Papers

Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux

L. Georget, M. Jaume, G. Piolle, F. Tronel and V. Viet Triem Tong - FME Workshop on Formal Methods in Software Engineering (FormaliSE) 2017

Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory

L. Georget, M. Jaume, G. Piolle, F. Tronel and V. Viet Triem Tong - Software Engineering and Formal Methods (SEFM) 2017

Information Flow Policies vs Malware

R. Andriatsimandefitra, T. Saliou, V. Viet Triem Tong - Technical Report, CIDRE - INRIA - SUPELEC 2013 (pdf)

BSPL: A Language to Specify and Compose Fine-grained Information Flow Policies

S. Geller, V. Viet Triem Tong, L. Mé - International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2013

Intrusion detection in distributed systems, an approach based on taint marking

C. Hauser, F. Tronel, C. J. Fidge, L. Mé - IEEE International Conference on Computer Communications (ICC) 2013

Diagnosing intrusions in Android operating system using system flow graph

R. Andriatsimandefitra, V. Viet Triem Tong, L. Mé - Workshop Interdisciplinaire sur la Sécurité Globale (WISG) 2013

A taint marking approach to confidentiality violation detection

C. Hauser, F. Tronel, J. Reid, C. Fidge - Australasian Information Security Conference (AISC) 2012

Designing information flow policies for Android's operating system

R. Andriatsimandefitra, S. Geller, V. Viet Triem Tong - IEEE International Conference on Communications (ICC), 2012

Mise en oeuvre de politiques de protection des flux d'information dans l'environnement Android

V. Viet Triem Tong, R. Andriatsimandefitra, S. Geller, S. Boche, F. Tronel, C. Hauser - C&ESAR 2011 on "Mobilité & Sécurité"

Information Flow Control for Intrusion Detection Derived from MAC Policy

S. Geller, C. Hauser, F. Tronel, V. Viet Triem Tong - IEEE International Conference on Communications (ICC), 2011

Information Flow and Execution Policy for a Model of Detection without False Negatives

S. Geller - Conference on Network and Information Systems Security (SAR-SSI), 2011

Flow Based Interpretation of Access Control: Detection of Illegal Information Flows

M. Jaume, V. Viet Triem Tong, L. Mé - Information Systems Security, Lecture Notes in Computer Science, vol 7093, 2011

Policy-based intrusion detection in web applications by monitoring Java information flows

G. Hiet, V. Viet Triem Tong, L. Mé, B. Morin - International Journal of Information and Computer Security, vol 3, 2009

Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy

L. George, V. Viet Triem Tong, L. Mé - Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, vol 5758, 2009

Monitoring both os and program level information flows to detect intrusions against network servers

G. Hiet, L. Mé, B. Morin, V. Viet Triem Tong - IEEE Workshop on ”Monitoring, Attack Detection and Mitigation”, 2007

Détection fiable et pertinente de flux d'information illégaux

G. Hiet, L. Mé, J. Zimmermann, C. Bidan, B. Morin et V. Viet Triem Tong, June 2007 - SAR-SSI 2007

Vers une détection d'intrusions à fiabilité et pertinence prouvable

C. Bidan, G. Hiet, L. Mé, B. Morin et J. Zimmermann, October 2006 - Revue de l'Electricité et de l'Electronique (REE)

Experimenting With a Policy-Based HIDS Based on an Information Flow Control Model

J. Zimmermann, L. Mé, C. Bidan, December 2003 - ACSAC 2003

An improved reference flow control model for policy-based intrusion detection

J. Zimmermann, L. Mé, C. Bidan - Proceedings of the 8th European Symposium on Research in Computer Security (ESORICS), 2003

Introducing reference flow control for detecting intrusion symptoms at the os level

J. Zimmermann, L. Mé, C. Bidan - Recent Advances in Intrusion Detection, 2002