Publications & Conferences

Resilient critical infrastructures for Factory 4.0

Conferences
Publications

Cryptography

Conferences
Publications
  • MPHELL: Multi-Precision (Hyper) ELliptic curve Library, The MPHELL Team, Univ. Grenoble Alpes, Institut Fourier. 2019-2020
  • Mathieu Dutour Sikiric, Philippe Elbaz-Vincent, Alexander Kupers, Jacques Martinet. VORONOI COMPLEXES IN HIGHER DIMENSIONS, COHOMOLOGY OF GLN(Z) FOR N?8 AND THE TRIVIALITY OF K8(Z). 2019
  • Jean-Guillaume Dumas, Erich L. Kaltofen, Clément Pernet & David Lucas, Elimination-based certificates for triangular equivalence and rank profiles ,
    Journal of Symbolic Computation. 25 pages, in press., July 2019
  • Jean-Guillaume Dumas, Pascal Lafourcade, Francis Melemedjian, Jean-Baptiste Orfila & Pascal Thoniel, LocalPKI: An Interoperable and IoT Friendly PKI,
    Communications in Computer and Information Science. Volume 990, pages 224--252, Feb 2019
  • Jean-Guillaume Dumas, Pascal Lafourcade, Julio Ernesto López Fenner, David Lucas, Jean-Baptiste Orfila, Clément Pernet & Maxime Puys, Secure Multi-Party Matrix Multiplication Based on Strassen-Winograd Algorithm,
    Lecture Notes in Computer Science, Advances in Information and Computer Security, Volume 11689, pages 67--88, Springer 2019
  • Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Atsuki Nagao, Tatsuya Sasaki & Hideaki Sone, Interactive Physical Zero-Knowledge Proof for Norinori,
    Lecture Notes in Computer Science, Volume 11653, pages 166--177, Springer 2019
  • Serge Fehr, Pierre Karpman, Bart Mennink, Short Non-Malleable Codes from Related-Key Secure Block Ciphers,
    IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2018, pp.336-352.
  • Jean-Guillaume Dumas, Pascal Lafourcade, Ariane Tichit and Sébastien Varrette, Les blockchains en 50 questions,
    Dunod, 304 pages, September 2018.
  • Jean-Guillaume Dumas, Jean-Louis Roch, Éric Tannier and Sébastien Varrette, Théorie des codes : Compression, Cryptage, Correction,
    Dunod, 415 pages, 3e édition, June 2018.
  • Jean-Guillaume Dumas, Pascal Lafourcade, Julio López Fenner, David Lucas, Jean-Baptiste Orfila, Clément Pernet and Maxime Puys, Secure Multi-Party Matrix Multiplication Based on Strassen-Winograd Algorithm,
    Rapport de Recherche IMAG, April 2018

