, August 2019, vol. 85, pp. 202-224. [ DOI : 10.1016/j.cose.2019.05.004 ]
https://hal.sorbonne-universite.fr/hal-02123836
[8]
C. Kirchner, L. .
Défis de la recherche scientifique en cyber-sécurité, in: Annales des Mines - Enjeux Numériques, December 2019, pp. 1-15.
https://hal.inria.fr/hal-02381411
[9]
Y. Mocquard, B. Sericola, E. Anceaume.
Probabilistic Analysis of Rumor Spreading Time, in: INFORMS Journal on Computing, July 2019, pp. 1-20. [ DOI : 10.1287/ijoc.2018.0845 ]
https://hal.archives-ouvertes.fr/hal-01888300

Invited Conferences

[10]
P. Graux, J.-F. Lalande, V. Viet Triem Tong.
Obfuscated Android Application Development, in: CECC 2019 - Central European Cybersecurity Conference, Munich, Germany, ACM Press, November 2019, pp. 1-6. [ DOI : 10.1145/3360664.3361144 ]
https://hal-centralesupelec.archives-ouvertes.fr/hal-02305924
[11]
J.-L. Lanet.
Ransomware can always be detected but at which cost ?, in: JATNA'04, Oujda, Morocco, November 2019.
https://hal.inria.fr/hal-02416070

