DE eng

Search in the Catalogues and Directories

Page: 1 2
Hits 1 – 20 of 34

1
Privacy-Preserving Prediction of Victim's Mortality and Their Need for Transportation to Health Facilities
In: IEEE Transactions on Industrial Informatics ; https://hal.archives-ouvertes.fr/hal-03456142 ; IEEE Transactions on Industrial Informatics, 2021, 14 (30), pp.1 (2021)
BASE
Show details
2
Statistical ZAPs from Group-Based Assumptions
In: TCC 2021 - Theory of Cryptography Conference ; https://hal.archives-ouvertes.fr/hal-03374562 ; TCC 2021 - Theory of Cryptography Conference, Nov 2021, Raleigh, United States (2021)
BASE
Show details
3
Introducing an experimental distortion-tolerant speech encryption scheme for secure voice communication
In: https://hal.archives-ouvertes.fr/hal-03445994 ; 2021 (2021)
BASE
Show details
4
Enhancing Speech Privacy with Slicing
In: https://hal.inria.fr/hal-03369137 ; 2021 (2021)
BASE
Show details
5
Introducing the VoicePrivacy initiative
In: INTERSPEECH 2020 ; https://hal.inria.fr/hal-02562199 ; INTERSPEECH 2020, Oct 2020, Shanghai, China (2020)
BASE
Show details
6
Who started this rumor? Quantifying the natural differential privacy guarantees of gossip protocols
In: DISC 2020 - 34th International Symposium on Distributed Computing ; https://hal.inria.fr/hal-02166432 ; DISC 2020 - 34th International Symposium on Distributed Computing, Oct 2020, Freiburg / Virtual, Germany (2020)
BASE
Show details
7
Private Protocols for U-Statistics in the Local Model and Beyond
In: AISTATS 2020 - 23rd International Conference on Artificial Intelligence and Statistics ; https://hal.inria.fr/hal-02310236 ; AISTATS 2020 - 23rd International Conference on Artificial Intelligence and Statistics, Aug 2020, Palermo, Italy (2020)
BASE
Show details
8
The Conflict Notion and its Static Detection: a Formal Survey
In: https://hal.archives-ouvertes.fr/hal-02169360 ; [Research Report] IMT Atlantique. 2019 (2019)
BASE
Show details
9
MASSE: Modular Automated Syntactic Signature Extraction
In: RESSI 2019 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information ; https://hal.inria.fr/hal-02159947 ; RESSI 2019 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1 (2019)
BASE
Show details
10
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
In: IEEE Symposium on Security and Privacy (S&P) 2019 ; https://hal.inria.fr/hal-01974962 ; IEEE Symposium on Security and Privacy (S&P) 2019, May 2019, San Francisco, United States (2019)
BASE
Show details
11
Sequence Covering for Efficient Host-Based Intrusion Detection
In: ISSN: 1556-6013 ; IEEE Transactions on Information Forensics and Security ; https://hal.archives-ouvertes.fr/hal-01653650 ; IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2019, 14 (4), pp.994-1006. ⟨10.1109/TIFS.2018.2868614⟩ ; https://ieeexplore.ieee.org/document/8454473 (2019)
BASE
Show details
12
The DEEPSEC prover
In: CAV 2018 - 30th International Conference on Computer Aided Verification ; https://hal.inria.fr/hal-01763138 ; CAV 2018 - 30th International Conference on Computer Aided Verification, Jul 2018, Oxford, United Kingdom (2018)
BASE
Show details
13
Specification-Based Protocol Obfuscation
In: DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks ; https://hal.inria.fr/hal-01848573 ; DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg City, Luxembourg. pp.1-12, ⟨10.1109/DSN.2018.00056⟩ (2018)
BASE
Show details
14
Tutorial: an Overview of Malware Detection and Evasion Techniques
In: ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation ; https://hal.inria.fr/hal-01964222 ; ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, Oct 2018, Limassol, Cyprus. pp.1-23 (2018)
Abstract: International audience ; This tutorial presents and motivates various malware detection tools and illustrates their usage on a clear example. We demonstrate how statically-extracted syntactic signatures can be used for quickly detecting simple variants of malware. Since such signatures can easily be obfuscated, we also present dynamically-extracted behavioral signatures which are obtained by running the malware in an isolated environment known as a sandbox. However, some malware can use sandbox detection to detect that they run in such an environment and so avoid exhibiting their malicious behavior. To counteract sandbox detection, we present concolic execution that can explore several paths of a binary. We conclude by showing how opaque predicates and JIT can be used to hinder concolic execution.
Keyword: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
URL: https://hal.inria.fr/hal-01964222/document
https://hal.inria.fr/hal-01964222
https://hal.inria.fr/hal-01964222/file/main.pdf
BASE
Hide details
15
Taint-Based Return Oriented Programming
In: SSTIC 2018 - Symposium sur la sécurité des technologies de l'information et des communications ; https://hal.inria.fr/hal-01848575 ; SSTIC 2018 - Symposium sur la sécurité des technologies de l'information et des communications, Jun 2018, Rennes, France. pp.1-30 ; https://www.sstic.org/2018/ (2018)
BASE
Show details
16
Modular Software Fault Isolation as Abstract Interpretation
In: SAS 2018 - 25th International Static Analysis Symposium ; https://hal.inria.fr/hal-01894116 ; SAS 2018 - 25th International Static Analysis Symposium, Aug 2018, Freiburg, Germany. pp.166-186, ⟨10.1007/978-3-319-99725-4_12⟩ (2018)
BASE
Show details
17
JACPoL: A Simple but Expressive JSON-based Access Control Policy Language
In: Lecture Notes in Computer Science ; WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice ; https://hal.archives-ouvertes.fr/hal-01802720 ; WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩ (2017)
BASE
Show details
18
MASSE: Modular Automated Syntactic Signature Extraction
In: ISSRE 2017 - The 28th International Symposium on Software Reliability Engineering - IEEE ; https://hal.inria.fr/hal-01629035 ; ISSRE 2017 - The 28th International Symposium on Software Reliability Engineering - IEEE, Oct 2017, Toulouse, France. pp.1-2 (2017)
BASE
Show details
19
Dependent Event Types
In: Logic, Language, Information, and Computation ; 24th International Workshop Logic, Language, Information, and Computation (WoLLIC 2017) ; https://hal.archives-ouvertes.fr/hal-01913662 ; 24th International Workshop Logic, Language, Information, and Computation (WoLLIC 2017), Jul 2017, London, United Kingdom. pp. 216-228 (2017)
BASE
Show details
20
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif
In: ISSN: 2474-1558 ; Foundations and Trends® in Privacy and Security ; https://hal.inria.fr/hal-01423760 ; Foundations and Trends® in Privacy and Security , Now publishers inc, 2016, 1 (1-2), pp.1 - 135. ⟨10.1561/3300000004⟩ (2016)
BASE
Show details

Page: 1 2

Catalogues
0
0
0
0
0
0
0
Bibliographies
0
0
0
0
0
0
0
0
0
Linked Open Data catalogues
0
Online resources
0
0
0
0
Open access documents
34
0
0
0
0
© 2013 - 2024 Lin|gu|is|tik | Imprint | Privacy Policy | Datenschutzeinstellungen ändern