Mots-clés

Nombre de documents

64

JF Lalande


I am currently part of the Security and Distributed Systems team of the LIFO laboratory. From sept. 2013 to august 2015, I was part of the CIDRE team of INRIA Rennes.

My areas of interest are the security of operating systems, the security of C embedded software (e.g. smart cards) and the security of Android applications. I work on access control policies, intrusion detection tools and software code analysis. I am currently focusing countermeasures that can help to defeat malware that targets Android's applications.


Article dans une revue11 documents

  • Marcin Urbanski, Wojciech Mazurczyk, Jean-François Lalande, Luca Caviglione. Detecting Local Covert Channels Using Process Activity Correlation on Android Smartphones. International Journal of Computer Systems Science and Engineering, CRL Publishing Ltd, 2017, 32 (2), pp.71-80. 〈hal-01302828〉
  • Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Jean-François Lalande. Network Information Hiding and Science 2.0: Can it be a Match?. International Journal of Electronics and Telecommunications, Warsaw Science Publishers of PAS, 2017, 63 (2), pp.217-222. 〈10.1515/eletel-2017-0029〉. 〈hal-01451475〉
  • Valérie Viet Triem Tong, Jean-François Lalande, Mourad Leslous. Challenges in Android Malware Analysis. ERCIM News, ERCIM, 2016, Special Theme: Cybersecurity, pp.42-43. 〈http://ercim-news.ercim.eu/en106/special/challenges-in-android-malware-analysis〉. 〈hal-01355122〉
  • Luca Caviglione, Mauro Gaggero, Jean-François Lalande, Wojciech Mazurczyk, Marcin Urbanski. Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2016, 11 (4), pp.799-810. 〈10.1109/TIFS.2015.2510825〉. 〈hal-01247495〉
  • Ghada Arfaoui, Jean-François Lalande, Jacques Traoré, Nicolas Desmoulins, Pascal Berthomé, et al.. A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. Proceedings on Privacy Enhancing Technologies, De Gruyter Open, 2015, 2015 (2), pp.25-45. 〈10.1515/popets-2015-0019〉. 〈hal-01192867〉
  • Ghada Arfaoui, Guillaume Dabosville, Sébastien Gambs, Patrick Lacharme, Jean-François Lalande. A Privacy-Preserving NFC Mobile Pass for Transport Systems. EAI Endorsed Transactions on Mobile Communications and Applications, ICST, 2014, 14 (5), pp.e4. 〈10.4108/mca.2.5.e4〉. 〈hal-01091576〉
  • Waleed Smari, Patrice Clemente, Jean-François Lalande. An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system. Future Generation Computer Systems, Elsevier, 2014, 31, pp.147-168. 〈10.1016/j.future.2013.05.010〉. 〈hal-00835887〉
  • Mathieu Blanc, Jean-François Lalande. Improving Mandatory Access Control for HPC clusters. Future Generation Computer Systems, Elsevier, 2013, 29 (3), pp.876-885. 〈10.1016/j.future.2012.03.020〉. 〈hal-00691844〉
  • Jérémy Briffaut, Jean-François Lalande, Christian Toinard. Formalization of security properties: enforcement for MAC operating systems and verification of dynamic MAC policies. International Journal On Advances in Security, IARIA, 2009, 2 (4), pp.325-343. 〈hal-00464773〉
  • Jean-François Lalande, David Rodriguez, Christian Toinard. Security properties in an open peer-to-peer network. International Journal of Network Security & Its Applications, 2009, 1 (3), pp.73-89. 〈hal-00451807〉
  • Jérémy Briffaut, Jean-François Lalande, Christian Toinard. Security and results of a large-scale high-interaction honeypot. Journal of Computers (JCP), Academy Publisher, 2009, 4 (5), pp.395-404. 〈10.4304/jcp.4.5.395-404〉. 〈hal-00451810〉

