
Publications
449 documents
Articles dans une revue
- Jean-Marie Mineau, Jean-François Lalande. Class loaders in the middle: confusing Android static analyzers. Digital Threats: Research and Practice, 2025, pp.1-20. ⟨10.1145/3754457⟩. ⟨hal-05186153⟩
- Jean Gasnier, Aurore Guillevic. An Algebraic Point of View on the Generation of Pairing-Friendly Curves. SIAM Journal on Applied Algebra and Geometry, 2025, 9 (2), pp.456-480. ⟨10.1137/23M1601961⟩. ⟨hal-04205681v3⟩
- Luis Ibanez-Lissen, Lorena Gonzalez-Manzano, Jose Maria de Fuentes, Nicolas Anciaux. LPASS: Linear Probes as Stepping Stones for vulnerability detection using compressed LLMs. Journal of information security and applications, 2025, 93, pp.104125. ⟨10.1016/j.jisa.2025.104125⟩. ⟨hal-05203578⟩
- Santiago Arranz-Olmos, Gilles Barthe, Benjamin Grégoire, Jan Jancar, Vincent Laporte, et al.. Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025, 2025 (3), pp.644-667. ⟨10.46586/tches.v2025.i3.644-667⟩. ⟨hal-05249675⟩
- Sami El Amraoui, Aghiles Douadi, Régis Leveugle, Paolo Maistri. On the Harmonic Locking of Ring Oscillators under Single ElectroMagnetic Pulsed Fault Injection in FPGAs. Journal of Electronic Testing: : Theory and Applications, 2025, ⟨10.1007/s10836-025-06181-7⟩. ⟨hal-05105142⟩
- Héber Hwang Arcolezi, Karima Makhlouf, Catuscia Palamidessi. Group fairness under obfuscated sensitive information. Journal of Computer Security, 2025, pp.1-26. ⟨10.1177/0926227X251330212⟩. ⟨hal-05070800⟩
- Roua Boulifa, Giorgio Di Natale, Paolo Maistri. Countermeasures Against Fault Injection Attacks in Processors: A Review. Information, 2025, 16 (4), pp.293. ⟨10.3390/info16040293⟩. ⟨hal-05028623⟩
- Léo Bertrand, Maíra de Freitas Pereira, Jean-Yves Marion. Les capacités offensives de l’intelligence artificielle dans le cyberespace. Études françaises de renseignement et de cyber, 2025, n° 4 (3), pp.217-233. ⟨10.3917/efrc.243.0218⟩. ⟨hal-05045904⟩
- Christina Boura, Patrick Derbez, Baptiste Germon. Extending the Quasidifferential Framework: From Fixed-Key to Expected Differential Probability. IACR Transactions on Symmetric Cryptology, 2025, 2025 (1), pp.515-541. ⟨10.46586/tosc.v2025.i1.515-541⟩. ⟨hal-05022864⟩
- Teddy Furon. On the Vulnerability of Retrieval in High Intrinsic Dimensionality Neighborhood. IEEE Transactions on Information Forensics and Security, In press, pp.1-1. ⟨10.1109/TIFS.2025.3553067⟩. ⟨hal-05012282⟩
- Grégoire Menguy, Sébastien Bardin, Arnaud Gotlieb, Nadjib Lazaar. A Query-Based Constraint Acquisition Approach for Enhanced Precision in Program Precondition Inference. Journal of Artificial Intelligence Research, 2025, 82, pp.901-936. ⟨10.1613/jair.1.16206⟩. ⟨hal-04996488⟩
- Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher. New models for the cryptanalysis of ASCON. Designs, Codes and Cryptography, 2025, 93 (6), pp.2055-2072. ⟨10.1007/s10623-025-01572-5⟩. ⟨hal-05243652⟩
- Santiago Arranz Olmos, Gilles Barthe, Lionel Blatter, Benjamin Grégoire, Vincent Laporte. Preservation of Speculative Constant-time by Compilation. Proceedings of the ACM on Programming Languages, 2025, 9 (POPL), pp.1293 - 1325. ⟨10.1145/3704880⟩. ⟨hal-04663857v2⟩
- Andreas Athanasiou, Konstantinos Chatzikokolakis, Catuscia Palamidessi. Enhancing Metric Privacy With a Shuffler. Proceedings on Privacy Enhancing Technologies, 2025. ⟨hal-04895564⟩
- Véronique Cortier, Alexandre Debant, Pierrick Gaudry, Léo Louistisserand. Vote&Check: Secure Postal Voting with Reduced Trust Assumptions. Proceedings on Privacy Enhancing Technologies, 2025, 2025 (3), pp.333-348. ⟨10.56553/popets-2025-0101⟩. ⟨hal-04813613v3⟩
- Haoying Zhang, Mariem Brahem, Nicolas Anciaux, Benjamin Nguyen, Jose Maria de Fuentes. TELESAFE: Detecting Private/Work Boundary Crossings in Energy Consumption Trails in Telework. Proceedings of the VLDB Endowment (PVLDB), In press, 18 (6), pp.14. ⟨hal-05109917⟩
- Pierre Ayoub, Aurélien Hernandez, Romain Cayre, Aurélien Francillon, Clémentine Maurice. PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels. IACR Transactions on Cryptographic Hardware and Embedded Systems, In press. ⟨hal-04726109⟩
- Anis Fellah-Touta, Lilian Bossuet, Carlos Andres Lara-Nino. High-confidence Remote Power Analysis on Heterogeneous SoCs. Journal of Hardware and Systems Security, 2024, ⟨10.1007/s41635-024-00155-5⟩. ⟨hal-04716668⟩
- Robin Carpentier, Iulian Sandu Popa, Nicolas Anciaux. Enabling secure data-driven applications: an approach to personal data management using trusted execution environments. Distributed and Parallel Databases, 2024, 43 (1), pp.51. ⟨10.1007/s10619-024-07449-1⟩. ⟨hal-04843097⟩
- Margo Bernelin. Le Conseil d'Etat approuve l'entrepôt de données de santé EMC2 hébergé par Microsoft ( Commentaire : CE, 13 novembre 2024, n°492895 et CE, 19 octobre 2024, n°491644). Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024. ⟨hal-04859261⟩
- Charles Bouillaguet. Algorithm xxx: Evaluating a Boolean Polynomial on All Possible Inputs. ACM Transactions on Mathematical Software, In press, ⟨10.1145/3699957⟩. ⟨hal-04418528v2⟩
- Haetham Al Aswad, Cécile Pierrot, Emmanuel Thomé. Discrete Logarithm Factory. IACR Communications in Cryptology, 2024, 1 (3), ⟨10.62056/ah2ip2fgx⟩. ⟨hal-04117298v3⟩
- Xavier Bonnetain, Virginie Lallemand. A Note on Related-Tweakey Impossible Differential Attacks. IACR Communications in Cryptology, 2024, 1 (3), ⟨10.62056/abbn-4c2h⟩. ⟨hal-04748002⟩
- Diego F. Aranha, Georgios Fotiadis, Aurore Guillevic. A short-list of pairing-friendly curves resistant to the Special TNFS algorithm at the 192-bit security level. IACR Communications in Cryptology, 2024, 1 (3), pp.44. ⟨hal-04666521v2⟩
- Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, Duong Hieu Phan. Computational Differential Privacy for Encrypted Databases Supporting Linear Queries. Proceedings on Privacy Enhancing Technologies, 2024, 2024 (4), pp.583-604. ⟨10.56553/popets-2024-0131⟩. ⟨hal-04659467⟩
- Johannes Müller, Jan Oupický. Post-quantum XML and SAML Single Sign-On. Proceedings on Privacy Enhancing Technologies, 2024, 2024 (4), pp.525-543. ⟨10.56553/popets-2024-0128⟩. ⟨hal-04845637⟩
- Debasmita Chakraborty, Hosein Hadipour, Phuong Hoa Nguyen, Maria Eichlseder. Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs. IACR Transactions on Symmetric Cryptology, 2024, 2024 (3), pp.84-176. ⟨10.46586/tosc.v2024.i3.84-176⟩. ⟨hal-04869476⟩
- Simon Tollec, Vedad Hadžić, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, et al.. Fault-resistant partitioning of secure CPUs for system Co-verification against faults. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (4), pp.179-204. ⟨10.46586/tches.v2024.i4.179-204⟩. ⟨cea-04706853⟩
- Margo Bernelin. Le règlement européen sur l'intelligence artificielle publié à la surprise générale ! (Commentaire : Règlement (UE) 2024/1689 13 juin 2024 établissant des règles harmonisées concernant l’intelligence artificielle). Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024, 361, pp.12. ⟨hal-04859221⟩
- Margo Bernelin. Traitement des données de santé sans autorisation: la CNIL inflige une amende de 800 000 euros, Commentaire : Délibération de la formation restreinte n°SAN-2024-013 du 5 septembre 2024 concernant la société CEGEDIM SANTÉ. Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024, 361, pp.15. ⟨hal-04859251⟩
- Margo Bernelin. Données de santé : quelle est la marge d'appréciation de la CNIL en cas de manquement au RGPD (Commentaire - Conseil d’État, 12 juillet 2024, n°488687). Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024, 361, pp.14. ⟨hal-04859238⟩
- Theodoros Karathanasis. Defining AI Systems in the EU and Beyond : Assessing the Global Outreach of the AI Act’s Norms. Computer Law Review international, 2024, 25 (4), pp.104-114. ⟨10.9785/cri-2024-250402⟩. ⟨halshs-04845862⟩
- Alexandre Lodie. Cybersécurité des données de santé et droit de la protection des données à caractère personnel. Droit, Santé et Société [Journal de médecine légale, droit médical, victimologie, dommage corporel. Série E], 2024, 11. ⟨hal-05034462⟩
- Nicolas Bon, David Pointcheval, Matthieu Rivain. Optimized Homomorphic Evaluation of Boolean Functions. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024, pp.302 - 341. ⟨10.46586/tches.v2024.i3.302-341⟩. ⟨hal-04787972⟩
- Nouri Alnahawi, Johannes Müller, Jan Oupický, Alexander Wiesmaier. A Comprehensive Survey on Post-Quantum TLS. IACR Communications in Cryptology, 2024, ⟨10.62056/ahee0iuc⟩. ⟨hal-04845617⟩
- Ky Nguyen, David Pointcheval, Robert Schädlich. Decentralized Multi-Client Functional Encryption with Strong Security. IACR Communications in Cryptology, 2024, 1 (2), ⟨10.62056/andkp2fgx⟩. ⟨hal-05029125⟩
- Héber H. Arcolezi, Sébastien Gambs. Revealing the True Cost of Locally Differentially Private Protocols: An Auditing Perspective. Proceedings on Privacy Enhancing Technologies, 2024, 2024 (4), pp.123 - 141. ⟨10.56553/popets-2024-0110⟩. ⟨hal-04644975⟩
- Margo Bernelin. Le CNOM obtient une QPC sur l'accès au dossier médical partagé (Commentaire CE, 10 juin 2024, n°490409). Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024. ⟨hal-04859196⟩
- Margo Bernelin. La diffusion non autorisée de photographies identifiables à des fins d'enseignement médical constitue une faute, Commentaire TA Strasbourg, 5e ch., 9 juil. 2024 (2207563). Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024. ⟨hal-04859208⟩
- Raphaële Milan, Lilian Bossuet, Loïc Lagadec, Carlos Andres Lara-Nino, Brice Colombier, et al.. Efficient Adaptive Multi-Level Privilege Partitioning With RTrustSoC. IEEE Transactions on Circuits and Systems I: Regular Papers, 2024, 72 (2), pp.497-509. ⟨10.1109/TCSI.2024.3413364⟩. ⟨hal-04630451v2⟩
- Xavier Bonnetain, Margarita Cordero, Virginie Lallemand, Marine Minier, Maria Naya Plasencia. On Impossible Boomerang Attacks. IACR Transactions on Symmetric Cryptology, 2024, 2024 (2), pp.222-253. ⟨10.46586/tosc.v2024.i2.222-253⟩. ⟨hal-04747817⟩
- Augustin Bariant, Jules Baudrin, Gaëtan Leurent, Clara Pernot, Léo Perrin, et al.. Fast AES-Based Universal Hash Functions and MACs. IACR Transactions on Symmetric Cryptology, 2024, 2024 (2), pp.35-67. ⟨10.46586/tosc.v2024.i2.35-67⟩. ⟨hal-04710478⟩
- Ludovic Javet, Nicolas Anciaux, Luc Bouganim, Philippe Pucheral. Edgelet Computing: Enabling Privacy-Preserving Decentralized Data Processing at the Network Edge. Personal and Ubiquitous Computing, 2024, ⟨10.1007/s00779-024-01821-9⟩. ⟨hal-04594280⟩
- Margo Bernelin. La mise en oeuvre de Mon Espace Santé à des fins de prévention se précise, Commentaire: Décret n° 2024-468 du 24 mai 2024 relatif à la mise en oeuvre de l'espace numérique de santé. Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024, 359, pp.13. ⟨hal-04859189⟩
- Margo Bernelin. Une loi pour sécuriser et réguler l'espace numérique (Commentaire loi n°2024-449 du 21 mai 2024 visant à sécuriser et à réguler l'espace numérique). Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024, 359, pp.12. ⟨hal-04859170⟩
- Margo Bernelin. Système national des données de santé : publication du nouveau référentiel de sécurité ( Commentaire - Arrêté du 6 mai 2024 relatif au référentiel de sécurité applicable au Système national des données de santé). Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024. ⟨hal-04859157⟩
- Karima Makhlouf, Héber Hwang Arcolezi, Sami Zhioua, Ghassen Ben Brahim, Catuscia Palamidessi. On the Impact of Multi-dimensional Local Differential Privacy on Fairness. Data Mining and Knowledge Discovery, 2024, pp.1-24. ⟨10.1007/s10618-024-01031-0⟩. ⟨hal-04329938v2⟩
- Julien Mirval, Luc Bouganim, Iulian Sandu Popa. Handling Dropouts in Federating Learning with Personal Data Management Systems. Transactions on Large-Scale Data- and Knowledge-Centered Systems, In press. ⟨hal-04598486⟩
- Margo Bernelin. Une réforme de l'accès aux données de santé et du rôle de la CNIL déposée au Sénat, Commentaire - Projet de loi de simplification de la vie économique (Texte n° 550 (2023-2024), déposé au Sénat le 24 avril 2024). Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024, 358, pp.14. ⟨hal-04859138⟩
- Carlos Pinzón, Catuscia Palamidessi, Pablo Piantanida, Frank Valencia. On the incompatibility of accuracy and equal opportunity. Machine Learning, 2024, 113 (5), pp.2405-2434. ⟨10.1007/s10994-023-06331-y⟩. ⟨hal-04308195⟩
- Margo Bernelin. Adoption du Règlement relatif à l'Espace Européen des données de santé (Commentaire de l’accord politique sur l’EEDS). Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024. ⟨hal-04859148⟩
- Antoine Boutet, Juliette Sénéchal, Margo Bernelin, William Letrone. L’AI Act, ou comment encadrer les systèmes d’IA en Europe. The Conversation France, 2024, pp.1-6. ⟨hal-04797429⟩
- David Baelde, Stéphanie Delaune, Charlie Jacomme, Adrien Koutsos, Joseph Lallemand. The Squirrel Prover and its Logic. ACM SIGLOG News, 2024, 11 (2), ⟨10.1145/3665453.3665461⟩. ⟨hal-04579038⟩
- Vincent Cheval, Steve Kremer, Itsaka Rakotonirina. DeepSec: Deciding Equivalence Properties for Security Protocols -- Improved theory and practice. TheoretiCS, 2024, Volume3, ⟨10.46298/theoretics.24.4⟩. ⟨hal-04875934⟩
- Margo Bernelin. De l’éthique dans les services numériques de santé intégrant l’intelligence artificielle, Commentaire Référentiel CENS. Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024, 356, pp.19. ⟨hal-04859125⟩
- Margo Bernelin. Systèmes d'IA générative en santé : enjeux et perspectives (Commentaire : Rapport de l 'Académie nationale de médecine, 5 mars 2024). Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024. ⟨hal-04859115⟩
- Margo Bernelin. Sociétés de téléconsultation : les critères d'agrément sont posés (Commentaire Décret n° 2024-164 du 29 février 2024 relatif aux sociétés de téléconsultation). Dictionnaire permanent Santé, bioéthique, biotechnologies - Bulletin, 2024, 356, pp.17. ⟨hal-04859109⟩
- Margo Bernelin. L'hébergement de l'entrepôt des données de santé EMC2 devant le Conseil d'État (Commentaire: Conseil d’État, 22/03/2024, n°492369). Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024, 357, pp.13. ⟨hal-04859133⟩
- Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe, Mostafizar Rahman, André Schrottenloher. Key Committing Attacks against AES-based AEAD Schemes. IACR Transactions on Symmetric Cryptology, 2024, 2024 (1), pp.135-157. ⟨10.46586/tosc.v2024.i1.135-157⟩. ⟨hal-04773876⟩
- Margo Bernelin. "L’entrepôt des données de santé EMC2 de la Plateforme nationale des données de santé autorisé par la CNIL" (Commentaire - Délibération n° 2023-146 du 21 décembre 2023). Dictionnaire permanent Santé, bioéthique, biotechnologies - Bulletin, 2024, 355, pp.10. ⟨hal-04859061⟩
- Margo Bernelin. « L’utilisation secondaire des données de santé au cœur d’un rapport » (Commentaire : Rapport “Fédérer les acteurs de l’écosystème pour libérer l’utilisation secondaire des données de santé” du 5 déc. 2023),. Dictionnaire permanent Santé, bioéthique, biotechnologies - Bulletin, 2024, 355, pp.12. ⟨hal-04859072⟩
- Margo Bernelin. Rapport d'information sur les défis de l'IA générative : la protection des données personnelles en question, (Commentaire, Rapport n°2207 AN, 14 fév. 2024). Dictionnaire permanent Santé, bioéthique, biotechnologies - Bulletin, 2024, 356, pp.18. ⟨hal-04859097⟩
- Ugur Ilker Atmaca, Sayan Biswas, Carsten Maple, Catuscia Palamidessi. A Privacy-Preserving Querying Mechanism with High Utility for Electric Vehicles. IEEE Open Journal of Vehicular Technology, 2024, 5, pp.262-277. ⟨10.1109/OJVT.2024.3360302⟩. ⟨hal-04467866v2⟩
- Antoine Boutet, Alexis Leautier. L'IA générative pourrait aussi servir à exploiter des données personnelles en toute sécurité : la piste des données synthétiques. The Conversation France, 2024, pp.1-8. ⟨hal-04901134⟩
- Licinius Benea, Mikael Carmona, Viktor Fischer, Florian Pebay-Peyroula, Romain Wacquez. Impact of the flicker noise on the ring oscillator-based TRNGs. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (2), pp.870-889. ⟨10.46586/tches.v2024.i2.870-889⟩. ⟨ujm-04428085⟩
- Sayan Biswas, Catuscia Palamidessi. PRIVIC: A privacy-preserving method for incremental collection of location data. Proceedings on Privacy Enhancing Technologies, 2024, 2024 (1), pp.582-596. ⟨10.56553/popets-2024-0033⟩. ⟨hal-03968692v3⟩
- Margo Bernelin. Au coeur de l'exercice : les plateformes numériques en santé. RDSS. Revue de droit sanitaire et social, 2024, hors-série, pp.145. ⟨hal-04858968⟩
- Michele Panariello, Natalia Tomashenko, Xin Wang, Xiaoxiao Miao, Pierre Champion, et al.. The VoicePrivacy 2022 Challenge: Progress and perspectives in voice anonymisation. IEEE/ACM Transactions on Audio, Speech and Language Processing, In press, ⟨10.1109/TASLP.2024.3430530⟩. ⟨hal-04667625⟩
- Margo Bernelin. Anonymisation des données et cybersécurité en santé : un droit hésitant ?. Droit, Santé et Société [Journal de médecine légale, droit médical, victimologie, dommage corporel. Série E], 2024, 67 (2), pp.20. ⟨10.3917/dsso.112.0020⟩. ⟨hal-04885105⟩
- Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang, Chenkai Weng, et al.. An Efficient ZK Compiler from SIMD Circuits to General Circuits. Journal of Cryptology, In press. ⟨hal-04770559⟩
- Giuseppe Castagna, Mickaël Laurent, Kim Nguyen. Polymorphic Type Inference for Dynamic Languages. Proceedings of the ACM on Programming Languages, 2024, 8 (POPL), pp.40. ⟨10.1145/3632882⟩. ⟨hal-04284072⟩
- Margo Bernelin. Le puzzle juridique de l'IA médicale Le Règlement sur l'IA et la gouvernance des données. RDSS. Revue de droit sanitaire et social, 2024, 5, pp.767. ⟨hal-04858955⟩
- Margo Bernelin. Publication du Data Act : quel impact en santé ?. Dictionnaire permanent Santé, bioéthique, biotechnologies [Encyclopédie juridique Éditions législatives], 2024. ⟨hal-04859046⟩
- Santiago Arranz Olmos, Gilles Barthe, Ruben Gonzalez, Benjamin Grégoire, Vincent Laporte, et al.. High-assurance zeroization. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (1), pp.375-397. ⟨10.46586/tches.v2024.i1.375-397⟩. ⟨hal-04691165⟩
- Tristan Allard, Louis Béziaud, Sébastien Gambs. [~Re]Simulating socioeconomic-based affirmative action. The ReScience journal, 2023, 9 (1), pp.16. ⟨10.5281/zenodo.10255346⟩. ⟨hal-04328511⟩
- Viktor Fischer, Florent Bernard, Nathalie Bochard, Quentin Dallison, Maciej Skórski. Enhancing Quality and Security of the PLL-TRNG. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (4), pp.211-237. ⟨10.46586/tches.v2023.i4.211-237⟩. ⟨ujm-04199004⟩
- Son Ho, Aymeric Fromherz, Jonathan Protzenko. Modularity, Code Specialization, and Zero-Cost Abstractions for Program Verification. Proceedings of the ACM on Programming Languages, 2023, 7 (ICFP), pp.385-416. ⟨10.1145/3607844⟩. ⟨hal-04301439⟩
- Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub. Mechanized Proofs of Adversarial Complexity and Application to Universal Composability. ACM Transactions on Privacy and Security, 2023, 26 (3), pp.1-34. ⟨10.1145/3589962⟩. ⟨hal-04048217⟩
- Marine Picot, Federica Granese, Guillaume Staerman, Marco Romanelli, Francisco Messina, et al.. A Halfspace-Mass Depth-Based Method for Adversarial Attack Detection. Transactions on Machine Learning Research Journal, 2023. ⟨hal-04575113⟩
- Gaurav Maheshwari, Michaël Perrot. FairGrad: Fairness Aware Gradient Descent. Transactions on Machine Learning Research Journal, 2023. ⟨hal-03902196⟩
- Cyril Bouvier, Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie. I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groups. Journal of Cryptology, 2023, 36 (3), pp.17. ⟨10.1007/s00145-023-09459-1⟩. ⟨lirmm-03863678v2⟩
- Vincent Cheval, Raphaëlle Crubillé, Steve Kremer. Symbolic protocol verification with dice. Journal of Computer Security, 2023, pp.1-38. ⟨10.3233/JCS-230037⟩. ⟨hal-04179875⟩
- Nicolas Anciaux, Luc Bouganim. Extensive and Secure Personal Data Management Systems. ERCIM News, 2023. ⟨hal-04240543⟩
- Luc Bouganim, Julien Loudet, Iulian Sandu Popa. Highly distributed and privacy-preserving queries on personal data management systems. The VLDB Journal, 2023, 32 (2), pp.415-445. ⟨10.1007/s00778-022-00753-1⟩. ⟨hal-03814840⟩
- Tayssir Touili, Xin Ye. Reachability Analysis of Self Modifying Code. International Journal of Foundations of Computer Science, 2023, 34 (05), pp.507-536. ⟨10.1142/S0129054122500290⟩. ⟨hal-04295949⟩
- Alexandre Lodie. The Conciliation Of Transparency Measures with the Processing of Possibly Sensitive Data by the Administration According to the French Administrative Judge. European Review of Digital Administration & Law, In press, 3 (2), pp.233-239. ⟨10.53136/979122180798120⟩. ⟨hal-04299614⟩
- Héber H. Arcolezi, Sébastien Gambs, Jean-François Couchot, Catuscia Palamidessi. On the Risks of Collecting Multidimensional Data Under Local Differential Privacy. Proceedings of the VLDB Endowment (PVLDB), 2023, 16 (5), pp.1126 - 1139. ⟨10.14778/3579075.3579086⟩. ⟨hal-04082592⟩
- Ganesh Del Grosso, George Pichler, Catuscia Palamidessi, Pablo Piantanida. Bounding Information Leakage in Machine Learning. Neurocomputing, 2023, 534, pp.1-17. ⟨10.1016/j.neucom.2023.02.058⟩. ⟨hal-04349219⟩
- Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk. Binsec/Rel: Symbolic binary analyzer for security with applications to constant-Time and secret-erasure. ACM Transactions on Privacy and Security, 2023, 26 (2), pp.11:1-42. ⟨10.1145/3563037⟩. ⟨cea-04228169⟩
- Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker. Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts Proactive and Adaptive Security. Theoretical Computer Science, 2023, 939, pp.78-104. ⟨10.1016/j.tcs.2022.10.016⟩. ⟨hal-03927198⟩
- Rafael Pinot, Laurent Meunier, Florian Yger, Cédric Gouy-Pailler, Yann Chevaleyre, et al.. On the robustness of randomized classifiers to adversarial examples. Machine Learning, 2022, 111 (9), pp.3425-3457. ⟨10.1007/s10994-022-06216-6⟩. ⟨hal-03916842⟩
- Chris Brzuska, Geoffroy Couteau. On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness. Journal of Cryptology, 2022, pp.584-613. ⟨hal-04770557⟩
Communications dans un congrès
- Andrea Oliveri, Davide Balzarotti. A Comprehensive Quantification of Inconsistencies in Memory Dumps. The 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2025), Oct 2025, Gold Coast, Australia. ⟨hal-05189695⟩
- Franco Terranova, Abdelkader Lahmadi, Isabelle Chrisment. Scalable and Generalizable RL Agents for Attack Path Discovery via Continuous Invariant Spaces. 2025 28th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Oct 2025, Gold Coast, Australia. pp.18. ⟨hal-05182437⟩
- Sébastien Kilian, Valérie Viet Triem Tong, Jean-François Lalande, Frédéric Majorczyk, Alexandre Sanchez, et al.. CasinoLimit: An Offensive Dataset Labeled with MITRE ATT&CK Techniques. RAID 2025 - 28th International Symposium on Research in Attacks, Intrusions and Defenses, Oct 2025, Gold Coast, Australia. ⟨hal-05224264⟩
- Ryan Webster, Teddy Furon. Multi-modal Identity Extraction. ICCV 2025 - International Conference on Computer Vision, Oct 2025, Honololu, Hawaii, United States. pp.1-9. ⟨hal-05168368⟩
- Alexandre Drewery, Thomas Jensen, David Pichardie. Contextual Equality Saturation. SAS 2025 - 32nd Static Analysis Symposium, Oct 2025, Singapore, Singapore. pp.1-26. ⟨hal-05226543⟩
- Tobias Hilt, Florian Moser, Philipp Matheis, Melanie Volkamer. Development and Expert Evaluation of an Informative Video concerning Verifiable Internet Voting. Vote-ID 2025 - 10th International Joint Conference on Electronic Voting, Oct 2025, Nancy, France. ⟨hal-05240557⟩
- Antonino Vitale, Simone Aonzo, Savino Dambra, Nanda Rani, Lorenzo Ippolito, et al.. The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families. ESORICS 2025, 30th European Symposium on Research in Computer Security, Springer, Sep 2025, Toulouse, France. ⟨hal-05222691⟩
- Luis Ibanez-Lissen, Lorena Gonzalez-Manzano, Jose Maria de Fuentes, Nicolas Anciaux, Joaquin Garcia-Alfaro. LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states. ESORICS 2025 - 30th European Symposium on Research in Computer Security, Sep 2025, Toulouse, France. ⟨hal-05202765⟩
- Omar Anser, Jérôme François, Isabelle Chrisment, Daishi Kondo. TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation. ESORICS 2025 - 30th European Symposium on Research in Computer Security, Sep 2025, Toulouse, France. ⟨hal-05148383⟩
- Benoit Nougnanke, Gregory Blanc, Thomas Robert. How Dataset Diversity Affects Generalization in ML-based NIDS. ESORICS 2025 - 30th European Symposium on Research in Computer Security, Sep 2025, Toulouse, France. ⟨hal-05194730⟩
- Lucas Gnecco, Benjamin Negrevergne, Yann Chevaleyre. Lattice Climber Attack: Adversarial attacks for randomized mixtures of classifiers. Proceedings of ECML PKDD 2025, Sep 2025, Porto, Portugal. ⟨hal-05089941v2⟩
- Dorian Bourgeoisat, Ulrich Kühne, Florian Brandner. Execution Platform Contracts. 28th Euromicro Conference Series on Digital System Design (DSD), Euromicro, Sep 2025, Salerno, Italy. ⟨hal-05151434⟩
- Aurélien Noirault, Jan Butora, Vincent Itier, Patrick Bas. Génération d'Images et Insertion d'un Message Caché dans l'Espace Latent de Glow. Gresti 2025, Aug 2025, Strasbourg, France. ⟨hal-05147284⟩
- Augustin Diers, Christophe Rosenberger. Explication d’Attaques par Présentation d’Empreintes Digitales. XXe Colloque Francophone de Traitement du Signal et des Images (GRETSI), Aug 2025, Strasbourg, France. ⟨hal-05123418⟩
- Natalia Tomashenko, Emmanuel Vincent, Marc Tommasi. Exploiting Context-dependent Duration Features for Voice Anonymization Attack Systems. Interspeech 2025, Aug 2025, Rotterdam, Netherlands. ⟨hal-05099074⟩
- Florian Roudot, Mohamed Sabt. Narrowbeer: A Practical Replay Attack Against the Widevine DRM. 34th USENIX Security Symposium (USENIX Security '25), Aug 2025, Seattle, United States. ⟨hal-05111498⟩
- Herinomena Andrianatrehina, Ronan Lashermes, Joseph Paturel, Simon Rokicki, Thomas Rubiano. Exploring speculation barriers for RISC-V selective speculation. ARES 2025 - 20th International Conference on Availability, Reliability and Security, Aug 2025, Ghent, Belgium. pp.1-23. ⟨hal-05061555⟩
- Louis Savary, Simon Rokicki, Steven Derrien. Ahead of Time Generation for GPSA Protection in RISC-V Embedded Cores. ASAP 2025 - 36th IEEE International Conference on Application-specific Systems, Architectures and Processors, Jul 2025, Vancouver (BC), Canada. pp.1-7. ⟨hal-05100014v1⟩
- Roua Boulifa, Yongxin Sun, Giorgio Di Natale, Paolo Maistri. Real-Time Fault Analysis in RISC-V Processors: A Case Study Using the Internal State Monitor. 31st IEEE International Symposium on On-Line Testing and Robust System Design (IOLTS 2025), Jul 2025, Ischia, Italy. ⟨hal-05165992⟩
- Vincent Cheval, Caroline Fontaine. Automatic verification of Finite Variant Property beyond convergent equational theories. 2025 IEEE 38th Computer Security Foundations Symposium (CSF 2025), IEEE, Jul 2025, Santa Cruz, United States. ⟨hal-04748770⟩
- Mamy Razafintsialonina, David Bühler, Antoine Miné, Valentin Perrelle, Julien Signoles. Reusing Caches and Invariants for Efficient and Sound Incremental Static Analysis (Extended Version). 39th European Conference on Object-Oriented Programming (ECOOP 2025), Jun 2025, Bergen, Norway. ⟨hal-05110966⟩
- Gilles Mertens, Nataliia Bielova, Vincent Roca, Cristiana Santos. You Can't Trust Your Tag Neither: Privacy Leaks and Potential Legal Violations within the Google Tag Manager. EuroS&P 2025 - 10th IEEE European Symposium on Security and Privacy, Jun 2025, Venice (Ca' Foscari University), Italy. pp.1-20. ⟨hal-05032798v2⟩
- Omayma Alla, Stéphane Mocanu. Host-based Intrusion Detection for Industrial Control Systems. NetSoft 2025 - 11th IEEE International Conference on Network Softwarization, Jun 2025, Budapest, Hungary. pp.1-3. ⟨hal-05154767⟩
- Pierrick Philippe, Mohamed Sabt, Pierre-Alain Fouque. GnuZero: A Compiler-Based Zeroization Static Detection Tool for the Masses. Dependable Systems and Networks 2025, IEEE/IFIP, Jun 2025, Naples, Italy. ⟨hal-05065294⟩
