Bibliography
Publications of the year
Articles in International Peer-Reviewed Journals
-
1F. Biondi, M. A. Enescu, T. Given-Wilson, A. Legay, L. Noureddine, V. Verma.
Effective, Efficient, and Robust Packing Detection and Classification, in: Computers and Security, 2018, pp. 1-15.
https://hal.inria.fr/hal-01967597 -
2J. Duchene, C. Le Guernic, E. Alata, V. Nicomette, M. Kaâniche.
State of the art of network protocol reverse engineering tools, in: Journal of Computer Virology and Hacking Techniques, February 2018, vol. 14, no 1, pp. 53-68. [ DOI : 10.1007/s11416-016-0289-8 ]
https://hal.inria.fr/hal-01496958 -
3J. L. Fiadeiro, A. Lopes, B. Delahaye, A. Legay.
Dynamic networks of heterogeneous timed machines, in: Mathematical Structures in Computer Science, June 2018, vol. 28, no 06, pp. 800 - 855. [ DOI : 10.1017/S0960129517000135 ]
https://hal.archives-ouvertes.fr/hal-01917079 -
4T. Given-Wilson, A. Heuser, N. Jafri, A. Legay.
An automated and scalable formal process for detecting fault injection vulnerabilities in binaries, in: Concurrency and Computation: Practice and Experience, September 2018, pp. 1-12. [ DOI : 10.1002/cpe.4794 ]
https://hal.inria.fr/hal-01960940 -
5T. Given-Wilson, A. Legay.
On the Expressiveness of Joining and Splitting, in: Journal in honour of Bernhard Steffen's 60th, November 2018.
https://hal.inria.fr/hal-01955922 -
6T. Given-Wilson, A. Legay, S. Sedwards, O. Zendra.
Group Abstraction for Assisted Navigation of Social Activities in Intelligent Environments, in: Journal of Reliable Intelligent Environments, May 2018, vol. 4, no 2, pp. 107–120. [ DOI : 10.1007/s40860-018-0058-1 ]
https://hal.inria.fr/hal-01629137 -
7A. Nouri, B. L. Mediouni, M. Bozga, J. Combaz, S. Bensalem, A. Legay.
Performance Evaluation of Stochastic Real-Time Systems with the SBIP Framework, in: International Journal of Critical Computer-Based Systems, 2018, pp. 1-33.
https://hal.archives-ouvertes.fr/hal-01898426 -
8S. Picek, A. Heuser, A. Jovic, S. Bhasin, F. Regazzoni.
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations, in: IACR Transactions on Cryptographic Hardware and Embedded Systems, November 2018, vol. 2019, no 1, pp. 1-29. [ DOI : 10.13154/tches.v2019.i1.209-237 ]
https://hal.inria.fr/hal-01935318 -
9È. de Chèrisey, S. Guilley, A. Heuser, O. Rioul.
On the optimality and practicability of mutual information analysis in some scenarios, in: Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , January 2018, vol. 10, no 1, pp. 101 - 121. [ DOI : 10.1007/s12095-017-0241-x ]
https://hal.inria.fr/hal-01935303
International Conferences with Proceedings
-
10S. Arora, A. Legay, T. Richmond, L.-M. Traonouez.
Statistical Model Checking of Incomplete Stochastic Systems, in: ISoLA 2018 - International Symposium on Leveraging Applications of Formal Methods, Limassol, Cyprus, LNCS, Springer, November 2018, vol. 11245, pp. 354-371. [ DOI : 10.1007/978-3-030-03421-4_23 ]
https://hal.inria.fr/hal-02011309 -
11F. Biondi, T. Given-Wilson, A. Legay, C. Puodzius, J. Quilbeuf.
Tutorial: an Overview of Malware Detection and Evasion Techniques, in: ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, Limassol, Cyprus, October 2018, pp. 1-23.
https://hal.inria.fr/hal-01964222 -
12S. K. Bukasa, R. Lashermes, J.-L. Lanet, A. Legay.
Let's shock our IoT's heart: ARMv7-M under (fault) attacks, in: ARES 2018 - 13th International Conference on Availability, Reliability and Security, Hambourg, Germany, ACM Press, August 2018, pp. 1-6. [ DOI : 10.1145/3230833.3230842 ]
https://hal.inria.fr/hal-01950842 -
13V. Dragoi, T. Richmond, D. Bucerzan, A. Legay.
Survey on cryptanalysis of code-based cryptography: From theoretical to physical attacks, in: ICCCC 2018 - 7th International Conference on Computers Communications and Control, Oradea, Romania, IEEE, May 2018, pp. 215-223. [ DOI : 10.1109/ICCCC.2018.8390461 ]
https://hal.inria.fr/hal-02011334 -
14K. Drira, F. Oquendo, A. Legay, T. Batista.
Editorial Message Track on Software-intensive Systems-of-Systems (SiSoS) of the 33rd ACM/SIGAPP Symposium On Applied Computing (SAC 2018), in: SAC 2018 - The 33rd ACM/SIGAPP Symposium On Applied Computing, Pau, France, April 2018, pp. 1-3.
https://hal.laas.fr/hal-01666389 -
15J. Duchene, E. Alata, V. Nicomette, M. Kaâniche, C. Le Guernic.
Specification-Based Protocol Obfuscation, in: DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg City, Luxembourg, IEEE, June 2018, pp. 1-12, https://arxiv.org/abs/1807.09464. [ DOI : 10.1109/DSN.2018.00056 ]
https://hal.inria.fr/hal-01848573 -
16S. Picek, A. Heuser, A. Jovic, K. Knezevic, T. Richmond.
Improving Side-Channel Analysis through Semi-Supervised Learning, in: 17th Smart Card Research and Advanced Application Conference (CARDIS 2018), Montpellier, France, November 2018.
https://hal.inria.fr/hal-02011351 -
17S. Picek, I. P. Samiotis, A. Heuser, J. Kim, S. Bhasin, A. Legay.
On the Performance of Convolutional Neural Networks for Side-channel Analysis, in: SPACE 2018 - International Conference on Security, Privacy, and Applied Cryptography Engineering, Kanpur, India, LNCS, Springer, December 2018, vol. 11348, pp. 157-176.
https://hal.inria.fr/hal-02010591 -
18S. Sebastio, R. Ghosh, A. Gupta, T. Mukherjee.
ContAv: a Tool to Assess Availability of Container-Based Systems, in: SOCA 2018 - 11th IEEE International Conference on Service Oriented Computing and Applications, Paris, France, November 2018, pp. 1-8.
https://hal.inria.fr/hal-01954455
National Conferences with Proceedings
-
19C. Le Guernic, F. Khourbiga.
Taint-Based Return Oriented Programming, in: SSTIC 2018 - Symposium sur la sécurité des technologies de l'information et des communications, Rennes, France, June 2018, pp. 1-30.
https://hal.inria.fr/hal-01848575
Conferences without Proceedings
-
20D. Beaulaton, N. Ben Said, I. Cristescu, R. Fleurquin, A. Legay, J. Quilbeuf, S. Sadou.
A Language for Analyzing Security of IOT Systems, in: SoSE 2018 - 13th Annual Conference on System of Systems Engineering, Paris, France, IEEE, June 2018, pp. 37-44. [ DOI : 10.1109/SYSOSE.2018.8428704 ]
https://hal.inria.fr/hal-01960860 -
21B. L. Mediouni, A. Nouri, M. Bozga, M. Dellabani, A. Legay, S. Bensalem.
SBIP 2.0: Statistical Model Checking Stochastic Real-time Systems, in: ATVA 2018 - 16th International Symposium Automated Technology for Verification and Analysis, Los Angeles, CA, United States, October 2018, pp. 1-6.
https://hal.archives-ouvertes.fr/hal-01888538 -
22J. Quilbeuf, M. Barbier, L. Rummelhard, C. Laugier, A. Legay, B. Baudouin, T. Genevois, J. Ibañez-Guzmán, O. Simonin.
Statistical Model Checking Applied on Perception and Decision-making Systems for Autonomous Driving, in: PPNIV 2018 - 10th Workshop on Planning, Perception and Navigation for Intelligent Vehicles, Madrid, Spain, October 2018, pp. 1-8.
https://hal.inria.fr/hal-01888556
Scientific Books (or Scientific Book chapters)
-
23D. Beaulaton, I. Cristescu, A. Legay, J. Quilbeuf.
A Modeling Language for Security Threats of IoT Systems, in: Formal Methods for Industrial Critical Systems - 23rd International Conference, FMICS 2018, LNCS, Springer, August 2018, vol. 11119, pp. 258-268. [ DOI : 10.1007/978-3-030-00244-2_17 ]
https://hal.inria.fr/hal-01962080 -
24T. Given-Wilson, N. Jafri, A. Legay.
