Bibliography
Major publications by the team in recent years
-
1E. Anceaume, R. Ludinard, B. Sericola.
Performance evaluation of large-scale dynamic systems, in: ACM SIGMETRICS Performance Evaluation Review, April 2012, vol. 39, no 4, pp. 108-117. [ DOI : 10.1145/2185395.2185447 ]
http://hal.archives-ouvertes.fr/hal-00736918 -
2M. A. Ayachi, C. Bidan, N. Prigent.
A Trust-Based IDS for the AODV Protocol, in: Proc. of the 12th international conference on Information and communications security (ICICS 2010), Barcelona, Spain, December 2010. -
3M. Ben Ghorbel-Talbi, F. Cuppens, N. Cuppens-Boulahia, D. Le Métayer, G. Piolle.
Delegation of Obligations and Responsibility, in: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference (SEC2011), J. Camenisch, S. Fischer-Hübner, Y. Murayama, A. Portmann, C. Rieder (editors), IFIP AICT, Springer, 2011, vol. 354, pp. 197–209. -
4J. C. Demay, F. Majorczyk, E. Totel, F. Tronel.
Detecting illegal system calls using a data-oriented detection model, in: Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011. -
5S. Gambs, B. Kégl, E. Aïmeur.
Privacy-preserving boosting, in: Data Mining and Knowledge Discovery, 2007, vol. 14, no 1, pp. 131-170. -
6G. Hiet, V. Viet Triem Tong, L. Mé, B. Morin.
Policy-based intrusion detection in web applications by monitoring Java information flows, in: International Journal of Information and Computer Security, 2009, vol. 3, no 3/4, pp. 265–279. -
7L. Mé, H. Debar.
New Directions in Intrusion Detection and Alert Correlation, in: The Information - Interaction - Intelligence (I3) Journal, 2010, vol. 10, no 1. -
8G. Piolle, Y. Demazeau.
Representing privacy regulations with deontico-temporal operators, in: Web Intelligence and Agent Systems, Jul 2011, vol. 9, no 3, pp. 209-226. -
9E. Totel, F. Majorczyk, L. Mé.
COTS Diversity based Intrusion Detection and Application to Web Servers, in: Proc. of the International Symposium on Recent Advances in Intrusion Detection (RAID'2005), Seattle, USA, September 2005. -
10D. Zou, N. Prigent, J. Bloom.
Compressed Video Stream Watermarking for Peer-to-Peer-Based Content Distribution Network, in: Proc. of the IEEE International Conference on Multimedia and Expo (IEEE ICME), New York City, USA, June 2009.
Doctoral Dissertations and Habilitation Theses
-
11M. Assaf.
From qualitative to quantitative program analysis : permissive enforcement of secure information flow, Université Rennes 1, May 2015.
https://tel.archives-ouvertes.fr/tel-01184857 -
12C. Humphries.
User-centred security event visualisation, Université de Rennes 1, December 2015.
https://hal.inria.fr/tel-01242084 -
13P. Lajoie-Mazenc.
Reputation and privacy preservation in dynamic auto-organized networks, Université Rennes 1, September 2015.
https://tel.archives-ouvertes.fr/tel-01232139 -
14R. Paiva Melo Marin.
Enhancing Privacy Protection in Social Network Systems Through Decentralization and Policy Conflict Management, CentraleSupélec, September 2015.
https://hal.inria.fr/tel-01242091
Articles in International Peer-Reviewed Journals
-
15E. Anceaume, Y. Busnel, E. Schulte-Geers, B. Sericola.
Optimization Results for a Generalized Coupon Collector Problem, in: Journal of Applied Probability, June 2015, 9 p.
https://hal.archives-ouvertes.fr/hal-01189578 -
16E. Anceaume, Y. Busnel, B. Sericola.
New results on a generalized coupon collector problem using Markov chains, in: Journal of Applied Probability, 2015, 17 p. [ DOI : 10.1239/jap/1437658606 ]
https://hal.archives-ouvertes.fr/hal-01189564 -
17G. Arfaoui, J.-F. Lalande, J. Traoré, N. Desmoulins, P. Berthomé, S. Gharout.
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing, in: Proceedings on Privacy Enhancing Technologies, June 2015, vol. 2015, no 2, pp. 25-45. [ DOI : 10.1515/popets-2015-0019 ]
https://hal.inria.fr/hal-01192867 -
18L. Caviglione, M. Gaggero, J.-F. Lalande, W. Mazurczyk, M. Urbanski.
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence, in: IEEE Transactions on Information Forensics and Security, 2016. [ DOI : 10.1109/TIFS.2015.2510825 ]
https://hal.archives-ouvertes.fr/hal-01247495 -
19E. Godefroy, E. Totel, M. Hurfin, F. Majorczyk.
