BERTHOLON, B., VARRETTE, S., & BOUVRY, P. (2014). Comparison of Multi-objective Optimization Algorithms for the JShadObf JavaScript Obfuscator. In Proc. of the 17th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2014), part of the 28th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2014). Phoenix, Arizona, USA, Unknown/unspecified: IEEE Computer Society. Peer reviewed |
BERTHOLON, B. (2013). CertiCloud and JShadObf. Towards Integrity and Software Protection in Cloud Computing Platforms [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/17919 |
BERTHOLON, B., VARRETTE, S., & Martinez, S. (2013). ShadObf: A C-source Obfuscator based on Multi-objective Optimization Algorithms. In Proc. of the 16th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2013), part of the 27th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2013). Boston (Massachusetts), USA, Unknown/unspecified: IEEE Computer Society. Peer reviewed |
BERTHOLON, B., VARRETTE, S., & Martinez, S. (2013). ShadObf: A C-Source Obfuscator Based on Multi-objective Optimisation Algorithms. In Proceedings of the 2013 IEEE 27th International Symposium on Parallel and Distributed Processing Workshops and PhD Forum (pp. 435--444). Washington, DC, USA, Unknown/unspecified: IEEE Computer Society. doi:10.1109/IPDPSW.2013.234 Peer reviewed |
BERTHOLON, B., VARRETTE, S., & BOUVRY, P. (2013). JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms. In J. Lopez, X. Huang, ... R. Sandhu (Eds.), Network and System Security (pp. 336-349). Springer Berlin Heidelberg. doi:10.1007/978-3-642-38631-2_25 Peer reviewed |
Martinez, S., VARRETTE, S., & BERTHOLON, B. (2013). Optimisation d'obfuscation de code source au moyen d'algorithmes évolutionnaires multi-objectifs [Poster presentation]. ComPAS’13. |
BERTHOLON, B., VARRETTE, S., & BOUVRY, P. (2012). CERTICLOUD, une plate-forme Cloud IaaS sécurisée. Technique et Science Informatiques, 31 (8-9-10), 1121-1152. doi:10.3166/TSI.31.1121-1152 Peer reviewed |
BERTHOLON, B., VARRETTE, S., & BOUVRY, P. (2011). CertiCloud: a Novel TPM-based Approach to Ensure Cloud IaaS Security. In 4th IEEE Intl. Conf. on Cloud Computing (CLOUD 2011) (pp. 121 - 130). IEEE Computer Society. doi:10.1109/CLOUD.2011.71 Peer reviewed |
VARRETTE, S., BERTHOLON, B., & BOUVRY, P. (2011). A Signature Scheme for Distributed Executions based on Control flow Analysis. In 19th Intl. conference on Security and Intelligent Information Systems (SIIS 2011) (pp. 85-95). Springer. Peer reviewed |
BERTHOLON, B., Cérin, C., Coti, C., Dubacq, J.-C., & VARRETTE, S. (2011). Practical Security in Distributed Systems. In S. Haddad, F. Kordon, L. Pautet, ... L. Petrucci (Eds.), Distributed Systems; Design and Algorithms, 1 (pp. 243--306). Whiley and Son. Peer reviewed |
BERTHOLON, B., Cérin, C., Coti, C., Dubacq, J.-C., & VARRETTE, S. (2011). chap. "Practical Security in Distributed Systems". In Distributed Systems (volume 1); Design and Algorithms (pp. 237--300). Whiley. Peer reviewed |
BERTHOLON, B., VARRETTE, S., & BOUVRY, P. (2011). CertiCloud: une plate-forme Cloud IaaS sécurisée. RenPar'20 2011, 0-10. Peer reviewed |
BERTHOLON, B., VARRETTE, S., & BOUVRY, P. (2011). A Signature Scheme for Distributed Executions based on Control flow Analysis. In Proc. of the 19th Intl. conference on Security and Intelligent Information Systems (SIIS 2011). Warsaw, Poland, Unknown/unspecified: Springer Verlag. Peer reviewed |
BERTHOLON, B., VARRETTE, S., & BOUVRY, P. (2011). TPM-based Approaches to Improve Cloud Security [Paper presentation]. 2011 Grande Region Security and Reliability Day (SecDay 2011). |
VARRETTE, S., BERTHOLON, B., & BOUVRY, P. (2009). A Signature Scheme for Distributed Executions based on Macro-Dataflow Analysis [Paper presentation]. 2nd Int. Workshop on Remote Entrusting (Re-Trust 2009). |