Cost-effective IoT/Hardware protections

Conferences
  • Amir Alipour, Athanasios Papadimitriou, Vincent Beroulle, Ehsan Aerabi and David Hely “On The Performance Of Non-Profiled Differential Deep Learning Attacks Against An Aes Encryption Algorithm Protected Using A Correlated Noise Hiding Countermeasure"
    Design Automation & Test in Europe (DATE), 2020
  • Cyril Bresch, David Hély and Roman Lysecky, “Backflow: Backward Edge Control Flow Enforcement For Low End Arm Microcontrollers”,
    Design Automation & Test in Europe (DATE), 2020
  • J. Marconot, D. Hely, and F. Pebay-Peyroula, “SPN-DPUF: Substitution-Permutation Network Based Secure Circuit for Digital PUF",
    IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2019
  • C. Bresch, D. Hély, S. Chollet, and I. Parissis, “TrustFlow: A Trusted Memory Support for Data Flow Integrity"
    IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2019
  • P.Maistri, A Comprehensive Approach to a Trusted Test Infrastructure
    4th International Verification and Security Workshop, July 1-3, 2019
  • E. Aerabi, A. Papadimitriou, and D. Hely, “On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations,”
    25th International Symposium on On-Line Testing and Robust System Design (IOLTSD), Jul 2019
  • A. Sensaoui, D. Hely and O. Aktouf, "Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices,"
    2019 15th European Dependable Computing Conference (EDCC)
  • M. Mohammadinodoushan, B. Cambou, C. Philabaum, D. Hely and D. D. Booher, "Implementation of Password Management System Using Ternary Addressable PUF Generator,"
    2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)
  • Souhir Gabsi, Vincent Beroulle, Hamdi Bilgacem, Mohsen Machhout. Architectural Choices for Implementing a Secure ECC-based Lightweight RFID Tag
    2019 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS), Apr 2019, Gammarth-Tunis, Tunisia. pp.1-5
  • Arash Nejat, Zahra Kazemi, Vincent Beroulle, David Hély, Mahdi Fazeli. Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection
    2019 IEEE 4th International Verification and Security Workshop (IVSW), Jul 2019, Rhodes Island, Greece. pp.49-54
  • Baptiste Pestourie, Vincent Beroulle, Nicolas Fourty. Security Evaluation with an Indoor UWB Localization Open Platform: Acknowledgment Attack Case Study
    2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Sep 2019, Istanbul, Turkey. pp.1-7
  • Z. Kazemi, A. Papadimitriou, D. Hély, M. Fazeli, et V. Beroulle, “On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks,”
    2019 IEEE 4th International Verification and Security Workshop (IVSW)
  •  
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula, Athanasios Papadimitriou. Cross-layer analysis of software fault models and countermeasures against hardware fault attacks in a RISC-V processor
    Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2019, 71, pp.102862
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula. Fault Injection on Hidden Registers in a RISC-V Rocket Processor and Software Countermeasures
    Design, Automation & Test in Europe Conference & Exhibition (DATE), Mar 2019, Florence, Italy. pp.252-255, 2019
  • Baptiste Pestourie, Vincent Beroulle, Nicolas Fourty, Guidelines for the Choice of a Wireless Secure Positioning and Communication System,
    International Workshop on Secure Internet of Things (SIoT), September 6 2018
  • Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Stephan De Castro, Faber Louis-Barthelemy, et al., Laser fault injection at the CMOS 28 nm technology node: an analysis of the fault model,