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios, in: Journal of Information Assurance and Security, 2015, vol. 10, no 3, 11 p.
https://hal.inria.fr/hal-01241807
Articles in National Peer-Reviewed Journals
-
20G. Piolle.
Protection des données personnelles dans le système d'information, in: Techniques de l'Ingenieur, October 2015, vol. TIB458DUO, no h5455, 21 p.
https://hal.inria.fr/hal-01221892
Invited Conferences
-
21E. Anceaume, Y. Busnel, N. Rivetti.
Estimating the Frequency of Data Items in Massive Distributed Streams, in: IEEE 4th Symposium on Network Cloud Computing and Applications (NCCA), Munich, Germany, June 2015, 9 p.
https://hal.archives-ouvertes.fr/hal-01194529 -
22S. Gambs, G. Piolle.
Les techniques d'effacement des données, in: Le droit à l'oubli numérique, enjeux et perspectives, Rennes, France, Institut de l'Ouest : Droit et Europe, March 2015.
https://hal.inria.fr/hal-01241492 -
23J.-F. Lalande.
Sécurité Android: exemples de malware, in: Colloque International sur la Sécurité des Systèmes d'Information, Kénitra, Morocco, March 2015.
https://hal.inria.fr/hal-01136768 -
24G. Piolle.
La protection des données personnelles vue par un informaticien, in: Journées thématiques: Respect de la vie privée et services mobiles sans contact, Meudon, France, May 2015.
https://hal.inria.fr/hal-01241511
International Conferences with Proceedings
-
26M. Alaggan, S. Gambs, S. Matwin, M. Tuhin.
Sanitization of Call Detail Records via Differentially-Private Bloom Filters, in: Data and Applications Security and Privacy XXIX (DBSec'15), Fairfax, United States, July 2015. [ DOI : 10.1007/978-3-319-20810-7_15 ]
https://hal.inria.fr/hal-01244580 -
27E. Anceaume, Y. Busnel.
Estimer la corrélation à la volée entre flux massifs est possible avec très peu de mémoire, in: ALGOTEL 2015 — 17èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Beaune, France, June 2015.
https://hal.archives-ouvertes.fr/hal-01147072 -
28E. Anceaume, Y. Busnel, P. Lajoie-Mazenc, G. Texier.
Reputation for Inter-Domain QoS Routing, in: International Symposium on Network Computing and Applications (NCA), Boston, United States, IEEE, September 2015, 5 p.
https://hal.archives-ouvertes.fr/hal-01190451 -
29E. Anceaume, Y. Busnel, N. Rivetti, B. Sericola.
Identifying Global Icebergs in Distributed Streams, in: 34th International Symposium on Reliable Distributed Systems (SRDS), Montreal, Canada, September 2015, 10 p.
https://hal.archives-ouvertes.fr/hal-01194511 -
30E. Anceaume, F. Castella, A. Mostefaoui, B. Sericola.
A Message-Passing and Adaptive Implementation of the Randomized Test-and-Set Object, in: International Symposium on Network Computing and Applications (NCA), Boston, United States, September 2015, 9 p.
https://hal.archives-ouvertes.fr/hal-01190379 -
31R. Andriatsimandefitra Ratsisahanana, V. Viet Triem Tong.
Detection and Identification of Android Malware Based on Information Flow Monitoring, in: The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), New York, United States, November 2015.
https://hal.inria.fr/hal-01191595 -
32G. Arfaoui, J.-F. Lalande, S. Gharout, J. Traoré.
Practical and Privacy-Preserving TEE Migration, in: 9th IFIP WG 11.2 International Conference on Information Security Theory and Practice, Heraklion, Greece, R. Akram, S. Jajodia (editors), LNCS, Springer, August 2015, vol. 9311, pp. 153-168. [ DOI : 10.1007/978-3-319-24018-3_10 ]
https://hal.inria.fr/hal-01183508 -
33L. Caviglione, J.-F. Lalande, W. Mazurczyk, S. Wendzel.
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments, in: HAS - 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Los Angeles, United States, T. Tryfonas, I. G. Askoxylakis (editors), LNCS, August 2015, vol. 9190. [ DOI : 10.1007/978-3-319-20376-8 ]
https://hal.inria.fr/hal-01182303 -
34P. Cotret, G. Hiet, G. Gogniat, V. Lapotre.
HardBlare: an efficient hardware-assisted DIFC for non-modified embedded processors, in: CHES 2015 - Workshop on Cryptographic Hardware and Embedded Systems, Saint-Malo, France, September 2015.
https://hal-centralesupelec.archives-ouvertes.fr/hal-01252597 -
35S. Gambs, C. Eduardo Rosar Kos Lassance, C. Onete.
The Not-so-distant Future: Distance-Bounding Protocols on Smartphones, in: 14th Smart Card Research and Advanced Application Conference, Bochum, Germany, November 2015.
https://hal.inria.fr/hal-01244606 -
36L. Georget, G. Piolle, F. Tronel, V. Viet Triem Tong, M. Jaume.
Towards a Formal Semantics for System Calls in terms of Information Flow, in: Tenth International Conference on Systems (ICONS 2015), Barcelone, Spain, IARIA, April 2015, pp. 1-4, ISBN: 978-1-61208-399-5ISSN: 2308-4243.
https://hal-supelec.archives-ouvertes.fr/hal-01149471 -
37L. Georget, F. Tronel, V. Viet Triem Tong.
Kayrebt: An Activity Diagram Extraction and Visualization Toolset Designed for the Linux Codebase, in: 3rd IEEE Working Conference on Software Visualization - VISSOFT 2015, Bremen, Germany, IEEE, September 2015.
https://hal-supelec.archives-ouvertes.fr/hal-01213233 -
38E. Godefroy, E. Totel, M. Hurfin, F. Majorczyk.
Assessment of an Automatic Correlation Rules Generator, in: Eleventh International Conference on Information Systems Security (ICISS 2015), Kolkata, India, December 2015.
https://hal.inria.fr/hal-01241810 -
39G. Hiet, H. Debar, S. Ménouar, V. Houdebine.
Etude comparative des formats d’alertes, in: C&ESAR (Computer & Electronics Security Applications Rendez-vous) 2015, Rennes, France, November 2015, pp. 125-148.
https://hal-supelec.archives-ouvertes.fr/hal-01242786 -
40P. Lajoie-Mazenc, E. Anceaume, G. Guette, T. Sirvent, V. Viet Triem Tong.
Mécanisme de réputation distribué préservant la vie privée avec témoignages négatifs, in: ALGOTEL 2015 - 17èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Beaune, France, June 2015.
https://hal.archives-ouvertes.fr/hal-01148072 -
41P. Lajoie-Mazenc, E. Anceaume, G. Guette, T. Sirvent, V. Viêt Triem Tong.
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings, in: IFIP WG 11.1 International Conference on Trust Management, Hambourg, Germany, May 2015.
https://hal-supelec.archives-ouvertes.fr/hal-01131975 -
42C. Li, M. Hurfin, Y. Wang.
Reputation Propagation and Updating in Mobile Ad Hoc Networks with Byzantine Failures, in: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, August 2015. [ DOI : 10.1109/Trustcom.2015.364 ]
https://hal.inria.fr/hal-01242694 -
43Y. Mocquard, E. Anceaume, J. Aspnes, Y. Busnel, B. Sericola.
Counting with Population Protocols, in: International Symposium on Network Computing and Applications (NCA), Boston, United States, IEEE, September 2015, 9 p.
https://hal.archives-ouvertes.fr/hal-01189596 -
44N. Rivetti, L. Querzoni, E. Anceaume, Y. Busnel, B. Sericola.
Efficient Key Grouping for Near-Optimal Load Balancing in Stream Processing Systems , in: The 9th ACM International Conference on Distributed Event-Based Systems (DEBS), Oslo, Norway, June 2015. [ DOI : 10.1145/2675743.2771827 ]
https://hal.archives-ouvertes.fr/hal-01194518
Conferences without Proceedings
-
45R. Andriatsimandefitra Ratsisahanana, T. Genet, L. Guillo, J.-F. Lalande, D. Pichardie, V. Viet Triem Tong.
Kharon : Découvrir, comprendre et reconnaître des malware Android par suivi de flux d'information, in: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Troyes, France, May 2015.
https://hal.inria.fr/hal-01154368 -
46U. M. Aïvodji, S. Gambs, M.-J. Huguet, M.-O. Killijian.
Privacy-preserving carpooling, in: Odysseus 2015 - 6th International Workshop on Freight Transportation and Logistics, Ajaccio, France, May 2015.
https://hal.archives-ouvertes.fr/hal-01146639 -
47M. Boizard, S. Gambs.
Le droit à l’oubli numérique face aux moteurs de recherche, in: Sciences et droits de l’homme, Paris, France, Réseau droit, sciences et techniques (GDR 3178) and UMR de droit comparé de Paris I, October 2015.
https://halshs.archives-ouvertes.fr/halshs-01216636 -
48M. Boizard, S. Gambs.
Retour d'expérience d'un projet de recherche pluridisciplinaire droit - informatique - sociologie : le droit à l'oubli, in: Journée SHS et numérique, Rennes, France, Labex CominLabs, June 2015.
https://halshs.archives-ouvertes.fr/halshs-01203770 -
49S. Gambs, J.-F. Lalande, J. Traoré.
ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact, in: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Troyes, France, May 2015.
https://hal.inria.fr/hal-01154374 -
50G. Malis, A. Blandin, G. Piolle.
The articulation between the legal and technical means of erasure of data online, from the perspective of the user, in: 6ème Atelier sur la Protection de la Vie Privée (APVP'15), Mosnes, France, June 2015.
https://hal-supelec.archives-ouvertes.fr/hal-01166402
Internal Reports
-
51E. Anceaume, Y. Busnel, N. Rivetti, B. Sericola.
Identifying Global Icebergs in Distributed Streams, Cnrs ; Inria Rennes ; Université de Nantes, April 2015.
https://hal.archives-ouvertes.fr/hal-01141829 -
52E. Anceaume, Y. Busnel, E. Schulte-Geers, B. Sericola.
Optimization results for a generalized coupon collector problem, Inria Rennes ; Cnrs, January 2015.
https://hal.archives-ouvertes.fr/hal-01141577 -
53M. Boizard, A. Blandin, C. Corgas-Bernard, G. Dedessus Le Moustier, S. Gambs, C. Lejealle, S. Moisdon-Chataigner, P. Pierre, G. Piolle, L. Rousvoal.
Le droit à l'oubli, Mission de recherche Droit et Justice, February 2015, no 11-25, 216 p, Responsable scientifique du projet : Maryline Boizard.
https://halshs.archives-ouvertes.fr/halshs-01223778 -
54N. Rivetti, E. Anceaume, Y. Busnel, L. Querzoni, B. Sericola.
Proactive Online Scheduling for Shuffle Grouping in Distributed Stream Processing Systems, LINA-University of Nantes ; Sapienza Università di Roma (Italie), December 2015.
https://hal.inria.fr/hal-01246701
Other Publications
-
55A. Abraham, R. Andriatsimandefitra Ratsisahanana, N. Kiss, J.-F. Lalande, V. Viet Triem Tong.
Towards Automatic Triggering of Android Malware, July 2015, 12th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Poster.
https://hal.inria.fr/hal-01168354 -
56E. Anceaume, F. Castella, A. Mostefaoui, B. Sericola.
A Message-Passing and Adaptive Implementation of the Randomized Test-and-Set Object, August 2015, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01075650 -
57G. Arfaoui, J.-F. Lalande, J. Traoré, N. Desmoulins, P. Berthomé, S. Gharout.
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing, May 2015, working paper or preprint.
https://hal.inria.fr/hal-01150321 -
58D. Crémilleux, F. Majorczyk, N. Prigent.
VEGAS: Visualizing, Exploring and Grouping AlertS , October 2015, International Symposium on Visualization for Cyber Security - VizSec 2015, Poster.
https://hal-supelec.archives-ouvertes.fr/hal-01246441 -
59E. Godefroy, E. Totel, M. Hurfin, F. Majorczyk.
Generation and Assessment of correlation rules to Detect Complex Attack Scenarios, September 2015, IEEE Conference on Communications and Network Security (CNS 2015), Poster.
https://hal.inria.fr/hal-01241813 -
60P. Lajoie-Mazenc, E. Anceaume, G. Guette, T. Sirvent, V. Viet Triem Tong.
Efficient Distributed Privacy-Preserving Reputation Mechanism Handling Non-Monotonic Ratings, January 2015, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01104837 -
61Y. Mocquard, E. Anceaume, J. Aspnes, Y. Busnel, B. Sericola.
Counting with Population Protocols, July 2015, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01170575
-
62J. C. Demay, F. Majorczyk, E. Totel, F. Tronel.
Detecting illegal system calls using a data-oriented detection model, in: In Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011. -
63G. Hiet, V. Viet Triem Tong, L. Mé, B. Morin.
Policy-Based Intrusion Detection in Web Applications by Monitoring Java Information Flows, in: 3nd International Conference on Risks and Security of Internet and Systems (CRiSIS), 2008. -
64A. Myers, F. Schneider, K. Birman.
Nsf project security and fault tolerance, nsf cybertrust grant 0430161, 2004.
http://www.cs.cornell.edu/Projects/secft/ -
65O. Sarrouy, E. Totel, B. Jouga.
Building an application data behavior model for intrusion detection, in: Proc. of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montreal Canada, 07 2009, pp. 299–306. -
66J. Zimmermann, L. Mé, C. Bidan.
An improved reference flow control model for policy-based intrusion detection, in: Proc. of the 8th European Symposium on Research in Computer Security (ESORICS), October 2003.