Publications

Conference papers

  • C. Castelluccia, E. D. Cristofaro, and D. Perito, "Private Information Disclosure from Web Searches," in Privacy Enhancing Technology Symposium, 2010.
    @inproceedings{pets10,
      author = "Claude Castelluccia and Emiliano De Cristofaro and Daniele Perito", title = "Private Information Disclosure from Web Searches", booktitle = "Privacy Enhancing Technology Symposium", month = "July", year = "2010", url = "http://planete.inrialpes.fr/~perito/papers/pets10.pdf", }
  • A. Chaabane, P. Manils, and M. A. Kaafar, "Digging into Anonymous Traffic: a deep analysis of the Tor anonymizing network," in 4th International Conference on Network and System Security (NSS 2010), Melbourne, Australia, 2010.
    @Inproceedings{NSS10,
      author = "A. Chaabane and P. Manils and M.A. Kaafar", title = "Digging into Anonymous Traffic: a deep analysis of the Tor anonymizing network ", booktitle = "4th International Conference on Network and System Security (NSS 2010)", address = {Melbourne, Australia},
      month = {September},
      year = {2010},
      publisher = IEEE, }
  • L. S. Blond, A. Legout, F. Lefessant, W. Dabbous, and M. A. Kaafar, "Spying the World from your Laptop− Identifying and Profiling Content Providers and Big Downloaders in BitTorrent," in USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET’10), San Jose, USA, 2010.
    @Inproceedings{LEET10,
      author = "S. Le Blond and A. Legout and F. Lefessant and W. Dabbous and M.A. Kaafar", title = "Spying the World from your Laptop− Identifying and Profiling Content Providers and Big Downloaders in BitTorrent", booktitle = " USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET'10)", address = {San Jose, USA},
      month = {April},
      year = {2010},
      publisher = USENIX, }
  • P. Manils, A. Chaabane, S. le Blond, M. A. Kaafar, C. Castelluccia, A. Legout, and W. Dabbous, "Compromising Tor Anonymity Exploiting P2P Information Leakage," in 3rd Hot Topics in Privacy Enhancing Technologies (HotPETs 2010), Berlin, Germany, 2010.
    @Inproceedings{HotPETs10,
      author = "P. Manils and A. Chaabane and S. le Blond and M.A. Kaafar and C. Castelluccia and A. Legout and W. Dabbous", title = "Compromising Tor Anonymity Exploiting P2P Information Leakage", booktitle = "3rd Hot Topics in Privacy Enhancing Technologies (HotPETs 2010) ", address = {Berlin, Germany},
      month = {July},
      year = {2010},
      }
  • M. A. Kaafar and P. Manils, "Why Spammers should thank Google," in ACM workshop on Social Network Systems (SNS 2010), Paris, 2010.
    @Inproceedings{SNS10,
      author = "M.A. Kaafar and P. Manils ", title = "Why Spammers should thank Google", booktitle = " ACM workshop on Social Network Systems (SNS 2010)", address = {Paris},
      month = {April},
      year = {2010},
      publisher = ACM, }
  • . Cunche and . Roca, "Le RFC 5170 en pratique : conception et évaluation d’un codec AL-FEC LDPC-staircase hautes performances," in CFIP’2009, Strasbourg France, 2009.
    @inproceedings{CUNCHE:2009:INRIA-00419464:1, title = { {L}e {RFC} 5170 en pratique : conception et {\'e}valuation d'un codec {AL}-{FEC} {LDPC}-staircase hautes performances},
      author = {{C}unche, {M}athieu and {R}oca, {V}incent},
      language = {{F}ran{\c{c}}ais},
      affiliation = {{PLANETE} - {INRIA} {S}ophia {A}ntipolis / {INRIA} {R}h{\^o}ne-{A}lpes - {INRIA} },
      booktitle = {{CFIP}'2009 },
      address = {{S}trasbourg {F}rance },
      audience = {internationale },
      day = {12},
      month = {10},
      year = {2009},
      URL = {http://hal.archives-ouvertes.fr/inria-00419464/en/},
      URL = {http://hal.archives-ouvertes.fr/inria-00419464/PDF/42.pdf},
      }
  • P. Vicat-Blanc/Primet, V. Roca, J. Montagnat, J-P. Gelas, O. Mornard, L. Giraud, G. Koslovski, and T. T. Huu, "A Scalable Security Model for Enabling Dynamic Virtual Private Execution Infrastructures on the Internet," in 9th IEEE International Symposium on Cluster Computing and the Grid (CCGrid’09), Shanghai, China, 2009.
    @InProceedings{Roca.ccgrid09,
      author= "P. Vicat-Blanc/Primet and V. Roca and J. Montagnat and J-P. Gelas and O. Mornard and L. Giraud and G. Koslovski and T. Truong Huu", title = "A Scalable Security Model for Enabling Dynamic Virtual Private Execution Infrastructures on the Internet", BookTitle="9th IEEE International Symposium on Cluster Computing and the Grid (CCGrid'09), Shanghai, China", month = may, year = 2009 }
  • A. Alloum, B. Sayadi, and V. Roca, "Reed Solomon codes on graph for DVB-SH streaming services," in 22nd Wireless World Research Forum meeting (WWRF’09), Paris, France, 2009.
