GroddDroid : a gorilla for triggering malicious behaviors, International Conference on Malicious and Unwanted Software, pp.119-127, 2015. ,
Information Flow Policies vs Malware, pp.22-77 ,
BKL : That's all, folks [LWN.net]. E-mail publié sur la liste de développement du noyau Linux, PATCH, vol.2020, 2011. ,
Sous la dir, The Blast Query Language for Software Veriication ». In : International Static Analysis Symposium, pp.2-18978, 2004. ,
Sous la dir, International Symposium On Leveraging Applications of Formal Methods, Veriication and Validation, 2012. ,
Understanding the Linux Kernel. 3 e éd. O'Reilly Media, pp.35-55 ,
Sparse : a look under the hood. Linux Weekly News. 8 juin 2016. : https://lwn, p.29, 2017. ,
Sous la dir, Advances in Computer Science -ASIAN 2004. Higher-Level Decision Making. Asian Computing Science Conference, pp.320-329, 2004. ,
gcc-plugins : Add initial x86_64 kernexec plugin. E-mail publié sur la liste de développement du noyau Linux. 13 jan, 2017. ,
gcc-plugins : Add structleak for more stack initialization. E-mail publié sur la liste de développement du noyau Linux. 13 jan, 2017. ,
Kernel building with GCC plugins. Linux Weekly News. 14 juin 2014. : https : / / lwn, p.30, 2017. ,
net News from the source. Linux Weekly News, p.35, 1998. ,
« Runtime enforcement of noninterference by duplicating processes and their memories, p.11, 2009. ,
Implementación de no interferencia en Linux, pp.186-199, 2009. ,
« EEciently Computing Static Single Assignment Form and the Control Dependence Graph, In : ACM Transactions on Programming Languages and Systems, vol.13, issue.4, pp.451-490, 1991. ,
CLOC ? Count Lines of Code ,
A Lattice Model of Secure Information Flow, Communications of the ACM, vol.195, pp.236-243, 1976. ,
« Certiication of programs for secure information ow Sous la dir, Communications of the ACM, vol.207, pp.504-513, 1977. ,
Coverage-guided kernel fuzzing with syzkaller. Linux Weekly News. 2 mar. 2016. : https://lwn, p.31, 2017. ,
The Yices SMT solver. SRI International, p.123, 2006. ,
A pair of GCC plugins. Linux Weekly News. 27 jan. 2017. : https://lwn.net/Articles, p.30, 2017. ,
The kernel address sanitizer. Linux Weekly News. 14 sept. 2014. : https://lwn.net/Articles, pp.612153-612185, 2017. ,
« Maintaining the correctness of the Linux security modules framework, Ottawa Linux Symposium, pp.223-256, 2002. ,
« Graphviz and Dynagraph ? Static and Dynamic Graph Drawing Tools, Graph Drawing Software. Sous la dir. de M, pp.127-148, 2004. ,
An Information- Flow Tracking System for Realtime Privacy Monitoring on Smartphones, USENIX Conference on Operating Systems Design and Implementation, pp.1-6, 2010. ,
« Type qualiiers : lightweight speciications to improve software quality, Thèse de doct, p.29, 2002. ,
Practical Problems in System Call Interposition Based Security Tools. » In : Network and Distributed Systems Security Symposium, pp.163-176, 2003. ,
Information Flow Analysis for Java Bytecode Sous la dir. de Radhia CCCCC. T. 3385, International Conference on Veriication, Model Checking, and Abstract Interpretation, pp.346-362978, 2005. ,
A Policy-Based Intrusion Detection System Automatically Set by the Security Policy, International Workshop on Recent Advances in Intrusion Detection, pp.355-356, 2009. ,
Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory ». In : Software Engineering and Formal Methods Software Engineering & Formal Methods (SEFM 2017) Sous la dir, Lecture Notes in Computer Science, pp.1-16, 2017. ,
Suivi de ux d'information correct sous Linux, Approches Formelles dans l'Assistance au Développement de Logiciels, 2017. ,
Verifying the Reliability of Operating System- Level Information Flow Control Systems in Linux, FME Workshop on Formal Methods in Software Engineering Buenos Aires, pp.10-16, 2017. ,
An Activity Diagram Extraction and Visualization Toolset Designed for the Linux Codebase, IEEE Working Conference on Software Visualization, 2015. ,
Détection d'intrusion dans les systèmes distribués par propagation de teinte au niveau noyau ». Doctoral thesis University of Rennes 1, juin 2013 (cf, pp.75-82 ,
Logiciel. : https: //git.blare-ids.org (visité le 10, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00578853