- Antoine Boutet, Victor Morel. "I'm Not for Sale" -Perceptions and Limited Awareness of Privacy Risks by Digital Natives About Location Data. ICWSM 2025 - International AAAI Conference on Web and Social Media, Jun 2025, Copenhagen, Denmark. pp.1-13. ⟨hal-05041457⟩
- Adda-Akram Bendoukha, Héber H. Arcolezi, Nesrine Kaaniche, Aymen Boudguiga, Renaud Sirdey, et al.. FADE: federated aggregation with discrimination elimination. FAccT 2025 - ACM Conference on Fairness, Accountability, and Transparency (FAccT), Jun 2025, Athènes, Greece. pp.1-14. ⟨hal-05105146⟩
- Elyssa Boulila, Marc Dacier, Siva Prem Vengadessa Peroumal, Nicolas Veys, Simone Aonzo. A Closer Look At Modern Evasive Phishing Emails. DSN 2025, 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, IEEE/IFIP, Jun 2025, Naples, Italy. ⟨hal-05065623⟩
- Gildas Avoine, Tristan Claverie, Stéphanie Delaune. Formal Analysis of Random Nonce Misuses in Cryptographic Protocols. 38th IEEE Computer Security Foundations Symposium (CFS 2025), Jun 2025, Santa Cruz, CA, United States. ⟨hal-05066621⟩
- David Baelde, Stéphanie Delaune, Stanislas Riou. SMT-based Automation for Overwhelming Truth. 38th IEEE Computer Security Foundations Symposium, Owen Arden and Mohsen Lesani, Jun 2025, Santa Cruz, United States. ⟨hal-04884758⟩
- Thomas Haines, Rafieh Mosaheb, Johannes Müller, Reetika Reetika. Zero-Knowledge Proofs from Learning Parity with Noise: Optimization, Verification, and Application. IEEE Computer Security Foundations (CSF) Symposium 2025, Jun 2025, Santa Cruz, United States. ⟨hal-04856221⟩
- Adda-Akram Bendoukha, Renaud Sirdey, Aymen Boudguiga, Nesrine Kaaniche. Unveiling the (in) security of threshold FHE-based federated learning: the practical impact of recent CPA D attacks. 2025 IEEE 38th Computer Security Foundations Symposium (CSF), Jun 2025, Santa cruz, United States. pp.378-393. ⟨hal-05105133⟩
- Andreas Athanasiou, Konstantinos Chatzikokolakis, Catuscia Palamidessi. Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting. CSF 2025 - 38th IEEE Computer Security Foundations Symposium, IEEE, Jun 2025, Santa Cruz, United States. ⟨hal-04781593⟩
- Azzadine Thajte, Laurent Fesquet, Giorgio Di Natale. TIMA-PUF: A reliable arbiter PUF architecture. 20th CryptArchi Workshop, Jun 2025, Autrans, France. ⟨hal-05192577⟩
- Brian Pufler, Yury Belousov, Vitaliy Kinakh, Teddy Furon, Slava Voloshynovskiy. Task-Agnostic Attacks Against Vision Foundation Models. 5th Workshop of Adversarial Machine Learning at CVPR 2025, Jun 2025, Nashville, United States. pp.1-18. ⟨hal-05172315⟩
- Clara Bourgeais, Laure Gonnord, David Hély. Work in Progress: Securing a Critical Variable at Compile Time. Colloque 2025 du GDR SOC2, Jun 2025, Lorient (56100), France. ⟨hal-05149022⟩
- Stéphanie Delaune, Clément Herouard, Joseph Lallemand. Secrecy by typing in the computational model. 38th IEEE Computer Security Foundations Symposium (CSF 2025), Owen Arden, Jun 2025, Santa Cruz, CA, United States. ⟨hal-04666965⟩
- Christophe Rosenberger. Biometrics and digital forensics in the cyber ecosystems: technological challenges and social impacts in the knowledge management perspective. Italian Global community of lknowledge management conference, May 2025, Salerno (Italy), Italy. ⟨hal-05090700⟩
- Roua Boulifa, Paolo Maistri, Giorgio Di Natale. Early Result Capture: Racing Conditions in Pipeline due to Clock Glitches. 30th IEEE European Test Symposium (ETS 2025), May 2025, Tallinn, Estonia. ⟨hal-05096879⟩
- Sami El Amraoui, Aghiles Douadi, Régis Leveugle, Paolo Maistri. Pulsed Electromagnetic Fault Injection Attack on Ring Oscillator-based PUFs in FPGAs. 30th IEEE European Test Symposium (ETS 2025), May 2025, Tallinn, Estonia. ⟨hal-05096909⟩
- Pierre-François Gimenez, Sarath Sivaprasad, Mario Fritz. Certifiably Robust Malware Detectors by Design. SEC 2025 - 40th IFIP TC-11 International Information Security and Privacy Conference, May 2025, Maribor, Slovenia. pp.125-139, ⟨10.1007/978-3-031-92886-4_9⟩. ⟨hal-05079220⟩
- Romain Guittienne, Quentin Jacqmin, Jean-Yves Marion, Pierre Marty, Fabrice Sabatier. GoaTracer: An Open Service for Advanced PE Tracing. Botconf 2025 - 12th Edition, May 2025, Angers, France. ⟨hal-05086241⟩
- Damien Courousse, Mathieu Jan. Pre-silicon security analysis of RISC-V processors to fault injection attacks. RISC-V Summit Europe, May 2025, paris, France. ⟨cea-05026003⟩
- Cas Cremers, Gal Horowitz, Charlie Jacomme, Eyal Ronen. TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation. 2025 IEEE Symposium on Security and Privacy (SP 2025), May 2025, San Francisco, CA, United States. pp.4173-4191, ⟨10.1109/SP61157.2025.00093⟩. ⟨hal-05245012⟩
- Florian Pebay-Peyroula, Licinius-Pompiliu Benea, Mikael Carmona, Romain Wacquez. On the impact of metastability in jitter based TRNG. HOST 2025 - IEEE International Symposium on Hardware Oriented Security and Trust, May 2025, San Jose, United States. pp.279-288, ⟨10.1109/HOST64725.2025.11050059⟩. ⟨cea-05208309⟩
- Theophile Gousselot, Jean-Max Dutertre, Olivier Potin, Jean-Baptiste Rigaud. Code Encryption for Confidentiality and Execution Integrity down to Control Signals. IEEE International Symposium on Hardware Oriented Security and Trust (HOST), May 2025, San Jose, United States. ⟨hal-04919136⟩
- Arnaud Tisserand. Arithmetic and Functional Activity. WRACH: Workshop on Randomness and Arithmetics for Cryptographic Hardware, Apr 2025, Roscoff, France. ⟨hal-05046198⟩
- Christophe Rosenberger. Ai for Biometrics. International Conference on AI in Systems Engineering (IC-AISE'), Apr 2025, Beni Mellal, Morocco. ⟨hal-05061002⟩
- Natalia Tomashenko, Xiaoxiao Miao, Emmanuel Vincent, Junichi Yamagishi. The First VoicePrivacy Attacker Challenge. ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Hyderabad, India, 2025, Apr 2025, Hyderabad, India. pp.1-2, ⟨10.1109/ICASSP49660.2025.10888513⟩. ⟨hal-05040330⟩
- Natalia Tomashenko, Emmanuel Vincent, Marc Tommasi. Analysis of Speech Temporal Dynamics in the Context of Speaker Verification and Voice Anonymization. 2025 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2025), Apr 2025, Hyderabad, India. ⟨10.1109/ICASSP49660.2025.10887896⟩. ⟨hal-04853872⟩
- Chloé Imadache, Eva Giboulot, Teddy Furon. Evaluating the security of public surrogate watermark detectors. ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing, Apr 2025, Hyderabad, India. pp.1-5, ⟨10.1109/ICASSP49660.2025.10889821⟩. ⟨hal-05168353⟩
- Andrea Oliveri, Nikola Nemes, Branislav Andjelic, Davide Balzarotti. A Study on the Evolution of Kernel Data Types Used in Memory Forensics and Their Dependency on Compilation Options. DFRWS EU 2025, Digital Forensics Research Conference, Apr 2025, Brno, Czech Republic. ⟨hal-04991665⟩
- Louis Savary, Simon Rokicki, Steven Derrien. Hardware/Software Runtime for GPSA Protection in RISC-V Embedded Cores. DATE 2025 - Design, Automation and Test in Europe Conference, Mar 2025, Lyon, France. pp.1-7. ⟨hal-04788484v2⟩
- Sami El Amraoui, Luc Salvo, Régis Leveugle, Paolo Maistri. Analysis of Voltage Drop and Temperature Effects on Harmonic Errors under EMFI on ROs. 26th IEEE Latin American Test Symposium (LATS 2025), Mar 2025, San Andrés Island, Colombia. ⟨hal-05008902⟩
- Maxime Huyghe, Clément Quinton, Walter Rudametkin. BrowserFM: A Feature Model-based Approach to Browser Fingerprint Analysis. MADWeb'25 - Workshop on Measurements, Attacks, and Defenses for the Web, Feb 2025, San Diego, United States. pp.1-10, ⟨10.14722/madweb.2025.23017⟩. ⟨hal-04949268⟩
- Jack Royer, Frédéric Tronel, Yaëlle Vinçont. Towards Better CFG Layouts. BAR 2025 - Workshop on Binary Analysis Research, Christophe Hauser; Jun Xu, Feb 2025, San Diego (CA), United States. pp.1-17, ⟨10.14722/bar.2025.23011⟩. ⟨hal-04996939⟩
- André Pacteau, Antonino Vitale, Davide Balzarotti, Simone Aonzo. Mnemocrypt: A Machine Learning Approach for Cryptographic Function Detection in x86 Executables. BAR 2025, Workshop on Binary Analysis Research, Co-located with NDSS Symposium 2025, Usenix, Feb 2025, San Diego, United States. ⟨10.14722/bar.2025.23002⟩. ⟨hal-05127295⟩
- Martin Avanzini, Gilles Barthe, Davide Davoli, Benjamin Grégoire. A Quantitative Probabilistic Relational Hoare Logic. POPL 2025 - 52nd ACM SIGPLAN Symposium on Principles of Programming Languages, Jan 2025, Denver (Colorado), United States. ⟨10.1145/3704876⟩. ⟨hal-04834149⟩
- Basile Pesin, Sylvain Boulmé, David Monniaux, Marie-Laure Potet. Formally Verified Hardening of C Programs against Hardware Fault Injection. 14th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP’25), Jan 2025, Denver (CO), United States. ⟨10.1145/3703595.3705880⟩. ⟨hal-04818801v2⟩
- Clément Pierquin, Aurélien Bellet, Marc Tommasi, Matthieu Boussard. Privacy Amplification Through Synthetic Data: Insights from Linear Regression. ICML 2025 - 42nd International Conference on Machine Learning, 2025, Vancouver, Canada. ⟨10.48550/arXiv.2506.05101⟩. ⟨hal-05237878⟩
- Tudor Cebere, Aurélien Bellet, Nicolas Papernot. Tighter Privacy Auditing of DP-SGD in the Hidden State Threat Model. ICLR 2025 - 13th International Conference on Learning Representations, 2025, Singapore, Singapore. ⟨hal-04863204v2⟩
- Véronique Cortier, Alexandre Debant, Pierrick Gaudry. Breaking verifiability and vote privacy in CHVote. 30th European Symposium on Research in Computer Security - ESORICS 2025, 2025, Toulouse, France. ⟨hal-04895582v2⟩
- Vincent Diemunsch, Lucca Hirschi, Steve Kremer. A Comprehensive Formal Security Analysis of OPC UA. Usenix Security 2025, 2025, Seattle (USA), Washington, United States. ⟨hal-04989554⟩
- Ali Shahin Shamsabadi, Peter Snyder, Ralph Giles, Aurélien Bellet, Hamed Haddadi. Nebula: Efficient, Private and Accurate Histogram Estimation. CCS 2025 - 32nd ACM Conference on Computer and Communications Security, 2025, Tapei (Taiwan), Taiwan. ⟨hal-04863194v2⟩
- Dung Bui, Eliana Carozza, Geoffroy Couteau, Dahmun Goudarzi, Antoine Joux. Faster Signatures from MPC-in-the-Head. ASIACRYPT 2024 - International Conference on the Theory and Application of Cryptology and Information Security, Dec 2024, Kolkata, India. ⟨hal-04770548⟩
- Maxime Bombar, Dung Bui, Geoffroy Couteau, Alain Couvreur, Clément Ducros, et al.. FOLEAGE: F 4 OLE-Based Multi-Party Computation for Boolean Circuits. ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Chung, K.M.; Sazaki, Y., Dec 2024, Kolkata, India. pp.69-101, ⟨10.1007/978-981-96-0938-3_3⟩. ⟨hal-04770551v2⟩
- Pierre Ayoub, Romain Cayre, Aurélien Francillon, Clémentine Maurice. BlueScream: Screaming Channels on Bluetooth Low Energy. 40th Annual Computer Security Applications Conference (ACSAC '24), Dec 2024, Waikiki, Honolulu, Hawaii, United States. ⟨hal-04725668v2⟩
- Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, Yosuke Todo. Multiple-Tweak Differential Attack Against SCARF. Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, Dec 2024, Kolkata, France. pp.330-360, ⟨10.1007/978-981-96-0941-3_11⟩. ⟨hal-04877885⟩
- Joscha Cüppers, Adrien Schoen, Gregory Blanc, Pierre-Francois Gimenez. FlowChronicle: synthetic network flow generation through pattern set mining. CoNEXT 2024 - 20th International Conference on emerging Networking EXperiments and Technologies, Dec 2024, Los Angeles (CA), United States. pp.1 - 20, ⟨10.1145/3696407⟩. ⟨hal-04871198⟩
- Geoffroy Couteau, Lalita Devadas, Srinivas Devadas, Alexander Koch, Sacha Servan-Schreiber. QuietOT: Lightweight Oblivious Transfer with a Public-Key Setup. ASIACRYPT 2024, Dec 2024, Kolkata, India. ⟨hal-04770549⟩
- Matthieu Amet, Oussama Ben Moussa, Guillaume Bonfante, Sébastien Duval. Monitoring the execution of cryptographic functions. FPS-2024 - 17th International Symposium on Foundations & Practice of Security, Dec 2024, Montréal (Québec), Canada. pp.377-392, ⟨10.1007/978-3-031-87499-4_25⟩. ⟨hal-04902977⟩
- Christophe Rosenberger. AI for biometrics. Cyber Security in Networking Conference, Dec 2024, Paris, France. ⟨hal-05060997⟩
- Augustin Diers, Christophe Rosenberger. Explainable Presentation Attack Detection of Digital Fingerprints. IEEE international workshop on information forensics and security (WIFS), Dec 2024, Rome, Italy. ⟨hal-04710955⟩
- Pierre Charbit, Geoffroy Couteau, Pierre Meyer, Reza Naserasr. A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction. TCC 2024, Dec 2024, Milan, Italy. ⟨hal-04773929⟩
- Pierre Charbit, Geoffroy Couteau, Pierre Meyer, Reza Naserasr. A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction. TCC 2024, Dec 2024, Milan (Italie), Italy. ⟨hal-04779135⟩
- Chris Brzuska, Geoffroy Couteau, Christoph Egger, Willy Quach. On Bounded Storage Key Agreement and One-Way Functions. 22nd Theory of Cryptography Conference 2024 (TCC 2024), Dec 2024, Milan, Italy. ⟨hal-04770569⟩
- Thomas Lebrun, Louis Béziaud, Tristan Allard, Antoine Boutet, Sébastien Gambs, et al.. Synthetic Data: Generate Avatar Data on Demand. The International Web Information Systems Engineering conference (WISE), Dec 2024, Doha-Qatar, France. pp.193-203, ⟨10.1007/978-981-96-0576-7_15⟩. ⟨hal-04715055⟩
- Sara Taki, Adrien Boiret, Cédric Eichler, Benjamin Nguyen. Cohesive database neighborhoods for differential privacy: mapping relational databases to RDF. WISE 2024 - 25th International Conference of Web Information Systems Engineering, Dec 2024, Doha, Qatar. pp.11. ⟨hal-04700208⟩
- Jan Butora, Etienne Levecque, Patrick Bas. Errorless Robust JPEG Steganography for Pixel Images. 16th IEEE International Workshop on Information Forensics and Security, Dec 2024, Rome, Italy. ⟨hal-04671761v2⟩
- Jan Aalmoes, Vasisht Duddu, Antoine Boutet. On the Alignment of Group Fairness with Attribute Privacy. WISE 2024 - 25th International Web Information Systems Engineering conference, Dec 2024, Doha, Qatar. pp.1-15. ⟨hal-04739862⟩
- David Pointcheval, Robert Schädlich. Multi-client Attribute-Based and Predicate Encryption from Standard Assumptions. TCC 2024 - 22nd Theory of Cryptography Conference, Dec 2024, Milan, Italy. pp.31-64, ⟨10.1007/978-3-031-78020-2_2⟩. ⟨hal-05029340⟩