    @InProceedings{Alloum.wwrf09,
      author= "A. Alloum and B. Sayadi and V. Roca", title = "Reed Solomon codes on graph for DVB-SH streaming services", BookTitle="22nd Wireless World Research Forum meeting (WWRF'09), Paris, France", month = may, year = 2009 }
  • R. Di Pietro, C. Soriente, A. Spognardi, and G. Tsudik, "Intrusion-Resilience via Collaborative Authentication in Unattended WSNs," in ACM WiSec ‘09, 2009.
    @inproceedings{auth,
      author = {R. {Di Pietro} and C. Soriente and A. Spognardi and G. Tsudik},
      title = {Intrusion-Resilience via Collaborative Authentication in Unattended WSNs},
      booktitle = {{ACM WiSec '09}},
      year = {2009},
      }
  • C.Castelluccia and M. A. Kaafar, "Owner-Centric Networking (OCN): Toward A Data Pollution-Free Internet," in SAINT Workshop on Trust and Security in the Future Internet, FIST, Seattle, USA, 2009.
    @inproceedings{OCN09,
      author = {C.Castelluccia and M.A. Kaafar},
      title = "Owner-Centric Networking (OCN): Toward A Data Pollution-Free Internet", booktitle = "SAINT Workshop on Trust and Security in the Future Internet, FIST", address = "Seattle, USA", month = July, year = {2009},
      publisher = { IEEE Communications Society},
      }
  • K. Rasmussen, C.Castelluccia, T. Heydt-Benjamin, and S.Capkun, "Proximity-based Access Control for Implantable Medical Devices," in ACM CCS’09: Proceedings of the 16th ACM conference on Computer and Communications Security, 2009.
    @InProceedings{ccs-cardio09,
      author = {K. Rasmussen and C.Castelluccia and T. Heydt-Benjamin and S.Capkun},
      title = {Proximity-based Access Control for Implantable Medical Devices},
      booktitle = {ACM CCS'09: Proceedings of the 16th ACM conference on Computer and Communications Security},
      year = 2009, month = {Nov.}
    }
  • Y. Liao, M. A. Kaafar, B. Gueye, F. Cantin, P. Geurts, and G. Leduc, "Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning," in Proceedings of the IFIP Networking Conference, 2009.
    @inproceedings{networking09,
      author = {Yongjun Liao and Mohamed Ali Kaafar and Bamba Gueye and Francois Cantin and Pierre Geurts and Guy Leduc},
      title = {Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning},
      page = {352--363},
      booktitle = {Proceedings of the IFIP Networking Conference},
      month = may, year = {2009},
      location = {Aachen, Germany},
      }
  • T. Goodspeed and A. Francillon, "Half-Blind Attacks: Mask ROM Bootloaders are Dangerous," in WOOT ‘09, 3rd USENIX Workshop on Offensive Technologies, 2009.
    @InProceedings{WOOT09,
      author = {Goodspeed, Travis and Francillon, Aurélien },
      title = {Half-Blind Attacks: Mask {ROM} Bootloaders are Dangerous},
      editor = {Dan Boneh and Alexander Sotirov},
      booktitle = {WOOT '09, 3rd USENIX Workshop on Offensive Technologies},
      publisher = {USENIX Association},
      year = {2009},
      }
  • M. A. Kaafar, L. Mathy, C. Barakat, K. Salamatian, T. Turletti, and W. Dabbous, "Certified Internet Coordinates," in International Conference on Computer Communications and Networks, ICCCN, San Francisco, USA, 2009.
    @Inproceedings{Certif09,
      author = {M. A. Kaafar and L. Mathy and C. Barakat and K. Salamatian and T. Turletti and W. Dabbous},
      title = "Certified Internet Coordinates", booktitle = "International Conference on Computer Communications and Networks, ICCCN", address = "San Francisco, USA", month = August, year = {2009},
      publisher = {IEEE Communications Society},
      }
  • M. Soos, K. Nohl, and C. Castelluccia, "Extending SAT Solvers to Cryptographic Problems," in 12th International Conference on Theory and Applications of Satisfiability Testing (SAT), 2009, pp. 244-257.
    @inproceedings{DBLP:conf/sat/SoosNC09,
      author = {Mate Soos and Karsten Nohl and Claude Castelluccia},
      title = {Extending SAT Solvers to Cryptographic Problems},
      booktitle = {12th International Conference on Theory and Applications of Satisfiability Testing (SAT)},
      year = {2009},
      pages = {244-257},
      ee = {http://dx.doi.org/10.1007/978-3-642-02777-2_24},
      crossref = {DBLP:conf/sat/2009},
      bibsource = {DBLP, http://dblp.uni-trier.de}
    }
  • C. Castelluccia, A. Francillon, D. Perito, and C. Soriente, "Defending Embedded Systems Against Control Flow Attacks," in ACM Conference on Computer and Communications Security, Workshop on Virtual Machine Security, 2009.
    @inproceedings{vmsec_ccs09,
      author = "Claude Castelluccia and Aurélien Francillon and Daniele Perito and Claudio Soriente", title = "Defending Embedded Systems Against Control Flow Attacks", booktitle = "ACM Conference on Computer and Communications Security, Workshop on Virtual Machine Security", month = "November", year = "2009", }
  • C. Castelluccia, M. A. Kaafar, P. Manils, and D. Perito, "Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers," in ACM Internet Measurement Conference, 2009.
