Valerie Viet Triem Tong
Laboratoire Génie Électrique et Électronique de PariS
valerie.viettriemtong [at] centralesupelec.fr
Publications :
- POSTER - 4 documents
- Manuel Poisson, Sébastien Kilian, Valérie Viet Triem Tong, Jean-François Lalande, Gilles Guette, Frédéric Ghihéry, Damien Crémilleux. Digital twin for security evaluation using an attack agent, 2024-08-14. (https://inria.hal.science/hal-04708718v1)
- Mourad Leslous, Jean-François Lalande, Valérie Viet Triem Tong. Using Implicit Calls to Improve Malware Dynamic Execution, 2016-05-23. (https://hal.science/hal-01304326v1)
- Adrien Abraham, Radoniaina Andriatsimandefitra Ratsisahanana, Nicolas Kiss, Jean-François Lalande, Valérie Viet Triem Tong. Towards Automatic Triggering of Android Malware, 2015-07-09. (https://inria.hal.science/hal-01168354v1)
- Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong. Highlighting Easily How Malicious Applications Corrupt Android Devices, 2014-09-17. (https://inria.hal.science/hal-01083376v1)
- Communication on a congress - 65 documents
- Pierre-Victor Besson, Romain Brisse, Hélène Orsini, Natan Talon, Jean-François Lalande, Frédéric Majorczyk, Alexandre Sanchez, Valérie Viet Triem Tong. CERBERE: Cybersecurity Exercise for Red and Blue team Entertainment, REproducibility, 2023-12-15. (https://centralesupelec.hal.science/hal-04285565v1)
- Manuel Poisson, Valérie Viet Triem Tong, Gilles Guette, Frédéric Guihéry, Damien Crémilleux. CVE representation to build attack positions graphs, 2023-12-15. (https://inria.hal.science/hal-04317023v1)
- Pierre-Victor Besson, Valérie Viet Triem Tong, Gilles Guette, Guillaume Piolle, Erwann Abgrall. URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures, 2023-12-11. (https://inria.hal.science/hal-04317073v1)
- Vincent Raulin, Pierre-François Gimenez, Yufei Han, Valérie Viet Triem Tong. BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports, 2023-07-10. (https://hal.science/hal-04102144v1)
- Vincent Raulin, Pierre-François Gimenez, Yufei Han, Valérie Viet Triem Tong. Towards a Representation of Malware Execution Traces for Experts and Machine Learning, 2022-05-10. (https://hal.science/hal-03675366v1)
- Tomás Concepción Miranda, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke. DaViz: Visualization for Android Malware Datasets, 2022-05-10. (https://inria.hal.science/hal-03709062v1)
- Vincent Raulin, Pierre-François Gimenez, Yufei Han, Valérie Viet Triem Tong, Léopold Ouairy. GUI-Mimic, a cross-platform recorder and fuzzer of Graphical User Interface, 2021-11-19. (https://hal.science/hal-03449827v1)
- Benoît Fournier, Valérie Viet Triem Tong, Gilles Guette. Accurate measurement of the energy consumption of security functions, 2021-07-06. (https://inria.hal.science/hal-03510709v1)
- Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke. Preventing Serialization Vulnerabilities through Transient Field Detection, 2021-03-22. (https://inria.hal.science/hal-03066847v1)
- Pierre Graux, Jean-François Lalande, Pierre Wilke, Valérie Viet Triem Tong. Abusing Android Runtime for Application Obfuscation, 2020-09-11. (https://centralesupelec.hal.science/hal-02877815v1)
- Jean-François Lalande, Mathieu Simon, Valérie Viet Triem Tong. GroDDViewer: Dynamic Dual View of Android Malware, 2020-06-22. (https://centralesupelec.hal.science/hal-02913112v1)
- Aimad Berady, Valérie Viet Triem Tong, Gilles Guette, Christophe Bidan, Guillaume Carat. Modeling the Operational Phases of APT Campaigns, 2019-12-05. (https://inria.hal.science/hal-02379869v2)
- Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong. Obfuscated Android Application Development, 2019-11-14. (https://centralesupelec.hal.science/hal-02305924v1)
- Valérie Viet Triem Tong, Cédric Herzog, Tomás Concepción Miranda, Pierre Graux, Jean-François Lalande, Pierre Wilke. Isolating malicious code in Android malware in the wild, 2019-10-01. (https://centralesupelec.hal.science/hal-02288116v1)