- Cédric Eichler, Nathan Champeil, Nicolas Anciaux, Alexandra Bensamoun, Héber H. Arcolezi, et al.. Nob-MIAs: Non-biased Membership Inference Attacks Assessment on Large Language Models with Ex-Post Dataset Construction. WISE 2024 - 25th International Web Information Systems Engineering conference, Dec 2024, Doha, Qatar. pp.441-456, ⟨10.1007/978-981-96-0570-5_32⟩. ⟨hal-04670325v2⟩
- Christian Garzón, Abdelkader Lahmadi, Jaime Vergara, Alexánder Leal, Juan Felipe Botero. In-Band ARP-based Man-in-the-Middle Attack Detection Using P4 Programmable Switches. 2024 IEEE Latin-American Conference on Communications (LATINCOM), Nov 2024, Medellin, Colombia. pp.1-6, ⟨10.1109/LATINCOM62985.2024.10770688⟩. ⟨hal-04878851⟩
- Claire Guichemerre, Tristan Allard, Sofiane Azogagh, Sébastien Gambs, Marc-Olivier Killijian, et al.. [Short Paper] Privacy-Preserving Distributed Spectral Centrality Measures based on Fully Homomorphic Encryption. Conférence sur la Gestion de Données – Principes, Technologies et Applications, Oct 2024, Orleans, France. ⟨hal-04714952⟩
- Nicolas Anciaux, Sabine Frittella, Baptiste Joffroy, Benjamin Nguyen, Guillaume Scerri. Un nouveau PET pour la collecte de données via des formulaires avec minimisation des données, précision totale et consentement éclairé. BDA 2024 - 40ème Conférence sur la Gestion de Données, Principes, Technologies et Applications, Oct 2024, Orléans, France. ⟨hal-04908589⟩
- Mariem Brahem, Haoying Zhang, Nicolas Anciaux, Benjamin Nguyen, José Maria de Fuentes. TELESAFE – Détection des franchissements de frontière entre vie privée et vie professionnelle dans les traces de consommation d'énergie en télétravail. BDA 2024 - 40ème Conférence sur la Gestion de Données, Principes, Technologies et Applications, Oct 2024, Orléans, France. ⟨hal-04908690⟩
- Martin Avanzini, Gilles Barthe, Benjamin Grégoire, Georg Moser, Gabriele Vanoni. Hopping Proofs of Expectation-Based Properties: Applications to Skiplists and Security Proofs. OOPSLA 2024 -ACM Conference on Object Oriented Programming Systems Languages and Applications, Oct 2024, Pasadena (CA), United States. pp.784-809, ⟨10.1145/3649839⟩. ⟨hal-04834120⟩
- Charles Babu, Sébastien Bardin, Matthieu Lemerre, Jean-Yves Marion. Trace Partitioning as an Optimization Problem. Static Analysis Symposia, Roberto Giacobazzi; Alessandra Gorla; Marco Campion, Oct 2024, Pasedena, California, United States. ⟨hal-04917504⟩
- David Baelde, Adrien Koutsos, Justine Sauvage. Foundations for Cryptographic Reductions in CCSA Logics. CCS '24: ACM SIGSAC Conference on Computer and Communications Security, Oct 2024, Salt Lake City UT, United States. pp.2814-2828, ⟨10.1145/3658644.3690193⟩. ⟨hal-04511718v3⟩
- Andreas Athanasiou, Kangsoo Jung, Catuscia Palamidessi. Protection against Source Inference Attacks in Federated Learning using Unary Encoding and Shuffling. CCS 2024 - The ACM Conference on Computer and Communications Security, ACM, Oct 2024, Salt Lake City, United States. pp.5036-5038, ⟨10.1145/3658644.3691411⟩. ⟨hal-04707344⟩
- Ihab Alshaer, Ahmed Al-Kaf, Valentin Egloff, Vincent Beroulle. Inferred Fault Models for RISC-V and Arm: A Comparative Study. 37th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, Oct 2024, Oxfordshire, United Kingdom. ⟨hal-04726690⟩
- Sami El Amraoui, Régis Leveugle, Paolo Maistri. Capture the Pulse: Impact of FPGA Resource Utilization on EM Fault Injection Attacks Detection. IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC 2024), Oct 2024, Tanger, Morocco. ⟨hal-04717585⟩
- Anis Fellah-Touta, Lilian Bossuet, Vincent Grosso, Carlos Andres Lara-Nino. Lightweight Active Fences for FPGAs. IFIP/IEEE International Conference on Very Large Scale Integration VLSI-SoC, IFIP/IEEE, Oct 2024, Tanger, Morocco. ⟨10.1109/VLSI-SoC62099.2024.10767802⟩. ⟨hal-04716753⟩
- Florian Moser, Michael Kirsten, Felix Dörre. SoK: Mechanisms Used in Practice for Verifiable Internet Voting. E-Vote-ID 2024 - 9th International Joint Conference on Electronic Voting, Oct 2024, Tarragona, Spain. pp.141-162, ⟨10.18420/e-vote-id2024_10⟩. ⟨hal-04686386⟩
- Véronique Cortier, Pierrick Gaudry, Anselme Goetschmann, Sophie Lemonnier. Belenios with cast-as-intended: towards a usable interface. EVote-ID 2024 - 9th International Joint Conference on Electronic Voting, Oct 2024, Terragona, Spain. ⟨hal-04646244⟩
- Franco Terranova, Abdelkader Lahmadi, Isabelle Chrisment. Leveraging Deep Reinforcement Learning for Cyber-Attack Paths Prediction: Formulation, Generalization, and Evaluation. The 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024), Sep 2024, Padua, Italy. pp.1-16, ⟨10.1145/3678890.3678902⟩. ⟨hal-04662428⟩
- Mariem Brahem, Jasmine Watissee, Cédric Eichler, Adrien Boiret, Nicolas Anciaux, et al.. reteLLMe: Design Rules for using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions. DPM 2024 - International Workshop on Data Privacy Management @ ESORICS, Sep 2024, Barcelona, Spain. ⟨hal-04684512⟩
- Véronique Cortier, Alexandre Debant, Florian Moser. Code voting: when simplicity meets security. ESORICS 2024 29th European Symposium on Research in Computer Security, Sep 2024, Bydgoszcz, Poland. ⟨hal-04627733⟩
- Chris Brzuska, Geoffroy Couteau, Christoph Egger, Pihla Karanko, Pierre Meyer. Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs. 14th International Conference on Security and Cryptography for Networks (SCN 2024), Sep 2024, Amalfi, Italy. pp.97-116, ⟨10.1007/978-3-031-71073-5_5⟩. ⟨hal-04692913⟩
- Lennart Braun, Guilhem Castagnos, Ivan Damgård, Fabien Laguillaumie, Kelsey Melissaris, et al.. An Improved Threshold Homomorphic Cryptosystem Based on Class Groups. SCN 2024 - 14th International Conference on Security and Cryptography for Networks, Sep 2024, Amalfi, Italy. pp.24-46, ⟨10.1007/978-3-031-71073-5_2⟩. ⟨hal-04820390⟩
- David Pointcheval. Efficient Universally-Verifiable Electronic Voting with Everlasting Privacy. SCN 2024 - The 14th Conference on Security in Communication Networks, Sep 2024, Amalfi, Italy. pp.323-344, ⟨10.1007/978-3-031-71070-4_15⟩. ⟨hal-05029286⟩
- Teodora Curelariu, Alexandre Lodie. The lawfulness of re-identification under data protection law. Annual Privacy Forum 2024, ENISA; European Commission; Karlstads universitet, Sep 2024, Karlstad, Sweden. pp.112-131, ⟨10.1007/978-3-031-68024-3_6⟩. ⟨hal-04668779⟩
- Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, et al.. HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures. Conference on Cryptographic Hardware and Embedded Systems - CHES2024, Sep 2024, Halifax, Canada. pp.25-75, ⟨10.46586/tches.v2024.i3.25-75⟩. ⟨hal-04909666⟩
- Xin Wang, Héctor Delgado, Hemlata Tak, Jee-Weon Jung, Hye-Jin Shim, et al.. ASVspoof 5: crowdsourced speech data, deepfakes, and adversarial attacks at scale. The Automatic Speaker Verification Spoofing Countermeasures Workshop (ASVspoof 2024), ISCA, Aug 2024, Kos Island, Greece. pp.1-8, ⟨10.21437/ASVspoof.2024-1⟩. ⟨hal-04803294⟩
- Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie. Simulation Secure Multi-input Quadratic Functional Encryption. SAC 2024 - 31st International Conference on Selected Areas in Cryptography, Aug 2024, Montréal, Canada. pp.26-53, ⟨10.1007/978-3-031-82852-2_2⟩. ⟨hal-04988251⟩
- Hosein Hadipour, Patrick Derbez, Maria Eichlseder. Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. CRYPTO 2024 - 44th Annual International Cryptology Conference, Aug 2024, Santa barbara, United States. pp.38-72, ⟨10.1007/978-3-031-68385-5_2⟩. ⟨hal-04827105⟩
- Alex Biryukov, Ben Fisch, Gottfried Herold, Dmitry Khovratovich, Gaëtan Leurent, et al.. Cryptanalysis of Algebraic Verifiable Delay Functions. CRYPTO 2024 - 44th Annual International Cryptology Conference, Aug 2024, Santa Barbara (CA), United States. pp.457-490, ⟨10.1007/978-3-031-68382-4_14⟩. ⟨hal-04782206⟩
- Marina Checri, Renaud Sirdey, Aymen Boudguiga, Jean-Paul Bultel. On the practical CPA$^D$ security of “exact” and threshold FHE schemes and libraries. Crypto 2024 - 44th Annual International Cryptology Conference, Aug 2024, Santa Barbara, United States. pp.3-33, ⟨10.1007/978-3-031-68382-4_1⟩. ⟨cea-04706832⟩
- Xavier Bonnetain, Rachelle Heim Boissier, Gaëtan Leurent, André Schrottenloher. Improving Generic Attacks Using Exceptional Functions. CRYPTO 2024 - 44th Annual International Cryptology Conference, Aug 2024, Santa Barbara, United States. pp.105-138, ⟨10.1007/978-3-031-68385-5_4⟩. ⟨hal-04724605⟩
- Augustin Bariant, Aurélien Boeuf, Axel Lemoine, Irati Manterola Ayala, Morten Øygarden, et al.. The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives. Advances in Cryptology – CRYPTO 2024: 44th Annual International Cryptology Conference, Aug 2024, Santa Barbara (CA), United States. pp.139-173, ⟨10.1007/978-3-031-68385-5_5⟩. ⟨hal-04690640⟩
- José Bacelar Almeida, Santiago Arranz Olmos, Manuel Barbosa, Gilles Barthe, François Dupressoir, et al.. Formally verifying Kyber: Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt. Crypto 2024, International Association for Cryptologic Research, Aug 2024, Santa Barbara (CA), United States. ⟨10.1007/978-3-031-68379-4_12⟩. ⟨hal-04595591v2⟩
- Pascal Giorgi, Fabien Laguillaumie, Lucas Ottow, Damien Vergnaud. Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations. ITC 2024 - 5th Information-Theoretic Cryptography Conference, Aug 2024, Stanford, CA, United States. ⟨lirmm-04593144⟩
- Jannik Dreier, Pascal Lafourcade, Dhekra Mahmoud. Shaken, not Stirred -Automated Discovery of Subtle Attacks on Protocols using Mix-Nets. Usenix Security Symposium, Aug 2024, Philadelphia, United States. ⟨hal-04615474⟩
- Karthikeyan Bhargavan, Charlie Jacomme, Franziskus Kiefer, Rolfe Schmidt. Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging. 33rd USENIX Security Symposium, Aug 2024, Philadelphia (PA), United States. ⟨hal-04604518v2⟩
- Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, et al.. The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions. USENIX Security 2024 - 33rd USENIX Security Symposium, Aug 2024, Philadelphia (PA), United States. pp.2813--2830. ⟨hal-04913806⟩
- Stéphanie Delaune, Joseph Lallemand, Gwendal Patat, Florian Roudot, Mohamed Sabt. Formal Security Analysis of Widevine through the W3C EME Standard. USENIX Security Symposium, Aug 2024, PHILADELPHIA, United States. ⟨hal-04631369⟩
- Véronique Cortier, Alexandre Debant, Anselme Goetschmann, Lucca Hirschi. Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility. USENIX Security Symposium, Aug 2024, Philadelphie (USA), United States. ⟨hal-04764478⟩
- Jolahn Vaudey, Stéphane Mocanu, Gwenaël Delaval, Eric Rutten. An IEC 62443-security oriented domain specific modelling language. ARES 2024 - 19th International Conference on Availability, Reliability and Security, Jul 2024, Vienne, Austria. pp.1-12, ⟨10.1145/3664476.3670938⟩. ⟨hal-04600593⟩
- Luis Ibanez-Lissen, Jose Maria de Fuentes, Lorena Gonzales-Manzano, Nicolas Anciaux. Continuous Authentication Leveraging Matrix Profile. ARES 2024 - The 19th International Conference on Availability, Reliability and Security, Jul 2024, Vienne, Austria. ⟨hal-04663471⟩
- Abdellah El Mrini, Edwige Cyffers, Aurélien Bellet. Privacy Attacks in Decentralized Learning. ICML 2024 - Forty-first International Conference on Machine Learning, Jul 2024, Vienne (Austria), Austria. ⟨10.48550/arXiv.2402.10001⟩. ⟨hal-04610652⟩
- Edwige Cyffers, Aurélien Bellet, Jalaj Upadhyay. Differentially Private Decentralized Learning with Random Walks. ICML 2024 - Forty-first International Conference on Machine Learning, Jul 2024, Vienne (Autriche), Austria. ⟨10.48550/arXiv.2402.07471⟩. ⟨hal-04610660⟩
- Florent Galtier, Guillaume Auriol, Vincent Nicomette, Paul L R Olivier, Romain Cayre, et al.. Wireless Modulation Identification: filling the gap in IoT networks security audit. 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '24), Jul 2024, Lausanne, Switzerland. ⟨hal-04675669⟩
- Pascal Giorgi, Bruno Grenet, Armelle Perret Du Cray, Daniel S Roche. Fast interpolation and multiplication of unbalanced polynomials. ISSAC 2024 - International Symposium on Symbolic and Algebraic Computation, Jul 2024, Raleigh, NC, United States. pp.437-446, ⟨10.1145/3666000.3669717⟩. ⟨lirmm-04746015⟩
- Vincent Neiger, Clément Pernet, Gilles Villard. Computing Krylov iterates in the time of matrix multiplication. ISSAC '24: International Symposium on Symbolic and Algebraic Computation, Jul 2024, Raleigh, NC, United States. pp.419-428, ⟨10.1145/3666000.3669715⟩. ⟨hal-04445355v2⟩
- Matteo Abbondati, Eleonora Guerrini, Romain Lebreton. Decoding Simultaneous Rational Evaluation Codes. ISSAC 2024 - 49th International Symposium on Symbolic and Algebraic Computation, Jonathan Hauenstein, Jul 2024, Raleigh (North Carolina), United States. ⟨10.1145/3666000.3669686⟩. ⟨lirmm-04628184⟩
- Asmaa El fraihi, Nardjes Amieur, Walter Rudametkin, Oana Goga. Client-side and Server-side Tracking on Meta: Effectiveness and Accuracy. PETS 2024 - 24th Privacy Enhancing Technologies Symposium, Jul 2024, Bristol, United Kingdom. pp.431-445, ⟨10.56553/popets-2024-0086⟩. ⟨hal-04665102⟩
- Jean-Guillaume Dumas, Bruno Grenet. In-place fast polynomial modular remainder. Proceedings of the 49th International Symposium on Symbolic and Algebraic Computation (ISSAC'24), ACM SIGSAM, Jul 2024, Raleigh, NC, United States. pp.26-35, ⟨10.1145/3666000.3669672⟩. ⟨hal-03979016v7⟩
- Jean-Guillaume Dumas, Clément Pernet, Alexandre Sedoglavic. Strassen's algorithm is not optimally accurate. 49th International Symposium on Symbolic and Algebraic Computation (ISSAC'24), ACM SIGSAM, Jul 2024, Raleigh, NC, United States. pp.254-263, ⟨10.1145/3666000.3669697⟩. ⟨hal-04441653v2⟩
- Imane Fouad, Cristiana Santos, Pierre Laperdrix. The Devil is in the Details: Detection, Measurement and Lawfulness of Server-Side Tracking on the Web. 24th Privacy Enhancing Technologies Symposium (PETS 2024), Jul 2024, Bristol, United Kingdom. ⟨hal-04617727⟩
- Jean-Guillaume Dumas, Bruno Grenet. In-place accumulation of fast multiplication formulae. Proceedings of the 49th International Symposium on Symbolic and Algebraic Computation (ISSAC'24), ACM SIGSAM, Jul 2024, Raleigh, NC, United States. pp.16-25, ⟨10.1145/3666000.3669671⟩. ⟨hal-04167499v4⟩
