

{"id":66,"date":"2019-06-19T17:02:07","date_gmt":"2019-06-19T15:02:07","guid":{"rendered":"https:\/\/project.inria.fr\/kharon\/?page_id=66"},"modified":"2019-06-19T17:03:02","modified_gmt":"2019-06-19T15:03:02","slug":"publications","status":"publish","type":"page","link":"https:\/\/project.inria.fr\/kharon\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p>&nbsp;<\/p>\n<ul>\n<li id=\"aui_3_4_0_1_375\"><label id=\"aui_3_4_0_1_374\"> Viet Triem Tong, Val\u00e9rie and Trulla, Aur\u00e9lien and Leslous, Mourad and Lalande, Jean-Fran\u00e7ois: <\/label> <a href=\"https:\/\/hal-centralesupelec.archives-ouvertes.fr\/hal-01535678\"> Information flows at OS level unmask sophisticated Android malware <\/a> <label> 14th International Conference on Security and Cryptography <\/label> <label> : 2017 <\/label><\/li>\n<li><label> Leslous, Mourad and Viet Triem Tong, Val\u00e9rie and Lalande, Jean-Fran\u00e7cois and Genet, Thomas: <\/label> <a href=\"https:\/\/hal-centralesupelec.archives-ouvertes.fr\/hal-01584989\"> GPFinder: Tracking the Invisible in Android Malware <\/a> <label> 12th International Conference on Malicious and Unwanted Software <\/label> <label> : 2017 <\/label><\/li>\n<li><label> Fr\u00e9d\u00e9ric Besson, Nataliia Bielova, Thomas Jensen: <\/label> <a href=\"https:\/\/hal.inria.fr\/hal-01310572\"> Hybrid Monitoring of Attacker Knowledge <\/a> <label> 29th IEEE Computer Security Foundations Symposium <\/label> <label> : 2016 <\/label><\/li>\n<li><label> Viet Triem Tong, Val\u00e9rie and Lalande, Jean-Fran\u00e7ois and Leslous, Mourad: <\/label> <a href=\"https:\/\/hal-centralesupelec.archives-ouvertes.fr\/hal-01355122\"> Challenges in Android Malware Analysis <\/a> <label> ERCIM News <\/label> <label> : 2016 <\/label><\/li>\n<li><label> Viet Triem Tong, Val\u00e9rie: <\/label> <a href=\"https:\/\/hal.inria.fr\/hal-01427326\"> Lutter contre les codes malveillants <\/a> <label> Interstices <\/label> <label> : 2016 <\/label><\/li>\n<li><label> Leslous, Mourad and Lalande, Jean-Fran\u00e7ois and Viet Triem Tong, Val\u00e9rie: <\/label> <a href=\"https:\/\/hal.archives-ouvertes.fr\/hal-01304326\"> Using Implicit Calls to Improve Malware Dynamic Execution <\/a> <label> : 2016 <\/label><\/li>\n<li><label> Kiss, Nicolas and Lalande, Jean-Fran\u00e7ois and Leslous, Mourad and Viet Triem Tong, Val\u00e9rie: <\/label> <a href=\"https:\/\/hal-centralesupelec.archives-ouvertes.fr\/hal-01311917\"> Kharon dataset: Android malware under a microscope <\/a> <label> The Learning from Authoritative Security Experiment Results (LASER) workshop <\/label> <label> : 2016 <\/label><\/li>\n<li><label> Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat, Jean-Fran\u00e7ois Lalande, Val\u00e9rie Viet Triem Tong: <\/label> <a href=\"https:\/\/hal.inria.fr\/hal-01201743v2\"> GroddDroid: a Gorilla for Triggering Malicious Behaviors <\/a> <label> 10th International Conference on Malicious and Unwanted Software <\/label> <label> : 2015 <\/label><\/li>\n<li><label> Andriatsimandefitra Ratsisahanana, Radoniaina and Genet, Thomas and Guillo, Laurent and Lalande, Jean-Fran\\c cois and Pichardie, David and Viet Triem Tong, Val\\&#8217;erie: <\/label> <a href=\"https:\/\/hal.inria.fr\/hal-01154368\"> Kharon : D\\&#8217;ecouvrir, comprendre et reconna\\^itre des malware Android par suivi de flux d&#8217;information <\/a> <label> Rendez-vous de la Recherche et de l&#8217;Enseignement de la S\\&#8217;ecurit\\&#8217;e des Syst\\`emes d&#8217;Information <\/label> <label> : 2015 <\/label><\/li>\n<li><label> Andriatsimandefitra, Radoniaina and Viet Triem Tong, Val\u00e9rie: <\/label> <a href=\"https:\/\/hal.inria.fr\/hal-01191595\"> Detection and Identification of Android Malware Based on Information Flow Monitoring <\/a> <label> The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015) <\/label> <label> : 2015 <\/label><\/li>\n<li><label> Abraham, Adrien and Andriatsimandefitra Ratsisahanana, Radoniaina and Kiss, Nicolas and Lalande, Jean-Fran\\c cois and Viet Triem Tong, Val\\&#8217;erie: <\/label> <a href=\"https:\/\/hal.inria.fr\/hal-01168354\"> Towards Automatic Triggering of Android Malware <\/a> <label> : 2015 <\/label><\/li>\n<li><label> Abraham, Adrien and Andriatsimandefitra, Radoniaina and Brunelat, Adrien and Lalande, Jean-Fran\\c cois and Viet Triem Tong, Val\\&#8217;erie: <\/label> <a href=\"https:\/\/hal.inria.fr\/hal-01201743\"> GroddDroid: a Gorilla for Triggering Malicious Behaviors <\/a> <label> 10th International Conference on Malicious and Unwanted Software <\/label> <label> : 2015 <\/label><\/li>\n<li><label> R.Andriatsimandefitra, T. Genet, L. Guillo, J-F Lalande, D. Pichardie and V. Viet Triem Tong: <\/label> <a href=\"https:\/\/hal.inria.fr\/hal-01154368\"> Kharon : D\u00e9couvrir, comprendre et reconna\u00eetre des malware Android par suivi de flux d&#8217;information <\/a> <label> Rendez-vous de la Recherche et de l&#8217;Enseignement de la S\u00e9curit\u00e9 des Syst`emes d&#8217;Information <\/label> <label> : 2015 <\/label><\/li>\n<li><label> A. Abraham, R. Andriatsimandefitra, N. Kiss, J-F Lalande, and V. Viet Triem Tong: <\/label> <a href=\"https:\/\/hal.inria.fr\/hal-01168354\"> Towards Automatic Triggering of Android Malware <\/a> <label> : 2015 <\/label><\/li>\n<li><label> Fr\u00e9d\u00e9ric Besson, Nataliia Bielova, Thomas Jensen: <\/label> <a href=\"https:\/\/hal.inria.fr\/hal-01081037\"> Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach <\/a> <label> Nordic Conference on Secure IT Systems (NordSec 2014) <\/label> <label> : 2014 <\/label><\/li>\n<li><label> Andriatsimandefitra, Radoniaina and Viet Triem Tong, Val\\&#8217;erie: <\/label> <a href=\"https:\/\/hal.inria.fr\/hal-01018611\"> Capturing Android Malware Behaviour using System Flow Graph <\/a> <label> NSS 2014 &#8211; The 8th International Conference on Network and System Security <\/label> <label> : 2014 <\/label><\/li>\n<li><label> Fr\u00e9d\u00e9ric Besson, Nataliia Bielova, Thomas Jensen: <\/label> <a href=\"https:\/\/hal.inria.fr\/hal-00924138\"> Hybrid Information Flow Monitoring Against Web Tracking <\/a> <label> CSF &#8211; 2013 IEEE 26th Computer Security Foundations Symposium <\/label> <label> : 2013 <\/label><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; Viet Triem Tong, Val\u00e9rie and Trulla, Aur\u00e9lien and Leslous, Mourad and Lalande, Jean-Fran\u00e7ois: Information flows at OS level unmask sophisticated Android malware 14th International\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/project.inria.fr\/kharon\/publications\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":1611,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-66","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/project.inria.fr\/kharon\/wp-json\/wp\/v2\/pages\/66","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/project.inria.fr\/kharon\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/project.inria.fr\/kharon\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/kharon\/wp-json\/wp\/v2\/users\/1611"}],"replies":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/kharon\/wp-json\/wp\/v2\/comments?post=66"}],"version-history":[{"count":2,"href":"https:\/\/project.inria.fr\/kharon\/wp-json\/wp\/v2\/pages\/66\/revisions"}],"predecessor-version":[{"id":78,"href":"https:\/\/project.inria.fr\/kharon\/wp-json\/wp\/v2\/pages\/66\/revisions\/78"}],"wp:attachment":[{"href":"https:\/\/project.inria.fr\/kharon\/wp-json\/wp\/v2\/media?parent=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}