Talks
Talks given at international conferences or workshops:
- GraMSec 2020: GroDDViewer: Dynamic dual view of Android malware + Video Demo on SimpleLocker
- Invited talk at CECC 2019: Obfuscated Android Application Development
- SIGCSE 2019: Teaching Android Mobile Security
- Inria SecDays 2019: Lessons learned from Android malware experiments
- Keynote speaker at SecITC 2018: Android Malware Analysis: from technical difficulties to scientific challenges
- Invited talk at SHPCS 2018: Challenges for Reliable and Large Scale Evaluation of Android Malware Analysis
- LASER 2016: Kharon dataset: Android malware under a microscope
- ESORICS 2014: Software Countermeasures for Control Flow Integrity of Smart Card C Codes
- COSADE 2013: Attacking Smartphone Privacy Using Local Covert Channels
- METHOD 2012: Protecting resources in an open and trusted peer-to-peer network
- IWSMA 2012: Repackaging Android Applications for Auditing Access to Private Data
- AReS 2012: High Level Model of Control Flow Attacks for Smart Card Functional Security
- SECURWARE 2009: Enforcement of Security Properties for Dynamic MAC Policies
- SECURWARE 2009: Generation of role based access control security policies for Java collaborative applications
- SHPCS 2008: A Proposal for Securing a Large-Scale High-Interaction Honeypot
- INFOCOM 2005: Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellites
Demos:
- Demo at MASCOTS 2019: Orchestrating Android Malware Experiments
- MALWARE 2015 (with V. Viet Triem Tong): GroddDroid: a Gorilla for Triggering Malicious Behaviors : Demo
- RESSI 2015 (with V. Viet Triem Tong): Kharon : Découvrir, comprendre et reconnaître des malware Android par suivi de flux d’information : Demo
- RESSI 2015 (with J. Traoré): LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact (projet ANR)
Talks given at national conferences or workshops, or talks in french:
- CISSI 2016: Malware à base de canaux auxiliaires
- Journées thématiques: Respect de la vie privée et services mobiles sans contact: Attaques sous Android: dissection de malware
- CISSI 2015: Sécurité Android : exemples de malware
- CISSI 2014: Un titre de transport sur mobile NFC respectueux de la vie privée
- APVP 2012: Comment ajouter de la privacy after design pour les applications Android ?
- 3SL 2011: Attaques physiques à haut niveau pour le test de la sécurité des cartes à puce