A Survey on Security for Mobile Devices, IEEE Communications Surveys & Tutorials, 2012. ,
DOI : 10.1109/SURV.2012.013012.00028
Android Security: A Survey of Issues, Malware Penetration, and Defenses, IEEE Communications Surveys & Tutorials, 2015. ,
DOI : 10.1109/COMST.2014.2386139
The road to SDN, ACM SIGCOMM Computer Communication Review, vol.44, issue.2, pp.87-98, 2014. ,
DOI : 10.1145/2602204.2602219
Software-Defined Networks: Improving Network Management with SDN, IEEE Communications Magazine, 2013. ,
veriT: An Open, Trustable and Efficient SMT-Solver, Proc. 22nd International Conference on Automated Deduction (CADE-22), pp.151-156, 2009. ,
DOI : 10.1007/978-3-540-73595-3_38
URL : https://hal.archives-ouvertes.fr/inria-00430634
The nuXmv Symbolic Model Checker, Proc. 26th Intl. Conf. Computer Aided Verification, pp.334-342, 2014. ,
DOI : 10.1007/978-3-319-08867-9_22
Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service, Proc. ACM SIGCOMM Internationl Conference (SIGCOMM'12), pp.2012-2025 ,
DOI : 10.1145/2377677.2377680
Outsourcing network functionality, Proceedings of the first workshop on Hot topics in software defined networks, HotSDN '12, pp.73-78, 2012. ,
DOI : 10.1145/2342441.2342457
SIMPLE-fying Middlebox Policy Enforcement using SDN, Proc. ACM SIGCOMM International Conference (SIGCOMM'13), pp.27-38, 2013. ,
DOI : 10.1145/2486001.2486022
Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags, Proc. 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI'14), pp.543-546, 2014. ,
Per-user policy enforcement on mobile apps through network functions virtualization, Proceedings of the 9th ACM workshop on Mobility in the evolving internet architecture, MobiArch '14, pp.37-42, 2014. ,
DOI : 10.1145/2645892.2645896
Towards cloud-based compositions of security functions for mobile devices, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015. ,
DOI : 10.1109/INM.2015.7140340
URL : https://hal.archives-ouvertes.fr/hal-01093041
Vericon: Towards Verifying Controller Programs in Software-Defined Networks, Proc. 35th ACM SIGPLAN Intl. Conf. Programming Language Design (PLDI'14), pp.282-293, 2014. ,
A Nice Way to Test OpenFlow Applications, Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation (NSDI'12), 2012. ,
FlowChecker, Configuration Analysis and Verification of Federated OpenFlow Infrastructures, Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration (CCS'10), 2010. ,
Veri- Flow: Verifying Network-wide Invariants in Real Time, Proceedings of the first Workshop on Hot Topics in Software-Defined Networks (HotSDN'12), 2012. ,
A Verification Method of SDN Firewall Applications, IEICE Transactions on Communications, vol.99, issue.7, 2016. ,
DOI : 10.1587/transcom.2015EBP3329
Discovery of policy anomalies in distributed firewalls, Proceedings of the Twenty-third Annual Joint Conference of the IEEE Computer and Communications, 2004. ,
Frenetic, a Network Programming Language, Proceedings of the 16th ACM SIGPLAN International Conference on Functional Programming (ICFP'11), 2011. ,
Languages for software-defined networks, Software Technology Group, 2016. ,
DOI : 10.1109/MCOM.2013.6461197
URL : http://www.cs.princeton.edu/~mfreed/docs/frenetic-ieeecomm13.pdf
Kinetic: Verifiable Dynamic Network Control, Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation (NSDI'15), 2015. ,
DOI : 10.1002/sec.1317