Détection d'intrusions paramétrée par la politique de sécurité grâce au contrôle collaboratif des ux d'informations au sein du système d'exploitation et des applications : mise en oeuvre sous Linux pour les programmes Java, Thèse de doct, pp.11-77, 2008. ,
Version 3.18.0, publiée le 30 mar. 2017. Logiciel. : https://www.sqlite.org, p.5, 2017. ,
« Consistency analysis of authorization hook placement in the Linux security modules framework ,
Information Security : An integrated Collection of Essays. Sous la dir, Solutions to the Polyinstanciation Problem, pp.493-530, 1995. ,
Semantic Comparison of Security Policies : From Access Control Policies to Flow Properties, IEEE Symposium on Security and Privacy Workshops, pp.60-67, 2012. ,
« Secure states versus Secure executions : From access control to ow control, International Conference on Information Systems Security, pp.148-162, 2013. ,
« Flow based interpretation of access control : Detection of illegal information ows T. 7093, International Conference on Information Systems Security, pp.72-86, 2011. ,
Kernel Pointer Bugs with Type Inference, USENIX Security Symposium, p.29, 2004. ,
Version v1.7, publiée le 28 oct. 2016. Logiciel. : https: //github.com/kernelslacker/trinity, p.2, 2017. ,
The Trinity fuzz tester. Linux Weekly News. 6 fév. 2013. : https://lwn, p.31, 2017. ,
« Establishing Linux Driver Veriication Process, Perspectives of Systems Informatics. International Andrei Ershov Memorial Conference on Perspectives of System Informatics. T. 5947. Lecture Notes in Computer Science ,
Secure Computer Systems : A Mathematical Model MTR-2547 (ESD-TR-73-278-II), Bedford : MITRE Corp, vol.2, p.6, 1973. ,
Trusted Computer System Evaluation Criteria (Orange Book). 5200.28-STD, pp.116-130, 1985. ,
Linux Kernel Development. 3 e éd Upper Saddle River, NJ ,
« The SeaView security model, IEEE Transactions on Software Engineering, vol.166, pp.593-607, 1990. ,
« Multilevel Security in the UNIX Tradition » In : Software : Practice and Experience 22, pp.673-694, 1992. ,
« Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities, European Dependable Computing Conference, 2008. ,
A new tree representation for entire functions, GCC Developers Summit, pp.171-180, 2003. ,
« An Empirical Study of the Reliability of UNIX Utilities, Communications of the ACM, vol.3312, pp.32-44, 1990. ,
« Graph database applications and concepts with Neo4j, Southern Association for Information Systems Conference Proceedings. Southern Association for Information Systems Conference. T. 24 : Association for Information Systems, pp.2013-71 ,
Sous la dir, Formal Methods for Industrial Critical Systems Lecture Notes in Computer Science, vol.4346, pp.211-226978, 2006. ,
« seL4 : From General Purpose to a Proof of Information Flow Enforcement, IEEE Symposium on Security and Privacy, pp.415-429, 2013. ,
choice" to automate authorization hook placement, p.6, 2012. ,
Practical Mostly-static Information Flow Control, ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.228-241, 1999. ,
Decentralized Model for Information Flow Control Saint-Malo, ACM Symposium on Operating Systems Principles, pp.129-142, 1997. ,
Protecting Privacy Using the Decentralized Label Model, In : ACM Transactions on Software Engineering Methodology, vol.9, issue.17, pp.410-442, 2000. ,
Extending Linux Security Beyond the Limits, p.73, 2006. ,
« Documenting and Automating Collateral Evolutions in Linux Device Drivers, European Conference on Computer Systems, pp.247-260, 2008. ,
« Towards automatic software model checking of thousands of Linux modules?a case study with Avinux, Software Testing, pp.155-172, 2009. ,
« Information Flow Inference for ML », In : ACM Transactions on Programming Languages and Systems (TOPLAS), vol.251, pp.117-158, 2003. ,
Classes of Recursively Enumerable Sets and Their Decision Problems, Transactions of the American Mathematical Society, vol.742, pp.358-366, 1953. ,
Version v2, publiée le 20 août 2014. Logiciel. : https : / / sourceforge, p.2, 2017. ,
Practical Fine-grained Decentralized Information Flow Control, ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.63-74, 2009. ,
Unreliable guide to hacking the Linux kernel, p.30, 2000. ,
UBSan : run-time undeened behavior sanity checker. E-mail publié sur la liste de développement du noyau Linux. 20 oct, 2014. ,
Learning Perl. 6 e éd. O'Reilly Media, juin 2011, pp.978-979 ,
