Nombre de documents

73

Associate professor in CyberSecurity


-


Article dans une revue9 documents

  • Valérie Viet Triem Tong. Lutter contre les codes malveillants. Interstices, INRIA, 2016. 〈hal-01427326〉
  • Valérie Viet Triem Tong, Jean-François Lalande, Mourad Leslous. Challenges in Android Malware Analysis. ERCIM News, ERCIM, 2016, Special Theme: Cybersecurity, pp.42-43. 〈http://ercim-news.ercim.eu/en106/special/challenges-in-android-malware-analysis〉. 〈hal-01355122〉
  • Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong. Information Flow Policies vs Malware -- Final Battle --. Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2014, 9 (2), pp.72-82. 〈hal-01062313〉
  • Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong, Yves Le Traon. User Data Confidentiality in an Orchestration of Web Services. International Journal of Information Assurance and Security, 2012, 7, pp.32-40. 〈hal-00735996〉
  • Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Ludovic Mé. User Data on Androïd Smartphone Must be Protected. ERCIM News, ERCIM, 2012, pp.Page 18. 〈hal-00735993〉
  • Mathieu Jaume, Valérie Viet Triem Tong, Guillaume Hiet. Spécification et mécanisme de détection de flots d'information illégaux. Technique et Science Informatiques, Hermès-Lavoisier, 2012, 31 (6), pp.713-742. 〈10.3166/tsi.31.713-742〉. 〈hal-00761351〉
  • Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, et al.. Liability issues in software engineering: the use of formal methods to reduce legal uncertainties. Communications- ACM, Association for Computing Machinery, 2011, 54 (4), pp.99-106. 〈10.1145/1924421.1924444〉. 〈hal-00656921〉
  • Valérie Viet Triem Tong, Andrew Clark, Ludovic Mé. Specifying and enforcing a fine-grained information flow policy : model and experiments. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 2010, 1 (1), pp.56-71. 〈hal-00516672〉
  • Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin. Policy-based intrusion detection in web applications by monitoring Java information flows. International Journal of Information and Computer Security, Inderscience, 2009, Vol.3 (N°3/4), 15 p. 〈hal-00448139〉

