Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbański IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2015 | 155 | 2015 |
An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system WW Smari, P Clemente, JF Lalande Future Generation Computer Systems 31, 147-168, 2014 | 113 | 2014 |
Hiding privacy leaks in android applications using low-attention raising covert channels JF Lalande, S Wendzel 2013 international conference on availability, reliability and security, 701-710, 2013 | 68 | 2013 |
Software countermeasures for control flow integrity of smart card C codes JF Lalande, K Heydemann, P Berthomé Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 61 | 2014 |
Kharon dataset: Android malware under a microscope N Kiss, JF Lalande, M Leslous, VVT Tong The LASER Workshop: Learning from Authoritative Security Experiment Results …, 2016 | 56 | 2016 |
GroddDroid: a gorilla for triggering malicious behaviors A Abraham, R Andriatsimandefitra, A Brunelat, JF Lalande, VVT Tong 2015 10th international conference on malicious and unwanted software …, 2015 | 55 | 2015 |
Repackaging android applications for auditing access to private data P Berthome, T Fecherolle, N Guilloteau, JF Lalande 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 55 | 2012 |
A practical set-membership proof for privacy-preserving NFC mobile ticketing G Arfaoui, JF Lalande, J Traoré, N Desmoulins, P Berthomé, S Gharout arXiv preprint arXiv:1505.03048, 2015 | 41 | 2015 |
Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellites S Alouf, E Altman, J Galtier, JF Lalande, C Touati Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005 | 35 | 2005 |
Security and Results of a Large-Scale High-Interaction Honeypot. J Briffaut, JF Lalande, C Toinard J. Comput. 4 (5), 395-404, 2009 | 34 | 2009 |
High level model of control flow attacks for smart card functional security P Berthomé, K Heydemann, X Kauffmann-Tourkestansky, JF Lalande 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 29 | 2012 |
Detecting local covert channels using process activity correlation on android smartphones M Urbanski, W Mazurczyk, JF Lalande, L Caviglione International Journal of Computer Systems Science and Engineering 32 (2), 71-80, 2017 | 22 | 2017 |
Analysis of human awareness of security and privacy threats in smart environments L Caviglione, JF Lalande, W Mazurczyk, S Wendzel Human Aspects of Information Security, Privacy, and Trust: Third …, 2015 | 22 | 2015 |
Formalization of security properties: enforcement for mac operating systems and verification of dynamic mac policies J Briffaut, JF Lalande, C Toinard International journal on advances in security 2 (4), 325-343, 2009 | 21 | 2009 |
Formally verified software countermeasures for control-flow integrity of smart card C code K Heydemann, JF Lalande, P Berthomé Computers & Security 85, 202-224, 2019 | 20 | 2019 |
Teaching android mobile security JF Lalande, V Viet Triem Tong, P Graux, G Hiet, W Mazurczyk, H Chaoui, ... Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019 | 19 | 2019 |
Quasi-optimal resource allocation in multispot MFTDMA satellite networks S Alouf, E Altman, J Galtier, JF Lalande, C Touati Combinatorial optimization in communication networks, 325-365, 2006 | 19 | 2006 |
Mascopt-a network optimization library: Graph manipulation JF Lalande, M Syska, Y Verhoeven INRIA, 2004 | 17 | 2004 |
Approximate Multicommodity Flow for WDM Networks Design. M Bouklit, D Coudert, JF Lalande, C Paul, H Rivano Sirocco 10, 43-56, 2003 | 17 | 2003 |
Attack model for verification of interval security properties for smart card C codes P Berthomé, K Heydemann, X Kauffmann-Tourkestansky, JF Lalande Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and …, 2010 | 16 | 2010 |