The State of Fault Injection Vulnerability Detection, in: Verification and Evaluation of Computer and Communication Systems, August 2018, pp. 3-21. [ DOI : 10.1007/978-3-030-00359-3_1 ]
https://hal.inria.fr/hal-01960915
Books or Proceedings Editing
-
25N. CUPPENS-BOULAHIA, F. Cuppens, J.-L. Lanet, A. Legay, J. Garcia-Alfaro (editors)
Risks and security of internet and systems : 12th international conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, revised selected papers, Lecture Notes in Computer Science, Springer, 2018, vol. 10694, 269 p.
https://hal.archives-ouvertes.fr/hal-01865019
Scientific Popularization
-
26H. Le Bouder, A. Palisse.
Quand les malwares se mettent à la cryptographie, in: Interstices, February 2018.
https://hal.inria.fr/hal-01827607
Other Publications
-
27C. Aubert, I. Cristescu.
History-Preserving Bisimulations on Reversible Calculus of Communicating Systems, April 2018, https://arxiv.org/abs/1804.10355 - working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01778656 -
28E. Baranov, F. Biondi, O. Decourbe, T. Given-Wilson, A. Legay, C. Puodzius, J. Quilbeuf, S. Sebastio.
Efficient Extraction of Malware Signatures Through System Calls and Symbolic Execution: An Experience Report, December 2018, working paper or preprint. [ DOI : 10.1145/nnnnnnn.nnnnnnn ]
https://hal.inria.fr/hal-01954483 -
29D. Beaulaton, N. Ben Said, I. Cristescu, A. Legay, J. Quilbeuf.
Security Enforcement in IoT Systems using Attack Trees, December 2018, working paper or preprint.
https://hal.inria.fr/hal-01962089 -
30F. Biondi, T. Given-Wilson, A. Legay.
Universal Optimality of Apollonian Cell Encoders, February 2018, working paper or preprint.
https://hal.inria.fr/hal-01571226 -
31F. Biondi, Y. Kawamoto, A. Legay, L.-M. Traonouez.
Hybrid Statistical Estimation of Mutual Information and its Application to Information Flow, September 2018, working paper or preprint.
https://hal.inria.fr/hal-01629033 -
32T. Given-Wilson, N. Jafri, A. Legay.
Bridging Software-Based and Hardware-Based Fault Injection Vulnerability Detection, December 2018, working paper or preprint.
https://hal.inria.fr/hal-01961008 -
33J. Kim, S. Picek, A. Heuser, S. Bhasin, A. Hanjalic.
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis, February 2019, working paper or preprint.
https://hal.inria.fr/hal-02010599 -
34T. Ninet, A. Legay, R. Maillard, L.-M. Traonouez, O. Zendra.
The Deviation Attack: A Novel Denial-of-Service Attack Against IKEv2, 2018, working paper or preprint.
https://hal.inria.fr/hal-01980276 -
35S. Picek, A. Heuser, C. Alippi, F. Regazzoni.
When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis, February 2019, working paper or preprint.
https://hal.inria.fr/hal-02010603
-
36T. Given-Wilson, A. Heuser, N. Jafri, J.-L. Lanet, A. Legay.
An Automated and Scalable Formal Process for Detecting Fault Injection Vulnerabilities in Binaries, November 2017, working paper or preprint.
https://hal.inria.fr/hal-01629135 -
37T. Given-Wilson, N. Jafri, J.-L. Lanet, A. Legay.
An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT – Extended Version, April 2017, working paper or preprint.
https://hal.inria.fr/hal-01400283 -
38T. Given-Wilson, N. Jafri, J.-L. Lanet, A. Legay.
An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT, in: 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 2017, pp. 293 - 300. [ DOI : 10.1109/Trustcom/BigDataSE/ICESS.2017.250 ]
https://hal.inria.fr/hal-01629098 -
39A. Savary, M. Frappier, M. Leuschel, J. Lanet.
Model-Based Robustness Testing in Event-B Using Mutation, in: Software Engineering and Formal Methods - 13th International Conference, SEFM 2015, York, UK, September 7-11, 2015. Proceedings, R. Calinescu, B. Rumpe (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9276, pp. 132–147.
http://dx.doi.org/10.1007/978-3-319-22969-0_10