Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Rilling, Louis"'
Modular deductive verification is a powerful technique capable to show that each function in a program satisfies its contract. However, function contracts do not provide a global view of which high-level (e.g. security-related properties of a whole s
Externí odkaz:
http://arxiv.org/abs/1811.10509
Thèse doctorat : Informatique : Rennes 1 : 2005.
Bibliogr. p. 153-164.
Bibliogr. p. 153-164.
Publikováno v:
Proceedings of the 28th Computer & Electronics Security Application Rendezvous
Proceedings of the 28th Computer & Electronics Security Application Rendezvous, Nov 2021, Rennes, France
C&ESAR 2021-28th Computer & Electronics Security Application Rendezvous
C&ESAR 2021-28th Computer & Electronics Security Application Rendezvous, Nov 2021, Rennes, France. pp.1-19
Proceedings of the 28th Computer & Electronics Security Application Rendezvous, Nov 2021, Rennes, France
C&ESAR 2021-28th Computer & Electronics Security Application Rendezvous
C&ESAR 2021-28th Computer & Electronics Security Application Rendezvous, Nov 2021, Rennes, France. pp.1-19
International audience; Exhaustively listing the software and hardware components of an information system is non-trivial. This makes it even harder to analyze the risk created by a vulnerability disclosure in the context of a specific information sy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::c02e61180273d7551f029c49c6fb5fa7
https://hal.inria.fr/hal-03515662/file/2021-cesar_3758460.pdf
https://hal.inria.fr/hal-03515662/file/2021-cesar_3758460.pdf
Publikováno v:
FormaliSE 2021-9th International Conference on Formal Methods in Software Engineering
FormaliSE 2021-9th International Conference on Formal Methods in Software Engineering, IEEE TCSE; SIGSOFT, May 2021, Online conference, France
FormaliSE 2021-9th International Conference on Formal Methods in Software Engineering, IEEE TCSE; SIGSOFT, May 2021, Online conference, France
International audience; Specification and formal verification of high-level properties (such as security properties, like data integrity or confidentiality) over a large software product remains an important challenge for the industrial practice. Rec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______212::9409e43335345a11a556fcf97ca8fd9f
https://hal-cea.archives-ouvertes.fr/cea-03179670
https://hal-cea.archives-ouvertes.fr/cea-03179670
Publikováno v:
[Research Report] RR-9299, Inria Rennes-Bretagne Atlantique. 2019, pp.1-22
Common Vulnerabilities and Exposures (CVE) databases such as Mitre’s CVE List and NIST’s NVD database identify every disclosed vulnerability affecting any public software. However, during the early hours of a vulnerability disclosure, the metadat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::4253427e7f009e88337ffd6ef4da3471
https://inria.hal.science/hal-02362062/file/automated_keyword_extration_from_one_day_vulnerabilities_at_disclosure.pdf
https://inria.hal.science/hal-02362062/file/automated_keyword_extration_from_one_day_vulnerabilities_at_disclosure.pdf
Publikováno v:
RESSI 2019-Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information
RESSI 2019-Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Aug 2019, Erquy, France. pp.1-3
RESSI 2019-Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Aug 2019, Erquy, France. pp.1-3
National audience; Common Vulnerabilities and Exposures (CVE) databases such as Mitre’s CVE List and NIST’s NVD database identify every disclosed vulnerability affecting any public software. However, during the early hours of a vulnerability disc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::a336251dce02a8023a09308272ab700e
https://hal.inria.fr/hal-02267192
https://hal.inria.fr/hal-02267192
Publikováno v:
[Research Report] RR-9263, Inria Rennes Bretagne Atlantique. 2019, pp.1-37
In an IaaS cloud the physical infrastructure is controlled by service providers,including its security monitoring aspect. Clients hosting their information system need to trustand rely on what the providers claim. At the same time providers try to gi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::431d93212699b2f276d60451c088087b
https://hal.inria.fr/hal-02079860v2/file/RR-9263.pdf
https://hal.inria.fr/hal-02079860v2/file/RR-9263.pdf
Publikováno v:
ACM International Conference Proceeding Series; 8/25/2020, p1-10, 10p
Publikováno v:
ComPas'18-Conférence d’informatique en Parallélisme, Architecture et Système
ComPas'18-Conférence d’informatique en Parallélisme, Architecture et Système, Jul 2018, Toulouse, France. pp.1-7
ComPas'18-Conférence d’informatique en Parallélisme, Architecture et Système, Jul 2018, Toulouse, France. pp.1-7
National audience; Le cloud computing a permis le passage d'un paradigme d'obligation de moyen à celui d'obligation de résultat, mais cette transition montre ses limites dans le domaine de la sécurité. En effet, la sécurité effective d'un syst
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::1250c9cb490fcd9e087ff646a5b02b19
https://inria.hal.science/hal-01816674
https://inria.hal.science/hal-01816674
Autor:
Rilling, Louis, Morin, Christine
Publikováno v:
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des systèmes d'information (RESSI 2016)
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des systèmes d'information (RESSI 2016), LAAS-CNRS, INSA Toulouse, May 2016, Toulouse, France
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des systèmes d'information (RESSI 2016), LAAS-CNRS, INSA Toulouse, May 2016, Toulouse, France
National audience; Nous présentons dans cette communication le projet INDIC, une collaboration entre Inria et DGA Maîtrise de l'Information pour étudier la configuration automatique et l'adaptation dynamique de la supervision de sécurité pour le
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::e58571a1c6af444fa7ab286fff53a0b4
https://inria.hal.science/hal-01403774/document
https://inria.hal.science/hal-01403774/document