- Adrien Schoen, Gregory Blanc, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, et al.. A tale of two methods: unveiling the limitations of GAN and the rise of bayesian networks for synthetic network traffic generation. 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Jul 2024, Vienna, Austria. pp.273-286, ⟨10.1109/EuroSPW61312.2024.00036⟩. ⟨hal-04871298⟩
- Bruno Blanchet. Dealing with Dynamic Key Compromise in CryptoVerif. 37th IEEE Computer Security Foundations Symposium, IEEE, Jul 2024, Enschede, Netherlands. pp.495-510, ⟨10.1109/CSF61375.2024.00015⟩. ⟨hal-04271666v2⟩
- David Baelde, Caroline Fontaine, Adrien Koutsos, Guillaume Scerri, Théo Vignon. A Probabilistic Logic for Concrete Security. CSF 2024 - 37th IEEE Computer Security Foundations Symposium, Jul 2024, Enschede, Netherlands. pp.324-339, ⟨10.1109/CSF61375.2024.00046⟩. ⟨hal-04577828⟩
- Bruno Blanchet, Pierre Boutry, Christian Doczkal, Benjamin Grégoire, Pierre-Yves Strub. CV2EC: Getting the Best of Both Worlds. CSF 2024 - 37th IEEE Computer Security Foundations Symposium, IEEE, Jul 2024, Enschede, Netherlands. pp.283-298, ⟨10.1109/CSF61375.2024.00019⟩. ⟨hal-04321656v2⟩
- Karima Makhlouf, Tamara Stefanović, Héber Hwang Arcolezi, Catuscia Palamidessi. A Systematic and Formal Study of the Impact of Local Differential Privacy on Fairness: Preliminary Results. CSF 2024 - 37th IEEE Computer Security Foundations Symposium, Jul 2024, Enschede, Netherlands. pp.1-16, ⟨10.1109/CSF61375.2024.00039⟩. ⟨hal-04832154⟩
- Barbara Fila, Saša Radomirović. Nothing is Out-of-Band: Formal Modeling of Ceremonies. 2024 IEEE 37th Computer Security Foundations Symposium (CSF), Jul 2024, Enschede, Netherlands. pp.464-478, ⟨10.1109/CSF61375.2024.00049⟩. ⟨hal-04846060⟩
- Bruno Blanchet, Charlie Jacomme. Post-quantum sound CryptoVerif and verification of hybrid TLS and SSH key-exchanges. CSF'24 - 37th IEEE Computer Security Foundations Symposium, IEEE, Jul 2024, Enschede, Netherlands. pp.543-556, ⟨10.1109/CSF61375.2024.00032⟩. ⟨hal-04577912⟩
- Ihab Alshaer, Ahmed Al-Kaf, Valentin Egloff, Vincent Beroulle. Modeling Clock Glitch Fault Injection Effects on a RISC-V Microcontroller. 2024 IEEE 30th International Symposium on On-Line Testing and Robust System Design (IOLTS), Jul 2024, Rennes, France. ⟨10.1109/IOLTS60994.2024.10616064⟩. ⟨hal-04634303⟩
- Frédéric Tran Minh, Laure Gonnord, Julien Narboux. Proof assistants for teaching: a survey. Theorem Proving Components for Educational Software 2024 (ThEdu’24), J. Narboux, W. Neuper and P. Quaresma, Jul 2024, Nancy, France, France. pp.1-27, ⟨10.4204/EPTCS.419.1⟩. ⟨hal-04705580v2⟩
- Romain Cayre, Vincent Nicomette, Guillaume Auriol, Mohamed Kaâniche, Aurélien Francillon. OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers. 2024 ACM Asia conference on Computer and Communications Security (ASIACCS)., Jul 2024, Singapore, Singapore. ⟨hal-04488826⟩
- Antonio Ruggia, Dario Nisi, Savino Dambra, Alessio Merlo, Davide Balzarotti, et al.. Unmasking the Veiled: A Comprehensive Analysis of Android Evasive Malware. ASIAACS 2024, 19th ACM ASIA Conference on Computer and Communications Security, ACM, Jul 2024, Singapore, Singapore. ⟨hal-04378941⟩
- Florent Moriconi, Olivier Levillain, Aurélien Francillon, Raphael Troncy. X-Ray-TLS: transparent decryption of TLS sessions by extracting session keys from memory. The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS), ACM, Jul 2024, Singapore, Singapore. pp.35-48, ⟨10.1145/3634737.3637654⟩. ⟨hal-04446027⟩
- Léa Astrid KENMOGNE, Stéphane Mocanu. Explainable AI for Process-Aware Attack Detection in Industrial Control Systems. SecSoft 2024 - 6th International Workshop on Cyber-Security in Software-defined and Virtualized Infrastructures at the 10th IEEE International Conference on Network Softwarization (IEEE NetSoft 2024), IEEE, Jun 2024, St Louis, MO, United States. pp.1-6, ⟨10.1109/NetSoft60951.2024.10588940⟩. ⟨hal-04680302⟩
- Jolahn Vaudey, Gwenaël Delaval, Stéphane Mocanu, Éric Rutten. Self-reconfiguration of industrial control systems as a response to cyberattacks. SecSoft 2024 - 6th International Workshop on Cyber-Security in Software-defined and Virtualized Infrastructures, Jun 2024, St. Louis, United States. pp.1-6. ⟨hal-04600646⟩
- Sara Taki, Adrien Boiret, Cédric Eichler, Benjamin Nguyen. Mapping relational databases to RDF and its impact on privacy. APVP 2024 - 14ème Atelier sur la Protection de la Vie Privée, Jun 2024, Vogüé, France. ⟨hal-04908768⟩
- Do Duc Anh Nguyen, Pierre Alain, Fabien Autrel, Ahmed Bouabdallah, Jérôme Franc. Intent-Based Attack Mitigation through Opportunistic Synchronization of Micro-Services. 10th IEEE International Conference on Network Softwarization (NetSoft 2024), Jun 2024, Saint Louis, MO, United States. ⟨10.1109/NetSoft60951.2024.10588925⟩. ⟨hal-04645889⟩
- Guillaume Girol, Guilhem Lacombe, Sébastien Bardin. Quantitative robustness for vulnerability assessment. PLDI 2024 - ACM-SIGPLAN Symposium on Programming Language Design and Implementation, Jun 2024, Copenhague, Denmark. pp.741-765. ⟨cea-05119619⟩
- Do Duc Anh Nguyen, Pierre Alain, Fabien Autrel, Ahmed Bouabdallah, Jérôme François, et al.. How Fast Does Malware Leveraging EternalBlue Propagate? The case of WannaCry and NotPetya. NetSoft 2024: IEEE 10th International Conference on Network Softwarization, Jun 2024, Saint Louis (Missouri), United States. ⟨10.1109/NetSoft60951.2024.10588886⟩. ⟨hal-04645862⟩
- Mariem Brahem, Jasmine Watissee, Cédric Eichler, Adrien Boiret, Nicolas Anciaux, et al.. reteLLMe: Design Rules for using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions. APVP 2024 - 14ème Atelier sur la Protection de la Vie Privée, Jun 2024, Vogüé, France. ⟨hal-04909371⟩
- Nicolas Anciaux, Sabine Frittella, Baptiste Joffroy, Guillaume Scerri, Benjamin Nguyen. Un nouveau PET pour la collecte de données via des formulaires avec minimisation des données, précision totale et consentement éclairé. 14e Atelier sur la Protection de la Vie Privée (APVP 2024), Jun 2024, Vogüé, France. ⟨hal-04908781⟩
- Xinqing Li, Iulian Sandu Popa, Nicolas Anciaux. Système de gestion de données extensif et sécurisé avec code d'extension vulnérable. APVP 2024 - 14ème Atelier sur la Protection de la Vie Privée, Jun 2024, Lyon, France. ⟨hal-04598521v2⟩
- Enzo d'Andréa, Jérôme François, Abdelkader Lahmadi, Olivier Festor. Vulnet: Learning Navigation in an Attack Graph. 2024 IEEE 10th International Conference on Network Softwarization (NetSoft), Jun 2024, Saint Louis, MO, United States. pp.393-398, ⟨10.1109/NetSoft60951.2024.10588918⟩. ⟨hal-04782284⟩
- Mariem Brahem, Haoying Zhang, Nicolas Anciaux, Benjamin Nguyen, José Maria de Fuentes. Vers une détection des activités privées dans la consommation énergétique en télétravail basée sur le profil matriciel. APVP 2024 - 14e Atelier sur la Protection de la Vie Privée, Jun 2024, Vogüé, France. ⟨hal-04908749⟩
- Walid Messahel, Tayssir Touili. Reachability Analysis of Concurrent Self-modifying Code. 28th International Conference on Engineering of Complex Computer Systems, Jun 2024, Limassol (Chypre), Cyprus. pp.257-271, ⟨10.1007/978-3-031-66456-4_14⟩. ⟨hal-04766984v2⟩
- Jean-Marie Mineau, Jean-François Lalande. Evaluating the Reusability of Android Static Analysis Tools. ICSR 2024 - 21st International Conference on Software and Systems Reuse, Jun 2024, Limassol, Cyprus. pp.153-170, ⟨10.1007/978-3-031-66459-5_10⟩. ⟨hal-04557993⟩
- Vassil Dimitrov, Richard Ford, Laurent Imbert, Arjuna Madanayake, Nilan Udayanga, et al.. Multiple-base Logarithmic Quantization and Application in Reduced Precision AI Computations. ARITH 2024 - 31st IEEE International Symposium on Computer Arithmetic, Jun 2024, Málaga, Spain. pp.48-51, ⟨10.1109/ARITH61463.2024.00017⟩. ⟨lirmm-04638183⟩
- Angèle Bossuat, Eloïse Brocas, Véronique Cortier, Pierrick Gaudry, Stéphane Glondu, et al.. Belenios: the Certification Campaign. SSTIC 2024 - Symposium sur la sécurité des technologies de l'information et des communications, Jun 2024, Rennes, France. ⟨hal-04578848⟩
- Ruta Binkyte, Daniele Gorla, Catuscia Palamidessi. BaBE: Enhancing Fairness via Estimation of Explaining Variables. FAccT 2024 - The ACM Conference on Fairness, Accountability, and Transparency, Jun 2024, Rio de Janeiro, Brazil. pp.1917 - 1925, ⟨10.1145/3630106.3659016⟩. ⟨hal-04950351⟩
- Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, et al.. Partial Sums Meet FFT: Improved Attack on 6-Round AES. Eurocrypt 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2024, Zurich, Switzerland. pp.128-157, ⟨10.1007/978-3-031-58716-0_5⟩. ⟨hal-04925753⟩
- Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, Maria Naya Plasencia. A Generic Algorithm for Efficient Key Recovery in Differential Attacks – and its Associated Tool. EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2024, Zurich, Switzerland. pp.217-248, ⟨10.1007/978-3-031-58716-0_8⟩. ⟨hal-04598635⟩
- Nassim Riadi, Florent Bruguier, Pascal Benoit, Sophie Dupuis, Marie-Lise Flottes. Power Analysis Attack Against post-SAT Logic Locking schemes. ETS 2024 - 29th IEEE European Test Symposium, May 2024, The Hague, Netherlands. pp.1-6, ⟨10.1109/ETS61313.2024.10567311⟩. ⟨lirmm-04628663⟩
- Grégor Quétel, Eric Alata, Pierre-François Gimenez, Laurent Pautet, Thomas Robert. A Parser-Based Data Collector for Intrusion Detection. RESSI 2024 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2024, Eppe-Sauvage, France. pp.1-2. ⟨hal-04871463⟩
- Do Duc Anh Nguyen, Fabien Autrel, Ahmed Bouabdallah, Jérôme François, Pierre Alain, et al.. Intent-Based Attack Mitigation through Opportunistic Synchronization of Microservices. RESSI 2024 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2024, Eppe-Sauvage, France. ⟨hal-04645953⟩
- Colin M Gray, Nataliia Bielova, Cristiana Santos, Thomas Mildner. An Ontology of Dark Patterns Knowledge: Foundations, Definitions, and a Pathway for Shared Knowledge-Building. CHI 2024 - Conference on Human Factors in Computing Systems, May 2024, Honolulu (HI), United States. pp.1-22, ⟨10.1145/3613904.3642436⟩. ⟨hal-04913778⟩
- Louis Béthune, Thomas Massena, Thibaut Boissin, Yannick Prudent, Corentin Friedrich, et al.. DP-SGD Without Clipping: The Lipschitz Neural Network Way. ICLR 2024 - 12th International Conference on Learning Representations, May 2024, Vienna (Austria), Austria. ⟨hal-04610647⟩
- Ali Shahin Shamsabadi, Gefei Tan, Tudor Ioan Cebere, Aurélien Bellet, Hamed Haddadi, et al.. Confidential-DPproof: Confidential Proof of Differentially Private Training. ICLR 2024 - 12th International Conference on Learning Representations, May 2024, Vienna (Austria), Austria. ⟨hal-04610635⟩
- Anis Fellah-Touta, Lilian Bossuet, Carlos Andres Lara-Nino. A Lightweight Non-Oscillatory Delay-Sensor for Remote Power Analysis. 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), May 2024, Virginia, United States. pp.343-348, ⟨10.1109/HOST55342.2024.10545353⟩. ⟨hal-04604413⟩
- Hadrien Hendrikx, Paul Mangold, Aurélien Bellet. The Relative Gaussian Mechanism and its Application to Private Gradient Descent. AISTATS 2024 - 27th International Conference on Artificial Intelligence and Statistics, May 2024, Valencia, Spain. pp.3079-3087. ⟨hal-04370596⟩
- Louis Gauthier, Virgile Prevosto, Julien Signoles. A semantics of structures, unions, and underspecified terms for formal specification. FormaliSE 2024 - International Conference on Formal Methods in Software Engineering, Apr 2024, Lisbonne, Portugal. ⟨10.1145/3644033.3644380⟩. ⟨cea-04480238⟩
- Roua Boulifa, Giorgio Di Natale, Paolo Maistri. Internal State Monitoring in RISC-V Microarchitectures for Security Purpose. 25th IEEE Latin American Test Symposium (LATS 2024), Apr 2024, Maceio (Brazil), Brazil. ⟨10.1109/LATS62223.2024.10534613⟩. ⟨hal-04513607⟩
- Sami El Amraoui, Aghiles Douadi, Régis Leveugle, Paolo Maistri. Harmonic Response of Ring Oscillators under Single ElectroMagnetic Pulsed Fault Injection. 25th IEEE Latin American Test Symposium (LATS 2024), Apr 2024, Maceio (Brazil), Brazil. ⟨hal-04513585⟩
- Sami El Amraoui, Régis Leveugle, Paolo Maistri. Choose your Path: Control of Ring Oscillators EMFI Susceptibility through FPGA P&R Constraints. International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS 2024), Apr 2024, Kielce, Poland. ⟨hal-04513560⟩
- Ruta Binkyte, Carlos Pinzón, Szilvia Lestyán, Kangsoo Jung, Héber Hwang Arcolezi, et al.. Causal Discovery Under Local Privacy. Third Conference on Causal Learning and Reasoning, Apr 2024, Los Angeles, CA, United States. pp.325-383. ⟨hal-04617032⟩
- Nicolas Anciaux, Sabine Frittella, Baptiste Joffroy, Benjamin Nguyen, Guillaume Scerri. A new PET for Data Collection via Forms with Data Minimization, Full Accuracy and Informed Consent. 27th International Conference on Extending Database Technology, EDBT 2024, Mar 2024, Paestum, Italy. ⟨10.48786/edbt.2024.08⟩. ⟨hal-04149000v2⟩
- Sébastien Michelland, Christophe Deleuze, Laure Gonnord. From low-level fault modeling (of a pipeline attack) to a proven hardening scheme. Compiler Construction (CC'24), Mar 2024, Edinburgh (Scotland), United Kingdom. ⟨10.1145/3640537.3641570⟩. ⟨hal-04438994v2⟩
- Romain Malmain, Andrea Fioraldi, Aurélien Francillon. LibAFL QEMU: A Library for Fuzzing-oriented Emulation. BAR 2024, Workshop on Binary Analysis Research, colocated with NDSS 2024, Mar 2024, San Diego (CA), United States. ⟨hal-04500872⟩
- Filippo Galli, Catuscia Palamidessi, Tommaso Cucinotta. Online Sensitivity Optimization in Differentially Private Learning. AAAI 2024 - National Conference on Artificial Intelligence, Feb 2024, Vancouver, Canada. pp.12109-12117, ⟨10.1609/aaai.v38i11.29099⟩. ⟨hal-04941814⟩
- Carlos Andres Lara-Nino, Lilian Bossuet. Covert Communications in Heterogeneous SoCs. École d'hiver Francophone sur les Technologies de Conception des Systèmes Embarqués Hétérogènes (FETCH), Université Libre de Bruxelles, Feb 2024, Maillen, Belgium. ⟨hal-04467933⟩
- Vincent Roca, Pierre Laperdrix. Web, smartphone, AdTech: the privacy viewpoint. Winter school 2024 of the PEPR Cybersecurity, PEPR Cybercesurity, Jan 2024, Autrans, France. ⟨hal-04550725⟩
- Marco Milanese, Antoine Miné. Generation of Violation Witnesses by Under-Approximating Abstract Interpretation. 25th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2024, Jan 2024, London, United Kingdom. pp.50-73, ⟨10.1007/978-3-031-50524-9_3⟩. ⟨hal-04317611⟩
- David Monniaux. Memory Simulations, Security and Optimization in a Verified Compiler. Certified Programs and Proofs 2024, Brigitte Pientka; Sandrine Blazy; Amin Timany; Dmitriy Traytel, Jan 2024, London, United Kingdom. ⟨10.1145/3636501.3636952⟩. ⟨hal-04336347⟩
- Véronique Cortier, Pierrick Gaudry, Quentin Yang. Is the JCJ voting system really coercion-resistant?. 37th IEEE Computer Security Foundations Symposium (CSF), 2024, Enschede, Netherlands. ⟨hal-03629587v3⟩
- Clément Pierquin, Aurélien Bellet, Marc Tommasi, Matthieu Boussard. Rényi Pufferfish Privacy: General Additive Noise Mechanisms and Privacy Amplification by Iteration via Shift Reduction Lemmas. International Conference on Machine Learning (ICML 2024), 2024, Vienna (Austria), Austria. ⟨hal-04363020v2⟩
- Yanis Sellami, Guillaume Girol, Frédéric Recoules, Damien Couroussé, Sébastien Bardin. Inference of Robust Reachability Constraints. 2024 ACM Symposium on Principles of Programming Languages, Jan 2024, London, United Kingdom. pp.2731-2760, ⟨10.1145/3632933⟩. ⟨hal-04477919⟩
- Gaspard Berthelier, Antoine Boutet, Antoine Richard. Toward training NLP models to take into account privacy leakages. BigData 2023 - IEEE International Conference on Big Data, Dec 2023, Sorrento, Italy. pp.1-9. ⟨hal-04299405⟩
- Tristan Benoit, Jean-Yves Marion, Sébastien Bardin. Scalable program clone search through spectral analysis. ESEC/FSE '23 - 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Dec 2023, San Francisco, United States. ⟨10.48550/arXiv.2210.13063⟩. ⟨hal-03826726v4⟩
- Duy Nguyen, Duong Hieu Phan, David Pointcheval. Verifiable Decentralized Multi-Client Functional Encryption for Inner Product. Advances in Cryptology - ASIACRYPT 2023, Dec 2023, Guanzhou, China. ⟨hal-04276484⟩
- Daphne Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey. A homomorphic AES evaluation in less than 30 seconds by means of TFHE. WAHC 2023 - 11th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, Nov 2023, Copenhague, Denmark. ⟨cea-04332234⟩
- Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, et al.. Decoding the Secrets of Machine Learning in Windows Malware Classification: A Deep Dive into Datasets, Features, and Model Performance. CCS 2023 - 30th ACM Conference on Computer and Communications Security, Nov 2023, Copenhagen, Denmark. pp.60-74, ⟨10.1145/3576915.3616589⟩. ⟨hal-04321280⟩
- Nicolas Anciaux, Sabine Frittella, Baptiste Joffroy, Benjamin Nguyen. Demo : Data Minimization and Informed Consent in Administrative Forms. ACM CCS 2023 - Conference on Computer and Communications Security, Nov 2023, Copenhagen, Denmark. ⟨10.1145/3576915.3624363⟩. ⟨hal-04240432⟩
- Arnaud Grivet Sebert, Martin Zuber, Oana Stan, Renaud Sirdey, Cedric Gouy-Pailler. A probabilistic design for practical homomorphic majority voting with intrinsic differential privacy. WAHC 2023 - 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, Nov 2023, Copenhague, Denmark. pp.47-58, ⟨10.1145/3605759.3625258⟩. ⟨cea-04461731⟩
- Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, et al.. A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries. CCS 2023 - ACM SIGSAC Conference on Computer and Communications Security, Nov 2023, Copenhagen, Denmark. pp.1690-1704, ⟨10.1145/3576915.3623112⟩. ⟨hal-04474774⟩
- Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan. Comparse: Provably Secure Formats for Cryptographic Protocols. CCS '23: ACM SIGSAC Conference on Computer and Communications Security, Nov 2023, Copenhagen, Denmark. pp.564-578, ⟨10.1145/3576915.3623201⟩. ⟨hal-04310972⟩
- Sylvain Conchon, Alexandrina Korneva. The Cubicle Fuzzy Loop: A Fuzzing-Based Extension for the Cubicle Model Checker. SEFM 2023 - Software Engineering and Formal Methods, Nov 2023, Eindhoven, Netherlands. pp.30-46, ⟨10.1007/978-3-031-47115-5_3⟩. ⟨hal-04394062v2⟩
- Julien Mirval, Luc Bouganim, Iulian Sandu Popa. Federated Learning on Personal Data Management Systems: Decentralized and Reliable Secure Aggregation Protocols. BDA 2023 - 39ème Conférence sur la Gestion de Données – Principes, Technologies et Applications, Université de Montpellier, Oct 2023, Montpellier, France. pp.1-12. ⟨hal-04234906⟩
- Tristan Allard, Louis Béziaud, Sébastien Gambs. SNAKE challenge: Sanitization Algorithms under Attack. ACM International Conference on Information and Knowledge Management, Oct 2023, Birmingham, United Kingdom. ⟨10.1145/3583780.3614754⟩. ⟨hal-04228115⟩
- Véronique Cortier, Pierrick Gaudry, Stéphane Glondu, Sylvain Ruhault. French 2022 legislatives elections: a verifiability experiment. The E-Vote-ID Conference 2023, Oct 2023, Luxembourg City, Luxembourg. ⟨hal-04205615⟩
- Constantin Catalin Dragan, François Dupressoir, Kristian Gjøsteen, Thomas Haines, Peter Rønne, et al.. Machine-Checked Proofs of Accountability: How to sElect who is to Blame. ESORICS 2023, Sep 2023, The Hague, The Netherlands, Netherlands. ⟨10.1007/978-3-031-51479-1_24⟩. ⟨hal-04216243⟩
- Théophile Brézot, Paola de Perthuis, David Pointcheval. Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE. ESORICS 2023 - 28th European Symposium on Research in Computer Security, Sep 2023, La Haye, Netherlands. ⟨hal-04283160⟩
- Tristan Claverie, Gildas Avoine, Stéphanie Delaune, José Lopes Esteves. Extended version: Tamarin-based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks. 28th European Symposium on Research in Computer Security on Computer Security, Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis, Sep 2023, The Hague, Netherlands. ⟨hal-04079883⟩
- Daniele Gorla, Louis Jalouzot, Federica Granese, Catuscia Palamidessi, Pablo Piantanida. On the (Im)Possibility of Estimating Various Notions of Differential Privacy (short paper). ICTCS 2023 - The 24th Italian Conference on Theoretical Computer Science, Sep 2023, Palermo, Italy. pp.219--224. ⟨hal-04349303⟩
- José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, et al.. Formally verifying Kyber: Episode IV: Implementation correctness. CHES 2023 - Conference on Cryptographic Hardware and Embedded Systems, IACR, Sep 2023, Praha, Czech Republic. pp.164-193, ⟨10.46586/tches.v2023.i3.164-193⟩. ⟨hal-04218417⟩
- Theodoros Karathanasis. EU’s External Regulatory Power effectiveness via Markets, The Impact of EU’s Artificial Intelligence Act. UACES 53rd Annual Conference, University Asssociation for Contemporary European Studies (UACES), Sep 2023, Belfast, Ireland. ⟨hal-04478220⟩
- Grégoire Menguy, Sébastien Bardin, Arnaud Gotlieb, Nadjib Lazaar. Active disjunctive constraint acquisition. KR 2023 - 20th International Conference on Principles of Knowledge Representation and Reasoning, Sep 2023, Rhodes, Greece. pp.512-520, ⟨10.24963/kr.2023/50⟩. ⟨cea-04258912⟩
- Arnaud Grivet Sebert, Marina Checri, Oana Stan, Renaud Sirdey, Cedric Gouy-Pailler. Combining homomorphic encryption and differential privacy in federated learning. 2023 20th Annual International Conference on Privacy, Security and Trust (PST), Aug 2023, Copenhague, Denmark. 10320195 (7 p.), ⟨10.1109/PST58708.2023.10320195⟩. ⟨cea-04485721⟩
- Maxime Bombar, Geoffroy Couteau, Alain Couvreur, Clément Ducros. Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding. CRYPTO 2023 - 43rd Annual International Cryptology Conference, Aug 2023, Santa Barbara, United States. pp.567-601, ⟨10.1007/978-3-031-38551-3_18⟩. ⟨hal-04265638v2⟩
- Manuel Barbosa, Gilles Barthe, Christian Doczkal, Jelle Don, Serge Fehr, et al.. Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium. CRYPTO 2023 - 43rd International Cryptology Conference, Aug 2023, Santa Barbara, United States. pp.358-389, ⟨10.1007/978-3-031-38554-4_12⟩. ⟨hal-04315311⟩
- Geoffroy Couteau, Abhishek Jain, Zhengzhong Jin, Willy Quach. A Note on Non-Interactive Zero-Knowledge from CDH. 43rd Annual International Cryptology Conference, CRYPTO 2023,, Aug 2023, Santa Barbara (CA), France. pp.731-764, ⟨10.1007/978-3-031-38551-3_23⟩. ⟨hal-04265640⟩
- Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan. TreeSync: Authenticated Group Management for Messaging Layer Security. USENIX Security '23, Aug 2023, Anaheim, United States. ⟨hal-04255953⟩
- Cas Cremers, Charlie Jacomme, Aurora Naska. Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations. USENIX Security 2023 - 32nd USENIX Security Symposium, Aug 2023, Anaheim, United States. ⟨hal-03996689⟩
- Charlie Jacomme, Elise Klein, Steve Kremer, Maïwenn Racouchot. A comprehensive, formal and automated analysis of the EDHOC protocol. USENIX Security '23 - 32nd USENIX Security Symposium, Aug 2023, Anaheim, CA, United States. ⟨hal-03810102⟩
- Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao. Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security. 32nd USENIX Security Symposium 2023, USENIX, Aug 2023, Anaheim, United States. ⟨hal-04126116v3⟩
- Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, et al.. Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses. 32nd USENIX Security Symposium, Aug 2023, Anaheim, United States. ⟨hal-03795715⟩
- Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti. Humans vs. Machines in Malware Classification. USENIX Security 2023 - 32nd Usenix Security Symposium, Aug 2023, Anaheim (CA), United States. ⟨hal-04321950⟩
- Alberto Pedrouzo-Ulloa, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, et al.. Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation. 2023 IEEE International Conference on Cyber Security and Resilience (CSR), Jul 2023, Venice, Italy. pp.612-617, ⟨10.1109/CSR57506.2023.10224979⟩. ⟨hal-04509093⟩
- Paul Mangold, Michaël Perrot, Aurélien Bellet, Marc Tommasi. Differential Privacy has Bounded Impact on Fairness in Classification. International Conference on Machine Learning, Jul 2023, Honolulu, United States. ⟨hal-03902203v2⟩
- Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey, Martin Zuber. ComBo: a Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain. AfricaCrypt, Jul 2023, Sousse, Tunisia. p. 317-343, ⟨10.1007/978-3-031-37679-5_14⟩. ⟨cea-04487781⟩
- Héber Hwang Arcolezi, Karima Makhlouf, Catuscia Palamidessi. (Local) Differential Privacy has NO Disparate Impact on Fairness. DBSec 2023 - the 37th IFIP Annual Conference on Data and Applications Security and Privacy, Vijay Atluri; Anna Lisa Ferrara, Jul 2023, SOPHIA ANTIPOLIS, France. pp.3-21, ⟨10.1007/978-3-031-37586-6_1⟩. ⟨hal-04175027⟩
- Héber Hwang Arcolezi, Selene Cerna, Catuscia Palamidessi. On the Utility Gain of Iterative Bayesian Update for Locally Differentially Private Mechanisms. DBSec 2023 - 37th IFIP Annual Conference on Data and Applications Security and Privacy, Vijay Atluri; Anna Lisa Ferrara, Jul 2023, Sophia Antipolis, France. pp.165-183, ⟨10.1007/978-3-031-37586-6_11⟩. ⟨hal-04175035⟩
- Vincent Cheval, Itsaka Rakotonirina. Indistinguishability Beyond Diff-Equivalence in ProVerif. 2023 IEEE 36th Computer Security Foundations Symposium (CSF), Jul 2023, Dubrovnik, Croatia. pp.184-199, ⟨10.1109/CSF57540.2023.00036⟩. ⟨hal-04219230⟩
- Julien Mirval, Luc Bouganim, Iulian Sandu Popa. Federated Learning on Personal Data Management Systems: Decentralized and Reliable Secure Aggregation Protocols. SSDBM 2023 - 35th International Conference on Scientific and Statistical Database Management, USC Information Sciences Institute, Jul 2023, Los Angeles CA, United States. pp.1-12, ⟨10.1145/3603719.3603730⟩. ⟨hal-04234924⟩
- Guillaume Gagnon, Sébastien Gambs, Mathieu Cunche. RSSI-based Fingerprinting of Bluetooth Low Energy Devices. SECRYPT 2023 - 20th International Conference on Security and Cryptography, Jul 2023, Rome, Italy. pp.1-12. ⟨hal-04161424⟩
- Vincent Cheval, Véronique Cortier, Alexandre Debant. Election Verifiability with ProVerif. CSF 2023 - 36th IEEE Computer Security Foundations Symposium, Jul 2023, Dubrovnik, Croatia. ⟨10.1109/CSF57540.2023.00032⟩. ⟨hal-04177268v2⟩
- David Baelde, Alexandre Debant, Stéphanie Delaune. Proving Unlinkability using ProVerif through Desynchronized Bi-Processes. IEEE Computer Security Foundations Symposium, Jul 2023, Dubrovnik, Croatia. ⟨hal-03674979v2⟩
- Vincent Cheval, José Moreira, Mark Ryan. Automatic verification of transparency protocols. 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), Jul 2023, Delft, Netherlands. ⟨10.1109/EuroSP57164.2023.00016⟩. ⟨hal-04219234⟩
- Anis Fellah-Touta, Lilian Bossuet, Carlos Andres Lara-Nino. Combined Internal Attacks on SoC-FPGAs: Breaking AES with Remote Power Analysis and Frequency-based Covert Channels. 8th IEEE European Symposium on Security and Privacy (EuroSP2023), IEEE, Jul 2023, Delft, Netherlands. ⟨10.1109/EuroSPW59978.2023.00035⟩. ⟨hal-04165230⟩
- Daniel de Almeida Braga, Natalia Kulatova, Mohamed Sabt, Pierre-Alain Fouque, Karthikeyan Bhargavan. From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake. EuroS&P 2023 - IEEE 8th European Symposium on Security and Privacy, Jul 2023, Delft, Netherlands. pp.707-723, ⟨10.1109/EuroSP57164.2023.00048⟩. ⟨hal-04175322⟩
- Antonio Ruggia, Andrea Possemato, Alessio Merlo, Dario Nisi, Simone Aonzo. Android, Notify Me When It Is Time To Go Phishing. EUROS&P 2023, 8th IEEE European Symposium on Security and Privacy, IEEE, Jul 2023, Delft, Netherlands. ⟨hal-04017843⟩
- Edwige Cyffers, Aurélien Bellet, Debabrota Basu. From Noisy Fixed-Point Iterations to Private ADMM for Centralized and Federated Learning. Proceedings of the 40th International Conference on Machine Learning (ICML), Jul 2023, Honolulu, United States. ⟨hal-04260417⟩
- Daphne Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey. Building blocks for LSTM homomorphic evaluation with TFHE. 7th International Symposium on Cyber Security, Cryptology and Machine Learning (CSCML 2023), Jun 2023, Paris, France. pp.117. ⟨cea-04186110⟩
