Skip to Main content

Keywords

Co-authors

Number of documents

74

JF Lalande


I am currently Professor at CentraleSupélec, Rennes campus in the Inria CIDRE team.

My areas of interest are the security of operating systems, the security of C embedded software (e.g. smart cards) and the security of Android applications. I work on access control policies, intrusion detection tools and software code analysis. I am currently focusing countermeasures that can help to defeat malware that targets Android's applications.


Journal articles11 documents

  • Marcin Urbanski, Wojciech Mazurczyk, Jean-François Lalande, Luca Caviglione. Detecting Local Covert Channels Using Process Activity Correlation on Android Smartphones. International Journal of Computer Systems Science & Engineering, CRL Publishing Ltd, 2017, 32 (2), pp.71-80. ⟨hal-01302828⟩
  • Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Jean-François Lalande. Network Information Hiding and Science 2.0: Can it be a Match?. International Journal of Electronics and Telecommunications, Warsaw Science Publishers of PAS, 2017, 63 (2), pp.217-222. ⟨10.1515/eletel-2017-0029⟩. ⟨hal-01451475⟩
  • Valérie Viet Triem Tong, Jean-François Lalande, Mourad Leslous. Challenges in Android Malware Analysis. ERCIM News, ERCIM, 2016, Special Theme: Cybersecurity, pp.42-43. ⟨hal-01355122⟩
  • Luca Caviglione, Mauro Gaggero, Jean-François Lalande, Wojciech Mazurczyk, Marcin Urbanski. Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2016, 11 (4), pp.799-810. ⟨10.1109/TIFS.2015.2510825⟩. ⟨hal-01247495⟩
  • Pascal Berthomé, Saïd Gharout, Ghada Arfaoui, Jean-François Lalande, Jacques Traoré, et al.. A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. Proceedings on Privacy Enhancing Technologies, De Gruyter Open, 2015, 2015 (2), pp.25-45. ⟨10.1515/popets-2015-0019⟩. ⟨hal-01192867⟩
  • Ghada Arfaoui, Guillaume Dabosville, Sébastien Gambs, Patrick Lacharme, Jean-François Lalande. A Privacy-Preserving NFC Mobile Pass for Transport Systems. EAI Endorsed Transactions on Mobile Communications and Applications, ICST, 2014, 14 (5), pp.e4. ⟨10.4108/mca.2.5.e4⟩. ⟨hal-01091576⟩
  • Waleed Smari, Patrice Clemente, Jean-François Lalande. An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system. Future Generation Computer Systems, Elsevier, 2014, 31, pp.147-168. ⟨10.1016/j.future.2013.05.010⟩. ⟨hal-00835887⟩
  • Mathieu Blanc, Jean-François Lalande. Improving Mandatory Access Control for HPC clusters. Future Generation Computer Systems, Elsevier, 2013, 29 (3), pp.876-885. ⟨10.1016/j.future.2012.03.020⟩. ⟨hal-00691844⟩
  • Jérémy Briffaut, Jean-François Lalande, Christian Toinard. Formalization of security properties: enforcement for MAC operating systems and verification of dynamic MAC policies. International Journal On Advances in Security, IARIA, 2009, 2 (4), pp.325-343. ⟨hal-00464773⟩
  • Jean-François Lalande, David Rodriguez, Christian Toinard. Security properties in an open peer-to-peer network. International journal of network security & its applications, Academy and Research Collaboration Center (AIRCC), 2009, 1 (3), pp.73-89. ⟨hal-00451807⟩
  • Jérémy Briffaut, Jean-François Lalande, Christian Toinard. Security and results of a large-scale high-interaction honeypot. Journal of Computers (JCP), Academy Publisher, 2009, 4 (5), pp.395-404. ⟨10.4304/jcp.4.5.395-404⟩. ⟨hal-00451810⟩