- Jean-François Lalande, Valérie Viet Triem Tong, Pierre Graux, Guillaume Hiet, Wojciech Mazurczyk, Habiba Chaoui, Pascal Berthomé. Teaching Android Mobile Security, 2019-02-27. (https://centralesupelec.hal.science/hal-01940652v1)
- Jean-François Lalande, Valérie Viet Triem Tong, Mourad Leslous, Pierre Graux. Challenges for Reliable and Large Scale Evaluation of Android Malware Analysis, 2018-07-16. (https://centralesupelec.hal.science/hal-01844312v1)
- Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong. Etat de l'Art des Techniques d'Unpacking pour les Applications Android, 2018-05-23. (https://centralesupelec.hal.science/hal-01794252v1)
- Jean-François Lalande, Valérie Viet Triem Tong. Le projet CominLabs Kharon: aidons les malwares à s'exécuter, 2018-05-23. (https://centralesupelec.hal.science/hal-01794223v2)
- Mourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet. GPFinder: Tracking the Invisible in Android Malware, 2017-10-11. (https://centralesupelec.hal.science/hal-01584989v1)
- Laurent Georget, Mathieu Jaume, Guillaume Piolle, Frédéric Tronel, Valérie Viet Triem Tong. Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory, 2017-09-04. (https://hal.sorbonne-universite.fr/hal-01535949v1)
- Valérie Viet Triem Tong, Aurélien Trulla, Mourad Leslous, Jean-François Lalande. Information flows at OS level unmask sophisticated Android malware, 2017-07-24. (https://centralesupelec.hal.science/hal-01535678v1)
- Guillaume Fournier, Paul Audren de Kerdrel, Pascal Cotret, Valérie Viet Triem Tong. DroneJack: Kiss your drones goodbye!, 2017-06-07. (https://inria.hal.science/hal-01635125v1)
- Laurent Georget, Mathieu Jaume, Guillaume Piolle, Frédéric Tronel, Valérie Viet Triem Tong. Suivi de flux d'information correct sous Linux, 2017-06. (https://hal.sorbonne-universite.fr/hal-01535937v1)
- Laurent Georget, Mathieu Jaume, Guillaume Piolle, Frédéric Tronel, Valérie Viet Triem Tong. Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux, 2017-05-27. (https://inria.hal.science/hal-01535862v1)
- Guillaume Brogi, Valérie Viet Triem Tong. Sharing and replaying attack scenarios with Moirai, 2017-05-17. (https://hal.science/hal-01533275v1)
- Guillaume Brogi, Valérie Viet Triem Tong. TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking, 2016-11-21. (https://inria.hal.science/hal-01417612v1)
- Nicolas Kiss, Jean-François Lalande, Mourad Leslous, Valérie Viet Triem Tong. Kharon dataset: Android malware under a microscope, 2016-05-26. (https://centralesupelec.hal.science/hal-01311917v1)
- Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong. Detection and Identification of Android Malware Based on Information Flow Monitoring, 2015-11-03. (https://inria.hal.science/hal-01191595v1)
- Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat, Jean-François Lalande, Valérie Viet Triem Tong. GroddDroid: a Gorilla for Triggering Malicious Behaviors, 2015-10-20. (https://inria.hal.science/hal-01201743v2)
- Laurent Georget, Frédéric Tronel, Valérie Viet Triem Tong. Kayrebt: An Activity Diagram Extraction and Visualization Toolset Designed for the Linux Codebase, 2015-09-27. (https://hal.science/hal-01213233v1)
- Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong. Mécanisme de réputation distribué préservant la vie privée avec témoignages négatifs, 2015-06-02. (https://hal.science/hal-01148072v1)
- Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong. Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings, 2015-05-26. (https://hal.science/hal-01131975v2)
- Radoniaina Andriatsimandefitra Ratsisahanana, Thomas Genet, Laurent Guillo, Jean-François Lalande, David Pichardie, Valérie Viet Triem Tong. Kharon : Découvrir, comprendre et reconnaître des malware Android par suivi de flux d'information, 2015-05-19. (https://inria.hal.science/hal-01154368v1)
