Publications
 

Elisavet KozyriFred B. SchneiderAndrew BedfordJosée Desharnais, Nadia Tawbi

Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement. CSF 2019: 351-366. PDF (local version). Bibtex

Andrew Bedford, Stephen Chong, Josée Desharnais, Elisavet Kozyri,  Nadia Tawbi: A progress-sensitive flow-sensitive inlined information-flow control monitor (extended version). Computers & Security, 2017,  Vol 71, 114--131. PDF (local version). Bibtex

Andrew Bedford, Stephen Chong, Josée Desharnais,  Nadia Tawbi: A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor. IFIP SEC 2016: 352-366. PDF. Bibtex.

Andrew Bedford, Sébastien GarvinJosée Desharnais, Nadia Tawbi, Hana AjakanFrédéric AudetBernard Lebel: Andrana: Quick and Accurate Malware Detection for Android. FPS-2016: 20-35. PDF. Bibtex

Mina SheikhalishahiMohamed Mejri, Nadia Tawbi, Fabio Martinelli:
Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm. FPS-2016: 161-file:20978178. PDFBibtex

Mina Sheikhalishahi, Mohamed Mejri, Nadia Tawbi: On the Abstraction of a Categorical Clustering Algorithm. MLDM 2016: 659-675. PDFBibtex.

 

Mina SheikhAlishahi, Andrea , Mohamed Mejri, Nadia Tawbi, Fabio Martinelli: Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns. STM 2015: 3-19. PDF. Bibtex.

Mina Sheikhalishahi, Mohamed Mejri, Nadia Tawbi:Clustering Spam Emails into Campaigns.
ICISSP 2015: 90-97. PDF. Bibtex

Mina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli:
Fast and Effective Clustering of Spam Emails Based on Structural Similarity.Foundations and Practice of Security, FPS 2015 : 195-211, PDF. Bibtex.

Raphaël Khoury and Nadia Tawbi: Equivalence-preserving corrective enforcement of security properties. 
International Journal of  Information and Computer Security Volume 7, number 2/3/4: 113-139 (2015), PDF. Bibtex

 

A. Bedford, J. Desharnais, T. G. Godonou and N. Tawbi. Enforcing information flow by combining static and dynamic analysis,  International Symposim on Foundations & Practice of Security (FPS'2013). PDF. Bibtex

 

J. Desharnais, E. P. Kanyabwero and N. Tawbi. Enforcing information flow policies by a three-valued analysis,  International Conference "Mathematical Methods, Models and Architectures for Computer Network Security" (MMM-ACNS 2012). Full version with proofs.  bibtex

 

 R. Khoury, and N. Tawbi. Corrective Enforcement: A new Paradigm of Security Policy Enforcement by Monitors.    ACM Transactions on Information and System Security (2012). PDF. bibtex.

 

R. Khoury, and N. Tawbi. Which security policies are enforceable by runtime monitors? A survey. Computer Science Review 6 (2012) pp 27-45. PDF, bibtex.

 

F. Lemay, R. Khoury and N. Tawbi. Optimized Inlining of Runtime Monitors. NordSec 2011. PDF, bibtex.  

 H.  Chabot, R. Khoury, and N. Tawbi. Extending the Enforcement Power of Truncation Monitors Using Static Analysis.  Computers & Security (2011). PDF, bibtex

 

R. Khoury, and N. Tawbi.  Corrective Enforcement of Security Policies. In Proceedings of the The 7th International Workshop on Formal Aspects of Security & Trust. September 2010. PDF, bibtex.

 

R. Khoury, and N. Tawbi. Using Equivalence Relations for Corrective Enforcement of Security Policies. In Proceedings of the  5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, Lecture Notes in Computer Science, volume 6258. September 2010. PDF, bibtex

 

H. Chabot, R. Khoury, and N. Tawbi. Generating in-line monitors for Rabin automata. In Proceedings of The 14th Nordic Conference on Secure IT  Systems. October 2009. PDF, bibtex.  

 

N. Tawbi C. Talhi and M. Debbabi. Execution monitoring enforcement under memory-limitations constraints.Information and Computation, 2008. PDF, bibtex

 

H. Yahyaoui, M. Debbabi and N. Tawbi. A denotational Semantic Model for Validationg JVML/CLDC Optimizations under Isabelle/HOL. International Conference on Quality Software, 2007. PDF, bibtex.