    14th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), September 2018, Amsterdam, Netherlands.
  • Yassine Naija, Vincent Beroulle, Mohsen Machhout, ElectroMagnetic Attack Test Platform for Validating RFID Tag Architectures,
    Eurasip RFID 2018, Brno, Czech Republic, September 11-12, 2018
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula and Athanasios Papadimitriou, On the Importance of Analysing Microarchitecture for Accurate Software Fault Models,
    Euromicro DSD/SEAA 2018, August 29 – 31, 2018 Prague (Czech Republic)
  • Cyril Bresch, Stéphanie Chollet, David Hély, Towards an Inherently Secure Run-Time Environment for Medical Devices,
    in 2018 IEEE International Congress on Internet of Things (ICIOT), July 2018, p. 140–147
  • Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Louis-Barthelemy Faber, Marie-Lise Flottes et al., The case of using CMOS FD-SOI rather than CMOS bulk to harden ICs against laser attacks,
    IOLTS: International Symposium on On-Line Testing and Robust System Design, Jul 2018, Platja d’Aro, Spain.
  • Zahra Kazemi, Athanasios Papadimitriou, David Hély, Mahdi Fazcli, Vincent Beroulle, Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoT,
    in 2018 IEEE 3rd International Verification and Security Workshop (IVSW), July 2018, p. 87-92
  • Mosabbah Mushir Ahmed, David Hely, Etienne Perret, Nicolas Barbot, Romain Siragusa, Maxime Bernier, Fredric Garet, Authentication of Microcontroller Board Using Non-Invasive EM Emission Technique,
    in 2018 IEEE 3rd International Verification and Security Workshop (IVSW), July 2018, p. 25-3
  • Aymane Bouzafour, Marc Renaudin, Hubert Garavel, Radu Mateescu, Wendelin Serwe, Model-checking Synthesizable SystemVerilog Descriptions of Asynchronous Circuits,
    ASYNC'18 - 24th IEEE International Symposium on Asynchronous Circuits and Systems, May 2018, Vienne, Austria
  • Olivier Alphand, Michele Amoretti, Timothy Claeys, Simone Dall 'Asta, Andrzej Duda, Gianluigi Ferrari, Franck Rousseau, Bernard Tourancheau, Luca Veltri, Francesco Zanichelli, IoTChain: A Blockchain Security Architecture for the Internet of Things,
    IEEE Wireless Communications and Networking Conference, Apr 2018, Barcelona, Spain
  • Rahma Ben Fraj, Vincent Beroulle, Nicolas Fourty , Aref Meddeb, An approach to enhance the safety and security of EPC Class-1 generation-2 UHF RFID systems,
    2018 2nd International Conference on Inventive Systems and Control (ICISC), 19-20 Jan. 2018, Coimbatore, India INSPEC Accession Number: 17894327 , DOI: 10.1109/ICISC.2018.8398977
  • Timothy Claeys, Franck Rousseau, Bernard Tourancheau, Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment,
    International Workshop on Secure Internet of Things (SIOT), Sep 2017, Oslo, Norway
Publications
  • Amir Alipour, David Hely, Vincent Beroulle, and Giorgio Di Natale; Power of Prediction: Advantages of Deep Learning Modeling as Replacement for Traditional PUF CRP Enrollment
    Trudevice 2020, forthcoming Mar 2020
  • Zahra Kazemi, Cyril Bresch, Mahdi Fazeli, David Hely, and Vincent Beroulle; A Systematic Approach for Hardware Security Assessment of Secured IoT Applications
    Trudevice 2020, forthcoming Mar 2020
  • Ezinam Bertrand Talaki, Mathieu Bouvier Des Noes, Olivier Savry, and David Hely; Side-channel Leakage Assessment On RISC-V Architecture
    Trudevice 2020, forthcoming Mar 2020
  • CONFISCA : SIMD-based CONcurrent FI and SCA countermeasure with switchable performance and security modes
    IEEE Embedded system Letters, forthcoming 2020
  • SecPump: A Connected Open Source Infusion Pump for Security Purposes
    IEEE Embedded system Letters, forthcoming 2020
  • TrustFlow-X: A Practical Framework for Fine-Grained Data Flow Integrity in Critical Systems
    ACM Transactions on Embedded Computing Systems (TECS) (submitted)
  • "Conception and Evaluation of Secure Circuits for Strong Digital PUF"
    IEEE Transactions on Computers (submitted)
  • Aerabi, Milad Bohlouli, MohammadHasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, David Hely, « Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs »
    ACM Transactions on Embedded Computing Systems, Feb 2020
  • D. Hely, P. Flikkema and B. Cambou; “Physical Unclonable Function-Based On-Chip Data Integrity”
    Patent, submitted Jun 2019
  • D. Hely, and B. Cambou; “Secure Enrollment for PUFs”;
    Patent, submitted Jun 2019
  • Mosabbah Mushir Ahmed, David Hély, Etienne Perret and Romain Siragusa, “Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions"
    Journal of Hardware and Systems Security
  • A. Sensaoui, O.-E.-K. Aktouf, D. Hely, and S. Di Vito, “An In-depth Study of MPU-Based Isolation Techniques,”
    Journal of Hardware and Systems Security, Nov. 2019. 3: 365. https://doi.org/10.1007/s41635-019-00078-6
  • Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Stephan De Castro, Louis-Barthelemy Faber et al., Sensitivity to Laser Fault Injection: CMOS FD-SOI vs. CMOS bulk,
    IEEE Transactions on Device and Materials Reliability, Institute of Electrical and Electronics Engineers, 2018, DOI:10.1109/TDMR.2018.288646
  • Yassine Naija, Vincent Beroulle, Mohsen Machhout, Security Enhancements of a Mutual Authentication Protocol used in a HF Full-Fledged RFID Tag,
    Journal of Electronic Testing: Theory and Applications, June 2018, Volume 34, Issue 3, pp 291–304
  • Arash Nejat, David Hely and Vincent Beroulle, ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods,
    Journal of Hardware and Systems Security, March 2018, Volume 2, Issue 1, pp 83–96, DOI 10.1007/s41635-018-0033-6
  • Ahmed, M., Hely, D., Perret, E. et al. Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions
    Journal of Hardware Systems and Security (2019). DOI 10.1007/s41635-019-00072-y
  • E.Aerabi, A.Papadimitriou, D.Hely, On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations,
    25th IEEE International Symposium on On-Line Testing and Robust System Design, July 1-3, 2019
  • Zahra Kazemi, Athanasios Papadimitriou, Ehsan Aerabi, Mosabbah Mushir Ahmed, David Hely and Vincent Beroulle, A low Cost and Practical Framework for Security Assessment of the Cyber-Physical Systems,
    4th International Verification and Security Workshop (IVSW) July 1-3, 2019
  • Arash Nejat, Zahra Kazemi, Vincent Beroulle, David Hely (Univ. Grenoble Alpes France), and Mahdi Fazeli (Iran Univ. of Science and Technology, Iran), Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection,
    4th International Verification and Security Workshop (IVSW), July 1-3, 2019
  • Cyril Bresch, David Hely and Stephanie Chollet, TrustFlow: A Trusted Memory Support for Data Flow Integrity IEEE Computer Society Annual Symposium on VLSI, Miami, Florida, U.S.A., July 15-17, 2019
  • Johan Marconot, David Hely and Florian Pebay-Peyroula, SPN-DPUF: Substitution-Permutation Network based Secure Circuit for Digital PUF,
    IEEE Computer Society Annual Symposium on VLSI, Miami, Florida, U.S.A., July 15-17, 2019
  • Abderrahmane Sensaoui, David Hely and Oum-El-Kheir Aktouf, Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices,
    15th European Dependable Computing Conference,17-20 September 2019

Cybersecurity and AI

Conferences
  • Ramtine Tofighi-Shirazi, Irina Mariuca Asavoae, Philippe Elbaz-Vincent, Thanh-Ha Le. Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis.
    3rd International Workshop on Software PROtection, Nov 2019, London, United Kingdom.
  • Ludovic Darmet, Kai Wang, François Cayre. Weakly Supervised Adaptation to Re-sizing for Image Manipulation Detection on Small Patches
    18th International Workshop on Digital-forensics and Watermarking, Nov 2019, Chengdu, China.
  • Weize Quan, Kai Wang, Dong-Ming Yan, Denis Pellerin, Xiaopeng Zhang. Impact of Data Preparation and CNN’s First Layer on Performance of Image Forensics: A Case Study of Detecting Colorized Images
    WI '19 Companion IEEE/WIC/ACM International Conference on Web Intelligence, Oct 2019, Thessaloniki, Greece. pp.127-131.
  • Weize Quan, Kai Wang, Dong-Ming Yan, Denis Pellerin, Xiaopeng Zhang. Improving the generalization of colorized image detection with enhanced training of CNN
    11th International Symposium on Image and Signal Processing and Analysis, Sep 2019, Dubrovnik, Croatia. pp.246-252
  • Ivan Castillo Camacho, Kai Wang. A simple and effective initialization of CNN for forensics of image processing operations
    ACM Information Hiding and Multimedia Security Workshop, Jul 2019, Paris, France
  • Ramtine Tofighi-Shirazi, Irina Mariuca Asavoae, Philippe Elbaz-Vincent. Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning.
    Software Security, Protection, and Reverse Engineering Workshop (SSPREW9), Dec 2019, San Juan, United States
  • Jean-Marie Flaus, Revue des approches pour la détection d’intrusion à base de machine learning pour les systèmes de commande industriels,
    C&SAR 2018 - Intelligence Artificielle et Cybersécurité, Rennes, France, November 19-21 2018
Publications
  • Amir Alipour, David Hely, Vincent Beroulle, and Giorgio Di Natale; Power of Prediction: Advantages of Deep Learning Modeling as Replacement for Traditional PUF CRP Enrollment
    Trudevice 2020
  • François Cayre, GRAFT: Unsupervised adaptation to resizing for detection of image manipulation
    IEEE Access (submitted, 2020)
  • Claude Castellucia, "Understanding algorithmic decision-making: Opportunities and challenges"
    European Parliamentary Research Service, Panel for the Future of Science and Technology, March 2020

Cybersecurity and Privacy

Publications

Prevention & Reaction to attacks

Conferences
  • Karine Bannelier, “State Takes Down Unilaterally A Gigantic Botnet Affecting 140 Countries, Raising Questions of International Law”
    International Cyber Law in Practice. Interactive Toolkit, Czech National Cyber and Information Security Agency (NCISA), International Committee of the Red Cross (ICRC), NATO Cooperative Cyber Defence Centre of Excellence(CCD COE), Exeter University and Wuhan University (forthcoming 2020)
  • Karine Bannelier, Due Diligence and International Responsibility in the Cyberspace,
    The Challenge of Global Cybersecurity from an International-legal Perspective, University of Granada, Granada, 26-27 march 2020
  • Karine Bannelier, Avoiding Civilian Harm During Military Cyber Operations in Armed Conflict,
    CICR
    , Genève, January 20-21 2020
  • Karine Bannelier, Cyber Conflicts and Dispute Settlement Mechanisms,
    The Changing Character of International Dispute Settlement: Prospects and Challenges, Centre for International and European Law
    , Sheffield University, Sheffield, December 6 2019
  • Karine Bannelier, Cyber-sécurité et droit international,
    Session Nationale Souveraineté Numérique et Cyber-Sécurité
    , INHESJ/IHEDN, Paris, November 14 2019
  • Coline Boniface, Imane Fouad, Nataliia Bielova, Cédric Lauradoux, Cristiana Santos, Security Analysis of Subject Access Request procedures,
    Annual Privacy Forum 2019, Rome, Italy, June 12-14 2019
  • Karine Bannelier, “Attribution of Cyber Attacks”,
    The Federmann Cyber Security Center – Cyber Law Program, Rotterdam, June 6 2019
  • Karine Bannelier, “Private Actor’s Self-Help in the Cyber-Space”,
    Rapport introductif, Global Challenges Science Week, World Trade Center, Grenoble June 5 2019
  • Karine Bannelier, “Third Israel Defence Forces International Conference on the Law of Armed Conflict”,
    IDF, Herzliya, 28-30 May 2019
  • Karine Bannelier, Entreprises privées et Hack-Back : questions juridiques autour de la zone grise,
    Session Nationale Souveraineté Numérique et Cyber-Sécurité, INHESJ/IHEDN, Paris, May 23 2019
  • Karine Bannelier, “Due diligence Obligations and Restrictive Measures in the EU Cyber-Security Toolbox: Mutually Reinforcing?”,
    EUISS Task Force on Cyber Sanctions, European Union Institute for Security Studies
    , Bruxelles, May 14-15 2019
  • Karine Bannelier, Prevention and Reactions to Cyber-Attacks & Malicious Cyber Activities. An International Law Perspective in Course on the Challenges of European Cybersecurity,
    Collège Européen de Sécurité et de Défense/IHEDN
    , Bruxelles, April 3 2019
  • Karine Bannelier, Due Diligence: a Strategic Norm of Responsible Behaviour for the EU Cyber Diplomacy Toolbox?,
    Inaugural meeting of the European Cyber Diplomacy Dialogue, EU Cyber Direct, European University Institute, School of Transnational Governance, Florence, 28-29 January 2019
  • Karine Bannelier, Private Sector ‘Hack Back’: Where is The Limit?,
    OECD Open Forum CyberSecurity Best Practices, Internet Governance Forum, UNESCO, Paris, November 12th - 14th 2018
  • Karine Bannelier, ‘Don’t trust me, test me’. Analyse critique du Manuel de Tallinn 2.0,
    Conférence annuelle des conseillers juridiques, Ministère des Armées, Ecole de Guerre, Paris, September 24th 2018
  • Karine Bannelier, Between Certainty and Flexibility : Obligations of Conduct and Variability Factors in the Due Diligence Principle,
    CyCon X : Maximizing Effects, 10th International Conference on Cyber Conflict, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), Tallinn, May 30th – June 1st 2018
  • Karine Bannelier, Aspects juridiques des cyber-opérations,
    Conférence des Legal Advisors (LEGAD) de l’Armée de l’air, Centre National des Opérations Aériennes (CNOA), Base aérienne 942 Lyon-Mont Verdun, May 22nd 2018
Publications
  • Karine Bannelier, “Judicial Dispute Settlement in Cyber Conflicts: Still in a Pre-historic Era?”
    in N. Tsagourias ed. The Changing Character of International Dispute Settlement: Prospects and Challenges, Cambridge University Press
  • Karine Bannelier, “Distinction: A Cardinal but Controversial Principle in Cyberwarfare?”
    in N. Tsagourias ed. The Changing Character of International Dispute Settlement: Prospects and Challenges, Cambridge University Press
  • Karine Bannelier, “Laws of Gravitation. Due diligence Obligations in Cyberspace”
    in P. Pawlak, T. Biersteker eds., Guardian of the Galaxy. EU Cyber Sanctions and Norms in Cyberspace, Chaillot Paper 155, oct. 2019, pp. 62-69.
  • Karine Bannelier, Judicial Dispute Settlement in Cyber Conflicts: Still in a Pre-historic Era?
    in N. Tsagourias ed. The Changing Character of International Dispute Settlement: Prospects and Challenges, Cambridge University Press (forthcoming 2020)
  • Karine Bannelier, Distinction: A Cardinal but Controversial Principle in Cyberwarfare?
    in N. Tsagourias, R. Buchan eds., Research Handbook on International Law and Cyberspace, London, Edward Elgar, (à paraître 2020)
  • Karine Bannelier, De la 5G aux débats sur le hack-back, des initiatives européennes aux négociations au sein de l’ONU : quels enjeux pour la régulation de la cyber-sécurité en 2020?
    Sécurité et Défense magazine, Janvier 2020.
  • Karine Bannelier, Laws of Gravitation. Due diligence Obligations in Cyberspace
    in P. Pawlak, T. Biersteker eds., Guardian of the Galaxy. EU Cyber Sanctions and Norms in Cyberspace, Chaillot Paper 155, oct. 2019, pp. 62-69.
  • Karine Bannelier, Obligations de diligence dans le cyberespace : qui a peur de la Cyber-diligence ?,
    Revue Belge de droit international 2018
  • Karine Bannelier, Le standard de due diligence et la cyber-sécurité,
    Le standard de due diligence et la responsabilité internationale, Société Française pour le Droit international, Paris, Pedone, May 2018, pp. 67-92
  • Karine Bannelier and Theodore Christakis, Cyberdéfense active par des entreprises privées ? Le hack-back entre l’hostilité de la Revue Stratégique de cyberdéfense de la France et le projet de loi ACDC aux Etats-Unis,
    Stratégique 2017
  • Karine Bannelier, Rien que la lex lata? Etude critique du Manuel de Tallinn 2.0 sur le droit international applicable aux cyber-opérations,
    Annuaire Français de Droit International 2017
  • Karine Bannelier and Theodore Christakis, Cyberattaques. Prévention-réactions : rôle des Etats et des acteurs privés/Cyberattacks. Prevention-Reactions,
    Les Cahiers de la Revue Défense Nationale, 2017

Social Impact & Regulation

Conferences
  • Elaine Fahey, Fabien Terpan, Between Institutionalisation and Judicialisation? Studying the Implementation of the Privacy Shield
    26th international conference of europeanists, Council for European Studies, Madrid, 2020
  • D. Deschaux-Dutard, EU Cybersecurity and Cyberdefence Policy : Can We Cope Facing Cyber Threats ?
    UACES Conference, Cracovie, 4-6 septembre 2017
  • Karine Bannelier, “Cyber Security and the Debates on the Principle of Sovereignty”, By Passing Sovereignty: Enforcing Rules in the Cyberspace,
    Sovereignty: A Concept in Flux, European Society of International Law Annual Conference, Athens, 12-14 september 2019
  • Karine Bannelier, “Intelligence and Cyber Norms”,
    The Hague Program for Cyber norms, Institute of Security and Global Affairs, Leiden University, La Haye, 17-18 april 2019
  • Delphine Deschaux-Dutard, Can the EU cope with cyber challenges? Potentials and limits of the EU cybersecurity architecture,
    International Studies Association (ISA) Convention, Toronto, March 27th - 30th 2019
  • Sabine Saurugger and Fabien Terpan, Explaining the Transformations of Law - the Cases of Migration, Cybersecurity and Economic Governance,
    Workshop on Normative Transformations in the EU, Grenoble, 18-19 october 2018
  • Theodore Christakis, Enabling International Cooperation: Evidence and Equities,
    Building Common Approaches for Cybersecurity and Privacy in a Globalized World, Transatlantic Conference, NYU Center For Cybersecurity & Humboldt Institute for Internet and Society, October 1-3 2018, New York
  • Theodore Christakis, Interview: Surveillance de masse et CEDH,
    Next INPACT, September 19th 2018
  • Karine Bannelier, Between Certainty and Flexibility : Obligations of Conduct and Variability Factors in the Due Diligence Principle,
    CyCon X : Maximizing Effects, 10th International Conference on Cyber Conflict, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), Tallinn, May 30th – June 1st 2018
  • Theodore Christakis, Law Enforcement Cross-border Access to Data and Human Rights,
    CyCon X : Maximizing Effects, 10th International Conference on Cyber Conflict, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), Tallinn, May 30th – June 1st 2018
  • Sabine Saurugger and Fabien Terpan, Explaining the Transformations of Law - the Cases of Migration, Cybersecurity and Economic Governance,
    Standing Group on European Union, European Consortium of Political Research, Paris, 12-14 April 2018
  • Sabine Saurugger and Fabien Terpan, Explaining the Transformations of Law - the Cases of Migration, Cybersecurity and Economic Governance,
    25th international conference of europeanists, Chicago, 28-30 March 2018
  • Karine Bannelier, How to Use International Law to Shape Responsible State Behavior in Cyber Space,
    Expert Level Round Table: Shaping Responsible State Behavior in Cyber Space, The German Marshall Fund of the United States, Paris, Maison de l’Amérique Latine, February 13th 2018
  • Karine Bannelier and Theodore Christakis, Masterclass Regulation of Cyber-Attacks after the Failure of the UN GGE and Wannacry,
    10th International Forum on Cybersecurity (FIC 2018), Lille, January 23rd - 24th 2018
  • Delphine Deschaux-Dutard, EU Cybersecurity and Cyberdefence Policy : Can We Cope Facing Cyber Threats?,
    UACES Conference, Krakow, September 4th - 6th 2017 (represented)
  • Delphine Deschaux-Dutard, EU and US cyber security strategies in comparison: how does strategic culture matter when it comes to cyber-security?,
    International Studies Association (ISA) Convention, Baltimore, February 23rd - 25th 2017
Publications

Software vulnerabilities

Conferences
Publications

Internet wide measurements

Conferences
  • "Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation", V. Le Pochat, T. Van Goethem, S. Tajalizadehkhoob, M. Korczynski, W. Joosen,  Network and Distributed System Security Symposium (NDSS 2019)
  • "Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning", Marcin Skwarek, Maciej Korczynski, Wojciech Mazurczyk and Andrzej Duda, IEEE S&P Workshop on Traffic Measurements for Cybersecurity (WTMC 2019)
  • "MLSEC - Benchmarking Shallow and Deep Machine Learning Models for Network Security", Pedro Casas, Gonzalo Marin, German Capdehourat, Maciej Korczynski, IEEE S&P Workshop on Traffic Measurements for Cybersecurity (WTMC 2019)

Education and awareness

Publications
  • Romain Xu-Darme, CALI-SSI : Challenge interdisciplinaire en sécurité des systèmes d’information
    RESSI’20 (submitted, 2020)