default search action
Jean-François Lalande
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c34]Jean-Marie Mineau, Jean-François Lalande:
Evaluating the Reusability of Android Static Analysis Tools. ICSR 2024: 153-170 - 2023
- [j12]Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke:
OATs'inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications. DTRAP 4(2): 30:1-30:27 (2023) - [c33]Pierre-Victor Besson, Romain Brisse, Helene Orsini, Natan Talon, Jean-François Lalande, Frédéric Majorczyk, Alexandre Sanchez, Valérie Viet Triem Tong:
CERBERE: Cybersecurity Exercise for Red and Blue team Entertainment, REproducibility. IEEE Big Data 2023: 2980-2988 - 2022
- [j11]Steffen Wendzel, Luca Caviglione, Aleksandra Mileva, Jean-François Lalande, Wojciech Mazurczyk:
Guest editorial: Information security methodology and replication studies. it Inf. Technol. 64(1-2): 1-3 (2022) - [j10]Tomás Concepción Miranda, Pierre-François Gimenez, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke:
Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased? IEEE Trans. Inf. Forensics Secur. 17: 2182-2197 (2022) - [d1]Tomás Concepción Miranda, Pierre-François Gimenez, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke:
Dada: Debiased Android DAtasets. IEEE DataPort, 2022 - 2021
- [c32]Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke:
Preventing serialization vulnerabilities through transient field detection. SAC 2021: 1598-1606 - [c31]Romain Brisse, Simon Boche, Frédéric Majorczyk, Jean-François Lalande:
KRAKEN: A Knowledge-Based Recommender System for Analysts, to Kick Exploration up a Notch. SecITC 2021: 1-17 - 2020
- [j9]Steffen Wendzel, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-François Lalande, Wojciech Mazurczyk:
Information Security Methodology, Replication Studies and Information Security Education. J. Univers. Comput. Sci. 26(7): 762-763 (2020) - [c30]Pierre Graux, Jean-François Lalande, Pierre Wilke, Valérie Viet Triem Tong:
Abusing Android Runtime for Application Obfuscation. EuroS&P Workshops 2020: 616-624 - [c29]Jean-François Lalande, Mathieu Simon, Valérie Viet Triem Tong:
GroDDViewer: Dynamic Dual View of Android Malware. GraMSec@CSF 2020: 127-139
2010 – 2019
- 2019
- [j8]Karine Heydemann, Jean-François Lalande, Pascal Berthomé:
Formally verified software countermeasures for control-flow integrity of smart card C code. Comput. Secur. 85: 202-224 (2019) - [c28]Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong:
Obfuscated Android Application Development. CECC 2019: 27:1-27:6 - [c27]Jean-François Lalande, Pierre Graux, Tomás Concepción Miranda:
Orchestrating Android Malware Experiments. MASCOTS 2019: 433-434 - [c26]Jean-François Lalande, Valérie Viet Triem Tong, Pierre Graux, Guillaume Hiet, Wojciech Mazurczyk, Habiba Chaoui, Pascal Berthomé:
Teaching Android Mobile Security. SIGCSE 2019: 232-238 - 2018
- [c25]Jean-François Lalande, Valérie Viet Triem Tong, Mourad Leslous, Pierre Graux:
Challenges for Reliable and Large Scale Evaluation of Android Malware Analysis. HPCS 2018: 1068-1070 - [c24]Jean-François Lalande:
Android Malware Analysis: From Technical Difficulties to Scientific Challenges. SecITC 2018: 17-21 - 2017
- [j7]Marcin Urbanski, Wojciech Mazurczyk, Jean-François Lalande, Luca Caviglione:
Detecting local covert channels using process activity correlation on Android smartphones. Comput. Syst. Sci. Eng. 32(2) (2017) - [c23]Mourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet:
GPFinder: Tracking the invisible in Android malware. MALWARE 2017: 39-46 - [c22]Valérie Viet Triem Tong, Aurélien Trulla, Mourad Leslous, Jean-François Lalande:
Information Flows at OS Level Unmask Sophisticated Android Malware. SECRYPT 2017: 578-585 - 2016
- [b2]Jean-François Lalande:
Vers la sécurité mobile : caractérisation des attaques et contremesures. (Towards mobile security: characterizing attacks and countermeasures). University of Orléans, France, 2016 - [j6]Luca Caviglione, Mauro Gaggero, Jean-François Lalande, Wojciech Mazurczyk, Marcin Urbanski:
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence. IEEE Trans. Inf. Forensics Secur. 11(4): 799-810 (2016) - [i5]Valérie Viet Triem Tong, Jean-François Lalande, Mourad Leslous:
Challenges in Android Malware Analysis. ERCIM News 2016(106) (2016) - 2015
- [j5]Ghada Arfaoui, Jean-François Lalande, Jacques Traoré, Nicolas Desmoulins, Pascal Berthomé, Saïd Gharout:
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. Proc. Priv. Enhancing Technol. 2015(2): 25-45 (2015) - [c21]Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel:
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. HCI (22) 2015: 165-177 - [c20]Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat, Jean-François Lalande, Valérie Viet Triem Tong:
GroddDroid: a gorilla for triggering malicious behaviors. MALWARE 2015: 119-127 - [c19]Ghada Arfaoui, Saïd Gharout, Jean-François Lalande, Jacques Traoré:
Practical and Privacy-Preserving TEE Migration. WISTP 2015: 153-168 - [i4]Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel:
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. CoRR abs/1502.00868 (2015) - [i3]Ghada Arfaoui, Jean-François Lalande, Jacques Traoré, Nicolas Desmoulins, Pascal Berthomé, Saïd Gharout:
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. CoRR abs/1505.03048 (2015) - 2014
- [j4]Waleed W. Smari, Patrice Clemente, Jean-François Lalande:
An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system. Future Gener. Comput. Syst. 31: 147-168 (2014) - [j3]Ghada Arfaoui, Guillaume Dabosville, Sébastien Gambs, Patrick Lacharme, Jean-François Lalande:
A Privacy-Preserving NFC Mobile Pass for Transport Systems. EAI Endorsed Trans. Mob. Commun. Appl. 2(5): e4 (2014) - [c18]Jean-François Lalande, Karine Heydemann, Pascal Berthomé:
Software Countermeasures for Control Flow Integrity of Smart Card C Codes. ESORICS (2) 2014: 200-218 - 2013
- [j2]Mathieu Blanc, Jean-François Lalande:
Improving Mandatory Access Control for HPC clusters. Future Gener. Comput. Syst. 29(3): 876-885 (2013) - [c17]Jean-François Lalande, Steffen Wendzel:
Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. ARES 2013: 701-710 - [c16]Ghada Arfaoui, Sébastien Gambs, Patrick Lacharme, Jean-François Lalande, Roch Lescuyer, Jean Claude Paillès:
A Privacy-Preserving Contactless Transport Service for NFC Smartphones. MobiCASE 2013: 282-285 - 2012
- [c15]Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande:
High Level Model of Control Flow Attacks for Smart Card Functional Security. ARES 2012: 224-229 - [c14]Pascal Berthomé, Thomas Fécherolle, Nicolas Guilloteau, Jean-François Lalande:
Repackaging Android Applications for Auditing Access to Private Data. ARES 2012: 388-396 - [c13]Jean-François Lalande, David Rodriguez:
Protecting Resources in an Open and Trusted Peer-to-Peer Network. COMPSAC Workshops 2012: 140-143 - [c12]Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas:
HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots. SECRYPT 2012: 434-439 - [i2]Pascal Berthomé, Jean-François Lalande, Vincent Levorato:
Implementation of exponential and parametrized algorithms in the AGAPE project. CoRR abs/1201.5985 (2012) - 2011
- [c11]Aline Bousquet, Patrice Clemente, Jean-François Lalande:
SYNEMA: Visual Monitoring of Network and System Security Sensors. SECRYPT 2011: 375-378 - 2010
- [c10]Mathieu Blanc, Jean-François Lalande:
Mandatory Access Control for shared HPC clusters: Setup and performance evaluation. HPCS 2010: 291-298 - [c9]Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande:
Attack model for verification of interval security properties for smart card C codes. PLAS 2010: 2 - [i1]Jean-François Lalande, David Rodriguez, Christian Toinard:
Security properties in an open peer-to-peer network. CoRR abs/1004.0772 (2010)
2000 – 2009
- 2009
- [j1]Jérémy Briffaut, Jean-François Lalande, Christian Toinard:
Security and Results of a Large-Scale High-Interaction Honeypot. J. Comput. 4(5): 395-404 (2009) - [c8]Mathieu Blanc, Kevin Guérin, Jean-François Lalande, Vincent Le Port:
Mandatory Access Control implantation against potential NFS vulnerabilities. CTS 2009: 195-200 - [c7]Jérémy Briffaut, Jean-François Lalande, Christian Toinard, Mathieu Blanc:
Enforcement of Security Properties for Dynamic MAC Policies. SECURWARE 2009: 114-120 - [c6]Jérémy Briffaut, Xavier Kauffmann-Tourkestansky, Jean-François Lalande, Waleed W. Smari:
Generation of Role Based Access Control Security Policies for Java Collaborative Applications. SECURWARE 2009: 224-229 - 2008
- [c5]Jérémy Briffaut, Jean-François Lalande, Waleed W. Smari:
Team--Based MAC Policy over Security--Enhanced Linux. SECURWARE 2008: 41-46 - 2006
- [c4]Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard:
Collaboration between MAC Policies and IDS based on a Meta-Policy approach. CTS 2006: 48-55 - [c3]Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard:
Distributed Control Enabling Consistent MAC Policies and IDS Based on a Meta-Policy Approach. POLICY 2006: 153-156 - 2005
- [c2]Sara Alouf, Eitan Altman, Jérôme Galtier, Jean-François Lalande, Corinne Touati:
Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellites. INFOCOM 2005: 560-571 - 2004
- [b1]Jean-François Lalande:
Conception de réseaux de télécommunications : optimisation et expérimentations. (Telecommunication network design: optimization and experiments). University of Nice Sophia Antipolis, France, 2004 - 2003
- [c1]Mohamed Bouklit, David Coudert, Jean-François Lalande, Christophe Paul, Hervé Rivano:
Approximate Multicommodity Flow for WDM Networks Design. SIROCCO 2003: 43-56
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint