Recherche - Archive ouverte HAL Accéder directement au contenu

Filtrer vos résultats

143 résultats
Image document

Feedback to the European Data Protection Board’s Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive

Cristiana Santos , Nataliia Bielova , Vincent Roca , Mathieu Cunche , Gilles Mertens , et al.
Inria & Université Cote d'Azur, CNRS, I3S, Sophia Antipolis, France. 2024
Rapport hal-04437008v1
Image document

Symbolic protocol verification with dice: process equivalences in the presence of probabilities (extended version)

Vincent Cheval , Raphaëlle Crubillé , Steve Kremer
2023
Pré-publication, Document de travail hal-03683907v2

Reachability Analysis of Self Modifying Code

Tayssir Touili , Xin Ye
International Journal of Foundations of Computer Science, 2023, 34 (05), pp.507-536. ⟨10.1142/S0129054122500290⟩
Article dans une revue hal-04295949v1
Image document

CryptoVerif: a Computationally-Sound Security Protocol Verifier (Initial Version with Communications on Channels)

Bruno Blanchet
RR-9525, Inria Paris. 2023, pp.166
Rapport hal-04246199v1
Image document

CryptoVerif: a Computationally-Sound Security Protocol Verifier

Bruno Blanchet , Charlie Jacomme
RR-9526, Inria. 2023, pp.194
Rapport hal-04253820v1
Image document

Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co

Constantin Catalin Dragan , Francois Dupressoir , Ehsan Estaji , Kristian Gjøsteen , Thomas Haines , et al.
2022 IEEE 35th Computer Security Foundations Symposium (CSF), Aug 2022, Haifa, Israel. ⟨10.1109/CSF54842.2022.9919663⟩
Communication dans un congrès hal-03913573v2
Image document

Unmasking the Veiled: A Comprehensive Analysis of Android Evasive Malware

Antonio Ruggia , Dario Nisi , Savino Dambra , Alessio Merlo , Davide Balzarotti , et al.
ASIAACS 2024, 19th ACM ASIA Conference on Computer and Communications Security, ACM, Jul 2024, Singapore, Singapore
Communication dans un congrès hal-04378941v1
Image document

Typing High-Speed Cryptography against Spectre v1

Basavesh Ammanaghatta Shivakumar , Gilles Barthe , Benjamin Grégoire , Vincent Laporte , Tiago Oliveira , et al.
SP 2023- IEEE Symposium on Security and Privacy, IEEE, May 2023, San Francisco, United States. pp.1592-1609, ⟨10.1109/SP46215.2023.10179418⟩
Communication dans un congrès hal-04106448v1
Image document

RSSI-based Fingerprinting of Bluetooth Low Energy Devices

Guillaume Gagnon , Sébastien Gambs , Mathieu Cunche
SECRYPT 2023 - 20th International Conference on Security and Cryptography, Jul 2023, Rome, Italy. pp.1-12
Communication dans un congrès hal-04161424v1
Image document

Rétro-ingénierie et détournement de piles protocolaires embarquées, un cas d'étude sur le système ESP32

Damien Cauquil , Romain Cayre
SSTIC 2023, Symposium sur la sécurité des technologies de l'information et des communications, Jun 2023, Rennes, France
Communication dans un congrès hal-04228161v1

Modularity, Code Specialization, and Zero-Cost Abstractions for Program Verification

Son Ho , Aymeric Fromherz , Jonathan Protzenko
Proceedings of the ACM on Programming Languages, 2023, 7 (ICFP), pp.385-416. ⟨10.1145/3607844⟩
Article dans une revue hal-04301439v1
Image document

A Higher-Order Indistinguishability Logic for Cryptographic Reasoning

David Baelde , Adrien Koutsos , Joseph Lallemand
LICS, Jun 2023, Boston, United States. pp.1-13, ⟨10.1109/LICS56636.2023.10175781⟩
Communication dans un congrès hal-03981949v2
Image document

Themis: an On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability

Mikaël Bougon , Hervé Chabanne , Véronique Cortier , Alexandre Debant , Emmanuelle Dottax , et al.
CCS 2022 - The ACM Conference on Computer and Communications Security, Nov 2022, Los Angeles, United States. ⟨10.1145/3548606.3560563⟩
Communication dans un congrès hal-03763294v2
Image document

Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts Proactive and Adaptive Security

Guilhem Castagnos , Dario Catalano , Fabien Laguillaumie , Federico Savasta , Ida Tucker
Theoretical Computer Science, 2023, 939, pp.78-104. ⟨10.1016/j.tcs.2022.10.016⟩
Article dans une revue hal-03927198v1
Image document

Evaluating the Reusability of Android Static Analysis Tools

Jean-Marie Mineau , Jean-François Lalande
ICSR 2024 - 21st International Conference on Software and Systems Reuse, Jun 2024, Limassol, Cyprus
Communication dans un congrès hal-04557993v1
Image document

Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security

Cas Cremers , Alexander Dax , Charlie Jacomme , Mang Zhao
32nd USENIX Security Symposium 2023, USENIX, Aug 2023, Anaheim, United States
Communication dans un congrès hal-04126116v3
Image document

