Jean-François Lalande

Orcid: 0000-0003-4984-2199

According to our database1, Jean-François Lalande authored at least 50 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
CERBERE: Cybersecurity Exercise for Red and Blue team Entertainment, REproducibility.
Proceedings of the IEEE International Conference on Big Data, 2023

2022

Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?
IEEE Trans. Inf. Forensics Secur., 2022

Guest editorial: Information security methodology and replication studies.
it Inf. Technol., 2022

2021
KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021

Preventing serialization vulnerabilities through transient field detection.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
Information Security Methodology, Replication Studies and Information Security Education.
J. Univers. Comput. Sci., 2020

GroDDViewer: Dynamic Dual View of Android Malware.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

Abusing Android Runtime for Application Obfuscation.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Formally verified software countermeasures for control-flow integrity of smart card C code.
Comput. Secur., 2019

Teaching Android Mobile Security.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Orchestrating Android Malware Experiments.
Proceedings of the 27th IEEE International Symposium on Modeling, 2019

Obfuscated Android Application Development.
Proceedings of the Third Central European Cybersecurity Conference, 2019

2018
Android Malware Analysis: From Technical Difficulties to Scientific Challenges.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Challenges for Reliable and Large Scale Evaluation of Android Malware Analysis.
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018

2017
Detecting local covert channels using process activity correlation on Android smartphones.
Comput. Syst. Sci. Eng., 2017

Information Flows at OS Level Unmask Sophisticated Android Malware.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

GPFinder: Tracking the invisible in Android malware.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

2016
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence.
IEEE Trans. Inf. Forensics Secur., 2016

Challenges in Android Malware Analysis.
ERCIM News, 2016

Vers la sécurité mobile : caractérisation des attaques et contremesures. (Towards mobile security: characterizing attacks and countermeasures).
, 2016

2015
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing.
Proc. Priv. Enhancing Technol., 2015

Practical and Privacy-Preserving TEE Migration.
Proceedings of the Information Security Theory and Practice, 2015

GroddDroid: a gorilla for triggering malicious behaviors.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Analysis of Human Awareness of Security and Privacy Threats in Smart Environments.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
A Privacy-Preserving NFC Mobile Pass for Transport Systems.
EAI Endorsed Trans. Mob. Commun. Appl., 2014

An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system.
Future Gener. Comput. Syst., 2014

Software Countermeasures for Control Flow Integrity of Smart Card C Codes.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Improving Mandatory Access Control for HPC clusters.
Future Gener. Comput. Syst., 2013

A Privacy-Preserving Contactless Transport Service for NFC Smartphones.
Proceedings of the Mobile Computing, Applications, and Services, 2013

Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Implementation of exponential and parametrized algorithms in the AGAPE project
CoRR, 2012

HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots.
Proceedings of the SECRYPT 2012, 2012

Protecting Resources in an Open and Trusted Peer-to-Peer Network.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

High Level Model of Control Flow Attacks for Smart Card Functional Security.
Proceedings of the Seventh International Conference on Availability, 2012

Repackaging Android Applications for Auditing Access to Private Data.
Proceedings of the Seventh International Conference on Availability, 2012

2011
SYNEMA: Visual Monitoring of Network and System Security Sensors.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
Security properties in an open peer-to-peer network
CoRR, 2010

Attack model for verification of interval security properties for smart card C codes.
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, 2010

Mandatory Access Control for shared HPC clusters: Setup and performance evaluation.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

2009
Security and Results of a Large-Scale High-Interaction Honeypot.
J. Comput., 2009

Enforcement of Security Properties for Dynamic MAC Policies.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Generation of Role Based Access Control Security Policies for Java Collaborative Applications.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Mandatory Access Control implantation against potential NFS vulnerabilities.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

2008
Team--Based MAC Policy over Security--Enhanced Linux.
Proceedings of the Second International Conference on Emerging Security Information, 2008

2006
Distributed Control Enabling Consistent MAC Policies and IDS Based on a Meta-Policy Approach.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

Collaboration between MAC Policies and IDS based on a Meta-Policy approach.
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006

2005
Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellites.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
Conception de réseaux de télécommunications : optimisation et expérimentations. (Telecommunication network design: optimization and experiments).
PhD thesis, 2004

2003
Approximate Multicommodity Flow for WDM Networks Design.
Proceedings of the SIROCCO 10: Proceedings of the 10th Internaltional Colloquium on Structural Information Complexity, 2003


  Loading...