Conference papers53 documents

  • Pierre Graux, Jean-François Lalande, Pierre Wilke, Valérie Viet Triem Tong. Abusing Android Runtime for Application Obfuscation. Workshop on Software Attacks and Defenses, Sep 2020, Genova, Italy. ⟨hal-02877815⟩
  • Jean-François Lalande, Mathieu Simon, Valérie Viet Triem Tong. GroDDViewer: Dynamic Dual View of Android Malware. The Seventh International Workshop on Graphical Models for Security, Jun 2020, Virtual Conference, France. ⟨hal-02913112⟩
  • Jean-François Lalande, Valérie Viet Triem Tong, Pierre Graux, Guillaume Hiet, Wojciech Mazurczyk, et al.. Teaching Android Mobile Security. SIGCSE '19 - 50th ACM Technical Symposium on Computer Science Education, Feb 2019, Minneapolis, United States. pp.232-238, ⟨10.1145/3287324.3287406⟩. ⟨hal-01940652⟩
  • Valérie Viet Triem Tong, Cédric Herzog, Tomás Concepción Miranda, Pierre Graux, Jean-François Lalande, et al.. Isolating malicious code in Android malware in the wild. MALCON 2019 - 14th International Conference on Malicious and Unwanted Software, Oct 2019, Nantucket, United States. ⟨hal-02288116⟩
  • Jean-François Lalande, Pierre Graux, Tomás Concepción Miranda. Orchestrating Android Malware Experiments. MASCOTS 2019 - 27th IEEE International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Oct 2019, Rennes, France. pp.1-2. ⟨hal-02305473⟩
  • Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong. Obfuscated Android Application Development. CECC 2019 - Central European Cybersecurity Conference, Nov 2019, Munich, Germany. pp.1-6, ⟨10.1145/3360664.3361144⟩. ⟨hal-02305924⟩
  • Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong. Etat de l'Art des Techniques d'Unpacking pour les Applications Android. RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2018, Nancy / La Bresse, France. pp.1-3. ⟨hal-01794252⟩
  • Jean-François Lalande, Valérie Viet Triem Tong. Le projet CominLabs Kharon: aidons les malwares à s'exécuter. RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2018, Nancy / La Bresse, France. pp.1. ⟨hal-01794223v2⟩
  • Jean-François Lalande, Valérie Viet Triem Tong, Mourad Leslous, Pierre Graux. Challenges for Reliable and Large Scale Evaluation of Android Malware Analysis. SHPCS 2018 - International Workshop on Security and High Performance Computing Systems, Jul 2018, Orléans, France. pp.1068-1070, ⟨10.1109/HPCS.2018.00173⟩. ⟨hal-01844312⟩
  • Jean-François Lalande. Android Malware Analysis: from technical difficulties to scientific challenges. SecITC 2018 - International Conference on Innovative Security Solutions for Information Technology and Communications, Nov 2018, Bucharest, Romania. pp.1-54, ⟨10.1007/978-3-030-12942-2_2⟩. ⟨hal-01906318⟩
  • Valérie Viet Triem Tong, Aurélien Trulla, Mourad Leslous, Jean-François Lalande. Information flows at OS level unmask sophisticated Android malware. 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.578-585, ⟨10.5220/0006476705780585⟩. ⟨hal-01535678⟩
  • Mourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet. GPFinder: Tracking the Invisible in Android Malware. 12th International Conference on Malicious and Unwanted Software, Oct 2017, Fajardo, Puerto Rico. pp.39-46, ⟨10.1109/MALWARE.2017.8323955⟩. ⟨hal-01584989⟩
  • Nicolas Kiss, Jean-François Lalande, Mourad Leslous, Valérie Viet Triem Tong. Kharon dataset: Android malware under a microscope. The Learning from Authoritative Security Experiment Results (LASER) workshop, May 2016, San Jose, United States. pp.1-12. ⟨hal-01311917⟩
  • Jean-François Lalande. Malware à base de canaux auxiliaires. Colloque International sur la Sécurité des Systèmes d'Information, Dec 2016, Kénitra, Maroc. ⟨hal-01419182⟩
  • Jean-François Lalande. Contre-mesures logicielles contre les fautes induisant des sauts. Workshop SERTIF : Simulation pour l'Evaluation de la RobusTesse des applications embarquées contre l'Injection de Fautes, Oct 2016, Grenoble, France. ⟨hal-01382045⟩
  • Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel. Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. HAS - 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, Aug 2015, Los Angeles, United States. ⟨10.1007/978-3-319-20376-8_15⟩. ⟨hal-01182303⟩
  • Jean-François Lalande. Sécurité Android: exemples de malware. Colloque International sur la Sécurité des Systèmes d'Information, Mar 2015, Kénitra, Maroc. ⟨hal-01136768⟩