« Experience of improving the blast static veriication tool », In : Programming and Computer Software, vol.383, pp.134-142 ,
« Fuzzing the Out-of-memory Killer on Embedded Linux : An Adaptive Random Approach, In : ACM Symposium on Applied Computing, pp.387-392, 2011. ,
Automatic Bug--nding Techniques for Large Software Projects ». Doctoral thesis, pp.4-2014 ,
Add missing LSM hooks in mq_timed{send,receive} and splice, Email on the Linux Security Modules development mailing list. Email publié sur la liste de développement du noyau Linux, Juil, issue.2, 2016. ,
Implementing SELinux as a Linux security module. 01-043, pp.139-73, 2001. ,
Keynote -grsecurity ». Symposium sur la sécurité des technologies de l'information et des communications, pp.1-2006, 2016. ,
Why doesn't grsecurity use LSM ? grsecurity, 2008. ,
Plugins - GNU Compiler Collection (GCC) Internals. 2015. : https : / / gcc . gnu . org/onlinedocs/gccint/Plugins.html#Plugins (visité le 18, p.61, 2015. ,
Using the GNU Compiler Collection (GCC). 2013 (cf, pp.30-61 ,
Operating system Family / Linux. TOP500 Supercomputer Sites, top500.org/statistics, 2016. ,
American National Standard for Information Systems ? Programming Language C. X3.159-1989, American National Standard Institute, 1989. ,
The Coq Proof Assistant Reference Manual. 14 déc. 2016 (cf, p.88 ,
The Kernel of the Argument, p.36, 2015. ,
Media commit causes user space to misbahave (was : Re : Linux 3.8-rc1) E-mail publié sur la liste de développement du noyau Linux. 23 déc. 2012. : https://lkml.org/lkml, p.7502, 2012. ,
context" checking.. E-mail publié sur la liste de développement du noyau Linux. 30 oct, 2004. ,
The Linux Kernel Version 4.7, publiée le 24 juil. 2016. Logiciel . Linux Kernel Organization, Inc. : https://kernel.org, p.2, 2017. ,
Sparse ? a semantic parser for C. 2003. Logiciel. : https://sparse ,
An Architectural Framework for User-Centric Information-Flow Security, International Symposium on Microarchitecture, pp.243-254, 2004. ,
« Specifying and Enforcing a Fined-Grained Information Flow Policy : Model and Experiments, p.20 ,
Controls in the ADEPT-50 Time-sharing System ». In : Fall Joint Computer Conference (AFIPS 1969), pp.5-7 ,
« Model Checking Concurrent Linux Device Drivers, IEEE/ACM International Conference on Automated Software Engineering, 2007. ,
Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis, USENIX Security Symposium (USENIX 2012, pp.29-29, 2012. ,
« MECA : an extensible, expressive system and language for statically checking security properties, ACM conference on Computer and Communications Security, pp.321-334, 2003. ,
Capturing System-wide Information Flow for Malware Detection and Analysis, ACM Conference on Computer and Communications Security, pp.116-127, 2007. ,
« Hardware Enforcement of Application Security Policies Using Tagged Memory, USENIX Conference on Operating Systems Design and Implementation (OSDI, pp.225-240, 2008. ,
« Using CQUAL for Static Analysis of Authorization Hook Placement, USENIX Security Symposium : USENIX Association, pp.33-48, 2002. ,
Détection d'intrusions paramétrée par la politique par contrôle de ux de références, Thèse de doct, pp.16-2003 ,
« An Improved Reference Flow Control Model for Policy-Based Intrusion Detection, Proceedings of the 8th European Symposium on Research in Computer Security (ESORICS, p.20, 2003. ,
« Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model, Proceedings of the Annual Computer Security Applications Conference (ACSAC) ,
Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory ». In : Software Engineering and Formal Methods, Publications de l'auteur associées aux contributions de cette thèse Conférences internationales avec actes, pp.1-16, 2017. ,
Verifying the Reliability of Operating System- Level Information Flow Control Systems in Linux, FME Workshop on Formal Methods in Software Engineering Buenos Aires, pp.10-16, 2017. ,
An Activity Diagram Extraction and Visualization Toolset Designed for the Linux Codebase, IEEE Working Conference on Software Visualization, 2015. ,
Suivi de ux d'information correct sous Linux Sous la dir. d'Akram II et Nikolai K, p.54, 2017. ,
une transition comprend un noeud plus un arc, p.98 ,
Extrait des traces émises par Weir durant l'exécution réussie de l'attaque utilisant TestCommClient, p.131 ,