Communication dans un congrès51 documents

  • Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong. Etat de l'Art des Techniques d'Unpacking pour les Applications Android. RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2018, Nancy / La Bresse, France. pp.1-3, 2018. 〈hal-01794252〉
  • Jean-François Lalande, Valérie Viet Triem Tong. Le projet CominLabs Kharon: aidons les malwares à s'exécuter. RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2018, Nancy / La Bresse, France. 2018. 〈hal-01794223v2〉
  • Jean-François Lalande, Valérie Viêt Triem Tong, Mourad Leslous, Pierre Graux. Challenges for Reliable and Large Scale Evaluation of Android Malware Analysis. SHPCS 2018 - International Workshop on Security and High Performance Computing Systems, Jul 2018, Orléans, France. IEEE Computer Society, pp.1-3. 〈hal-01844312〉
  • Guillaume Fournier, Paul Audren de Kerdrel, Pascal Cotret, Valérie Viet Triem Tong. DroneJack: Kiss your drones goodbye!. SSTIC 2017 - Symposium sur la sécurité des technologies de l'information et des communications, Jun 2017, Rennes, France. pp.1-8. 〈hal-01635125〉
  • Valérie Viet Triem Tong, Aurélien Trulla, Mourad Leslous, Jean-François Lalande. Information flows at OS level unmask sophisticated Android malware. 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. SciTePress, 6, pp.578-585, 2017, 〈http://www.secrypt.icete.org/〉. 〈10.5220/0006476705780585〉. 〈hal-01535678〉
  • Mourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet. GPFinder: Tracking the Invisible in Android Malware. 12th International Conference on Malicious and Unwanted Software, Oct 2017, Fajardo, Puerto Rico. IEEE Conputer Society, 12th International Conference on Malicious and Unwanted Software, pp.39-46, 2017, 〈10.1109/MALWARE.2017.8323955〉. 〈hal-01584989〉
  • Laurent Georget, Mathieu Jaume, Guillaume Piolle, Frédéric Tronel, Valérie Viet Triem Tong. Suivi de flux d'information correct sous Linux. Akram Idani; Nikolai Kosmatov. 16èmes journées AFADL (Approches formelles dans l'assistance au développement de logiciels), Jun 2017, Montpellier, France. Actes des 16èmes journées AFADL (Approches formelles dans l'assistance au développement de logiciels), pp.19-26, 2017, 〈http://afadl2017.imag.fr/〉. 〈hal-01535937〉
  • Laurent Georget, Mathieu Jaume, Guillaume Piolle, Frédéric Tronel, Valérie Viet Triem Tong. Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory. Alessandro Cimatti; Marjan Sirjani. 15th International Conference on Software Engineering and Formal Methods (SEFM 2017), Sep 2017, Trento, Italy. Springer International Publishing, Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM 2017), pp.1-16, 2017, LNCS. 〈http://sefm17.fbk.eu/〉. 〈10.1007/978-3-319-66197-1_1〉. 〈hal-01535949〉
  • Laurent Georget, Mathieu Jaume, Guillaume Piolle, Frédéric Tronel, Valérie Viet Triem Tong. Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux. 5th International FME Workshop on Formal Methods in Software Engineering, May 2017, Buenos Aires, Argentina. IEEE Press, pp.10-16, 2017, 〈http://www.formalise.org/〉. 〈10.1109/FormaliSE.2017.1〉. 〈hal-01535862〉
  • Guillaume Brogi, Valérie Viet Triem Tong. Sharing and replaying attack scenarios with Moirai. RESSI 2017: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2017, Autrans, France. 〈hal-01533275〉
  • Nicolas Kiss, Jean-François Lalande, Mourad Leslous, Valérie Viet Triem Tong. Kharon dataset: Android malware under a microscope. The Learning from Authoritative Security Experiment Results (LASER) workshop, May 2016, San Jose, United States. USENIX Association, Proceedings of the Learning from Authoritative Security Experiment Results (LASER) 2016, pp.1-12. 〈hal-01311917〉
  • Guillaume Brogi, Valérie Viet Triem Tong. TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking. 8th IFIP International Conference on New Technologies, Mobility and Security, Nov 2016, Larnaca Cyprus. 2016, 〈http://www.ntms-conf.org/ntms2016/〉. 〈hal-01417612〉
  • Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong. Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings. Christian Damsgaard Jensen; Stephen Marsh; Theo Dimitrakos; Yuko Murayama. 9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. IFIP Advances in Information and Communication Technology, AICT-454, pp.92-108, 2015, Trust Management IX. 〈10.1007/978-3-319-18491-3_7〉. 〈hal-01416211〉
  • Laurent Georget, Frédéric Tronel, Valérie Viet Triem Tong. Kayrebt: An Activity Diagram Extraction and Visualization Toolset Designed for the Linux Codebase. 3rd IEEE Working Conference on Software Visualization - VISSOFT 2015, Sep 2015, Bremen, Germany. 2015, Proceedings of the 3rd IEEE Working Conference on Software Visualization (VISSOFT 2015). 〈https://www.lgeorget.eu/code-panel/images/kayrebt_viewer_VISSOFT2015.pdf〉. 〈hal-01213233〉
  • Radoniaina Andriatsimandefitra Ratsisahanana, Thomas Genet, Laurent Guillo, Jean-François Lalande, David Pichardie, et al.. Kharon : Découvrir, comprendre et reconnaître des malware Android par suivi de flux d'information. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2015, Troyes, France. 〈hal-01154368〉