  • Ghada Arfaoui, Jean-François Lalande, Saïd Gharout, Jacques Traoré. Practical and Privacy-Preserving TEE Migration. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩. ⟨hal-01183508⟩
  • Radoniaina Andriatsimandefitra Ratsisahanana, Thomas Genet, Laurent Guillo, Jean-François Lalande, David Pichardie, et al.. Kharon : Découvrir, comprendre et reconnaître des malware Android par suivi de flux d'information. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France. ⟨hal-01154368⟩
  • Sébastien Gambs, Jean-François Lalande, Jacques Traoré. ANR LYRICS: Cryptographie pour la protection de la vie privée, optimisée pour les services mobiles sans contact. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France. ⟨hal-01154374⟩
  • Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat, Jean-François Lalande, Valérie Viet Triem Tong. GroddDroid: a Gorilla for Triggering Malicious Behaviors. 10th International Conference on Malicious and Unwanted Software, Oct 2015, Fajardo, Puerto Rico. pp.119-127, ⟨10.1109/MALWARE.2015.7413692⟩. ⟨hal-01201743v2⟩
  • Ghada Arfaoui, Jean-François Lalande. A Privacy Preserving Post-Payment Mobile Ticketing Protocol for Transport Systems. Atelier sur la Protection de la Vie Privée 2014, Jun 2014, Cabourg, France. ⟨hal-01091597⟩
  • Mathilde de Saint Léger, Sébastien Gambs, Brigitte Juanals, Jean-François Lalande, Jean-Luc Minel. Privacy and Mobile Technologies: the Need to Build a Digital Culture. Digital Intelligence 2014, Sep 2014, Nantes, France. pp.100-105. ⟨halshs-01065840⟩
  • Ghada Arfaoui, Guillaume Dabosville, Sébastien Gambs, Patrick Lacharme, Jean-François Lalande. Un pass de transport anonyme et intraçable pour mobile NFC. Atelier sur la Protection de la Vie Privée 2014, Jun 2014, Cabourg, France. ⟨hal-01009516⟩
  • Jean-François Lalande. Un titre de transport sur mobile NFC respectueux de la vie privée. Colloque International sur la Sécurité des Systèmes d'Information, Mar 2014, Kénitra, Maroc. ⟨hal-00967463⟩
  • Jean-François Lalande, Steffen Wendzel. Hiding privacy leaks in Android applications using low-attention raising covert channels. ECTCM 2013, Sep 2013, Regensburg, Germany. pp.701-710, ⟨10.1109/ARES.2013.92⟩. ⟨hal-00857896⟩
  • Jean-François Lalande, Steffen Wendzel. Attacking Smartphone Privacy Using Local Covert Channels. Fourth International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE'2013), Mar 2013, Paris, France. ⟨hal-00796288⟩
  • Ghada Arfaoui, Sébastien Gambs, Patrick Lacharme, Jean-François Lalande, Lescuyer Roch, et al.. A Privacy-Preserving Contactless Transport Service for NFC Smartphones. Fifth International Conference on Mobile Computing, Applications and Services, Nov 2013, Paris, France. pp.282-285, ⟨10.1007/978-3-319-05452-0_24⟩. ⟨hal-00875098⟩
  • Pascal Berthomé, Jean-François Lalande. Comment ajouter de la privacy after design pour les applications Android ?. Atelier Protection de la Vie Privée, Jun 2012, Ile de Groix, France. ⟨hal-00710492⟩
  • Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas. HoneyCloud: elastic honeypots - On-attack provisioning of high-interaction honeypots. SECRYPT 2012, Jul 2012, Rome, Italy. pp.434-439. ⟨hal-00721415⟩
  • Pascal Berthomé, Thomas Fécherolle, Nicolas Guilloteau, Jean-François Lalande. Repackaging Android applications for auditing access to private data. IWSMA 2012, Aug 2012, Prague, Czech Republic. pp.388-396, ⟨10.1109/ARES.2012.74⟩. ⟨hal-00721407⟩
  • Jean-François Lalande, David Rodriguez. Protecting resources in an open and trusted peer-to-peer network. METHOD 2012, Jul 2012, Izmir, Turkey. pp.140-143, ⟨10.1109/COMPSACW.2012.35⟩. ⟨hal-00721420⟩
  • Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande. High level model of control flow attacks for smart card functional security. AReS 2012 - 7th International Conference on Availability, Reliability and Security, Aug 2012, Prague, Czech Republic. pp.224-229, ⟨10.1109/ARES.2012.79⟩. ⟨hal-00721111⟩
  • Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande. Attaques physiques à haut niveau pour le test de la sécurité des cartes à puce. Journée Sécurité des Systèmes & Sûreté des Logiciels, May 2011, Saint-Malo, France. ⟨hal-00596984⟩
  • Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande. Simulating physical attacks in smart card C codes: the jump attack case. e-Smart, Sep 2011, Nice - Sophia Antipolis, France. ⟨hal-00596997⟩