 

C. Talhi, Nadia Tawbi, and M. Debbabi. Execution monitoring enforcement for limited-memory systems. In proceedings of PST06 Conference (Privacy, Security, Trust), October 2006. PDF, bibtex.

 

C. Talhi, Nadia Tawbi, and M. Debbabi. Execution monitoring enforcement under memory-limitation constraints. In proceedings of FCS-ARSPA-06 (Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis) associated with FLOC 2006 (Federated Logic Conference), August 2006. PDF, bibtex.

 

M. Debbabi, A. Gherbi, L. Ketari, C. Talhi, N. Tawbi, H. Yahyaoui, and S. Zhioua. On the Acceleration of Embedded Java Virtual Machines, Journal of Object Thechnology, 4(1), January 2005. PDF, bibtex.

 

M. Debbabi, A. Mourad, and N. Tawbi. Armed E-Bunny: A Selective Dynamic Compiler for Embedded Java Virtual Machines Targeting ARM Processors. In 20th ACM Symposium on Applied Computing SAC 2005, Special Track Embedded Systems: Applications, Solutions, and Techniques, March 2005. PDF, bibtex.

 

S. Cloutier, C. Gustave, R. Khoury, D Nassour, A. Robison, Frédéric Samson, and N. Tawbi.  Alternative Java Security Policy Model. In Nouvelles Technologies de la répartition, (NOTERE 2004), June 2004. PDF, bibtex.

 

M. Debbabi, A. Gherbi, L. Ketari, N. Tawbi C. Talhi, H. Yahyaoui, and S. Zhioua. A Dynamic Compiler for Embedded Java Virtual Machines. In the 3rd International Conference on the Principles and Practice of Programming in Java (ACM PPPJ'04), June 2004. PDF, bibtex.

 

M. Debbabi, J. Desharnais, B. Ktari, F. Michaud, and N. Tawbi.  A Framework for the certification of COTS. In Proceedings of workshop on Security and network Architecture, pages 275--284, 2003. PDF, bibtex.

 

M. Debbabi, M. Erhioui, L. Ketari, N. Tawbi, H. Yahyaoui, and S. Zhioua. Method Call Acceleration in Embedded Java Virtual Machines. In P. Sloot, D. Abramson, A. Bogdanov, J. Dongara, A. Zomaya, and Y. Gorbachev, editors, Proceedings of ICCS 2003, Lecture Notes in Computer Science, LNCS 2659, pages 750--759, Melbourne, Australia, June 2003. PDF, bibtex.

 

H. Yahyaoui, N. Tawbi, and J.-F. Rodrigue.  Analyse de flot de contrôle en présence des exceptions pour Java. In Proceedings of IEEE CCECE 2003, May 2003. PDF, bibtex.

 

A. Boukhtouta, M. Debbabi, and N Tawbi.A new paradigm for decision-making: Business Intelligence and Digital Cockpits. In Proceedings of the 10th ISPE International Conference on Concurrent Engineering: Research and Applications, A.A.Balkema Publishers (acquired by Swets and Zeitlinger Publishers in 2000), July 2003. PDF, bibtex.

 

M. Debbabi, N. Tawbi, and H. Yahyaoui.  Formal Dynamic Semantics of Java: an Essential Ingredient of Java Security. Journal of Telecommunications and Information Technology, 4:81--120, 2002. invited paper. PDF, bibtex.

 

M. Debbabi, J. Desharnais, M. Fourati, E. Menif, F. Painchaud, and N. Tawbi. Secure Self-Certified Code for Java. In Proceedings of Formal Aspects of Security 2002, pages 1--19, December 2002. LNCS volume 2629. PDF,  bibtex.

 

J. Bergeron, M. Debbabi, J Desharnais, M. Erhioui, Y. Lavoie, and N Tawbi. Static Detection of Malicious Code in Executable Programs. In Symposium on Requirements Engineering for Information Security, May 2000. PDF, bibtex.

 

M. Debbabi, E. Giasson, B. Ktari, F. Michaud, and N. Tawbi. Secure self-certified code. In Proceedings of the IEEE 9th International Workshop on Enterprise Security (WETICE'00), National Institute of Standards and Technology (NIST), Maryland, USA, June 2000. IEEE Press. PDF, bibtex.