Communication dans un congrès43 documents

  • Valérie Viet Triem Tong, Aurélien Trulla, Mourad Leslous, Jean-François Lalande. Information flows at OS level unmask sophisticated Android malware. 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. SciTePress, 6, pp.578-585, 2017, 〈http://www.secrypt.icete.org/〉. 〈10.5220/0006476705780585〉. 〈hal-01535678〉
  • Mourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet. GPFinder: Tracking the Invisible in Android Malware. 12th International Conference on Malicious and Unwanted Software, Oct 2017, Fajardo, Puerto Rico. IEEE Conputer Society, 12th International Conference on Malicious and Unwanted Software, 2017. 〈hal-01584989〉
  • Jean-François Lalande. Malware à base de canaux auxiliaires. Colloque International sur la Sécurité des Systèmes d'Information, Dec 2016, Kénitra, Maroc. 〈hal-01419182〉
  • Jean-François Lalande. Contre-mesures logicielles contre les fautes induisant des sauts. Workshop SERTIF : Simulation pour l'Evaluation de la RobusTesse des applications embarquées contre l'Injection de Fautes, Oct 2016, Grenoble, France. 2016. 〈hal-01382045〉
  • Nicolas Kiss, Jean-François Lalande, Mourad Leslous, Valérie Viet Triem Tong. Kharon dataset: Android malware under a microscope. The Learning from Authoritative Security Experiment Results (LASER) workshop, May 2016, San Jose, United States. USENIX Association, Proceedings of the Learning from Authoritative Security Experiment Results (LASER) 2016, pp.1-12. 〈hal-01311917〉
  • Jean-François Lalande. Sécurité Android: exemples de malware. Colloque International sur la Sécurité des Systèmes d'Information, Mar 2015, Kénitra, Maroc. 2015, 〈http://www.univ-ibntofail.ac.ma/ensak/CISSI2015/〉. 〈hal-01136768〉
  • Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. Theo Tryfonas; Ioannis G. Askoxylakis. HAS - 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Aug 2015, Los Angeles, United States. 9190, LNCS. 〈http://2015.hci.international/has〉. 〈10.1007/978-3-319-20376-8〉. 〈hal-01182303〉
  • Radoniaina Andriatsimandefitra Ratsisahanana, Thomas Genet, Laurent Guillo, Jean-François Lalande, David Pichardie, et al.. Kharon : Découvrir, comprendre et reconnaître des malware Android par suivi de flux d'information. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France. 〈hal-01154368〉
  • Sébastien Gambs, Jean-François Lalande, Jacques Traoré. ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France. 〈hal-01154374〉
  • Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat, Jean-François Lalande, Valérie Viet Triem Tong. GroddDroid: a Gorilla for Triggering Malicious Behaviors. 10th International Conference on Malicious and Unwanted Software, Oct 2015, Fajardo, Puerto Rico. IEEE Computer Society, pp.119-127, 2015, 〈10.1109/MALWARE.2015.7413692〉. 〈hal-01201743v2〉
  • Ghada Arfaoui, Jean-François Lalande, Saïd Gharout, Jacques Traoré. Practical and Privacy-Preserving TEE Migration. Raja Naeem Akram; Sushil Jajodia. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. Springer, Lecture Notes in Computer Science, 9311, pp.153-168, Information Security Theory and Practice. 〈http://www.wistp.org/〉. 〈10.1007/978-3-319-24018-3_10〉. 〈hal-01183508〉
  • Mathilde De Saint Léger, Sébastien Gambs, Brigitte Juanals, Jean-François Lalande, Jean-Luc Minel. Privacy and Mobile Technologies: the Need to Build a Digital Culture. Digital Intelligence 2014, Sep 2014, Nantes, France. pp.100-105, 2014. 〈halshs-01065840〉
  • Jean-François Lalande. Un titre de transport sur mobile NFC respectueux de la vie privée. Colloque International sur la Sécurité des Systèmes d'Information, Mar 2014, Kénitra, Maroc. 2014. 〈hal-00967463〉
  • Ghada Arfaoui, Guillaume Dabosville, Sébastien Gambs, Patrick Lacharme, Jean-François Lalande. Un pass de transport anonyme et intraçable pour mobile NFC. Atelier sur la Protection de la Vie Privée 2014, Jun 2014, Cabourg, France. 2014. 〈hal-01009516〉