    @inproceedings{imc09,
      author = "Claude Castelluccia and Mohamed Ali Kaafar and Pere Manils and Daniele Perito", title = "Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers", booktitle = "ACM Internet Measurement Conference", month = "November", year = "2009", }
  • J. R. Thomas Roche Mathieu Cunche, "Algorithm-based Fault Tolerance Applied to P2P Computing Networks," in The First International Conference on Advances in P2P Systems (AP2PS’09), 2009.
    @InProceedings{Roche09, title = {Algorithm-based Fault Tolerance Applied to P2P Computing Networks},
      author = {Thomas Roche, Mathieu Cunche, Jean-Louis Roch},
      booktitle = {The First International Conference on Advances in P2P Systems (AP2PS'09)},
      year = {2009},
      }
  • A. Chaabane and M. A. Kaafar, "Revisiting unstructured overlay network security," in Foundations and Practice Of Security workshop, Grenoble, 2009.
    @Inproceedings{chaabane09,
      author = {A. Chaabane and M. A. Kaafar},
      title = "Revisiting unstructured overlay network security", booktitle = {Foundations and Practice Of Security workshop},
      month= {June},
      year = {2009},
      address = {Grenoble},
      }
  • C. Castelluccia, A. Francillon, D. Perito, and C. Soriente, "On the Difficulty of Software-Based Attestation of Embedded Devices," in Proceedings of 16th ACM Conference on Computer and Communications Security, 2009.
    @inproceedings{ccs09,
      author = "Claude Castelluccia and Aurélien Francillon and Daniele Perito and Claudio Soriente", title = "On the Difficulty of Software-Based Attestation of Embedded Devices", booktitle = "Proceedings of 16th ACM Conference on Computer and Communications Security", month = "November", year = "2009", }
  • M. Cunche and V. Roca, "Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes," Global Telecommunications Conference, 2009. GLOBECOM’09. IEEE, 2009.
    @Article{ Verifec09,
      author = "Mathieu Cunche and Vincent Roca", title = "Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes", journal = "Global Telecommunications Conference, 2009. GLOBECOM'09. IEEE", year = "2009" }
  • A. Soro, M. Cunche, J. Lacan, and V. Roca, "Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding," Global Telecommunications Conference, 2009. GLOBECOM’09. IEEE, 2009.
    @Article{ Soro09ldpcband,
      author = "Alexandre Soro and Mathieu Cunche and Jérôme Lacan and Vincent Roca", title = "Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding", journal = "Global Telecommunications Conference, 2009. GLOBECOM'09. IEEE", year = "2009" }
  • M. Cunche and V. Roca, "Optimizing the Error Recovery Capabilities of LDPC-staircase Codes Featuring a Gaussian Elimination Decoding Scheme," in 10th IEEE International Workshop on Signal Processing for Space Communications (SPSC’08), Rhodes Island, Greece, 2008.
    @InProceedings{Cunche.spsc08,
      author= "M. Cunche and V. Roca", title = "Optimizing the Error Recovery Capabilities of LDPC-staircase Codes Featuring a Gaussian Elimination Decoding Scheme", BookTitle="10th IEEE International Workshop on Signal Processing for Space Communications (SPSC'08), Rhodes Island, Greece", month = Oct, year = 2008 }
  • M. Cunche, V. Savin, V. Roca, G. Kraidy, A. Soro, and J. Lacan, "Low-rate coding using incremental redundancy for GLDPC codes," in Satellite and Space Communications, 2008. IWSSC 2008. IEEE International Workshop on, 2008, pp. 299-303.
    @InProceedings{ cunche08gldpc, title = "Low-rate coding using incremental redundancy for GLDPC codes",
      author = "M. Cunche and V. Savin and V. Roca and G. Kraidy and A. Soro and J. Lacan", booktitle = "Satellite and Space Communications, 2008. IWSSC 2008. IEEE International Workshop on", year = "2008", month = "Oct.", volume = "", number = "", pages = "299--303", }
  • M. Soos, "Analysing the Molva and Di Pietro Private RFID Authentication Scheme," in Workshop on RFID Security — RFIDSec’08, Budapest, Hungary, 2008.
    @INPROCEEDINGS{Soos08Analysing,
      author = {Soos, Mate},
      title = {{Analysing the {M}olva and {D}i {P}ietro Private {RFID} Authentication Scheme}},
      booktitle = {Workshop on RFID Security --- RFIDSec'08},
      year = {2008},
      editor = {},
      volume = {},
      series = {},
      pages = {},
      address = {Budapest, Hungary},
      month = {July},
      organization = {},
      publisher = {},
      }
  • A. C. -F. Chan and C. Castelluccia, "On the (Im)possibility of aggregate message authentication codes," Information Theory, 2008. ISIT 2008. IEEE International Symposium on, pp. 235-239, 2008.
    @ARTICLE{isit2008, title={On the (Im)possibility of aggregate message authentication codes},
      author={Chan, A.C.-F. and Castelluccia, C.},
      journal={Information Theory, 2008. ISIT 2008. IEEE International Symposium on},
      year={2008},
      month={jul},
      volume={},
      number={},
      pages={235-239},
      keywords={message authentication, source coding, telecommunication security, tree codes, trees (mathematics)MAC security model, aggregate message authentication codes, concast tree, end-to-end data integrity, end-to-end privacy, multiple source nodes},
      doi={10.1109/ISIT.2008.4594983},
      ISSN={},
      }
  • C. Castelluccia and C. Soriente, "ABBA: A Balls and bins approach to secure aggregation in WSNs," Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, 2008. WiOPT 2008. 6th International Symposium on, pp. 185-191, 2008.