  • Aline Bousquet, Patrice Clemente, Jean-François Lalande. SYNEMA: visual monitoring of network and system security sensors. SECRYPT 2011, Jul 2011, Séville, Spain. pp.375-378, ⟨10.5220/0003516203750378⟩. ⟨hal-00596893⟩
  • Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande. Attack model for verification of interval security properties for smart card C codes. PLAS '10 - 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, Jun 2010, Toronto, Canada. pp.2:1--2:12, ⟨10.1145/1814217.1814219⟩. ⟨hal-00476478⟩
  • Mathieu Blanc, Jean-François Lalande. Mandatory access control for shared HPC clusters: setup and performance evaluation. HPCS 2010, Jun 2010, Caen, France. pp.291-298, ⟨10.1109/HPCS.2010.5547118⟩. ⟨hal-00473944⟩
  • Mathieu Blanc, Kévin Guérin, Jean-François Lalande, Vincent Le Port. Mandatory access control implantation against potential NFS vulnerabilities. Workshop on Collaboration and Security 2009, May 2009, Baltimore, United States. pp.195-200, ⟨10.1109/CTS.2009.5067481⟩. ⟨hal-00451794⟩
  • Jérémy Briffaut, Xavier Kauffmann-Tourkestansky, Jean-François Lalande, Waleed Smari. Generation of role based access control security policies for Java collaborative applications. SECURWARE '09, May 2009, Athens, Glyfada, Greece. pp.224 - 229, ⟨10.1109/SECURWARE.2009.41⟩. ⟨hal-00451800⟩
  • Jérémy Briffaut, Jean-François Lalande, Christian Toinard, Mathieu Blanc. Enforcement of security properties for dynamic MAC policies. SECURWARE '09, May 2009, Athens, Glyfada, Greece. pp.114-120, ⟨10.1109/SECURWARE.2009.25⟩. ⟨hal-00451806⟩
  • Jérémy Briffaut, Jean-François Lalande, Waleed Smari. Team-based MAC policy over Security-Enhanced Linux. SECURWARE '08, Aug 2008, Cap Esterel, France. pp.41 - 46, ⟨10.1109/SECURWARE.2008.35⟩. ⟨hal-00451804⟩
  • Jérémy Briffaut, Jean-François Lalande, Christian Toinard. A proposal for securing a large-scale high-interaction honeypot. Workshop on Security and High Performance Computing Systems, Jun 2008, Cyprus, Cyprus. pp.206-212. ⟨hal-00447542⟩
  • Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard. Collaboration entre politiques MAC et IDS pour une approche basée sur une méta-politique. Les Journées Informatique de la Région Centre, Jul 2006, Orléans, France. ⟨hal-00461179⟩
  • Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard. Politique de contrôle d'accès et détection d'intrusion basée sur une approche de méta-politique. Journée Informatique de la Région Centre, 2006, Orléans, France. ⟨hal-00459990⟩
  • Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard. Distributed control enabling consistent MAC policies and IDS based on a meta-policy approach. POLICY 2006, Jun 2006, University of Western Ontario, London, Canada. pp.153-156, ⟨10.1109/POLICY.2006.15⟩. ⟨hal-00082278⟩
  • Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard. Collaboration between MAC policies and IDS based on a meta-policy approach. Workshop on Collaboration and Security 2006, May 2006, Las Vegas, United States. pp.48-55, ⟨10.1109/CTS.2006.25⟩. ⟨hal-00081640⟩
  • Anas Abou El Kalam, Jérémy Briffaut, Patrice Clemente, Pierre Courtieu, Fabrice Gadaud, et al.. Systèmes de confiance et détection d'intrusion répartis. Les Journées Informatique de la Région Centre, Jun 2005, Blois, France. ⟨hal-00459971⟩
  • Jean-François Lalande, Michel Syska, Yann Verhoeven. Arrondi aléatoire et protection des réseaux WDM. ROADEF 2005, Laboratoire d'Informatique de l'Universite de Tours, Feb 2005, Tours, France. pp.241-242. ⟨inria-00451818⟩
  • Sara Alouf, Eitan Altman, Jérôme Galtier, Jean-François Lalande, Corinne Touati. Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellites. INFOCOM 2005, Mar 2005, Miami, United States. pp.560-571, ⟨10.1109/INFCOM.2005.1497923⟩. ⟨inria-00451816⟩
  • Mohamed Bouklit, David Coudert, Jean-François Lalande, Christophe Paul, Hervé Rivano. Approximate Multicommodity Flow for WDM Networks Design. SIROCCO: Structural Information and Communication Complexity, Jun 2003, Umeä, Sweden. pp.43-56. ⟨lirmm-00269524⟩
  • Mohamed Bouklit, David Coudert, Jean-François Lalande, Hervé Rivano. Approximation Combinatoire de Multiflot Factionnaire : Améliorations. AlgoTel: Aspects Algorithmiques des Télécommunications, May 2003, Banyuls-sur-Mer, France. ⟨lirmm-00269814⟩
  • Jean-François Lalande, Stéphane Pérennes, Michel Syska. Groupage dans les réseaux dorsaux WDM. ROADEF 2003, Université d'Avignon et des Pays de Vaucluse, Feb 2003, Avignon, France. pp.254-255. ⟨inria-00451812⟩