- Nathalie Bochard, Florent Bernard. Problématiques modernes de la génération d'aléa véritable: étude approfondie d'un TRNG basé sur les PLLs. Journées Nationales 2023 du GDR Sécurité Informatique, GDR Sécurité Informatique, Jun 2023, Puteaux (92), France. ⟨ujm-04217962⟩
- David Baelde, Adrien Koutsos, Joseph Lallemand. A Higher-Order Indistinguishability Logic for Cryptographic Reasoning. LICS, Jun 2023, Boston, United States. pp.1-13, ⟨10.1109/LICS56636.2023.10175781⟩. ⟨hal-03981949v2⟩
- Mário S. Alvim, Natasha Fernandes, Bruno D Nogueira, Catuscia Palamidessi, Thiago V A Silva. On the Duality of Privacy and Fairness. CADE 2023 - International Conference on AI and the Digital Economy, Jun 2023, Venice, Italy. p. 46 - 48. ⟨hal-04407491⟩
- Ky Nguyen, Duong Hieu Phan, David Pointcheval. Optimal Security Notion for Decentralized Multi-Client Functional Encryption. Applied Cryptography and Network Security. ACNS 2023, Jun 2023, Kyoto, Japan. pp.336-365, ⟨10.1007/978-3-031-33491-7_13⟩. ⟨hal-04194145⟩
- Anis Fellah-Touta, Lilian Bossuet, Carlos Andres Lara-Nino. Advanced method for power trace alignment in Remote Power Analysis over Heterogeneous SoCs. Cryptographic architectures embedded in logic devices, Jun 2023, Castro Urdiales, Spain. ⟨ujm-04220156⟩
- Lilian Bossuet, Vincent Grosso, Carlos Andres Lara-Nino. Is information leakage spilling?. Cryptographic architectures embedded in logic devices, Jun 2023, Castro Urdiales, Spain. ⟨ujm-04220174⟩
- Damien Cauquil, Romain Cayre. Rétro-ingénierie et détournement de piles protocolaires embarquées, un cas d'étude sur le système ESP32. SSTIC 2023, Symposium sur la sécurité des technologies de l'information et des communications, Jun 2023, Rennes, France. ⟨hal-04228161⟩
- Héber Hwang Arcolezi, Catuscia Palamidessi, Carlos Pinzón, Sébastien Gambs. Frequency Estimation of Evolving Data Under Local Differential Privacy. EDBT 2023 - 26th International Conference on Extending Database Technology, May 2023, Ioánnina, Greece. pp.512-525, ⟨10.48786/edbt.2023.44⟩. ⟨hal-03911550⟩
- Florent Moriconi, Axel Ilmari Neergaard, Lucas Georget, Samuel Aubertin, Aurélien Francillon. Reflections on Trusting Docker: Invisible Malware in Continuous Integration Systems. 17th IEEE Workshop on Offensive Technologies (WOOT 2023), IEEE, May 2023, San Francisco (CA, USA), United States. ⟨10.1109/SPW59333.2023.00025⟩. ⟨hal-04087018⟩
- Romain Cayre, Damien Cauquil, Aurélien Francillon. ESPwn32: Hacking with ESP32 System-on-Chips. WOOT 2023, 17th IEEE Workshop on Offensive Technologies, co-located with IEEE S&P 2023, IEEE, May 2023, San Francisco, United States. ⟨10.1109/SPW59333.2023.00033⟩. ⟨hal-04183794⟩
- Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, et al.. Typing High-Speed Cryptography against Spectre v1. SP 2023- IEEE Symposium on Security and Privacy, IEEE, May 2023, San Francisco, United States. pp.1592-1609, ⟨10.1109/SP46215.2023.10179418⟩. ⟨hal-04106448⟩
- Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, et al.. Sound Verification of Security Protocols: From Design to Interoperable Implementations. 2023 IEEE Symposium on Security and Privacy (SP), May 2023, San Francisco, United States. ⟨hal-04210887⟩
- Zoé Lagache, Pierre-Henri Thevenon, Maxime Puys, Oum-El-Kheir Aktouf. Study of autonomous response and recovery mechanisms for embedded systems. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, RESSI 2023, May 2023, Neuvy-sur-Barangeon, France. ⟨hal-05124436⟩
- Antoine Boutet, Iulian Sandu Popa. Tutorial: Trusted Execution Environments and Intel SGX - a few basic notions and usages. RESSI 2023 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France. ⟨hal-04228113⟩
- Antoine Boutet, Vincent Roca. IPoP: Interdisciplinary Project on Privacy. RESSI 2023 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France. ⟨hal-04233354⟩
- Do Duc Anh Nguyen, Fabien Autrel, Ahmed Bouabdallah, Guillaume Doyen. A Robust Approach for the Detection and Prevention of Conflicts in I2NSF Security Policies. NOMS 2023: IEEE/IFIP Network Operations and Management Symposium, May 2023, Miami, United States. pp.1-7, ⟨10.1109/NOMS56928.2023.10154304⟩. ⟨hal-04223371⟩
- Chloé Hébant, David Pointcheval, Robert Schädlich. Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures. PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, May 2023, Atlanta (GA), United States. pp.312-341, ⟨10.1007/978-3-031-31368-4_12⟩. ⟨hal-04497276⟩
- Élie Bouscatié, Guilhem Castagnos, Olivier Sanders. Pattern Matching in Encrypted Stream from Inner Product Encryption. PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, May 2023, Atlanta (Georgia), United States. pp.774-801, ⟨10.1007/978-3-031-31368-4_27⟩. ⟨hal-04087741⟩
- Geoffroy Couteau, Clément Ducros. Pseudorandom Correlation Functions from Variable-Density LPN, Revisited. IACR 2023 - 26th International Conference on Practice and Theory of Public-Key Cryptography, May 2023, Atlanta, United States. pp.221-250, ⟨10.1007/978-3-031-31371-4_8⟩. ⟨hal-03947831v2⟩
- Véronique Cortier, Alexandre Debant, Pierrick Gaudry, Stéphane Glondu. Belenios with cast as intended. Voting 2023 - 8th Workshop on Advances in Secure Electronic Voting, May 2023, Bol, Brač, Croatia. ⟨hal-04020110⟩
- Selene Cerna, Catuscia Palamidessi. On the Application and Impact of differential privacy and Fairness in Ambulance Engagement Time Prediction. ICLR 2023 - The First Tiny Papers Track at ICLR 2023, May 2023, Kigali, Rwanda. ⟨hal-04349309⟩
- Anggrio Sutopo, Thomas Haines, Peter Rønne. On the Auditability of the Estonian IVXV System and an Attack on Individual Verifiability. Workshop on Advances in Secure Electronic Voting, May 2023, Bol, brac, Croatia. ⟨10.1007/978-3-031-48806-1_2⟩. ⟨hal-04216242⟩
- Dung Bui, Geoffroy Couteau. Improved Private Set Intersection for Sets with Small Entries. 26th IACR International Conference on Practice and Theory of Public-Key Cryptography,, May 2023, Atlanta (GA), United States. pp.190-220, ⟨10.1007/978-3-031-31371-4_7⟩. ⟨hal-04265603⟩
- Théophile Gousselot, Olivier Thomas, Jean-Max Dutertre, Olivier Potin, Jean-Baptiste Rigaud. Lightweight Countermeasures Against Original Linear Code Extraction Attacks on a RISC-V Core. 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), May 2023, San Jose, France. pp.89-99, ⟨10.1109/HOST55118.2023.10133316⟩. ⟨hal-04465052⟩
- Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi. High-Dimensional Private Empirical Risk Minimization by Greedy Coordinate Descent. AISTATS 2023 - International Conference on Artificial Intelligence and Statistics, Apr 2023, Valencia, Spain. pp.4894-4916. ⟨hal-03714465v3⟩
- Catuscia Palamidessi. Local Methods for Privacy Protection and Impact on Fairness. CODASPY 2023 - Thirteenth ACM Conference on Data and Application Security and Privacy, Apr 2023, Charlotte NC, United States. ⟨10.1145/3577923.3587263⟩. ⟨hal-04349271⟩
- Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia. Constrained Pseudorandom Functions from Homomorphic Secret Sharing. 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques,EUROCRYPT 2023, Apr 2023, Lyon, France. pp.194-224, ⟨10.1007/978-3-031-30620-4_7⟩. ⟨hal-04265643⟩
- Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, et al.. Oblivious Transfer with Constant Computational Overhead. 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2023), Apr 2023, Lyon, France. pp.271-302, ⟨10.1007/978-3-031-30545-0_10⟩. ⟨hal-04265616⟩
- Eliana Carozza, Geoffroy Couteau, Antoine Joux. Short Signatures from Regular Syndrome Decoding in the Head. 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2023), Apr 2023, Lyon, France. pp.532-563, ⟨10.1007/978-3-031-30589-4_19⟩. ⟨hal-04265627⟩
- Abtin Afshar, Geoffroy Couteau, Mohammad Mahmoody, Elahe Sadeghi. Fine-Grained Non-Interactive Key-Exchange: Constructions and Lower Bounds. 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2023), Apr 2023, Lyon, France. pp.55-85, ⟨10.1007/978-3-031-30545-0_3⟩. ⟨hal-04265624⟩
- Sébastien Bardin, Soline Ducousso, Marie-Laure Potet. Adversarial reachability for program-level security analysis. ESOP 2023 - 32nd European Symposium on Programming,, ETAPS, Apr 2023, Paris, France. pp.58-89, ⟨10.1007/978-3-031-30044-8_3⟩. ⟨cea-04199882⟩
- Elette Boyle, Geoffroy Couteau, Pierre Meyer. Sublinear-Communication Secure Multiparty Computation Does Not Require FHE. EUROCRYPT 2023, Apr 2023, Lyon, France. pp.159-189, ⟨10.1007/978-3-031-30617-4_6⟩. ⟨hal-04265633⟩
- Ludovic Javet, Nicolas Anciaux, Luc Bouganim, Léo Lamoureux, Philippe Pucheral. Pushing Edge Computing one Step Further: Resilient and Privacy-Preserving Processing on Personal Devices. EDBT 2023 - 26th International Conference on Extending Database Technology, Mar 2023, Ioannina, Greece. ⟨10.48786/edbt.2023.77⟩. ⟨hal-03996787v2⟩
- Ludovic Javet, Nicolas Anciaux, Luc Bouganim, Léo Lamoureux, Philippe Pucheral. Secure Computations in Opportunistic Networks: An Edgelet Demonstration with a Medical Use-Case. PerCom 2023 - 21st IEEE International Conference on Pervasive Computing and Communications, Mar 2023, Atlanta, United States. pp.331-333, ⟨10.1109/PerComWorkshops56833.2023.10150321⟩. ⟨hal-03925679v3⟩
- Benoît Libert, Alain Passelègue, Mahshid Riahinia. PointProofs, Revisited. Asiacrypt 2022 - International Conference on the Theory and Application of Cryptology and Information Security, Dec 2022, Taipei, Taiwan. ⟨hal-03903981⟩
- Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker. Threshold Linearly Homomorphic Encryption on $\mathbf{Z}/2^k\mathbf{Z}$. ASIACRYPT 2022 - International Conference on the Theory and Application of Cryptology and Information Security, Dec 2022, Taipei, Taiwan. pp.99-129, ⟨10.1007/978-3-031-22966-4_4⟩. ⟨hal-03936038⟩
- Geoffroy Couteau, Maryam Zarezadeh. Non-Interactive Secure Computation of Inner-Product from LPN and LWE. Advances in Cryptology - ASIACRYPT 2022, Dec 2022, Taipei, Taiwan. ⟨hal-03860759⟩
- Geoffroy Couteau, Adi Rosén. Random Sources in Private Computation. Advances in Cryptology - ASIACRYPT 2022, Dec 2022, Taipei, Taiwan. ⟨hal-03869622⟩
- Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter Rønne, Tjerand Silde. Verifiable Decryption in the Head. Australasian Conference on Information Security and Privacy, Nov 2022, Wollongong, Australia. pp.355-374, ⟨10.1007/978-3-031-22301-3_18⟩. ⟨hal-03913553v2⟩
- Elette Boyle, Geoffroy Couteau, Pierre Meyer. Sublinear Secure Computation from New Assumptions. TCC 2022 - Theory of Cryptography Conference, Nov 2022, Chicago, United States. ⟨hal-03860742⟩
- Geoffroy Couteau, Dahmun Goudarzi, Michael Klooß, Michael Reichle. Sharp: Short Relaxed Range Proofs. CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security, Nov 2022, Los Angeles CA USA, United States. pp.609-622, ⟨10.1145/3548606.3560628⟩. ⟨hal-03860720⟩
- Mikaël Bougon, Hervé Chabanne, Véronique Cortier, Alexandre Debant, Emmanuelle Dottax, et al.. Themis: an On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability. CCS 2022 - The ACM Conference on Computer and Communications Security, Nov 2022, Los Angeles, United States. ⟨10.1145/3548606.3560563⟩. ⟨hal-03763294v2⟩
- Thomas Agrikola, Geoffroy Couteau, Sven Maier. Anonymous Whistleblowing over Authenticated Channels. TCC 2022 - Theory of Cryptography Conference, Nov 2022, Chicago, United States. ⟨hal-03860748⟩
- Robin Carpentier, Floris Thiant, Iulian Sandu Popa, Nicolas Anciaux, Luc Bouganim. An Extensive and Secure Personal Data Management System Using SGX. BDA 2022 - 38ème Conférence sur la Gestion de Données - Principes, Technologie et Applications, Oct 2022, Clermont-Ferrand, France. ⟨10.48786/edbt.2022.53⟩. ⟨hal-03941868⟩
- Robin Carpentier, Iulian Sandu Popa, Nicolas Anciaux. Data Leakage Mitigation of User-Defined Functions on Secure Personal Data Management Systems. BDA 2022 - 38ème Conférence sur la Gestion de Données - Principes, Technologie et Applications, Oct 2022, Clermont-Ferrand, France. ⟨hal-03941879⟩
- Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, Peter Rønne, Gergei Bana, David Naccache, et al.. Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol. International Joint Conference on Electronic Voting 2022, Oct 2022, Bregenz, Austria. pp.19-35, ⟨10.1007/978-3-031-15911-4_2⟩. ⟨hal-03913581v2⟩
- Stéphanie Delaune, Joseph Lallemand. One vote is enough for analysing privacy. ESORICS 2022 - 27th European Symposium on Research in Computer Security, Sep 2022, Copenhague, Denmark. ⟨hal-03669664⟩
- Constantin Catalin Dragan, Francois Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, et al.. Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. 2022 IEEE 35th Computer Security Foundations Symposium (CSF), Aug 2022, Haifa, Israel. ⟨10.1109/CSF54842.2022.9919663⟩. ⟨hal-03913573v2⟩
- Robin Carpentier, Iulian Sandu Popa, Nicolas Anciaux. Local Personal Data Processing with Third Party Code and Bounded Leakage. DATA 2022 - 11th International Conference on Data Science, Technology and Applications, Jul 2022, Lisbon, Portugal. ⟨hal-03686098⟩
- Hassan Chaitou, Thomas Robert, Jean Leneutre, Laurent Pautet. Threats to Adversarial Training for IDSs and Mitigation. 19th International Conference on Security and Cryptography, Jul 2022, Lisbon, France. pp.226-236, ⟨10.5220/0011277600003283⟩. ⟨hal-03801012⟩
- Robin Carpentier, Iulian Sandu Popa, Nicolas Anciaux. Data Leakage Mitigation of User-Defined Functions on Secure Personal Data Management Systems. SSDBM 2022 - 34th International Conference on Scientific and Statistical Database Management, Jul 2022, Copenhagen, Denmark. ⟨10.1145/3538712.3538741⟩. ⟨hal-03692175⟩
Poster de conférence
- Clara Bourgeais, Laure Gonnord, David Hély. Work in progress: securing critical variables at compile time. Compas, Jun 2025, Bordeaux, France. ⟨hal-05148976⟩
- Erwan Fasquel, Frédéric Tronel, Yaëlle Vinçont. Fuzzing des Extensions Noyau de macOS. RESSI 2025 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2025, Lanniron, France. , 2025. ⟨hal-05173342⟩
- Nassim Riadi, Florent Bruguier, Marie-Lise Flottes, Sophie Dupuis, Pascal Benoit. Full key recovery for advanced Logic Locking Schemes. CHES 2024 - Conference on Cryptographic Hardware and Embedded Systems, Sep 2024, Halifax, Canada. . ⟨lirmm-04689311⟩