    @ARTICLE{wiopt08, title={ABBA: A Balls and bins approach to secure aggregation in WSNs},
      author={Castelluccia, C. and Soriente, C.},
      journal={Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, 2008. WiOPT 2008. 6th International Symposium on},
      year={2008},
      month={April},
      volume={},
      number={},
      pages={185-191},
      }
  • A. Francillon and C. Castelluccia, "Code injection attacks on Harvard-architecture devices," in ACM Conference on Computer and Communications Security, 2008.
    @inproceedings{ccs08,
      author = {Aur{\'e}lien Francillon and Claude Castelluccia},
      title = {Code injection attacks on {H}arvard-architecture devices},
      url = {http://planete.inrialpes.fr/papers/francil_ccs08.pdf},
      booktitle = {ACM Conference on Computer and Communications Security},
      year = {2008},
      OPTpages = {15-26},
      ee = {http://doi.acm.org/10.1145/1455770.1455775},
      crossref = {DBLP:conf/ccs/2008},
      url = {http://planete.inrialpes.fr/papers/francil_ccs08.pdf} bibsource = {DBLP, http://dblp.uni-trier.de},
      }
  • A. Chan and C. Castelluccia, "On the Security of Concealed Data Aggregation," in European Symposium On Research in Computer Security (ESORICS 2007), Dresden, Germany, 2007.
    @inproceedings{Esorics07,
      author = "Chan, Aldar and Castelluccia, Claude", title = "On the Security of Concealed Data Aggregation", booktitle = "European Symposium On Research in Computer Security (ESORICS 2007) ", year = "2007", address = {Dresden, Germany},
      month = {September},
      }
  • C. Castelluccia, "Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks," in IEEE International Conference on Mobile Ad-hoc and Sensor Networks (MASS 2007), Pisa, Italy, 2007.
    @inproceedings{MASS07,
      author = "Castelluccia, Claude", title = "Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks", booktitle = "IEEE International Conference on Mobile Ad-hoc and Sensor Networks (MASS 2007)", year = "2007", address = {Pisa, Italy},
      month = {October},
      }
  • C. Castelluccia and A. Spognardi, "A Robust Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks," in IEEE Securecom’07, 2007.
    @inproceedings{rok, title={{A Robust Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks}},
      booktitle = {IEEE Securecom'07},
      year = {2007},
      author={C. Castelluccia and A. Spognardi},
      }
  • C. Castelluccia and M. Soos, "Secret Shuffling: A Novel Approach to RFID Private Identification," in RFIDSec’07, 2007, pp. 169-180.
    @INPROCEEDINGS{Castelluccia07Secret,
      author = {Castelluccia, Claude and Soos, Mate},
      title = {Secret Shuffling: A Novel Approach to {RFID} Private Identification},
      booktitle = {{RFIDSec}'07},
      pages = {169-180},
      year = {2007},
      month = {July}
    }
  • A. Francillon and C. Castelluccia, "TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes," in Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, 2007. WiOpt 2007. 5th International Symposium on, 2007, pp. 1-7.
    @inproceedings{TinyRNG, title={{TinyRNG}: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes},
      author={Francillon, Aurélien and Castelluccia, Claude},
      booktitle={Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, 2007. WiOpt 2007. 5th International Symposium on},
      year= {2007},
      month= {April},
      pages= {1-7},
      keywords={cryptographic protocols, random number generation, random processes, telecommunication security, wireless sensor networkscryptographic random number generator, transmission bit errors, wireless sensors network nodes},
      doi={10.1109/WIOPT.2007.4480051},
      ISSN={},
      }
  • M. A. Kaafar, L. Mathy, B. C. K. Salamatian, T. Turletti, and W. Dabbous, "Secure Coordinate systems for the Internet," in AINTEC 2007, 2007.
    @inproceedings{Aintec07,
      author = {M.A. Kaafar and L. Mathy and C. Barakat. K. Salamatian and T. Turletti and W. Dabbous},
      title = {Secure Coordinate systems for the Internet},
      booktitle = {AINTEC 2007},
      month = November, year = {2007},
      location = {Phuket},
      }
  • M. A. Kaafar, L. Mathy, B. C. K. Salamatian, T. Turletti, and W. Dabbous, "Securing Internet Coordinate Embedding Systems," in ACM SIGCOMM, 2007.
    @inproceedings{SIGCOMM07,
      author = {M.A. Kaafar and L. Mathy and C. Barakat. K. Salamatian and T. Turletti and W. Dabbous},
      title = {Securing Internet Coordinate Embedding Systems},
      booktitle = {ACM SIGCOMM},
      month = August, year = {2007},
      location = {Kyoto},
      }
  • M. A. Kaafar, T. Turletti, , and W. Dabbous, "A Locating-First Approach for Scalable Overlay multicast," in IEEE International Workshop on QoS, 2006.
    @inproceedings{IWQoS06,
      author = {M.A. Kaafar and T. Turletti and and W. Dabbous},
      title = {A Locating-First Approach for Scalable Overlay multicast},
      booktitle = {IEEE International Workshop on QoS},
      month = June, year = {2006},
      location = {New Heaven},
      publisher = {IEEE Communications Society},
      }
  • C. Castelluccia and G. Avoine, "Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags," in CARDIS, Tarragona, Spain, 2006, pp. 289-299.
