default search action
Frédéric Tronel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c34]Nicolas Bellec, Guillaume Hiet, Simon Rokicki, Frederic Tronel, Isabelle Puaut:
RT-DFI: Optimizing Data-Flow Integrity for Real-Time Systems. ECRTS 2022: 18:1-18:24 - 2021
- [c33]Camille Le Bon, Erven Rohou, Frédéric Tronel, Guillaume Hiet:
DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification. EuroS&P Workshops 2021: 86-95 - 2020
- [c32]Guillaume Hiet, Frédéric Tronel, Jean-Louis Lanet:
Preface of the 2nd Workshop on the Security of Software/Hardware Interfaces (SILM 2020). EuroS&P Workshops 2020: 681
2010 – 2019
- 2017
- [c31]Laurent Georget, Mathieu Jaume, Frederic Tronel, Guillaume Piolle, Valérie Viet Triem Tong:
Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux. FormaliSE@ICSE 2017: 10-16 - [c30]Mounir Assaf, David A. Naumann, Julien Signoles, Eric Totel, Frédéric Tronel:
Hypercollecting semantics and its application to static analysis of information flow. POPL 2017: 874-887 - [c29]Laurent Georget, Mathieu Jaume, Guillaume Piolle, Frédéric Tronel, Valérie Viet Triem Tong:
Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory. SEFM 2017: 1-16 - [c28]Emmanuelle Anceaume, Romaric Ludinard, Maria Potop-Butucaru, Frédéric Tronel:
Bitcoin a Distributed Shared Register. SSS 2017: 456-468 - 2016
- [i2]Mounir Assaf, David A. Naumann, Julien Signoles, Eric Totel, Frédéric Tronel:
Hypercollecting Semantics and its Application to Static Analysis of Information Flow. CoRR abs/1608.01654 (2016) - 2015
- [c27]Laurent Georget, Frédéric Tronel, Valérie Viet Triem Tong:
Kayrebt: An activity diagram extraction and visualization toolset designed for the Linux codebase. VISSOFT 2015: 170-174 - 2014
- [j6]Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications. Int. J. Secur. Softw. Eng. 5(1): 19-38 (2014) - [c26]Pierre Meye, Philippe Raipin Parvédy, Frédéric Tronel, Emmanuelle Anceaume:
A Secure Two-Phase Data Deduplication Scheme. HPCC/CSS/ICESS 2014: 802-809 - [c25]Pierre Meye, Philippe Raipin Parvédy, Frederic Tronel, Emmanuelle Anceaume:
Mistore: A distributed storage system leveraging the DSL infrastructure of an ISP. HPCS 2014: 260-267 - 2013
- [c24]Christophe Hauser, Frederic Tronel, Colin J. Fidge, Ludovic Mé:
Intrusion detection in distributed systems, an approach based on taint marking. ICC 2013: 1962-1967 - [c23]Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel:
Program Transformation for Non-interference Verification on Programs with Pointers. SEC 2013: 231-244 - 2012
- [c22]Christophe Hauser, Frédéric Tronel, Jason Reid, Colin J. Fidge:
A taint marking approach to confidentiality violation detection. AISC 2012: 83-90 - [c21]Romaric Ludinard, Eric Totel, Frederic Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
Detecting attacks against data in web applications. CRiSIS 2012: 1-8 - 2011
- [j5]Emmanuelle Anceaume, Francisco Vilar Brasileiro, Romaric Ludinard, Bruno Sericola, Frédéric Tronel:
Dependability Evaluation of Cluster-Based Distributed Systems. Int. J. Found. Comput. Sci. 22(5): 1123-1142 (2011) - [c20]Emmanuelle Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel Hurfin, Ludovic Mé, Guillaume Piolle, Nicolas Prigent, Eric Totel, Frederic Tronel, Valérie Viet Triem Tong:
From SSIR to CIDre: A New Security Research Group in Rennes, France. SysSec@DIMVA 2011: 86-89 - [c19]Emmanuelle Anceaume, Bruno Sericola, Romaric Ludinard, Frederic Tronel:
Modeling and evaluating targeted attacks in large scale dynamic systems. DSN 2011: 347-358 - [c18]Stephane Geller, Christophe Hauser, Frédéric Tronel, Valérie Viet Triem Tong:
Information Flow Control for Intrusion Detection Derived from MAC Policy. ICC 2011: 1-6 - [c17]Jonathan-Christofer Demay, Frédéric Majorczyk, Eric Totel, Frédéric Tronel:
Detecting Illegal System Calls Using a Data-Oriented Detection Model. SEC 2011: 305-316
