<  Retour au portail Polytechnique Montréal

Documents dont l'auteur est "Graa, Mariem"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Date de publication | Sous-type de document | Aucun groupement
Aller à : B | G | K
Nombre de documents: 13

B

Bouder, H. L., Thomas, G., Bourget, E., Graa, M., Boulahia Cuppens, N., & Lanet, J.-L. (juillet 2018). Theoretical Security Evaluation of the Human Semantic Authentication Protocol [Communication écrite]. 15th International Joint Conference on e-Business and Telecommunications, Porto, Portugal. Lien externe

Bkakria, A., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (décembre 2017). Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems [Communication écrite]. 13th International Conference on Information Systems Security (ICISS 2017), Mumbai, India. Lien externe

Bkakria, A., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (août 2017). Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper) [Communication écrite]. 15th annual Conference on Privacy, Security and Trust (PST 2017), Calgary, AB, Canada. Lien externe

G

Graa, M., Kome, I. M. L., Boulahia Cuppens, N., Cuppens, F., & Frey, V. (septembre 2018). Detection and Response to Data Exfiltration from Internet of Things Android Devices [Communication écrite]. 33rd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2018), Poznan, Poland. Lien externe

Graa, M., Boulahia Cuppens, N., Cuppens, F., Lanet, J.-L., & Moussaileb, R. (mai 2017). Detection of Side Channel Attacks Based on Data Tainting in Android Systems [Communication écrite]. 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2017), Rome, Italy. Lien externe

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (février 2016). Tracking Explicit and Control Flows in Java and Native Android Apps Code [Communication écrite]. 2nd International Conference on Information Systems Security and Privacy (ICISS) 2016), Rome, Italy. Lien externe

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (mai 2014). Détection de flux de contrôle illégaux dans les Smartphones [Communication écrite]. INFORSID 2014, Lyon, France. Lien externe

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (novembre 2014). Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps [Communication écrite]. 7th International Symposium on Foundations and Practice of Security (FPS 2014), Montréal, Qc, Canada. Lien externe

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (juin 2014). Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems [Communication écrite]. 8th IEEE International Conference on Software Security and Reliability-Companion, San Francisco, CA, USA. Lien externe

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (décembre 2013). Formal Characterization of Illegal Control Flow in Android System [Communication écrite]. International Conference on Signal-Image Technology & Internet-Based Systems, Kyoto, Japan. Lien externe

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (décembre 2012). Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses [Communication écrite]. 4th International Symposium on Cyberspace Safety and Security (CSS 2012), Melbourne, Australia. Lien externe

Graa, M., Boulahia Cuppens, N., Autrel, F., Azkia, H., Cuppens, F., Coatrieux, G., Cavalli, A. R., & Mammar, A. (septembre 2011). Using Requirements Engineering in an Automatic Security Policy Derivation Process [Communication écrite]. 6th International Workshop on Data Privacy Management (DPM 2011) and 4th International Workshop on Autonomous and Spontaneous Security (SETOP), Leuven, Belgium. Lien externe

K

Kome, M. L., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Frey, V. (décembre 2017). DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT [Communication écrite]. 13th International Conference on Information Systems Security (ICISS 2017), Mumbai, India. Lien externe

Liste produite: Tue Apr 23 04:42:53 2024 EDT.