    @INPROCEEDINGS{Cardis06,
      author = {Castelluccia, Claude and Avoine, Gildas},
      title = {Noisy Tags: A Pretty Good Key Exchange Protocol for {RFID} Tags},
      booktitle = {CARDIS},
      year = {2006},
      editor = {Domingo-Ferrer, Josep and Posegga, Joachim and Schreckling, Daniel},
      volume = {3928},
      series = {Lecture Notes in Computer Science},
      pages = {289--299},
      address = {Tarragona, Spain},
      month = {April},
      organization = {IFIP},
      publisher = {Springer-Verlag},
      }
  • C. Castelluccia, E. Mykletun, and G. Tsudik, "Improving secure server performance by re-balancing SSL/TLS handshakes," in ASIACCS ‘06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, New York, NY, USA, 2006, pp. 26-34.
    @inproceedings{asiaccs06,
      author = {Claude Castelluccia and Einar Mykletun and Gene Tsudik},
      title = {Improving secure server performance by re-balancing SSL/TLS handshakes},
      booktitle = {ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security},
      year = {2006},
      isbn = {1-59593-272-0},
      pages = {26--34},
      location = {Taipei, Taiwan},
      doi = {http://doi.acm.org/10.1145/1128817.1128826},
      publisher = {ACM Press},
      address = {New York, NY, USA},
      }
  • I. Aad, C. Castelluccia, and J. P. Hubaux, "Packet Coding for Strong Anonymity in Ad Hoc Networks," in IEEE SecureComm 2006., 2006.
    @inproceedings{Securecom06,
      author = "Aad,I. and Castelluccia,C. and Hubaux,J.P.", title = "Packet Coding for Strong Anonymity in Ad Hoc Networks", booktitle = "IEEE SecureComm 2006.", year = "2006" }
  • M. A. Kaafar, L. Mathy, T. Turletti, and W. Dabbous, "Real Attacks on Virtual Networks: Vivaldi out of tune," in ACM SIGCOMM workshop Large Scale Attack Defense (LSAD), 2006.
    @inproceedings{SIGCOMMLSAD06,
      author = {M.A. Kaafar and L. Mathy and T. Turletti and W. Dabbous},
      title = {Real Attacks on Virtual Networks: Vivaldi out of tune},
      booktitle = {ACM SIGCOMM workshop Large Scale Attack Defense (LSAD)},
      month = September, year = {2006},
      location = {Pisa},
      publisher = {ACM Press.},
      }
  • M. A. Kaafar, C. Mrabet, and T. Turletti, "A Topolopgy-aware overlay multicast approach for mobile ad-hoc networks," in Asian Internet Engineering Conference (AINTEC), 2006.
    @inproceedings{Aintec06,
      author = {M.A. Kaafar and C. Mrabet and T. Turletti},
      title = {A Topolopgy-aware overlay multicast approach for mobile ad-hoc networks},
      booktitle = {Asian Internet Engineering Conference (AINTEC)},
      month = November, year = {2006},
      location = {Bangkok},
      publisher = {LNCS Springer},
      }
  • M. A. Kaafar, L. Mathy, T. Turletti, and W. Dabbous, "Virtual Networks under Attack: Disrupting Internet Coordinate Systems," in ACM/e-NEXT International Conference on Future Networking Technologies, 2006.
    @inproceedings{CoNext06,
      author = {M.A. Kaafar and L. Mathy and T. Turletti and W. Dabbous},
      title = {Virtual Networks under Attack: Disrupting Internet Coordinate Systems},
      booktitle = {ACM/e-NEXT International Conference on Future Networking Technologies},
      month = December, year = {2006},
      location = {Lisboa},
      publisher = {ACM Press},
      }
  • Z. Khallouf, V. Roca, R. Moignard, and S. Loye, "A Filtering Approach for an IGMP Flooding Resilient Infrastructure," in 4ème Conférence sur la Sécurité et Architectures Réseaux (SAR’05), Batz sur Mer, France, 2005.
    @InProceedings{Khallouf.sar05,
      author= "Z. Khallouf and V. Roca and R. Moignard and S. Loye", title = "A Filtering Approach for an IGMP Flooding Resilient Infrastructure", BookTitle = "4ème Conférence sur la Sécurité et Architectures Réseaux (SAR'05), Batz sur Mer, France", month = jun, year = 2005 }
  • C. Castelluccia and P. Mutaf, "Shake them up!: a movement-based pairing protocol for CPU-constrained devices," in Proceedings of the 3rd ACM conference on Mobile systems, applications, and services, New York, NY, USA, 2005, pp. 51-64.
    @inproceedings{mobisys05,
      author = {Claude Castelluccia and Pars Mutaf},
      title = {Shake them up!: a movement-based pairing protocol for CPU-constrained devices},
      booktitle = {Proceedings of the 3rd ACM conference on Mobile systems, applications, and services},
      year = {2005},
      isbn = {1-931971-31-5},
      pages = {51--64},
      location = {Seattle, Washington},
      doi = {http://doi.acm.org/10.1145/1067170.1067177},
      publisher = {ACM Press},
      address = {New York, NY, USA},
      }
  • C. Neumann and V. Roca, "Impacts of the Startup Behavior of Multilayered Multicast Congestion Control Protocols on the Performance of Content Delivery Protocols," in IEEE 10th International Workshop on Web Content Caching and Distribution, Sophia Antipolis, French Riviera, France, (also in INRIA Research Report RR-5578), 2005.
    @InProceedings{Neumann.wccd05,
      author= "C. Neumann and V. Roca", title = "Impacts of the Startup Behavior of Multilayered Multicast Congestion Control Protocols on the Performance of Content Delivery Protocols", BookTitle = "IEEE 10th International Workshop on Web Content Caching and Distribution, Sophia Antipolis, French Riviera, France, (also in INRIA Research Report RR-5578)", month = sep, year = 2005 }
  • C. Neumann, V. Roca, A. Francillon, and D. Furodet, "Impacts of Packet Scheduling and Packet Loss Distribution on FEC Performances: Observations and Recommendations," in ACM CoNEXT’05 Conference, Toulouse, France, 2005.
    @InProceedings{Neumann.conext05,
      author= "C. Neumann and V. Roca and A. Francillon and D. Furodet", title = "Impacts of Packet Scheduling and Packet Loss Distribution on FEC Performances: Observations and Recommendations", BookTitle="ACM CoNEXT'05 Conference, Toulouse, France", month = Oct, year = 2005 }
  • C. Neumann, V. Roca, A. Francillon, and D. Furodet, "Impacts of packet scheduling and packet loss distribution on FEC Performances: observations and recommendations," in CoNEXT ‘05: Proceedings of the 2005 ACM conference on Emerging network experiment and technology, New York, NY, USA, 2005, pp. 166-176.
    @inproceedings{CoNEXT_FEC,
      author = {Neumann, Christoph and Roca, Vincent and Francillon, Aurélien and Furodet, David},
      title = {Impacts of packet scheduling and packet loss distribution on FEC Performances: observations and recommendations},
      booktitle = {CoNEXT '05: Proceedings of the 2005 ACM conference on Emerging network experiment and technology},
      year = {2005},
      isbn = {1-59593-197-X},
      pages = {166--176},
      location = {Toulouse, France},
      doi = {http://doi.acm.org/10.1145/1095921.1095944},
      publisher = {ACM},
      address = {New York, NY, USA},
      }
  • C. Castelluccia, N. Saxena, and J. Yi, "Self-Configurable Key Pre-distribution in Mobile Ad-Hoc Network," in IFIP Networking 2005, 2005.
    @inproceedings{ifip05,
      author = "Castelluccia,C. and Saxena, N. and Yi, J.", title = "Self-Configurable Key Pre-distribution in Mobile Ad-Hoc Network", booktitle = "IFIP Networking 2005", year = "2005" }
  • C. Neumann and V. Roca, "Scalable Video Streaming over ALC (SVSoA): a Solution for the Large Scale Multicast Streaming of Videos," in First International Workshop on ‘Streaming Media Distribution over the Internet’ (SMDI04), Athens, Greece, 2004.
    @InProceedings{Neumann.smdi04,
      author= "C. Neumann and V. Roca", title = "Scalable Video Streaming over ALC (SVSoA): a Solution for the Large Scale Multicast Streaming of Videos", BookTitle = "First International Workshop on 'Streaming Media Distribution over the Internet' (SMDI04), Athens, Greece", month = may, year = 2004 }
  • A. El-Sayed and V. Roca, "On Robustness in Application-Level Multicast: the Case of HBM," in 9th IEEE Symposium on Computers and Communications (ISCC’04), Alexandria, Egypt, 2004.
    @InProceedings{Elsayed.iscc04,
      author= " A. El-Sayed and V. Roca", title = "On Robustness in Application-Level Multicast: the Case of HBM", BookTitle = "9th IEEE Symposium on Computers and Communications (ISCC'04), Alexandria, Egypt", month = jun, year = 2004 }
  • C. Neumann and V. Roca, "Analysis of FEC Codes for Partially Reliable Media Broadcasting Schemes," in 2nd International Workshop on Multimedia Interactive Protocols and Systems (MIPS’04), Grenoble, France, 2004.
    @InProceedings{Neumann.mips04,
      author= "C. Neumann and V. Roca", title = "Analysis of FEC Codes for Partially Reliable Media Broadcasting Schemes", BookTitle = "2nd International Workshop on Multimedia Interactive Protocols and Systems (MIPS'04), Grenoble, France", month = nov, year = 2004 }
  • L. Alchaal, V. Roca, and M. Habert, "Managing and Securing Web Services with VPNs," in 2nd IEEE International Conference on Web Services (ICWS 2004), 2004.
    @InProceedings{Alchaal.icws04,
      author= "L. Alchaal and V. Roca and M. Habert", title = "Managing and Securing Web Services with VPNs", BookTitle = "2nd IEEE International Conference on Web Services (ICWS 2004)", month = jul, year = 2004 }

Journal papers

  • R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Data Security in Unattended Wireless Sensor Networks," in Autonomic Network Computing, IEEE Transaction on Computers, 2009.
    @inproceedings{toc,
      author = {R. {Di Pietro} and L. V. Mancini and C. Soriente and A. Spognardi and G. Tsudik},
      title = {Data Security in Unattended Wireless Sensor Networks},
      booktitle = {Autonomic Network Computing, IEEE Transaction on Computers},
      year = {2009},
      }
  • C.Castelluccia, A. Chan, E.Meykletun, and G.Tsudik, "Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks," ACM ToSN (Transaction on Sensor Networks), 2009.