2000 – 2009
- 2009
- [c16]Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel:
SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data. CRiSIS 2009: 51-58 - [c15]Emmanuelle Anceaume, Francisco V. Brasileiro, Romaric Ludinard, Bruno Sericola, Frédéric Tronel:
Analytical Study of Adversarial Strategies in Cluster-based Overlays. PDCAT 2009: 293-298 - [c14]Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel:
Automatic Software Instrumentation for the Detection of Non-control-data Attacks. RAID 2009: 348-349 - [c13]Emmanuelle Anceaume, Francisco Vilar Brasileiro, Romaric Ludinard, Bruno Sericola, Frederic Tronel:
Brief Announcement: Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems. SSS 2009: 773-774 - [i1]Emmanuelle Anceaume, Romaric Ludinard, Bruno Sericola, Frédéric Tronel, Francisco Vilar Brasileiro:
Analytical Study of Adversarial Strategies in Cluster-based Overlays. CoRR abs/0908.0398 (2009) - 2006
- [c12]Michel Hurfin, Jean-Pierre Le Narzul, Frédéric Majorczyk, Ludovic Mé, Ayda Saïdane, Eric Totel, Frédéric Tronel:
A Dependable Intrusion Detection Architecture Based on Agreement Services. SSS 2006: 378-394 - [c11]François Bonnet, Frederic Tronel, Spyros Voulgaris:
Brief Announcement: Performance Analysis of Cyclon, an Inexpensive Membership Management for Unstructured P2P Overlays. DISC 2006: 560-562 - 2003
- [c10]Frederic Tronel, Frédéric Lang, Hubert Garavel:
Compositional Verification Using CADP of the ScalAgent Deployment Protocol for Software Components. FMOODS 2003: 244-260 - 2001
- [c9]Fabíola Greve, Michel Hurfin, Michel Raynal, Frederic Tronel:
Primary Component Asynchronous Group Membership as an Instance of a Generic Agreement Framework. ISADS 2001: 93-100 - [c8]Francisco Vilar Brasileiro, Fabíola Greve, Frederic Tronel, Michel Hurfin, Jean-Pierre Le Narzul:
Eva: An Event-Based Framework for Developing Specialized Communication Protocols. NCA 2001: 108-121 - [c7]Christof Fetzer, Michel Raynal, Frederic Tronel:
An Adaptive Failure Detection Protocol. PRDC 2001: 146-153 - 2000
- [j4]Achour Mostéfaoui, Michel Raynal, Frederic Tronel:
From Binary Consensus to Multivalued Consensus in asynchronous message-passing systems. Inf. Process. Lett. 73(5-6): 207-212 (2000) - [j3]Jean-Michel Hélary, Michel Hurfin, Achour Mostéfaoui, Michel Raynal, Frederic Tronel:
Computing Global Functions in Asynchronous Distributed Systems with Perfect Failure Detectors. IEEE Trans. Parallel Distributed Syst. 11(9): 897-909 (2000) - [c6]Achour Mostéfaoui, Michel Raynal, Frederic Tronel:
The Best of Both Worlds: A Hybrid Approach to Solve Consensus. DSN 2000: 513-522 - [c5]Jean-Michel Hélary, Michel Hurfin, Achour Mostéfaoui, Michel Raynal, Frederic Tronel:
Computing Global Functions in Asynchronous Distributed Systems Prone to Process Crashes. ICDCS 2000: 584-591
1990 – 1999
- 1999
- [j2]Michel Raynal, Frederic Tronel:
Group membership failure detection: a simple protocol and its probabilistic analysis. Distributed Syst. Eng. 6(3): 95-102 (1999) - [j1]Michel Raynal, Frederic Tronel:
Restricted failure detectors: Definition and reduction protocols. Inf. Process. Lett. 72(3-4): 91-97 (1999) - [c4]Eddy Fromentin, Michel Raynal, Frederic Tronel:
On Classes of Problems in Asynchronous Distributed Systems with Process Crashes. ICDCS 1999: 470-477 - [c3]Michel Hurfin, Raimundo A. Macêdo, Michel Raynal, Frederic Tronel:
A General Framework to Solve Agreement Problems. SRDS 1999: 56-65 - [c2]Roger Bollo, Jean-Pierre Le Narzul, Michel Raynal, Frederic Tronel:
Probabilistic analysis of a group failure detection protocol. WORDS (Jan.) 1999: 156-162 - 1997
- [c1]Michel Hurfin, Frederic Tronel:
A Solution to Atomic Commitment Based on an Extended Consensus Protocol. FTDCS 1997: 98-103
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-26 19:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint