Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Arnaud Fontaine is active.

Publication


Featured researches published by Arnaud Fontaine.


data mining in bioinformatics | 2009

Computational identification of protein-coding sequences by comparative analysis

Arnaud Fontaine; Hélène Touzet

Gene prediction is an essential step in understanding the genome of a species once it has been sequenced. For that, a promising direction in current research on gene finding is a comparative genomics approach. In this paper, we present a novel approach to identifying evolutionarily conserved protein-coding sequences in genomes. The method takes advantage of the specific substitution pattern of coding se- quences together with the consistency of reading frames. It has been implemented in a software called Protea. Large- scale experimentation shows good results. Protea is in- tended to be a useful complement to existing tools based on homology search or statistical properties of the sequences.


Nucleic Acids Research | 2008

MAGNOLIA: multiple alignment of protein–coding and structural RNA sequences

Arnaud Fontaine; Antoine de Monte; Hélène Touzet

MAGNOLIA is a new software for multiple alignment of nucleic acid sequences, which are recognized to be hard to align. The idea is that the multiple alignment process should be improved by taking into account the putative function of the sequences. In this perspective, MAGNOLIA is especially designed for sequences that are intended to be either protein-coding or structural RNAs. It extracts information from the similarities and differences in the data, and searches for a specific evolutionary pattern between sequences before aligning them. The alignment step then incorporates this information to achieve higher accuracy. The website is available at http://bioinfo.lifl.fr/magnolia.


international conference on engineering secure software and systems | 2011

On-device control flow verification for Java programs

Arnaud Fontaine; Samuel Hym; Isabelle Simplot-Ryl

While mobile devices have become ubiquitous and generally multi-application capable, their operating systems provide few high level mechanisms to protect services offered by application vendors against potentially hostile applications coexisting on the device. In this paper, we tackle the issue of controlling application interactions including collusion in Java-based systems running on open, constrained devices such as smart cards or mobile phones. We present a model specially designed to be embedded in constrained devices to verify on-device at loading-time that interactions between applications abide by the security policies of each involved application without resulting in run-time computation overheads; this model deals with application (un)installations and policy changes in an incremental fashion. We sketch the application of our approach and its security enhancements on a multi-application use case for GlobalPlatform/Java Card smart cards.


bioinformatics and biomedicine | 2007

Computational Identification of Protein-Coding Sequences by Comparative Analysis

Arnaud Fontaine; Hélène Touzet

Gene prediction is an essential step in understanding the genome of a species once it has been sequenced. For that, a promising direction in current research on gene finding is a comparative genomics approach. In this paper, we present a novel approach to identifying evolutionarily conserved protein-coding sequences in genomes. The method takes advantage of the specific substitution pattern of coding se- quences together with the consistency of reading frames. It has been implemented in a software called Protea. Large- scale experimentation shows good results. Protea is in- tended to be a useful complement to existing tools based on homology search or statistical properties of the sequences.


formal aspects in security and trust | 2011

Verifiable control flow policies for java bytecode

Arnaud Fontaine; Samuel Hym; Isabelle Simplot-Ryl

This paper presents the enforcement of control flow policies for Java bytecode dedicated to open and constrained devices. On-device enforcement of security policies mostly relies on run-time monitoring or inline checking code, which is not appropriate for strongly constrained devices such as mobile phones and smart-cards. We present a proof-carrying code approach with on-device lightweight verification of control flow policies statically at loading-time. Our approach is suitable for evolving, open and constrained Java-based systems as it is compositional, to avoid re-verification of already verified bytecode upon loading of new bytecode, and it is regressive, to cleanly support bytecode unloading.


Archive | 2012

SecureChange public project deliverable D6.6: Development-time and on-device interplay

Arnaud Fontaine; Olga Gadyatskaya; Frank Piessens; Isabelle Simplot-Ryl; Jan Tobias Mühlberg; Fabio Massacci; Anton Phillipov; Pedro Capelastegui; Bart Jacobs; Pieter Philippaerts


Archive | 2011

Lightweight verification of control flow policies on Java bytecode

Arnaud Fontaine; Samuel Hym; Isabelle Simplot-Ryl


Archive | 2009

New Results - Sound Information Flow

Arnaud Fontaine; Dorina Ghindici; Samuel Hym; Isabelle Simplot-Ryl


Archive | 2009

Contracts and Grants with Industry - ANR SESUR 2007 “Securing Flow of INformation for Computing pervasive Systems” (SFINCS) (2008-2010)

Arnaud Fontaine; Dorina Ghindici; Gilles Grimaud; Samuel Hym; Isabelle Simplot-Ryl


Archive | 2009

Software - STatic Alias aNalyser

Arnaud Fontaine; Samuel Hym; Gilles Grimaud; Isabelle Simplot-Ryl

Collaboration


Dive into the Arnaud Fontaine's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dorina Ghindici

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Gilles Grimaud

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Frank Piessens

National Fund for Scientific Research

View shared research outputs
Top Co-Authors

Avatar

Jan Tobias Mühlberg

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Pieter Philippaerts

Katholieke Universiteit Leuven

View shared research outputs
Researchain Logo
Decentralizing Knowledge