- Gilles Mertens, Nataliia Bielova, Vincent Roca, Cristiana Santos. Poster: Client-Side GTM Tags: hidden data leaks and potential violations of GDPR. PETS 2024 - 24th Privacy Enhancing Technologies Symposium, Jul 2024, Bristol, United Kingdom. pp.1-1, 2024. ⟨hal-04699754⟩
- Claire Guichemerre, Tristan Allard, Sofiane Azogagh, Sébastien Gambs, Marc-Olivier Killijian, et al.. [Poster] Privacy-Preserving Distributed Spectral Centrality Measures based on Fully Homomorphic Encryption. International Conference on Scientific and Statistical Database Management, Jul 2024, Rennes, France. ⟨hal-04714921⟩
- Florent Galtier, Paul L R Olivier, Guillaume Auriol, Vincent Nicomette, Romain Cayre. Experimentation platform for repeatable security analysis in IoT heterogeneous environments. 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2024), May 2024, Seoul, South Korea. 2024, ⟨10.1145/xxxxxxx.⟩. ⟨hal-04725617⟩
- Franco Terranova, Abdelkader Lahmadi, Isabelle Chrisment. Deep Reinforcement Learning for Automated Cyber-Attack Path Prediction in Communication Networks. Geilo Winter School 2024 - Graphs and Applications, Jan 2024, Geilo, Norway. ⟨hal-04462876⟩
- Marina Checri, Jean-Paul Bultel, Renaud Sirdey, Aymen Boudguiga. Lightweight FHE-based protocols achieving results consistency for data encrypted under different keys. SECRYPT 2023 - 20th International Conference on Security and Cryptography, Jul 2023, Rome, Italy. 2023, ⟨10.5220/0012085200003555⟩. ⟨cea-04321177⟩
- Nassim Riadi, Florent Bruguier, Pascal Benoit, Sophie Dupuis, Marie-Lise Flottes. Logic-Locking schemes and side channel attacks resilience. SAFEST Workshop, Jun 2023, Tallinn (Virtual), Estonia. ⟨lirmm-04526269⟩
Proceedings/Recueil des communications
- Adda-Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey. Optimized Stream-Cipher-Based Transciphering by Means of Functional-Bootstrapping. DBSec2023, 13942, Springer Nature Switzerland, pp.91-109, 2023, Lecture Notes in Computer Science, ⟨10.1007/978-3-031-37586-6_6⟩. ⟨hal-04460039⟩
- Olive Chakraborty, Martin Zuber. Efficient and accurate homomorphic comparisons. WAHC'22: Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2022, ACM, pp.35-46, 2022, WAHC'22 - Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 978-1-4503-9877-0. ⟨10.1145/3560827.3563375⟩. ⟨cea-03983178⟩
Chapitres d'ouvrage
- Theodoros Karathanasis. Article 17 : Quality Management System. Ceyhun Necati Pehlivan; Nikolaus Forgó; Peggy Valcke. The EU Artificial Intelligence (AI) act : a commentary, Wolters Kluwer, pp.433-458, 2025, 978-9-4035-3227-1. ⟨halshs-04845924⟩
- Michaël van den Poel, Gianclaudio Malgieri. Silent Reforms of the GDPR in the EU Digital Market Legal Revolution. Critical Reflections on the EU’s Data Protection Regime, 1, Hart Publishing, 2024, ⟨10.5040/9781509977871⟩. ⟨hal-04957151⟩
Article de blog scientifique
- Theodore Christakis. AI Hallucinations and Data Subject Rights under the GDPR: Regulatory Perspectives and Industry Responses. 2024. ⟨hal-04844898⟩
- Theodoros Karathanasis. The Global Outreach of the EU AI Act’s Norms. 2024. ⟨hal-04844936⟩
- Ludovica Robustelli. The Chat GPT Taskforce new report: a coordinated response to Chat GPT data protection violations. 2024. ⟨hal-04856315⟩
- Theodoros Karathanasis. AI incident notification in the EU AI Act: How does it work and is it Effective?. 2024. ⟨hal-04844964⟩
- Shavine Menaf Sedik, Theodore Christakis. Texte définitif du règlement IA en français avec table des matières interactive. 2024. ⟨hal-04845087⟩
- Shavine Menaf Sedik, Theodore Christakis. Tools for Navigating the EU AI Act: (3) Final Text with Interactive Table of Contents. 2024. ⟨hal-04845045⟩
- Alexandre Lodie. Case C-479/22 P, Case C-604/22 and the limitation of the relative approach of the definition of ‘personal data’ by the ECJ.. 2024. ⟨hal-04609263⟩
- Theodore Christakis, Theodoros Karathanasis. Tools for Navigating the EU AI Act: (2) Visualisation Pyramid. 2024. ⟨hal-04845277⟩
- Cornelia Kutterer. What if you move on from your AI companion?. 2024. ⟨hal-04845302⟩
- Shavine Menaf Sedik, Theodore Christakis. Tools for Navigating the EU AI Act: (1) provisional Final Text with Interactive Table of Contents. 2024. ⟨hal-04845336⟩
- Alexandre Lodie. Are personal data always personal? Case T-557/20 SRB v. EDPS or when the qualification of data depends on who holds them. 2023. ⟨hal-04292464⟩
- Theodoros Karathanasis. EU Copyright Directive: A ‘Nightmare’ for Generative AI Researchers and Developers ?. 2023. ⟨hal-04478023⟩
- Gaspard Berthelier, Antoine Boutet. ChatGPT, modèles de langage et données personnelles : quels risques pour nos vies privées ?. 2023. ⟨hal-04371691⟩
- Antoine Boutet. Données personnelles : rien à cacher, mais beaucoup à perdre. 2023. ⟨hal-04316957⟩
- Theodoros Karathanasis. Guidance on Classification and Conformity Assessments for High-Risk AI Systems under EU AI Act. 2023. ⟨hal-04477963⟩
- Cédric Lauradoux, Teodora Curelariu, Alexandre Lodie. Re-identification attacks and data protection law. 2023. ⟨hal-04477938⟩
- Alexandre Lodie, Stephanie Celis Juarez, Theodoros Karathanasis. Towards a New Regime of Civil Liability for AI Systems. 2022. ⟨hal-04130851⟩
Autres publications
- Michaël van den Poel, Rosamunde van Brakel. Opinie 'Live gezichtsherkenning inzetten tegen sluikstorten? Europa laat het straks toe'. 2025. ⟨hal-04957202⟩
- Michaël van Den Poel. Case C-21/23 Lindenapotheke -Competitors can enforce GDPR-based unfair commercial practices, and a broadening concept of health and sensitive data Michaël van den Poel. 2024, ⟨10.21428/9885764c.2d19b43d⟩. ⟨hal-04957185⟩
- Jean-Yves Marion. Rançongiciel, une plongée dans le monde de la cybercriminalité. Rançongiciel, une plongée dans le monde de la cybercriminalité, 2023. ⟨hal-04547822⟩
- Valérie Viet Triem Tong, Jean-Louis Lanet. Se protéger d'une pandémie numérique. 2023. ⟨hal-04547827⟩
Pré-publications, Documents de travail
- Thomas Boudou, Batiste Le Bars, Nirupam Gupta, Aurélien Bellet. Generalization under Byzantine & Poisoning Attacks: Tight Stability Bounds in Robust Distributed Learning. 2025. ⟨hal-05245060⟩
- Christian Janos Lebeda, Mathieu Even, Aurélien Bellet, Julie Josse. Model Agnostic Differentially Private Causal Inference. 2025. ⟨hal-05241348⟩
- Jannik Dreier, Elise Klein, Steve Kremer. Tamarin Unchained: Handling User-Defined AC Operators. 2025. ⟨hal-05196126v2⟩
- Myrto Arapinis, Vincent Danos, Maïwenn Racouchot, David Robin, Thomas Zacharias. Attacking and Fixing the Android Protected Confirmation Protocol. 2025. ⟨hal-05038009v2⟩
- Matteo Abbondati, Eleonora Guerrini, Romain Lebreton. Simultaneous Rational Number Codes: Decoding Beyond Half the Minimum Distance with Multiplicities and Bad Primes. 2025. ⟨hal-05027939⟩
- David Baelde, Stéphanie Delaune, Julia Gabet, Clément Hérouard. Verifying Protocols with Squirrel: Making Strides Without Compromise. 2025. ⟨hal-05013723⟩
- Bill Allombert, Jean-François Biasse, Jonathan Komada Eriksen, Péter Kutas, Chris Leonardi, et al.. Faster SCALLOP from Non-Prime Conductor Suborders in Medium Sized Quadratic Fields. 2025. ⟨hal-04755827v2⟩
- Gabriel Sauger, Jean-Yves Marion, Sazzadur Rahaman, Vincent Tourneur, Muaz Ali. Attacking the First-Principle: A Black-Box, Query-Free Targeted Evasion Attack on ML-Based Binary Function Code Classifiers.. 2025. ⟨hal-04914773⟩
- Margot Catinaud, Caroline Fontaine, Guillaume Scerri. Proving e-voting mixnets in the CCSA model: zero-knowledge proofs and rewinding. 2025. ⟨hal-04937921⟩
- Jérémy Berthomieu, Romain Lebreton, Kevin Tran. Quasi-Linear Guessing of Minimal Lexicographic Gröbner Bases of Ideals of C-Relations of Random Bi-Indexed Sequences. 2025. ⟨hal-04937888v2⟩
- Ahmed Alharbi, Charles Bouillaguet. Artificial Results From Hardware Synthesis. 2025. ⟨hal-04896063⟩
- Lionel Hemmerlé, Guillaume – Hiet, Frédéric Tronel, Pierre Wilke, Jean-Christophe Prévotet. An XVisor extension using a Domain Specific Language to detect Rootkits in Virtual Machines. 2025. ⟨hal-04879065⟩
- Margo Bernelin. Réforme de l’accréditation et de la certification pour l’hébergement des données de santé Commentaire: Arrêté du 26 avril 2024 modifiant l’arrêté du 11 juin 2018 portant approbation du référentiel d’accréditation des organismes de certification et du référentiel de certification pour l’hébergement de données de santé à caractère personnel. 2024. ⟨hal-04859278⟩
- Martin Borquez, Mikaela Keller, Michael Perrot, Damien Sileo. Recipient Profiling: Predicting Characteristics from Messages. 2024. ⟨hal-04850698⟩
- Theodoros Karathanasis. Assessing the Global Outreach of the AI Act's Norms. 2024. ⟨halshs-04845889⟩
- Alexandre Benoist, Jean Kieffer. The asymptotic distribution of Elkies primes for reductions of abelian varieties is Gaussian. 2024. ⟨hal-04798225⟩
- Fabrice Etienne. Computing class groups by induction with generalised norm relations. 2024. ⟨hal-04778100v3⟩
- Aurore Guillevic, Simon Masson. Embedded Curves and Embedded Families for SNARK-Friendly Curves. 2024. ⟨hal-04750802⟩
- Natalia Tomashenko, Xiaoxiao Miao, Emmanuel Vincent, Junichi Yamagishi. The First VoicePrivacy Attacker Challenge Evaluation Plan. 2024. ⟨hal-04730990⟩
- Marco Milanese, Antoine Miné. Under-approximating Memory Abstractions. 2024. ⟨hal-04670146⟩
- Vitalii Emelianov, Michaël Perrot. On the Impact of Output Perturbation on Fairness in Binary Linear Classification. 2024. ⟨hal-04440982⟩
- Alexandre Debant, Lucca Hirschi. Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol. 2023. ⟨hal-03875463v3⟩
- Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, et al.. Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. 2023. ⟨hal-04189325⟩
- Vincent Cheval, Raphaëlle Crubillé, Steve Kremer. Symbolic protocol verification with dice: process equivalences in the presence of probabilities (extended version). 2023. ⟨hal-03683907v2⟩
Rapports
- Natalia Tomashenko, Xiaoxiao Miao, Pierre Champion, Sarina Meyer, Xin Wang, et al.. The Voice Privacy 2024 Challenge Evaluation Plan. Inria; Eurecom; NII. 2024. ⟨hal-04531444⟩
- Cristiana Santos, Nataliia Bielova, Vincent Roca, Mathieu Cunche, Gilles Mertens, et al.. Feedback to the European Data Protection Board’s Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive. Inria & Université Cote d'Azur, CNRS, I3S, Sophia Antipolis, France. 2024. ⟨hal-04437008⟩
- Stéphanie Delaune, Joseph Lallemand, Arthur Outrey. One Vote is Enough for Analysing Privacy. CNRS. 2023. ⟨hal-04262499⟩
- Bruno Blanchet, Charlie Jacomme. CryptoVerif: a Computationally-Sound Security Protocol Verifier. RR-9526, Inria. 2023, pp.194. ⟨hal-04253820⟩
- Bruno Blanchet. CryptoVerif: a Computationally-Sound Security Protocol Verifier (Initial Version with Communications on Channels). RR-9525, Inria Paris. 2023, pp.166. ⟨hal-04246199⟩
- Son Ho, Jonathan Protzenko, Aymeric Fromherz. Aeneas: Rust Verification by Functional Translation. Inria Paris. 2023. ⟨hal-04136056⟩
Thèses
- Maïwenn Racouchot. Formal analysis of security protocols:real-world case-studies and automated proof strategies. Computer Science [cs]. Université de Lorraine, 2024. English. ⟨NNT : 2024LORR0186⟩. ⟨tel-04965599⟩
- Carlos Pinzón. Exploring fairness and privacy in machine learning. Computer Science [cs]. Ecole Polytechnique, 2023. English. ⟨NNT : 2023IPPAX126⟩. ⟨tel-04407152⟩
- Ganesh del Grosso Guzman. Leakage of Sensitive Data from Deep Neural Networks. Statistics [math.ST]. Institut Polytechnique de Paris, 2023. English. ⟨NNT : 2023IPPAX159⟩. ⟨tel-04555564⟩
- Sayan Biswas. Comprendre et optimiser le compromis entre vie privée et utilité d'un point de vue fondamental. Artificial Intelligence [cs.AI]. Institut Polytechnique de Paris, 2023. English. ⟨NNT : 2023IPPAX092⟩. ⟨tel-04407120⟩
- Federica Granese. Securing Machine Learning Algorithms. Artificial Intelligence [cs.AI]. Institut Polytechnique de Paris; Università degli studi La Sapienza (Rome), 2023. English. ⟨NNT : 2023IPPAX029⟩. ⟨tel-04407139v2⟩
Cours
- Christophe Rosenberger. Foundations trends in biometrics. Doctoral. Caen, France. 2024. ⟨hal-05061062⟩
Logiciel
- Franco Terranova, Abdelkader Lahmadi, Isabelle Chrisment. Continuous CyberBattleSim. 2025, ⟨swh:1:dir:0b32c22ea0771c26604e38728ab090df6469c4aa;origin=https://github.com/terranovafr/C-CyberBattleSim;visit=swh:1:snp:bc5aa14f7d947bec6111c51264e58ec506eeedac;anchor=swh:1:rev:7374c32b6711bb0e9b6d5fcd94d4eacc034c07cb⟩. ⟨hal-05194047⟩
- Jolahn Vaudey. Python scripts, instrumenting CEI 61131-10 PLCOPENXML files to allow for context migration.. 2025, ⟨swh:1:dir:3f49fc8e251e8393f97e1fe25c43f5a0221bb432⟩. ⟨hal-05169462⟩
- Basile Pesin, David Monniaux, Sylvain Boulmé. Chamois-Arsene. 2024. ⟨hal-04854350⟩
- David Baelde, Adrien Koutsos, Justine Sauvage. Artifact for "Foundations for Cryptographic Reductions in CCSA Logics". 2024. ⟨hal-04650670⟩
- Jolahn Vaudey, Eric Rutten, Stéphane Mocanu, Gwenaël Delaval. DSL for modeling IEC 62443 compliant ICS instances, in a zone/conduit model.. 2024, ⟨swh:1:dir:7d672d5b175bebcacb220d68867db4f127f372d5;origin=https://gitlab.inria.fr/jvaudey/iec62433-dsl;visit=swh:1:snp:ff3978f2eac26aa7d82e10abb5543562589f7507;anchor=swh:1:rev:505c77d8dfdfa1495d6497f7dd1b0811c7553d40⟩. ⟨hal-04573409⟩
- Jean-Guillaume Dumas, Clément Pernet, Alexandre Sedoglavic. FMM: accuracy of Fast Matrix Multiplication algorithms. 2024, ⟨swh:1:dir:624e6f505f0152fd9553d24174af5e4ec5295e8f;origin=https://github.com/jgdumas/Fast-Matrix-Multiplication;visit=swh:1:snp:bf61e170ae54c4e16afc9f3ea3ac09beee525236;anchor=swh:1:rev:6c157fe290af96907c137762643b28da636e4a01⟩. ⟨hal-04927400⟩
- Jean-Guillaume Dumas, Bruno Grenet, Clément Pernet, Alexandre Sedoglavic. PLinOpt: optimization of linear, bilinear & trilinear programs. 2024, ⟨swh:1:dir:606e4719f7b82eea0bfd1dfc88d8beb9a666774e;origin=https://github.com/jgdumas/plinopt;visit=swh:1:snp:8f8eba5195a71803e3620f352e6b815e62f268fc;anchor=swh:1:rev:c6b63fa5cfa8aada9f5d6655621ba1b1fbf12588⟩. ⟨hal-04927443⟩