1 |
Privacy-Preserving Prediction of Victim's Mortality and Their Need for Transportation to Health Facilities
|
|
|
|
In: IEEE Transactions on Industrial Informatics ; https://hal.archives-ouvertes.fr/hal-03456142 ; IEEE Transactions on Industrial Informatics, 2021, 14 (30), pp.1 (2021)
|
|
BASE
|
|
Show details
|
|
2 |
Statistical ZAPs from Group-Based Assumptions
|
|
|
|
In: TCC 2021 - Theory of Cryptography Conference ; https://hal.archives-ouvertes.fr/hal-03374562 ; TCC 2021 - Theory of Cryptography Conference, Nov 2021, Raleigh, United States (2021)
|
|
BASE
|
|
Show details
|
|
3 |
Introducing an experimental distortion-tolerant speech encryption scheme for secure voice communication
|
|
|
|
In: https://hal.archives-ouvertes.fr/hal-03445994 ; 2021 (2021)
|
|
BASE
|
|
Show details
|
|
4 |
Enhancing Speech Privacy with Slicing
|
|
|
|
In: https://hal.inria.fr/hal-03369137 ; 2021 (2021)
|
|
BASE
|
|
Show details
|
|
5 |
Introducing the VoicePrivacy initiative
|
|
|
|
In: INTERSPEECH 2020 ; https://hal.inria.fr/hal-02562199 ; INTERSPEECH 2020, Oct 2020, Shanghai, China (2020)
|
|
BASE
|
|
Show details
|
|
6 |
Who started this rumor? Quantifying the natural differential privacy guarantees of gossip protocols
|
|
|
|
In: DISC 2020 - 34th International Symposium on Distributed Computing ; https://hal.inria.fr/hal-02166432 ; DISC 2020 - 34th International Symposium on Distributed Computing, Oct 2020, Freiburg / Virtual, Germany (2020)
|
|
BASE
|
|
Show details
|
|
7 |
Private Protocols for U-Statistics in the Local Model and Beyond
|
|
|
|
In: AISTATS 2020 - 23rd International Conference on Artificial Intelligence and Statistics ; https://hal.inria.fr/hal-02310236 ; AISTATS 2020 - 23rd International Conference on Artificial Intelligence and Statistics, Aug 2020, Palermo, Italy (2020)
|
|
BASE
|
|
Show details
|
|
8 |
The Conflict Notion and its Static Detection: a Formal Survey
|
|
|
|
In: https://hal.archives-ouvertes.fr/hal-02169360 ; [Research Report] IMT Atlantique. 2019 (2019)
|
|
BASE
|
|
Show details
|
|
9 |
MASSE: Modular Automated Syntactic Signature Extraction
|
|
|
|
In: RESSI 2019 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information ; https://hal.inria.fr/hal-02159947 ; RESSI 2019 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. pp.1 (2019)
|
|
BASE
|
|
Show details
|
|
10 |
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
|
|
|
|
In: IEEE Symposium on Security and Privacy (S&P) 2019 ; https://hal.inria.fr/hal-01974962 ; IEEE Symposium on Security and Privacy (S&P) 2019, May 2019, San Francisco, United States (2019)
|
|
BASE
|
|
Show details
|
|
11 |
Sequence Covering for Efficient Host-Based Intrusion Detection
|
|
|
|
In: ISSN: 1556-6013 ; IEEE Transactions on Information Forensics and Security ; https://hal.archives-ouvertes.fr/hal-01653650 ; IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2019, 14 (4), pp.994-1006. ⟨10.1109/TIFS.2018.2868614⟩ ; https://ieeexplore.ieee.org/document/8454473 (2019)
|
|
BASE
|
|
Show details
|
|
12 |
The DEEPSEC prover
|
|
|
|
In: CAV 2018 - 30th International Conference on Computer Aided Verification ; https://hal.inria.fr/hal-01763138 ; CAV 2018 - 30th International Conference on Computer Aided Verification, Jul 2018, Oxford, United Kingdom (2018)
|
|
BASE
|
|
Show details
|
|
13 |
Specification-Based Protocol Obfuscation
|
|
|
|
In: DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks ; https://hal.inria.fr/hal-01848573 ; DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg City, Luxembourg. pp.1-12, ⟨10.1109/DSN.2018.00056⟩ (2018)