- Laurent Georget, Guillaume Piolle, Frédéric Tronel, Valérie Viet Triem Tong, Mathieu Jaume. Towards a Formal Semantics for System Calls in terms of Information Flow, 2015-04-19. (https://hal.science/hal-01149471v1)
- Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong. Capturing Android Malware Behaviour using System Flow Graph, 2014-10-15. (https://inria.hal.science/hal-01018611v1)
- Mathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Ludovic Mé. Secure states versus Secure executions: From access control to flow control, 2013-12-16. (https://inria.hal.science/hal-01083384v1)
- Emmanuelle Anceaume, Gilles Guette, Paul Lajoie-Mazenc, Nicolas Prigent, Valérie Viet Triem Tong. A Privacy Preserving Distributed Reputation Mechanism, 2013-06-09. (https://hal.science/hal-00763212v3)
- Radoniaina Andriatsimandefitra, Thomas Saliou, Valérie Viet Triem Tong. Information Flow Policies vs Malware, 2013. (https://inria.hal.science/hal-00909406v1)
- Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Ludovic Mé. Diagnosing intrusions in Android operating system using system flow graph, 2013-01. (https://inria.hal.science/hal-00875211v1)
- Stéphane Geller, Valérie Viet Triem Tong, Ludovic Mé. BSPL: A Language to Specify and Compose Fine-grained Information Flow Policies, 2013. (https://inria.hal.science/hal-00909400v1)
- Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong. User Defined Control Flow Policy for Web Service Orchestration, 2012-11-20. (https://centralesupelec.hal.science/hal-00761354v1)
- Radoniaina Andriatsimandefitra, Stéphane Geller, Valérie Viet Triem Tong. Designing information flow policies for Android's operating system, 2012-06-10. (https://centralesupelec.hal.science/hal-00736034v1)
- Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé. Flow based interpretation of access control: Detection of illegal information flows, 2011-12-15. (https://centralesupelec.hal.science/hal-00647170v1)
- Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong, Yves Le Traon. Preventing data leakage in service orchestration, 2011-12-05. (https://centralesupelec.hal.science/hal-00657796v1)
- Valérie Viet Triem Tong, Radoniaina Andriatsimandefitra, Stéphane Geller, Simon Boche, Frédéric Tronel, Christophe Hauser. Mise en œuvre de politiques de protection des flux d'information dans l'environnement Android, 2011-11-28. (https://centralesupelec.hal.science/hal-00656933v1)
- Emmanuelle Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel Hurfin, Ludovic Mé, Guillaume Piolle, Nicolas Prigent, Eric Totel, Frédéric Tronel, Valérie Viet Triem Tong. From SSIR to CIDre: a New Security Research Group in Rennes, 2011-07-06. (https://centralesupelec.hal.science/hal-00656940v1)
- Stéphane Geller, Christophe Hauser, Frédéric Tronel, Valérie Viet Triem Tong. Information Flow Control for Intrusion Detection derived from MAC Policy, 2011-06-05. (https://centralesupelec.hal.science/hal-00647116v1)
- Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé. Contrôle d'accès versus Contrôle de flots, 2010-06-09. (https://hal.sorbonne-universite.fr/hal-00593990v1)
- Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong, Yves Le Traon. Protection des données utilisateurs dans une orchestration de Web-Services, 2010-05-18. (https://centralesupelec.hal.science/hal-00536660v1)
- Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, Valérie Viet Triem Tong, Nicolas Craipeau, Ronan Hardouin, Christophe Alleaune, Valérie-Laure Benabou, Denis Beras, Christophe Bidan, Gregor Goessler, Julien Le Clainche, Ludovic Mé, Sylvain Steer. Liability in Software Engineering Overview of the LISE Approach and Illustration on a Case Study, 2010-05-02. (https://inria.hal.science/inria-00472287v3)
- François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. An Efficient Distributed PKI for Structured P2P Networks, 2009-09-09. (https://centralesupelec.hal.science/hal-00423320v1)
- Mehdi Talbi, Valérie Viet Triem Tong, Adel Bouhoula. Specification of Anonymity as a Secrecy Property in the ADM Logic – Homomorphic-based Voting Protocols, 2009-03-16. (https://centralesupelec.hal.science/hal-00349878v1)
- Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin. Policy-Based Intrusion Detection in Web Applications by Monitoring Java Information Flows, 2008-10-28. (https://centralesupelec.hal.science/hal-00353000v1)
- Mehdi Talbi, Benjamin Morin, Valérie Viet Triem Tong, Adel Bouhoula, Mohammed Mejri. Specification of Electronic Voting Protocol Properties Using ADM Logic : FOO Case Study, 2008-10-22. (https://centralesupelec.hal.science/hal-00349880v1)
- Mehdi Talbi, Benjamin Morin, Valérie Viet Triem Tong, Adel Bouhoula, Mohammed Mejri. Spécification Formelle des propriétés des Protocoles de Vote au moyen de la Logique ADM, 2008-10-13. (https://centralesupelec.hal.science/hal-00349883v1)
- François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. A Sybilproof Distributed Identity Management for P2P Networks, 2008-07. (https://centralesupelec.hal.science/hal-00287706v1)
- François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. A distributed certification system for structured P2P networks, 2008-07-01. (https://centralesupelec.hal.science/hal-00287656v1)
- François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. Detecting and Excluding Misbehaving Nodes in a P2P Network, 2008-06-16. (https://centralesupelec.hal.science/hal-00353016v1)
- François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification, 2008-06. (https://centralesupelec.hal.science/hal-00287700v1)
- Guillaume Hiet, Ludovic Mé, Benjamin Morin, Valérie Viet Triem Tong. Monitoring both OS and program level information flows to detect intrusions against network servers, 2007-11. (https://centralesupelec.hal.science/hal-00268408v1)
- Valérie Viet Triem Tong, Hervé Sibert, Jérémy Lecoeur, Marc Girault. Biometric fuzzy extractors made practical: a proposal based on FingerCodes, 2007-08. (https://hal.science/hal-00175353v1)
- Valérie Viet Triem Tong, Hervé Sibert, Jérémy Lecoeur, Marc Girault. FingerKey, un cryptosystème biométrique pour l'authentification, 2007-06. (https://hal.science/hal-00156447v1)
- Guillaume Hiet, Ludovic Mé, Jacob Zimmermann, Christophe Bidan, Benjamin Morin, Valérie Viet Triem Tong. Détection fiable et pertinente de flux d'information illégaux, 2007-06. (https://centralesupelec.hal.science/hal-00268422v1)
- François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. Contrôle d'accès distribué à un réseau pair-à-pair, 2007-06. (https://centralesupelec.hal.science/hal-00268415v1)
- François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. Gestion distribuée d'identités résistante à la Sybil attack pour un réseau pair-à-pair, 2007-06. (https://centralesupelec.hal.science/hal-00268419v1)
- Article in a review - 13 documents
- Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke. OATs’inside : Retrieving Object Behaviors From Native-based Obfuscated Android Applications, 2023-08-10. (https://centralesupelec.hal.science/hal-04279351v1)
- Tomás Concepción Miranda, Pierre-Francois Gimenez, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke. Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?, 2022-06-03. (https://inria.hal.science/hal-03700082v1)
- Aimad Berady, Mathieu Jaume, Valérie Viet Triem Tong, Gilles Guette. PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns, 2022. (https://inria.hal.science/hal-03694719v1)
- Aimad Berady, Mathieu Jaume, Valérie Viet Triem Tong, Gilles Guette. From TTP to IoC: Advanced Persistent Graphs for Threat Hunting, 2021. (https://inria.hal.science/hal-03131262v1)
- Valérie Viet Triem Tong. Lutter contre les codes malveillants, 2016-12-07. (https://inria.hal.science/hal-01427326v1)
- Valérie Viet Triem Tong, Jean-François Lalande, Mourad Leslous. Challenges in Android Malware Analysis, 2016-07. (https://centralesupelec.hal.science/hal-01355122v1)
- Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong. Information Flow Policies vs Malware -- Final Battle, 2014. (https://inria.hal.science/hal-01062313v1)
- Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Ludovic Mé. User Data on Androïd Smartphone Must be Protected, 2012-07. (https://centralesupelec.hal.science/hal-00735993v1)
- Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong, Yves Le Traon. User Data Confidentiality in an Orchestration of Web Services, 2012. (https://centralesupelec.hal.science/hal-00735996v1)
- Mathieu Jaume, Valérie Viet Triem Tong, Guillaume Hiet. Spécification et mécanisme de détection de flots d'information illégaux, 2012. (https://centralesupelec.hal.science/hal-00761351v1)
- Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, Valérie Viet Triem Tong, Nicolas Craipeau, Ronan Hardouin. Liability issues in software engineering: the use of formal methods to reduce legal uncertainties, 2011. (https://centralesupelec.hal.science/hal-00656921v1)
- Valérie Viet Triem Tong, Andrew E. Clark, Ludovic Mé. Specifying and enforcing a fine-grained information flow policy : model and experiments, 2010-06-14. (https://centralesupelec.hal.science/hal-00516672v1)
- Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin. Policy-based intrusion detection in web applications by monitoring Java information flows, 2009. (https://centralesupelec.hal.science/hal-00448139v1)
- Other submission - 2 documents
- Valérie Viet Triem Tong, Jean-Louis Lanet. Se protéger d'une pandémie numérique, 2023. (https://hal.science/hal-04547827v1)
- Laurent Georget, Valérie Viet Triem Tong, Ludovic Mé. Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy, 2009-09. (https://centralesupelec.hal.science/hal-00420117v1)
- HDR - 1 document
- Valérie Viet Triem Tong. Apport du suivi de flux d'information pour la sécurité des systèmes, 2015-12-03. (https://inria.hal.science/tel-01342243v1)
- Pre-submission / Working document - 1 document
- Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong. Efficient Distributed Privacy-Preserving Reputation Mechanism Handling Non-Monotonic Ratings, 2015-01-23. (https://hal.science/hal-01104837v2)
- Work chapter - 1 document
- Emmanuelle Anceaume, Gilles Guette, Paul Lajoie-Mazenc, Thomas Sirvent, Valérie Viet Triem Tong. Extending Signatures of Reputation, 2014. (https://hal.science/hal-00997133v1)
- Report - 6 documents
- Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Thomas Saliou. Information Flow Policies vs Malware, 2013-09-16. (https://inria.hal.science/hal-00862468v1)
- Valérie Viet Triem Tong, Christophe Bidan, Ludovic Mé, Christopher Humphries, Guillaume Piolle. Analyse de logs guidée par des vérifications de formules de responsabilité exprimées en CTL, 2011-01. (https://centralesupelec.hal.science/hal-01172702v1)
- Christophe Alleaune, Valérie-Laure Benabou, Denis Beras, Christophe Bidan, Nicolas Craipeau, Stéphane Frénot, Gregor Goessler, Ronan Hardouin, Julien Le Clainche, Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Ludovic Mé, Marie-Laure Potet, Sylvain Steer, Valérie Viet Triem Tong. Liability in Software Engineering: Overview of the LISE Approach and Illustration on a Case Study, 2009. (https://inria.hal.science/inria-00440437v1)
- Guillaume Feuillade, Thomas Genet, Valérie Viet Triem Tong. Reachability Analysis over Term Rewriting Systems, 2003. (https://inria.hal.science/inria-00071609v1)
- Thomas Genet, Valérie Viet Triem Tong. Proving Negative Conjectures on Equational Theories using Induction and Abstract Interpretation, 2002. (https://inria.hal.science/inria-00072012v1)
- Thomas Genet, Valérie Viet Triem Tong. Reachability Analysis of Term Rewriting Systems with Timbuk, 2001. (https://inria.hal.science/inria-00072321v1)