  • Ghada Arfaoui, Jean-François Lalande. A Privacy Preserving Post-Payment Mobile Ticketing Protocol for Transport Systems. Atelier sur la Protection de la Vie Privée 2014, Jun 2014, Cabourg, France. 〈hal-01091597〉
  • Jean-François Lalande, Steffen Wendzel. Hiding privacy leaks in Android applications using low-attention raising covert channels. ECTCM 2013, Sep 2013, Regensburg, Germany. IEEE Computer Society, pp.701-710, 2013, 〈10.1109/ARES.2013.92〉. 〈hal-00857896〉
  • Ghada Arfaoui, Sébastien Gambs, Patrick Lacharme, Jean-François Lalande, Lescuyer Roch, et al.. A Privacy-Preserving Contactless Transport Service for NFC Smartphones. Memmi, Gérard and Blanke, Ulf. Fifth International Conference on Mobile Computing, Applications and Services, Nov 2013, Paris, France. Springer, 130, pp.282-285, 2013, LNICST. 〈10.1007/978-3-319-05452-0_24〉. 〈hal-00875098〉
  • Jean-François Lalande, Steffen Wendzel. Attacking Smartphone Privacy Using Local Covert Channels. Fourth International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE'2013), Mar 2013, Paris, France. 〈hal-00796288〉
  • Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande. High level model of control flow attacks for smart card functional security. AReS 2012 - 7th International Conference on Availability, Reliability and Security, Aug 2012, Prague, Czech Republic. IEEE Computer Society, pp.224-229, 2012, 〈10.1109/ARES.2012.79〉. 〈hal-00721111〉
  • Jean-François Lalande, David Rodriguez. Protecting resources in an open and trusted peer-to-peer network. METHOD 2012, Jul 2012, Izmir, Turkey. IEEE Computer Society, pp.140-143, 2012, 〈10.1109/COMPSACW.2012.35〉. 〈hal-00721420〉
  • Pascal Berthomé, Thomas Fécherolle, Nicolas Guilloteau, Jean-François Lalande. Repackaging Android applications for auditing access to private data. IWSMA 2012, Aug 2012, Prague, Czech Republic. IEEE Computer Society, pp.388-396, 2012, 〈10.1109/ARES.2012.74〉. 〈hal-00721407〉
  • Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas. HoneyCloud: elastic honeypots - On-attack provisioning of high-interaction honeypots. SECRYPT 2012, Jul 2012, Rome, Italy. pp.434-439, 2012. 〈hal-00721415〉
  • Pascal Berthomé, Jean-François Lalande. Comment ajouter de la privacy after design pour les applications Android ?. Atelier Protection de la Vie Privée, Jun 2012, Ile de Groix, France. 〈hal-00710492〉
  • Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande. Attaques physiques à haut niveau pour le test de la sécurité des cartes à puce. Journée Sécurité des Systèmes & Sûreté des Logiciels, May 2011, Saint-Malo, France. 〈hal-00596984〉
  • Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande. Simulating physical attacks in smart card C codes: the jump attack case. e-Smart, Sep 2011, Nice - Sophia Antipolis, France. 〈hal-00596997〉
  • Aline Bousquet, Patrice Clemente, Jean-François Lalande. SYNEMA: visual monitoring of network and system security sensors. SECRYPT 2011, Jul 2011, Séville, Spain. pp.375-378, 2011, 〈10.5220/0003516203750378〉. 〈hal-00596893〉
  • Mathieu Blanc, Jean-François Lalande. Mandatory access control for shared HPC clusters: setup and performance evaluation. HPCS 2010, Jun 2010, Caen, France. IEEE Computer Society, pp.291-298, 2010, ISBN: 978-1-4244-6827-0. 〈10.1109/HPCS.2010.5547118〉. 〈hal-00473944〉
  • Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande. Attack model for verification of interval security properties for smart card C codes. PLAS '10 - 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, Jun 2010, Toronto, Canada. ACM, pp.2:1--2:12, 2010, 〈10.1145/1814217.1814219〉. 〈hal-00476478〉
  • Jérémy Briffaut, Jean-François Lalande, Christian Toinard, Mathieu Blanc. Enforcement of security properties for dynamic MAC policies. IARIA. SECURWARE '09, May 2009, Athens, Glyfada, Greece. IEEE Computer Society, pp.114-120, 2009, 〈10.1109/SECURWARE.2009.25〉. 〈hal-00451806〉
  • Mathieu Blanc, Kévin Guérin, Jean-François Lalande, Vincent Le Port. Mandatory access control implantation against potential NFS vulnerabilities. Waleed W. Smari and William McQuay. Workshop on Collaboration and Security 2009, May 2009, Baltimore, United States. IEEE Computer Society, pp.195-200, 2009, ISBN: 978-1-4244-4584-4. 〈10.1109/CTS.2009.5067481〉. 〈hal-00451794〉
  • Jérémy Briffaut, Xavier Kauffmann-Tourkestansky, Jean-François Lalande, Waleed Smari. Generation of role based access control security policies for Java collaborative applications. IARIA. SECURWARE '09, May 2009, Athens, Glyfada, Greece. IEEE Computer Society, pp.224 - 229, 2009, ISBN: 978-0-7695-3668-2. 〈10.1109/SECURWARE.2009.41〉. 〈hal-00451800〉
  • Jérémy Briffaut, Jean-François Lalande, Waleed Smari. Team-based MAC policy over Security-Enhanced Linux. IARIA. SECURWARE '08, Aug 2008, Cap Esterel, France. IEEE Computer Society, pp.41 - 46, 2008, ISBN: 978-0-7695-3329-2. 〈10.1109/SECURWARE.2008.35〉. 〈hal-00451804〉
  • Jérémy Briffaut, Jean-François Lalande, Christian Toinard. A proposal for securing a large-scale high-interaction honeypot. Ratan Kumar Guha and Luca Spalazzi. Workshop on Security and High Performance Computing Systems, Jun 2008, Cyprus, Cyprus. IEEE Computer Society, pp.206-212, 2008. 〈hal-00447542〉
  • Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard. Collaboration between MAC policies and IDS based on a meta-policy approach. Waleed W. Smari and William McQuay. Workshop on Collaboration and Security 2006, May 2006, Las Vegas, United States. IEEE Computer Society, pp.48-55, 2006, ISBN: 0-9785699-0-3. 〈10.1109/CTS.2006.25〉. 〈hal-00081640〉
  • Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard. Distributed control enabling consistent MAC policies and IDS based on a meta-policy approach. POLICY 2006, Jun 2006, University of Western Ontario, London, Canada. IEEE Computer Society, pp.153-156, 2006, ISBN: 0-7695-2598-9. 〈10.1109/POLICY.2006.15〉. 〈hal-00082278〉
  • Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard. Politique de contrôle d'accès et détection d'intrusion basée sur une approche de méta-politique. Journée Informatique de la Région Centre, 2006, Orléans, France. 2006. 〈hal-00459990〉
  • Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard. Collaboration entre politiques MAC et IDS pour une approche basée sur une méta-politique. Les Journées Informatique de la Région Centre, Jul 2006, Orléans, France. 〈hal-00461179〉
  • Sara Alouf, Eitan Altman, Jérôme Galtier, Jean-François Lalande, Corinne Touati. Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellites. INFOCOM 2005, Mar 2005, Miami, United States. IEEE Computer Society, 1, pp.560-571, 2005, ISBN: 0-7803-8968-9. 〈10.1109/INFCOM.2005.1497923〉. 〈inria-00451816〉
  • Jean-François Lalande, Michel Syska, Yann Verhoeven. Arrondi aléatoire et protection des réseaux WDM. Jean-Charles Billaut and Carl Esswein. ROADEF 2005, Feb 2005, Tours, France. Tours : Presses universitaires François Rabelais, pp.241-242, 2005, ROADEF 2005 / 6ème congrès de la Société Française de Recherche Opérationnelle et d'Aide à la Décision. 〈inria-00451818〉
  • Anas Abou El Kalam, Jérémy Briffaut, Patrice Clemente, Pierre Courtieu, Fabrice Gadaud, et al.. Systèmes de confiance et détection d'intrusion répartis. Les Journées Informatique de la Région Centre, Jun 2005, Blois, France. 2005. 〈hal-00459971〉
  • Mohamed Bouklit, David Coudert, Jean-François Lalande, Hervé Rivano. Approximation Combinatoire de Multiflot Factionnaire : Améliorations. AlgoTel'03 : 5ièmes Rencontres Francophones sur les Aspects ALGOrithmiques des TELécommunications, May 2003, Banyuls-sur-Mer, France. 2003, 〈http://dept-info.labri.fr/~gavoille/algotel03/〉. 〈lirmm-00269814〉
  • Mohamed Bouklit, David Coudert, Jean-François Lalande, Christophe Paul, Hervé Rivano. Approximate Multicommodity Flow for WDM Networks Design. SIROCCO: Structural Information and Communication Complexity, Jun 2003, Umeä, Sweden. Carleton Scientific, 10th (17), pp.43-56, 2003. 〈lirmm-00269524〉
  • Jean-François Lalande, Stéphane Pérennes, Michel Syska. Groupage dans les réseaux dorsaux WDM. ROADEF 2003, Feb 2003, Avignon, France. Université d'Avignon et des Pays de Vaucluse, pp.254-255, 2003. 〈inria-00451812〉

Poster2 documents

  • Mourad Leslous, Jean-François Lalande, Valérie Viet Triem Tong. Using Implicit Calls to Improve Malware Dynamic Execution. 37th IEEE Symposium on Security and Privacy, May 2016, San Jose, United States. 〈hal-01304326〉
  • Adrien Abraham, Radoniaina Andriatsimandefitra Ratsisahanana, Nicolas Kiss, Jean-François Lalande, Valérie Viet Triem Tong. Towards Automatic Triggering of Android Malware. 12th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Jul 2015, Milano, Italy. 〈hal-01168354〉

Chapitre d'ouvrage3 documents

  • Luca Caviglione, Mauro Gaggero, Jean-François Lalande, Wojciech Mazurczyk. Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile Data. M. Migliardi, A. Merlo, B. S. Al-Haj. Adaptive Mobile Computing: Advances in Processing Mobile Data Sets, Elsevier, pp.185-202, 2017, 9780128046036. 〈hal-01430804〉
  • Jérémy Briffaut, Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas. Honeypot forensics for system and network SIEM design. Guillermo Suárez de Tangil and Esther Palomar. Advances in Security Information Management: Perceptions and Outcomes, Nova Science Publishers, pp.181-216, 2013, Computer Science, Technology and Applications, Computer Networks, 978-1-62417-221-2. 〈hal-00677340〉
  • Sara Alouf, Eitan Altman, Jérôme Galtier, Jean-François Lalande, Corinne Touati. Quasi-Optimal Resource Allocation in Multi-Spot MFTDMA Satellite Networks. Maggie Xiaoyan Cheng and Yingshu Li and Ding-Zhu Du. Combinatorial Optimization in Communication Networks, 18 (18), Kluwer Academic Publishers, pp.325-365, 2006, Combinatorial Optimization, 0-387-29025-7. 〈10.1007/0-387-29026-5_13〉. 〈inria-00000005〉

Rapport4 documents

  • Pascal Berthomé, Jean-François Lalande, Vincent Levorato. Implementation of exponential and parametrized algorithms in the AGAPE project. 2012. 〈hal-00663866〉
  • Jérémy Briffaut, Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas. From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut, P. Clemente, J.-F. Lalande, J. Rouzaud-Cornabas. 2011. 〈hal-00995211〉
  • Jean-François Lalande, Michel Syska, Yann Verhoeven. Mascopt - A Network Optimization Library: Graph Manipulation. [Technical Report] RT-0293, INRIA. 2004, pp.25. 〈inria-00069887〉
  • Sara Alouf, Eitan Altman, Jérôme Galtier, Jean-François Lalande, Corinne Touati. Un algorithme d'allocation de bande passante satellitaire. RR-5172, INRIA. 2004. 〈inria-00071416〉

Thèse1 document

  • Jean-François Lalande. Conception de réseaux de télécommunications : optimisation et expérimentations. Modélisation et simulation. Université Nice Sophia Antipolis, 2004. Français. 〈tel-00008012〉