|
|
BASE
|
|
Show details
|
|
14 |
Tutorial: an Overview of Malware Detection and Evasion Techniques
|
|
|
|
In: ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation ; https://hal.inria.fr/hal-01964222 ; ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, Oct 2018, Limassol, Cyprus. pp.1-23 (2018)
|
|
Abstract:
International audience ; This tutorial presents and motivates various malware detection tools and illustrates their usage on a clear example. We demonstrate how statically-extracted syntactic signatures can be used for quickly detecting simple variants of malware. Since such signatures can easily be obfuscated, we also present dynamically-extracted behavioral signatures which are obtained by running the malware in an isolated environment known as a sandbox. However, some malware can use sandbox detection to detect that they run in such an environment and so avoid exhibiting their malicious behavior. To counteract sandbox detection, we present concolic execution that can explore several paths of a binary. We conclude by showing how opaque predicates and JIT can be used to hinder concolic execution.
|
|
Keyword:
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
|
|
URL: https://hal.inria.fr/hal-01964222/document https://hal.inria.fr/hal-01964222 https://hal.inria.fr/hal-01964222/file/main.pdf
|
|
BASE
|
|
Hide details
|
|
15 |
Taint-Based Return Oriented Programming
|
|
|
|
In: SSTIC 2018 - Symposium sur la sécurité des technologies de l'information et des communications ; https://hal.inria.fr/hal-01848575 ; SSTIC 2018 - Symposium sur la sécurité des technologies de l'information et des communications, Jun 2018, Rennes, France. pp.1-30 ; https://www.sstic.org/2018/ (2018)
|
|
BASE
|
|
Show details
|
|
16 |
Modular Software Fault Isolation as Abstract Interpretation
|
|
|
|
In: SAS 2018 - 25th International Static Analysis Symposium ; https://hal.inria.fr/hal-01894116 ; SAS 2018 - 25th International Static Analysis Symposium, Aug 2018, Freiburg, Germany. pp.166-186, ⟨10.1007/978-3-319-99725-4_12⟩ (2018)
|
|
BASE
|
|
Show details
|
|
17 |
JACPoL: A Simple but Expressive JSON-based Access Control Policy Language
|
|
|
|
In: Lecture Notes in Computer Science ; WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice ; https://hal.archives-ouvertes.fr/hal-01802720 ; WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩ (2017)
|
|
BASE
|
|
Show details
|
|
18 |
MASSE: Modular Automated Syntactic Signature Extraction
|
|
|
|
In: ISSRE 2017 - The 28th International Symposium on Software Reliability Engineering - IEEE ; https://hal.inria.fr/hal-01629035 ; ISSRE 2017 - The 28th International Symposium on Software Reliability Engineering - IEEE, Oct 2017, Toulouse, France. pp.1-2 (2017)
|
|
BASE
|
|
Show details
|
|
19 |
Dependent Event Types
|
|
|
|
In: Logic, Language, Information, and Computation ; 24th International Workshop Logic, Language, Information, and Computation (WoLLIC 2017) ; https://hal.archives-ouvertes.fr/hal-01913662 ; 24th International Workshop Logic, Language, Information, and Computation (WoLLIC 2017), Jul 2017, London, United Kingdom. pp. 216-228 (2017)
|
|
BASE
|
|
Show details
|
|
20 |
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif
|
|
|
|
In: ISSN: 2474-1558 ; Foundations and Trends® in Privacy and Security ; https://hal.inria.fr/hal-01423760 ; Foundations and Trends® in Privacy and Security , Now publishers inc, 2016, 1 (1-2), pp.1 - 135. ⟨10.1561/3300000004⟩ (2016)
|
|
BASE
|
|
Show details
|
|
|
|