Skip to Main content
Number of documents

58

Publications


Journal articles13 documents

  • Pierre-François Gimenez, Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, et al.. RIDS: Radio intrusion detection and diagnosis system for wireless communications in smart environment. ACM Transactions on Cyber-Physical Systems, ACM, 2021, 5 (3), pp.Article No.: 24. ⟨10.1145/3441458⟩. ⟨hal-03123925⟩
  • Erwan Beguin, Solal Besnard, Adrien Cros, Barbara Joannes, Ombeline Leclerc-Istria, et al.. Computer-Security-Oriented Escape Room. IEEE Security and Privacy Magazine, Institute of Electrical and Electronics Engineers, 2019, 17 (4), pp.78-83. ⟨10.1109/MSEC.2019.2912700⟩. ⟨hal-02297796⟩
  • Yann Bachy, Vincent Nicomette, Mohamed Kaâniche, Eric Alata. Smart-TV security: risk analysis and experiments on Smart-TV communication channels. Journal of Computer Virology and Hacking Techniques, Springer, 2019, 15 (1), pp.61-76. ⟨10.1007/s11416-018-0320-3⟩. ⟨hal-01761974⟩
  • Ivan Studnia, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Youssef Laarouchi. A language-based intrusion detection approach for automotive embedded networks. International Journal of Embedded Systems, Inderscience, 2018, 10 (1), ⟨10.1504/IJES.2018.10010488⟩. ⟨hal-01803432⟩
  • Nicola Accettura, Eric Alata, Pascal Berthou, Daniela Dragomirescu, Thierry Monteil. Addressing scalable, optimal and secure communications over LoRa networks: challenges and research directions. Internet Technology Letters, Wiley, 2018, 1 (4), pp.e54. ⟨10.1002/itl2.54⟩. ⟨hal-02063758⟩
  • Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. IOMMU protection against I/O attacks: A vulnerability and a proof-of-concept. Journal of the Brazilian Computer Society, Springer Verlag, 2018, 24, pp.Article number: 2. ⟨10.1186/s13173-017-0066-7⟩. ⟨hal-02877143⟩
  • Julien Duchene, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. State of the art of network protocol reverse engineering tools. Journal of Computer Virology and Hacking Techniques, Springer, 2018, 14 (1), pp.53-68. ⟨10.1007/s11416-016-0289-8⟩. ⟨hal-01496958⟩
  • Julien Duchene, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. Outils pour la rétro-conception de protocoles : Analyse et classification. Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2016, 35 (6), pp.609-640. ⟨10.3166/tsi.35.609-640⟩. ⟨hal-01864298⟩
  • Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. Identification de vulnérabilités Web et génération de scénarios d'attaque. Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2014, 33 (9-10), pp.809-840. ⟨10.3166/tsi.33.809-840⟩. ⟨hal-01967638⟩
  • Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, et al.. An Invariant-based Approach for Detecting Attacks against Data in Web Applications. International journal of secure software engineering, IGI Global, 2014, 5 (1), pp.19-38. ⟨10.4018/ijsse.2014010102⟩. ⟨hal-01083296⟩
  • Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. An automated black box approach for web vulnerability identification and attack scenario generation. Journal of the Brazilian Computer Society, Springer Verlag, 2014, 20 (1), pp.1--16. ⟨10.1186/1678-4804-20-4⟩. ⟨hal-00985670⟩
  • Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège. La sécurité des box ADSL. Analyse de risques et expérimentations. Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information, Lavoisier, 2014, 19 (6), pp.63-88. ⟨10.3166/isi.19.6.63-88⟩. ⟨hal-01178546⟩
  • Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Matthieu Herrb. Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. Journal in Computer Virology, Springer Verlag, 2011, 7 (2), pp.143-157. ⟨10.1007/s11416-010-0144-2⟩. ⟨hal-00762596⟩

Conference papers42 documents

  • Rémi Adelin, Eric Alata, Vincent Migliore, Vincent Nicomette. A user privacy-centric access control policy of data for intelligent transportation systems. Embedded Real Time Systems (ERTS), Jan 2020, Toulouse, France. ⟨hal-03139783⟩
  • Malcolm Bourdon, Eric Alata, Mohamed Kaâniche, Vincent Migliore, Vincent Nicomette, et al.. Anomaly detection using hardware performance counters on a large scale deployment. 10th European Congress Embedded Real Time Systems (ERTS 2020), Jan 2020, Toulouse, France. ⟨hal-03328254⟩
  • Malcolm Bourdon, Pierre-François Gimenez, Eric Alata, Mohamed Kaâniche, Vincent Migliore, et al.. Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices. 19th IEEE International Symposium on Network Computing and Applications (NCA 2020), Nov 2020, Cambridge, MA, United States. ