Jean-Francois Lalande
Jean-Francois Lalande
Professor at CentraleSupélec
Verified email at - Homepage
Cited by
Cited by
Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence
L Caviglione, M Gaggero, JF Lalande, W Mazurczyk, M Urbański
IEEE Transactions on Information Forensics and Security 11 (4), 799-810, 2015
An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system
WW Smari, P Clemente, JF Lalande
Future Generation Computer Systems 31, 147-168, 2014
Hiding privacy leaks in android applications using low-attention raising covert channels
JF Lalande, S Wendzel
2013 international conference on availability, reliability and security, 701-710, 2013
Software countermeasures for control flow integrity of smart card C codes
JF Lalande, K Heydemann, P Berthomé
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
Kharon dataset: Android malware under a microscope
N Kiss, JF Lalande, M Leslous, VVT Tong
The LASER Workshop: Learning from Authoritative Security Experiment Results …, 2016
GroddDroid: a gorilla for triggering malicious behaviors
A Abraham, R Andriatsimandefitra, A Brunelat, JF Lalande, VVT Tong
2015 10th international conference on malicious and unwanted software …, 2015
Repackaging android applications for auditing access to private data
P Berthome, T Fecherolle, N Guilloteau, JF Lalande
2012 Seventh International Conference on Availability, Reliability and …, 2012
A practical set-membership proof for privacy-preserving NFC mobile ticketing
G Arfaoui, JF Lalande, J Traoré, N Desmoulins, P Berthomé, S Gharout
arXiv preprint arXiv:1505.03048, 2015
Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellites
S Alouf, E Altman, J Galtier, JF Lalande, C Touati
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
Security and Results of a Large-Scale High-Interaction Honeypot.
J Briffaut, JF Lalande, C Toinard
J. Comput. 4 (5), 395-404, 2009
High level model of control flow attacks for smart card functional security
P Berthomé, K Heydemann, X Kauffmann-Tourkestansky, JF Lalande
2012 Seventh International Conference on Availability, Reliability and …, 2012
Formally verified software countermeasures for control-flow integrity of smart card C code
K Heydemann, JF Lalande, P Berthomé
Computers & Security 85, 202-224, 2019
Detecting local covert channels using process activity correlation on android smartphones
M Urbanski, W Mazurczyk, JF Lalande, L Caviglione
International Journal of Computer Systems Science and Engineering 32 (2), 71-80, 2017
Analysis of human awareness of security and privacy threats in smart environments
L Caviglione, JF Lalande, W Mazurczyk, S Wendzel
Human Aspects of Information Security, Privacy, and Trust: Third …, 2015
Formalization of security properties: enforcement for mac operating systems and verification of dynamic mac policies
J Briffaut, JF Lalande, C Toinard
International journal on advances in security 2 (4), 325-343, 2009
Teaching android mobile security
JF Lalande, V Viet Triem Tong, P Graux, G Hiet, W Mazurczyk, H Chaoui, ...
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
Quasi-optimal resource allocation in multispot MFTDMA satellite networks
S Alouf, E Altman, J Galtier, JF Lalande, C Touati
Combinatorial optimization in communication networks, 325-365, 2006
Improving mandatory access control for HPC clusters
M Blanc, JF Lalande
Future Generation Computer Systems 29 (3), 876-885, 2013
Attack model for verification of interval security properties for smart card C codes
P Berthomé, K Heydemann, X Kauffmann-Tourkestansky, JF Lalande
Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and …, 2010
Mascopt-a network optimization library: Graph manipulation
JF Lalande, M Syska, Y Verhoeven
INRIA, 2004
The system can't perform the operation now. Try again later.
Articles 1–20