    @Article{ToSN09,
      author = {C.Castelluccia and A. Chan and E.Meykletun and G.Tsudik},
      title = {Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks},
      journal = {ACM ToSN (Transaction on Sensor Networks)},
      year = 2009 }
  • S.Peter, D.Westhoff, and C.Castelluccia, "A Survey on the Encryption of Convergecast-Traffic with In-Network Processing," IEEE Transactions on Dependable and Secure Computing (TDSC), 2009.
    @article{TDSC09,
      author = {S.Peter and D.Westhoff and C.Castelluccia},
      title = {A Survey on the Encryption of Convergecast-Traffic with In-Network Processing},
      journal = {IEEE Transactions on Dependable and Secure Computing (TDSC)},
      year = {2009},
      }
  • B. Donnet, B. Gueye, and M. A. Kaafar, "A survey on Network Coordinates Systems, Design and Security," IEEE Communications Surveys and Tutorials, 2009.
    @Article{Sur09,
      author = {B. Donnet and B. Gueye and M. A. Kaafar},
      title = {A survey on Network Coordinates Systems, Design and Security},
      journal = {IEEE Communications Surveys and Tutorials},
      year = {2009},
      publisher = {IEEE Communications Society},
      }
  • C.Castelluccia and M. A. Kaafar, "Owner-Centric Networking: A New Architecture for a Pollution-Free Internet," ERCIM News, Special Theme on Future Internet Technology, vol. 77, 2009.
    @article{OCNERCIM09,
      author = {C.Castelluccia and M.A. Kaafar},
      title = "Owner-Centric Networking: A New Architecture for a Pollution-Free Internet", journal = {ERCIM News, Special Theme on Future Internet Technology},
      volume = {77},
      year = {2009},
      doi = {http://ercim-news.ercim.org/images/stories/EN77/EN77-web.pdf},
      publisher = {ERCIM},
      }
  • C. Claude, S. Nitesh, and Y. Jeong, "Robust Self-Keying Mobile Ad Hoc Networks," Elsevier Computer Networks, vol. 51, iss. 4, 2007.
    @article{CN07,
      author = {Castelluccia Claude and Saxena Nitesh and Yi Jeong},
      title = {Robust Self-Keying Mobile Ad Hoc Networks},
      journal = {Elsevier Computer Networks},
      volume = {51},
      number = {4},
      year = {2007},
      }
  • P. Mutaf and C. Castelluccia, "Hash-based paging and location update using Bloom filters," ACM/Kluwer Journal on Mobile Networks and Applications (MONET), vol. 10, iss. 2, 2005.
    @article{Monet05,
      author = {Mutaf, Pars and Castelluccia, Claude},
      title = {Hash-based paging and location update using Bloom filters},
      journal = {ACM/Kluwer Journal on Mobile Networks and Applications (MONET)},
      volume = {10},
      number = {2},
      year = {2005},
      }

Book chapters

  • V. Roca, "Multimedia Multicast on the Internet." ISTE, 2007.
    @inbook{Roca.cdp1_book07,
      author= "V. Roca", title = "{Multimedia Multicast on the Internet}", publisher = "ISTE", chapter = "Reliability in group communications: an introduction", month = jan, year = 2007 }

Technical reports

  • P. Manils, A. Chaabane, L. B. S, M. A. Kaafar, C. Castelluccia, A. Legout, and W. Dabbous. () Compromising Tor Anonymity Exploiting P2P Information Leakage. [Online]. Available: http://hal.archives-ouvertes.fr/inria-00471556/PDF/TorBT.pdf
    @misc{TechReportBtTor10, title = { {C}ompromising {T}or {A}nonymity {E}xploiting {P}2{P} {I}nformation {L}eakage},
      author = {Pere Manils and Abdelberri Chaabane and Le Blond {S}tevens and Mohamed Ali Kaafar and Claude Castelluccia and Arnaud Legout and Walid Dabbous},
      affiliation = {{PLANETE} - {INRIA} {S}ophia {A}ntipolis / {INRIA} {R}h{\^o}ne-{A}lpes - {INRIA} },
      URL = {http://hal.archives-ouvertes.fr/inria-00471556/en/},
      howpublished = {\url{http://hal.archives-ouvertes.fr/inria-00471556/PDF/TorBT.pdf}},
      year = {2010},
      }
  • M. A. Kaafar, L. Mathy, C. Barakat, K. Salamatian, T. Turletti, and W. Dabbous, "Securing Internet Coordinate System : Embedding Phase," INRIA2007.
    @techreport{EmbeddingCoordsSec07,
      author = {M. A. Kaafar and L. Mathy and C. Barakat and K. Salamatian and T. Turletti and W. Dabbous},
      title = {Securing Internet Coordinate System : Embedding Phase},
      year = {2007},
      institution = {INRIA},
      }
  • M. A. Kaafar, L. Mathy, C. Barakat, K. Salamatian, T. Turletti, and W. Dabbous, "Securing the distance Estimation phase of Internet Coordinate systems," INRIA2007.
    @techreport{TechRepAppliCoords07,
      author = {M. A. Kaafar and L. Mathy and C. Barakat and K. Salamatian and T. Turletti and W. Dabbous},
      title = {Securing the distance Estimation phase of Internet Coordinate systems},
      year = {2007},
      institution = {INRIA},
      }
  • M. A. Kaafar, L. Mathy, T. Tureltti, and W. Dabbous, "Virtual Networks under Attack : Disrupting Internet Coordinate Systems," INRIA2006.
    @techreport{CoordsSec06,
      author = {M. A. Kaafar and L. Mathy and T. Tureltti and W. Dabbous},
      title = {Virtual Networks under Attack : Disrupting Internet Coordinate Systems},
      year = {2006},
      institution = {INRIA},
      }
  • A. Francillon and S. Deswaerte, "ROHC, RObust Header Compression, RTP/UDP/IP demo," Demo at International Workshop on Multimedia Interactive Protocols and Systems (MIPS’04)2005.
    @techreport{ROHC,
      author = {Francillon, Aurélien and Deswaerte, Sylvain},
      title = {ROHC, RObust Header Compression, RTP/UDP/IP demo},
      institution = {Demo at International Workshop on Multimedia Interactive Protocols and Systems (MIPS'04)},
      month = {October},
      year = {2005},
      }
  • M. A. Kaafar, T. Tureltti, and W. Dabbous, "Locate, Cluster and Conquer : A Scalable Topologyaware Overlay Multicast," INRIA2005.
    @techreport{LCCReportTech06,
      author = {M. A. Kaafar and T. Tureltti and W. Dabbous},
      title = {Locate, Cluster and Conquer : A Scalable Topologyaware Overlay Multicast},
      year = {2005},
      institution = {INRIA},
      }

Standardization efforts

  • V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, and K. Matsuzono, "Reed-Solomon Forward Error Correction (FEC) Schemes for FECFRAME," 2009.
    @Manual{draft.rs_for_fecframe-01,
      author= "V. Roca and M. Cunche and J. Lacan and A. Bouabdallah and K. Matsuzono", title = "Reed-Solomon Forward Error Correction (FEC) Schemes for FECFRAME", note = "IETF FECFRAME Working Group, Work in Progress: $<$draft-roca-fecframe-rs-01.txt$>$", month = jul, year = 2009 }
  • J. Lacan, V. Roca, J. Peltotalo, and S. Peltotalo, "Reed-Solomon Forward Error Correction (FEC) Schemes," 2009.
    @Manual{rfc5510,
      author= "J. Lacan and V. Roca and J. Peltotalo and S. Peltotalo", title = "Reed-Solomon Forward Error Correction (FEC) Schemes", note = "IETF Request for Comments, RFC 5510 (Standards Track/Proposed Standard)", month = apr, year = 2009 }
  • V. Roca, M. Cunche, and J. Lacan, "LDPC-Staircase Forward Error Correction (FEC) Schemes for FECFRAME," 2009.
    @Manual{draft.ldpc_for_fecframe-00,
      author= "V. Roca and M. Cunche and J. Lacan", title = "LDPC-Staircase Forward Error Correction (FEC) Schemes for FECFRAME", note = "IETF FECFRAME Working Group, Work in Progress: $<$draft-roca-fecframe-ldpc-00.txt$>$", month = jul, year = 2009 }
  • V. Roca, "Simple Authentication Schemes for the ALC and NORM Protocols," 2009.
    @Manual{draft.simple_auth-01,
      author= "V. Roca", title = "Simple Authentication Schemes for the ALC and NORM Protocols", note = "IETF RMT Working Group, Work in Progress: $<$draft-ietf-rmt-simple-auth-for-alc-norm-01.txt$>$", month = mar, year = 2009 }
  • V. Roca and B. Adamson, "FCAST: Scalable Object Delivery for the ALC and NORM Protocols," 2009.
    @Manual{draft.newfcast-06,
      author= "V. Roca and B. Adamson", title = "FCAST: Scalable Object Delivery for the ALC and NORM Protocols", note = "IETF RMT Working Group (individual document), Work in Progress: $<$draft-roca-rmt-newfcast-05.txt$>$", month = oct, year = 2009 }
  • V. Roca, C. Neumann, and D. Furodet, "Low Density Parity Check (LDPC) Staircase and Triangle Forward Error Correction (FEC) Schemes," 2008.
    @Manual{rfc5170.ldpc,
      author= "V. Roca and C. Neumann and D. Furodet", title = "Low Density Parity Check (LDPC) Staircase and Triangle Forward Error Correction (FEC) Schemes", note = "IETF Request for Comments, RFC 5170 (Standards Track/Proposed Standard)", month = jun, year = 2008 }
  • V. Roca, A. Francillon, and S. Faurite, "TESLA source authentication in the ALC and NORM protocols," IETF RMT Working Group2006.
    @techreport{TeslaRFC,
      author = {Roca, Vincent and Francillon, Aurélien and Faurite, Sébastien},
      title = {TESLA source authentication in the ALC and NORM protocols},
      institution = {IETF RMT Working Group},
      month = {June},
      year = {2006},
      note = {draft-ietf-msec-tesla-for-alc-norm-00.txt},
      }
  • STMicroelectronics and INRIA-Planete, "LDPC benchmarking for DVB-H," Document submitted to the DVB-H CDP Working Group2005.
    @techreport{LDPC_DVBH,
      author = {STMicroelectronics and INRIA-Planete},
      title = {{LDPC} benchmarking for {DVB-H}},
      institution = {Document submitted to the DVB-H CDP Working Group},
      month = {December},
      year = {2005},
      }