Mechanized Proofs of Adversarial Complexity and Application to Universal Composability

Manuel Barbosa , Gilles Barthe , Benjamin Grégoire , Adrien Koutsos , Pierre-Yves Strub
ACM Transactions on Privacy and Security, 2023, 26 (3), pp.1-34. ⟨10.1145/3589962⟩
Article dans une revue hal-04048217v1
Image document

Toward training NLP models to take into account privacy leakages

Gaspard Berthelier , Antoine Boutet , Antoine Richard
BigData 2023 - IEEE International Conference on Big Data, Dec 2023, Sorrento, Italy. pp.1-9
Communication dans un congrès hal-04299405v1
Image document

Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium

Manuel Barbosa , Gilles Barthe , Christian Doczkal , Jelle Don , Serge Fehr , et al.
CRYPTO 2023 - 43rd International Cryptology Conference, Aug 2023, Santa Barbara, United States. pp.358-389, ⟨10.1007/978-3-031-38554-4_12⟩
Communication dans un congrès hal-04315311v1
Image document

Pushing Edge Computing one Step Further: Resilient and Privacy-Preserving Processing on Personal Devices

Ludovic Javet , Nicolas Anciaux , Luc Bouganim , Léo Lamoureux , Philippe Pucheral
EDBT 2023 - 26th International Conference on Extending Database Technology, Mar 2023, Ioannina, Greece. ⟨10.48786/edbt.2023.77⟩
Communication dans un congrès hal-03996787v2
Image document

On the Utility Gain of Iterative Bayesian Update for Locally Differentially Private Mechanisms

Héber Hwang Arcolezi , Selene Cerna , Catuscia Palamidessi
DBSec 2023 - 37th IFIP Annual Conference on Data and Applications Security and Privacy, Vijay Atluri; Anna Lisa Ferrara, Jul 2023, Sophia Antipolis, France. pp.165-183, ⟨10.1007/978-3-031-37586-6_11⟩
Communication dans un congrès hal-04175035v1
Image document

On the Auditability of the Estonian IVXV System and an Attack on Individual Verifiability

Anggrio Sutopo , Thomas Haines , Peter Rønne
Workshop on Advances in Secure Electronic Voting, May 2023, Bol, brac, Croatia. ⟨10.1007/978-3-031-48806-1_2⟩
Communication dans un congrès hal-04216242v1
Image document

SNAKE challenge: Sanitization Algorithms under Attack

Tristan Allard , Louis Béziaud , Sébastien Gambs
ACM International Conference on Information and Knowledge Management, Oct 2023, Birmingham, United Kingdom. ⟨10.1145/3583780.3614754⟩
Communication dans un congrès hal-04228115v1
Image document

A new PET for Data Collection via Forms with Data Minimization, Full Accuracy and Informed Consent

Nicolas Anciaux , Sabine Frittella , Baptiste Joffroy , Benjamin Nguyen , Guillaume Scerri
27th International Conference on Extending Database Technology, EDBT 2024, Mar 2024, Paestum, Italy
Communication dans un congrès hal-04149000v2
Image document

Automatic verification of transparency protocols

Vincent Cheval , José Moreira , Mark Ryan
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), Jul 2023, Delft, Netherlands. ⟨10.1109/EuroSP57164.2023.00016⟩
Communication dans un congrès hal-04219234v1
Image document

ESPwn32: Hacking with ESP32 System-on-Chips

Romain Cayre , Damien Cauquil , Aurélien Francillon
WOOT 2023, 17th IEEE Workshop on Offensive Technologies, co-located with IEEE S&P 2023, IEEE, May 2023, San Francisco, United States. ⟨10.1109/SPW59333.2023.00033⟩
Communication dans un congrès hal-04183794v1
Image document

CV2EC: Getting the Best of Both Worlds

Bruno Blanchet , Pierre Boutry , Christian Doczkal , Benjamin Grégoire , Pierre-Yves Strub
2023
Pré-publication, Document de travail hal-04321656v1
Image document

Reflections on Trusting Docker: Invisible Malware in Continuous Integration Systems

Florent Moriconi , Axel Ilmari Neergaard , Lucas Georget , Samuel Aubertin , Aurélien Francillon
17th IEEE Workshop on Offensive Technologies (WOOT 2023), IEEE, May 2023, San Francisco (CA, USA), United States. ⟨10.1109/SPW59333.2023.00025⟩
Communication dans un congrès hal-04087018v1
Image document

Improved Private Set Intersection for Sets with Small Entries

Dung Bui , Geoffroy Couteau
26th IACR International Conference on Practice and Theory of Public-Key Cryptography,, May 2023, Atlanta (GA), United States. pp.190-220, ⟨10.1007/978-3-031-31371-4_7⟩
Communication dans un congrès hal-04265603v1
Image document

I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groups

Cyril Bouvier , Guilhem Castagnos , Laurent Imbert , Fabien Laguillaumie
Journal of Cryptology, 2023, 36 (3), pp.17. ⟨10.1007/s00145-023-09459-1⟩
Article dans une revue lirmm-03863678v2