International Conferences with Proceedings

[12]
E. Anceaume, A. D. Pozzo, R. Ludinard, M. Potop-Butucaru, S. Tucci-Piergiovanni.
Blockchain Abstract Data Type, in: SPAA 2019 - 31st ACM Symposium on Parallelism in Algorithms and Architectures, Phoenix, United States, ACM, June 2019, pp. 1-11. [ DOI : 10.1145/3323165.3323183 ]
https://hal-cnrs.archives-ouvertes.fr/hal-02380364
[13]
A. Berady, V. Viet Triem Tong, G. Guette, C. Bidan, G. Carat.
Modeling the Operational Phases of APT Campaigns, in: CSCI 2019 - 6th Annual Conf. on Computational Science & Computational Intelligence, Las Vegas, United States, December 2019, pp. 1-6.
https://hal.inria.fr/hal-02379869
[14]
F. Besson, S. Blazy, A. Dang, T. Jensen, P. Wilke.
Compiling Sandboxes: Formally Verified Software Fault Isolation, in: ESOP 2019 - 28th European Symposium on Programming, Prague, Czech Republic, LNCS, Springer, April 2019, vol. 11423, pp. 499-524. [ DOI : 10.1007/978-3-030-17184-1_18 ]
https://hal.inria.fr/hal-02316189
[15]
E. Boespflug, R. Gourier, J.-L. Lanet.
Predicting the Effect of Hardware Fault Injection, in: IWBIS 2019 - 4th IEEE International Workshop on Big Data and Information Security, Bali, Indonesia, IEEE, October 2019, pp. 103-108. [ DOI : 10.1109/IWBIS.2019.8935864 ]
https://hal.inria.fr/hal-02416062
[16]
R. Chevalier, S. Cristalli, C. Hauser, Y. Shoshitaishvili, R. Wang, C. Kruegel, G. Vigna, D. Bruschi, A. Lanzi.
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images, in: CODASPY 2019 - Conference on Data and Application Security and Privacy, Dallas, United States, ACM Press, March 2019, pp. 1-11, https://arxiv.org/abs/1903.12505. [ DOI : 10.1145/3292006.3300026 ]
https://hal.inria.fr/hal-02066420
[17]
R. Chevalier, D. Plaquin, C. Dalton, G. Hiet.
Survivor: A Fine-Grained Intrusion Response and Recovery Approach for Commodity Operating Systems, in: ACSAC 2019 - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, Proceedings of the 35th Annual Computer Security Applications Conference, December 2019, vol. 2019, https://arxiv.org/abs/1912.06863. [ DOI : 10.1145/3359789.3359792 ]
https://hal.inria.fr/hal-02289315
[18]
G. A. Di Luna, E. Anceaume, L. Querzoni.
Byzantine Generalized Lattice Agreement, in: Proceedings of the 34th IEEE International Parallel and Distributed Processing Symposium (IPDPS 2020), New Orleans, Louisiana, United States, IEEE, May 2020.
https://hal-cnrs.archives-ouvertes.fr/hal-02380446
[19]
A. Durand, E. Anceaume, R. Ludinard.
STAKECUBE: Combining Sharding and Proof-of-Stake to build Fork-free Secure Permissionless Distributed Ledgers, in: International conference on networked systems (NETYS), Marrakesh, Morocco, June 2019.
https://hal.archives-ouvertes.fr/hal-02078072
[20]
J.-F. Lalande, P. Graux, T. Concepción Miranda.
Orchestrating Android Malware Experiments, in: MASCOTS 2019 - 27th IEEE International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Rennes, France, IEEE Computer societry, October 2019, pp. 1-2.
https://hal-centralesupelec.archives-ouvertes.fr/hal-02305473
[21]
J.-F. Lalande, V. Viet Triem Tong, P. Graux, G. Hiet, W. Mazurczyk, H. Chaoui, P. Berthomé.
Teaching Android Mobile Security, in: SIGCSE '19 - 50th ACM Technical Symposium on Computer Science Education, Minneapolis, United States, Proceedings of the 50th ACM Technical Symposium on Computer Science Education, ACM Press, February 2019, pp. 232-238. [ DOI : 10.1145/3287324.3287406 ]
https://hal-centralesupelec.archives-ouvertes.fr/hal-01940652
[22]
D. Lanoe, M. Hurfin, E. Totel, C. Maziero.
An Efficient and Scalable Intrusion Detection System on Logs of Distributed Applications, in: SEC 2019 - 34th IFIP International Conference on ICT Systems Security and Privacy Protection, Lisbonne, Portugal, Springer, June 2019, pp. 49-63. [ DOI : 10.1007/978-3-030-22312-0_4 ]
https://hal.inria.fr/hal-02409487
[23]
T. Letan, Y. Régis-Gianas.
FreeSpec: Specifying, Verifying and Executing Impure Computations in Coq, in: 9th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP '20), Nouvelle-Orléans, United States, January 2020. [ DOI : 10.1145/3372885.3373812 ]
https://hal.inria.fr/hal-02422273
[24]
Y. Mocquard, B. Sericola, E. Anceaume.
Brief: Explicit and Tight Bounds of the Convergence Time of Average-based Population Protocols, in: SIROCCO 2019 - 26th International Colloquium Structural Information and Communication Complexity, L'Aquila, Italy, Springer, July 2019, pp. 1-4. [ DOI : 10.1007/978-3-030-24922-9_29 ]
https://hal-cnrs.archives-ouvertes.fr/hal-02380422
[25]
L. Ouairy, H. Le Bouder, J.-L. Lanet.
JavaNeighbors: Improving ChuckyJava’s neighborhood discovery algorithm, in: EUSPN 2019 - 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, Coimbre, Portugal, November 2019, pp. 1-7.
https://hal.inria.fr/hal-01950822
[26]
V. Viet Triem Tong, C. Herzog, T. Concepción Miranda, P. Graux, J.-F. Lalande, P. Wilke.
Isolating malicious code in Android malware in the wild, in: MALCON 2019 - 14th International Conference on Malicious and Unwanted Software, Nantucket, United States, MALCON 2019, IEEE Computer society, October 2019.
https://hal-centralesupelec.archives-ouvertes.fr/hal-02288116

National Conferences with Proceedings

[27]
N. Ourdi, A. Palisse, J.-L. Lanet.
Classification of ransomwares using Artificial Neural Networks and Bayesian Networks, in: Third International Conference on Intelligent Computing in Data Sciences, Marrakech, Morocco, November 2019.
https://hal.inria.fr/hal-02416086