  • Adrien Abraham, Radoniaina Andriatsimandefitra, Adrien Brunelat, Jean-François Lalande, Valérie Viet Triem Tong. GroddDroid: a Gorilla for Triggering Malicious Behaviors. 10th International Conference on Malicious and Unwanted Software, Oct 2015, Fajardo, Puerto Rico. IEEE Computer Society, pp.119-127, 2015, 〈10.1109/MALWARE.2015.7413692〉. 〈hal-01201743v2〉
  • Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong. Detection and Identification of Android Malware Based on Information Flow Monitoring. The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), Nov 2015, New York, United States. The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), 2015, 〈http://csis.pace.edu/CSCloud/〉. 〈hal-01191595〉
  • Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viêt Triem Tong. Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings. IFIP WG 11.1 International Conference on Trust Management, May 2015, Hambourg, Germany. Proceedings of the International Conference on Trust Management, 2015. 〈hal-01131975v2〉
  • Laurent Georget, Guillaume Piolle, Frédéric Tronel, Valérie Viet Triem Tong, Mathieu Jaume. Towards a Formal Semantics for System Calls in terms of Information Flow. Tenth International Conference on Systems (ICONS 2015), Apr 2015, Barcelone, Spain. IARIA, pp.1-4, 2015, 〈http://thinkmind.org/index.php?view=article&articleid=icons_2015_1_10_40005〉. 〈hal-01149471〉
  • Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong. Mécanisme de réputation distribué préservant la vie privée avec témoignages négatifs. ALGOTEL 2015 - 17èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2015, Beaune, France. 〈hal-01148072〉
  • Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong. Capturing Android Malware Behaviour using System Flow Graph. NSS 2014 - The 8th International Conference on Network and System Security, Oct 2014, Xi'an, China. 2014. 〈hal-01018611〉
  • Stéphane Geller, Valérie Viet Triem Tong, Ludovic Mé. BSPL: A Language to Specify and Compose Fine-grained Information Flow Policies. SECUREWARE - 7th International Conference on Emerging Security Information, Systems and Technologies - 2013, 2013, Barcelona, Spain. 2013. 〈hal-00909400〉
  • Radoniaina Andriatsimandefitra, Thomas Saliou, Valérie Viet Triem Tong. Information Flow Policies vs Malware. IAS - Information assurance and security - 2013, 2013, Yassmine Hammamet, Tunisia. 2013. 〈hal-00909406〉
  • Emmanuelle Anceaume, Gilles Guette, Paul Lajoie-Mazenc, Nicolas Prigent, Valérie Viet Triem Tong. A Privacy Preserving Distributed Reputation Mechanism. International Conference on communications (ICC), Jun 2013, Budapest, France. 6 p., 2013. 〈hal-00763212v3〉
  • Mathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Ludovic Mé. Secure states versus Secure executions: From access control to flow control. ICISS 2013 - 9th International Conference on Information Systems Security, Dec 2013, Calcutta, India. Springer, 8303, pp.148-162, 2013, Lecture Notes in Computer Science. 〈10.1007/978-3-642-45204-8_11〉. 〈hal-01083384〉
  • Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Ludovic Mé. Diagnosing intrusions in Android operating system using system flow graph. Workshop Interdisciplinaire sur la Sécurité Globale, Jan 2013, Troyes, France. 2013. 〈hal-00875211〉
  • Radoniaina Andriatsimandefitra, Stéphane Geller, Valérie Viet Triem Tong. Designing information flow policies for Android's operating system. IEEE ICC 2012, Jun 2012, Ottawa, Canada. 2012. 〈hal-00736034〉
  • Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong. User Defined Control Flow Policy for Web Service Orchestration. C&ESAR 2012, Nov 2012, Rennes, France. pp.NC, 2012. 〈hal-00761354〉
  • Valérie Viet Triem Tong, Radoniaina Andriatsimandefitra, Stéphane Geller, Simon Boche, Frédéric Tronel, et al.. Mise en œuvre de politiques de protection des flux d'information dans l'environnement Android. Computer & Electronics Security Applications Rendez-vous (C&ESAR 2011), Nov 2011, Rennes, France. 〈hal-00656933〉
  • Emmanuelle Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel Hurfin, et al.. From SSIR to CIDre: a New Security Research Group in Rennes. 1st SysSec Workshop, Jul 2011, Amsterdam, Netherlands. 〈hal-00656940〉
  • Stéphane Geller, Christophe Hauser, Frédéric Tronel, Valérie Viet Triem Tong. Information Flow Control for Intrusion Detection derived from MAC Policy. 2011 IEEE International Conference on Communications (ICC), Jun 2011, Kyoto, Japan. 6 p., 2011, 〈10.1109/icc.2011.5962660〉. 〈hal-00647116〉
  • Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé. Flow based interpretation of access control: Detection of illegal information flows. 7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. Springer, 7093, pp.72-86, 2011, Lecture Notes in Computer Science. 〈10.1007/978-3-642-25560-1_5〉. 〈hal-00647170〉
  • Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong, Yves Le Traon. Preventing data leakage in service orchestration. IAS 2011, Dec 2011, Malacca, Malaysia. 6 p., 2011, 〈10.1109/ISIAS.2011.6122806〉. 〈hal-00657796〉
  • Thomas Demongeot, Eric Totel, Valérie Viet Triem Tong, Yves Le Traon. Protection des données utilisateurs dans une orchestration de Web-Services. SARSSI 2010, May 2010, Menton, France. pp.NC, 2010. 〈hal-00536660〉
  • Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé. Contrôle d'accès versus Contrôle de flots. LISI/ENSMA. 10emes Journées Francophones sur les Approches Formelles dans l'Assistance au développement des logiciels, AFADL 2010, Jun 2010, Poitiers, France. pp.27-41, 2010. 〈hal-00593990〉
  • Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, et al.. Liability in Software Engineering Overview of the LISE Approach and Illustration on a Case Study. ACM/IEEE 32nd International Conf. on Software Engineering (ICSE 2010), May 2010, Cape Town, South Africa. pp.135--144, 2010, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1, ICSE 2010. 〈http://doi.acm.org/10.1145/1806799.1806823〉. 〈10.1145/1806799.1806823〉. 〈inria-00472287v3〉
  • François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. An Efficient Distributed PKI for Structured P2P Networks. 9th IEEE International Conference on Peer-to-Peer Computing (P2P), Sep 2009, Seattle, United States. IEEE Computer Society, 10 p., 2009. 〈hal-00423320〉
  • Mehdi Talbi, Valérie Viet Triem Tong, Adel Bouhoula. Specification of Anonymity as a Secrecy Property in the ADM Logic – Homomorphic-based Voting Protocols. International Conference on Availability, Reliability and Security, Mar 2009, Fukuoka, Japan. 2009. 〈hal-00349878〉
  • François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification. 4th International Workshop on Collaborative Peer-to-Peer Systems (COPS) 2008, Jun 2008, Rome, Italy. 2008. 〈hal-00287700〉
  • François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. A Sybilproof Distributed Identity Management for P2P Networks. 13th IEEE Symposium on Computers and Communications (ISCC), Jul 2008, Marrakesch, Morocco. 2008. 〈hal-00287706〉
  • François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. A distributed certification system for structured P2P networks. 2nd International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2008, Bremen, Germany. Springer (LNCS), pp.40-52, 2008. 〈hal-00287656〉
  • François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. Detecting and Excluding Misbehaving Nodes in a P2P Network. 8th International Conference on Innovative Internet Community Systems (I2CS), Jun 2008, Martinique. 2008. 〈hal-00353016〉
  • Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin. Policy-Based Intrusion Detection in Web Applications by Monitoring Java Information Flows. CRiSIS 2008, Oct 2008, Tozeur, Tunisia. 8 p., 2008. 〈hal-00353000〉
  • Mehdi Talbi, Benjamin Morin, Valérie Viet Triem Tong, Adel Bouhoula, Mohammed Mejri. Specification of Electronic Voting Protocol Properties Using ADM Logic : FOO Case Study. ICICS 08, Oct 2008, Birmingham, United Kingdom. 2008. 〈hal-00349880〉
  • Mehdi Talbi, Benjamin Morin, Valérie Viet Triem Tong, Adel Bouhoula, Mohammed Mejri. Spécification Formelle des propriétés des Protocoles de Vote au moyen de la Logique ADM. Conférence sur la sécurité des Architectures Réseaux et des Systèmes d'Information, Oct 2008, Loctudy, France. 2008. 〈hal-00349883〉
  • Valérie Viet Triem Tong, Hervé Sibert, Jérémy Lecoeur, Marc Girault. Biometric fuzzy extractors made practical: a proposal based on FingerCodes. International conference on Biometrics, Aug 2007, Seoul, South Korea. 4642, pp.604-613, 2007, Lecture Notes in Computer Science. 〈10.1007/978-3-540-74549-5〉. 〈hal-00175353〉
  • Guillaume Hiet, Ludovic Mé, Benjamin Morin, Valérie Viet Triem Tong. Monitoring both OS and program level information flows to detect intrusions against network servers. IEEE Workshop on Monitoring, Attack Detection and Mitigation, Nov 2007, Toulouse, France. 2007. 〈hal-00268408〉
  • François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. Contrôle d'accès distribué à un réseau pair-à-pair. Sixth Conference on Security and Network Architectures (SARSSI), Jun 2007, France. 2007. 〈hal-00268415〉
  • Guillaume Hiet, Ludovic Mé, Jacob Zimmermann, Christophe Bidan, Benjamin Morin, et al.. Détection fiable et pertinente de flux d'information illégaux. Sixth Conference on Security and Network Architectures (SARSSI), Jun 2007, France. 2007. 〈hal-00268422〉
  • François Lesueur, Ludovic Mé, Valérie Viet Triem Tong. Gestion distribuée d'identités résistante à la Sybil attack pour un réseau pair-à-pair. Sixth Conference on Security and Network Architectures (SARSSI), Jun 2007, France. 2007. 〈hal-00268419〉
  • Valérie Viet Triem Tong, Hervé Sibert, Jérémy Lecoeur, Marc Girault. FingerKey, un cryptosystème biométrique pour l'authentification. Conférence sur la Sécurité et Architectures Réseaux, Jun 2007, annecy, France. 2007. 〈hal-00156447〉