Poster communications2 documents

  • Mourad Leslous, Jean-François Lalande, Valérie Viet Triem Tong. Using Implicit Calls to Improve Malware Dynamic Execution. 37th IEEE Symposium on Security and Privacy, May 2016, San Jose, United States. ⟨hal-01304326⟩
  • Adrien Abraham, Radoniaina Andriatsimandefitra Ratsisahanana, Nicolas Kiss, Jean-François Lalande, Valérie Viet Triem Tong. Towards Automatic Triggering of Android Malware. 12th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Jul 2015, Milano, Italy. ⟨hal-01168354⟩

Book sections3 documents

  • Luca Caviglione, Mauro Gaggero, Jean-François Lalande, Wojciech Mazurczyk. Understanding Information Hiding to Secure Communications and to Prevent Exfiltration of Mobile Data. M. Migliardi, A. Merlo, B. S. Al-Haj. Adaptive Mobile Computing: Advances in Processing Mobile Data Sets, Elsevier, pp.185-202, 2017, 9780128046036. ⟨10.1016/B978-0-12-804603-6.00009-7⟩. ⟨hal-01430804⟩
  • Jérémy Briffaut, Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas. Honeypot forensics for system and network SIEM design. Guillermo Suárez de Tangil and Esther Palomar. Advances in Security Information Management: Perceptions and Outcomes, Nova Science Publishers, pp.181-216, 2013, Computer Science, Technology and Applications, Computer Networks, 978-1-62417-221-2. ⟨hal-00677340⟩
  • Sara Alouf, Eitan Altman, Jérôme Galtier, Jean-François Lalande, Corinne Touati. Quasi-Optimal Resource Allocation in Multi-Spot MFTDMA Satellite Networks. Maggie Xiaoyan Cheng and Yingshu Li and Ding-Zhu Du. Combinatorial Optimization in Communication Networks, 18 (18), Kluwer Academic Publishers, pp.325-365, 2006, Combinatorial Optimization, 0-387-29025-7. ⟨10.1007/0-387-29026-5_13⟩. ⟨inria-00000005⟩

Reports4 documents

  • Pascal Berthomé, Jean-François Lalande, Vincent Levorato. Implementation of exponential and parametrized algorithms in the AGAPE project. 2012. ⟨hal-00663866⟩
  • Jérémy Briffaut, Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas. From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut, P. Clemente, J.-F. Lalande, J. Rouzaud-Cornabas. 2011. ⟨hal-00995211⟩
  • Jean-François Lalande, Michel Syska, Yann Verhoeven. Mascopt - A Network Optimization Library: Graph Manipulation. [Technical Report] RT-0293, INRIA. 2004, pp.25. ⟨inria-00069887⟩
  • Sara Alouf, Eitan Altman, Jérôme Galtier, Jean-François Lalande, Corinne Touati. Un algorithme d'allocation de bande passante satellitaire. [Rapport de recherche] RR-5172, INRIA. 2004. ⟨inria-00071416⟩

Theses1 document

  • Jean-François Lalande. Conception de réseaux de télécommunications : optimisation et expérimentations. Modélisation et simulation. Université Nice Sophia Antipolis, 2004. Français. ⟨tel-00008012⟩