Conferences without Proceedings

[28]
E. Anceaume, Y. Busnel, V. Cazacu.
L'art d'extraire des éléments du top-k en temps réel sur des fenêtres glissantes réparties, in: ALGOTEL 2019 - 21èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Saint Laurent de la Cabrerisse, France, June 2019, pp. 1-4.
https://hal-imt-atlantique.archives-ouvertes.fr/hal-02118367
[29]
E. Anceaume, A. Guellier, R. Ludinard, B. Sericola.
Sycomore : un registre de transactions distribué et public au débit auto-adaptatif, in: ALGOTEL 2019 - 21èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Saint Laurent de la Cabrerisse, France, June 2019, pp. 1-4.
https://hal.archives-ouvertes.fr/hal-02118385
[30]
L. Claudepierre, P. Besnier.
Microcontroller Sensitivity to Fault-Injection Induced by Near-Field Electromagnetic Interference, in: APEMC 2019 - Asia-Pacific International Symposium on Electromagnetic Compatibility, Sapporo, Japan, June 2019, pp. 1-4.
https://hal.archives-ouvertes.fr/hal-02313980
[31]
B. Fournier, G. Guette, V. Viet Triem Tong, J.-L. Lanet.
SEER4US, Secured Energy Efficient Routing for UAV Swarms, in: WiMob 2019 - 15th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Barcelona, France, October 2019, pp. 1-6.
https://hal.archives-ouvertes.fr/hal-02294744
[32]
K. Le Bon, B. Hawkins, E. Rohou, G. Hiet, F. Tronel.
Plateforme de protection de binaires configurable et dynamiquement adaptative, in: RESSI 2019 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Erquy, France, May 2019, pp. 1-3.
https://hal.inria.fr/hal-02385216
[33]
Y. Lemmou, H. Le Bouder, J.-L. Lanet.
Discriminating Unknown Software Using Distance Model, in: ICACSIS 2019 - 11th International Conference on Advanced Computer Science and Information Systems, Bali, Indonesia, IEEE, October 2019.
https://hal.archives-ouvertes.fr/hal-02352861
[34]
R. Moussaileb, C. Berrti, G. Deboisdeffre, N. Cuppens, J.-L. Lanet.
Watch Out! Doxware on The Way…, in: CRiSIS 2019 - 14th International Conference on Risks and Security of Internet and Systems, Hammamet, Tunisia, October 2019.
https://hal.archives-ouvertes.fr/hal-02313650
[35]
R. Moussaileb, N. Cuppens, J.-L. Lanet, H. Le Bouder.
Ransomware Network Traffic Analysis for Pre-Encryption Alert, in: FPS 2019 - 12th International Symposium on Foundations & Practice of Security, Toulouse, France, November 2019.
https://hal.archives-ouvertes.fr/hal-02313656
[36]
C. Xosanavongsa, E. Totel, O. Bettan.
Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events, in: EuroS&P 2019 - 4th IEEE European Symposium on Security and Privacy, Stockholm, Sweden, IEEE, June 2019, pp. 340-355. [ DOI : 10.1109/EuroSP.2019.00033 ]
https://hal-imt-atlantique.archives-ouvertes.fr/hal-02363431

Scientific Books (or Scientific Book chapters)

[37]
S. Kremer, L. , D. Rémy, V. Roca.
Cybersecurity : Current challenges and Inria's research directions, Inria white book, Inria, January 2019, no 3, 172 p.
https://hal.inria.fr/hal-01993308

Internal Reports

[38]
Y. Mocquard, F. Robin, B. Sericola, E. Anceaume.
Average-based Population Protocols : Explicit and Tight Bounds of the Convergence Time, Irisa, July 2019.
https://hal.archives-ouvertes.fr/hal-02178618

Scientific Popularization

[39]
V. Viet Triem Tong, B. Fournier, G. Fournier, L. Ouairy, P. Cotret.
Dis, c'est quoi là haut dans le ciel ? C'est un Linux, mon petit, in: MISC - Le journal de la sécurité informatique, July 2019.
https://hal.archives-ouvertes.fr/hal-02380997

Other Publications

[40]
E. Anceaume, A. Del Pozzo, R. Ludinard, M. Potop-Butucaru, S. Tucci-Piergiovanni.
POSTER: Blockchain Abstract Data Type, ACM, February 2019, pp. 1-2, 24th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming (PPoPP 2019), Poster. [ DOI : 10.1145/3293883.3303705 ]
https://hal.archives-ouvertes.fr/hal-01988364
[41]
E. Anceaume, M. Papatriantafilou, M. Potop-Butucaru, P. Tsigas.
Distributed Ledger Register: From Safe to Atomic, July 2019, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-02201472