Poster3 documents

  • Mourad Leslous, Jean-François Lalande, Valérie Viet Triem Tong. Using Implicit Calls to Improve Malware Dynamic Execution. 37th IEEE Symposium on Security and Privacy, May 2016, San Jose, United States. 〈hal-01304326〉
  • Adrien Abraham, Radoniaina Andriatsimandefitra Ratsisahanana, Nicolas Kiss, Jean-François Lalande, Valérie Viet Triem Tong. Towards Automatic Triggering of Android Malware. 12th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Jul 2015, Milano, Italy. 〈hal-01168354〉
  • Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong. Highlighting Easily How Malicious Applications Corrupt Android Devices. Research in Attacks, Intrusions, and Defenses, Sep 2014, Gothenburg, Sweden. Research in Attacks, Intrusions, and Defenses, 2014. 〈hal-01083376〉

Chapitre d'ouvrage1 document

  • Emmanuelle Anceaume, Gilles Guette, Paul Lajoie-Mazenc, Thomas Sirvent, Valérie Viet Triem Tong. Extending Signatures of Reputation. Hansen, M.; Hoepman, J.-H.; Leenes, R.; Whitehouse, D. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.165-176, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. 〈10.1007/978-3-642-55137-6_13〉. 〈hal-00997133〉

Autre publication1 document

  • Laurent George, Valérie Viet Triem Tong, Ludovic Mé. Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. Poster and short paper. 2009. 〈hal-00420117〉

Pré-publication, Document de travail1 document

  • Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong. Efficient Distributed Privacy-Preserving Reputation Mechanism Handling Non-Monotonic Ratings. 2015. 〈hal-01104837v2〉

Rapport6 documents

  • Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Thomas Saliou. Information Flow Policies vs Malware. [Technical Report] 2013. 〈hal-00862468〉
  • Valérie Viet Triem Tong, Christophe Bidan, Ludovic Mé, Christopher Humphries, Guillaume Piolle. Analyse de logs guidée par des vérifications de formules de responsabilité exprimées en CTL. [Rapport de recherche] D4.1, Supélec. 2011. 〈hal-01172702〉
  • Christophe Alleaune, Valérie-Laure Benabou, Denis Beras, Christophe Bidan, Nicolas Craipeau, et al.. Liability in Software Engineering: Overview of the LISE Approach and Illustration on a Case Study. [Research Report] RR-7148, INRIA. 2009, pp.23. 〈inria-00440437〉
  • Guillaume Feuillade, Thomas Genet, Valérie Viet Triem Tong. Reachability Analysis over Term Rewriting Systems. [Research Report] RR-4970, INRIA. 2003. 〈inria-00071609〉
  • Thomas Genet, Valérie Viet Triem Tong. Proving Negative Conjectures on Equational Theories using Induction and Abstract Interpretation. [Research Report] RR-4576, INRIA. 2002. 〈inria-00072012〉
  • Thomas Genet, Valérie Viet Triem Tong. Reachability Analysis of Term Rewriting Systems with Timbuk. [Research Report] RR-4266, INRIA. 2001. 〈inria-00072321〉

HDR1 document

  • Valérie Viet Triem Tong. Apport du suivi de flux d'information pour la sécurité des systèmes. Cryptographie et sécurité [cs.CR]. Université Rennes 1, 2015. 〈tel-01342243〉