Valérie Viet Triem Tong

Orcid: 0000-0003-4838-2952

According to our database1, Valérie Viet Triem Tong authored at least 54 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
URSID: Using formalism to Refine attack Scenarios for vulnerable Infrastructure Deployment.
CoRR, 2023

BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

CVE representation to build attack positions graphs.
Proceedings of the IEEE International Conference on Big Data, 2023

CERBERE: Cybersecurity Exercise for Red and Blue team Entertainment, REproducibility.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns.
IEEE Trans. Netw. Serv. Manag., December, 2022



Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?
IEEE Trans. Inf. Forensics Secur., 2022

2021
From TTP to IoC: Advanced Persistent Graphs for Threat Hunting.
IEEE Trans. Netw. Serv. Manag., 2021

Accurate Measurement of the Energy Consumption of Security Functions.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Preventing serialization vulnerabilities through transient field detection.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

GroDDViewer: Dynamic Dual View of Android Malware.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

Abusing Android Runtime for Application Obfuscation.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
SEER4US, Secured Energy Efficient Routing for UAV Swarms.
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019

Teaching Android Mobile Security.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Obfuscated Android Application Development.
Proceedings of the Third Central European Cybersecurity Conference, 2019

2018
Challenges for Reliable and Large Scale Evaluation of Android Malware Analysis.
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018

2017
Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory.
Proceedings of the Software Engineering and Formal Methods - 15th International Conference, 2017

Information Flows at OS Level Unmask Sophisticated Android Malware.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

GPFinder: Tracking the invisible in Android malware.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017

2016
Challenges in Android Malware Analysis.
ERCIM News, 2016

TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

2015
Kayrebt: An activity diagram extraction and visualization toolset designed for the Linux codebase.
Proceedings of the 3rd IEEE Working Conference on Software Visualization, 2015

GroddDroid: a gorilla for triggering malicious behaviors.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Detection and Identification of Android Malware Based on Information Flow Monitoring.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Apport du suivi de flux d'information pour la sécurité des systèmes.
, 2015

2014
Capturing Android Malware Behaviour Using System Flow Graph.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Extending Signatures of Reputation.
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013

Secure States versus Secure Executions - From Access Control to Flow Control.
Proceedings of the Information Systems Security - 9th International Conference, 2013

A privacy preserving distributed reputation mechanism.
Proceedings of IEEE International Conference on Communications, 2013

2012
Spécification et mécanisme de détection de flots d'information illégaux.
Tech. Sci. Informatiques, 2012

User Data on Androïd Smartphone Must be Protected.
ERCIM News, 2012

Designing information flow policies for Android's operating system.
Proceedings of IEEE International Conference on Communications, 2012

2011
Liability issues in software engineering: the use of formal methods to reduce legal uncertainties.
Commun. ACM, 2011

Flow Based Interpretation of Access Control: Detection of Illegal Information Flows.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Information Flow Control for Intrusion Detection Derived from MAC Policy.
Proceedings of IEEE International Conference on Communications, 2011

From SSIR to CIDre: A New Security Research Group in Rennes, France.
Proceedings of the First SysSec Workshop 2011, 2011

2010
Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Liability in software engineering: overview of the LISE approach and illustration on a case study.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

2009
Detecting and Excluding Misbehaving Nodes in a P2P Network.
Stud. Inform. Univ., 2009

Policy-based intrusion detection in web applications by monitoring Java information flows.
Int. J. Inf. Comput. Secur., 2009

Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

An Efficient Distributed PKI for Structured P2P Networks.
Proceedings of the Proceedings P2P 2009, 2009

Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols.
Proceedings of the The Forth International Conference on Availability, 2009

2008
A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification.
Proceedings of the 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2008

A sybilproof distributed identity management for P2P networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

A Distributed Certification System for Structured P2P Networks.
Proceedings of the Resilient Networks and Services, 2008

2007
Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes.
Proceedings of the Advances in Biometrics, International Conference, 2007

2004
Reachability Analysis over Term Rewriting Systems.
J. Autom. Reason., 2004

2001
Reachability Analysis of Term Rewriting Systems with Timbuk.
Proceedings of the Logic for Programming, 2001


  Loading...