 

M. Debbabi, M. Girard, L. Poulin, M. Salois, and N. Tawbi.  Dynamic Monitoring of Malicious Activity in Software Systems. In Symposium on Requirements Engineering for Information Security, May 2000. PDF, bibtex.

 

J. Bergeron, M. Debbabi, J. Desharnais, B. Ktari, M. Salois, and N. Tawbi.  Detection of malicious code in COTS software: A short survey. In First International Software Assurance Certification Conference (ISACC'99). PDF, bibtex.

 

M. Debabi, M. Mejri, N. Tawbi, and I. Yahmadi.  From ProtocolSpecifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. In WETICE 97 Workshop on Enterprise Security, June 1997. PDF, bibtex.

 

M. Debbabi, M. Mejri, N. Tawbi, and I. Yahmadi.  A New Algorithm for the Automatic Verification of Authentication Protocols. In the DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997. PDF, bibtex.

 

M. Debbabi, M. Mejri, N. Tawbi, and I. Yahmadi.  Formal Automatic Verification of Authentication Cryptographic Protocols. In the First IEEE International Conference on Formal Engineering Methods, ICFEM'97, November 1997. PDF, bibtex.

 

F. Bouguerch, M. Debbabi, and N. Tawbi. Information Control Nets as Processes: Qualitative Analysis. International Journal of Concurrent Engineering: Research and Application, pages 50--59, November 1996. PDF, bibtex.

 

M. Debbabi, A. Faour, and N. Tawbi. Efficient type-based control-flow analysis of higher-order concurrent programs. In Proceedings of the International Workshop on Functional and Logic Programming, IFL'96, pages 247--266. Spriger-Verlag LNCS 1268,September 1996. PDF, bibtex.

 

G. Chehaibar, H Garavel, L. Mounier, N. Tawbi, and F Zulian. Specification and Verification of the PowerScaleTM Bus Arbitration Protocol: An Industial Experiment with LOTOS. In Proceedings of FORTE/PSTV 1996, Reinhard Gotzhein, Jan Bredereke (eds.) Formal Description Techniques IX. Chapman and Hall (Sep. 1996). ISBN 0 412 79490 X., September 1996. PDF, bibtex.

 

J.M. Bouille, G. Chehaibar, A. Faivre, C. Loiseaux, and N. Tawbi. ASPIC: Vers un Outil de Vérification de Programmes C par analyse  Sémantique. In Proceedings of the lambda-mu'96 Conference, France, pages 1--15, 1996. PDF, bibtex.

 

N. Tawbi. Estimation of nested loops execution time by integer arithmetic in convex polyhedra. In H. J. Siegel, editor, Proceedings of the 8th International Symposium on Parallel Processing, pages 217--223. IEEE Computer Society Press, April 1994. PDF, bibtex.

 

N. Tawbi and P. Feautrier. Processor allocation and loop scheduling on multiprocessor computers. In Proceedings of the International Conference on Supercomputing, pages 63--71. ACM Press, July 1992. PDF, bibtex.

 

B. Dehbonei, N. Tawbi, and P. Feautrier. Parametrized Dependence Graph: A Structure for Efficient Recompilation inside a Parallel Programming Environment. In Proceedings of IEEE-IMACS PDCOM'91, 1991. PDF, bibtex.

 B. Dehbonei, C. Laurent, N. Tawbi, and R. S. Kulkarni. PMACS: An Environment for Parallel Programming. In V. P. Kumar, editor, Proceedings of the 5th International Parallel Processing Symposium, pages 638--641. IEEE Computer Society Press, April-May 1991. PDF, bibtex.

 

B. Dehbonei, C. Laurent, N. Tawbi, and R. S. Kulkarni. Pmacs : An environement for parallel programming. In Proceedings of the International Workshop on Compilers for Parallel Computers, December 1990. PDF, bibtex.

Patent - Brevet


M. Debbabi, N. Tawbi, S. Zhioua, M. Erhioui, L. Ketari, H. Yahyaoui.
Method Call Acceleration in Java Virtual Machines.

Patent disclosure filed at: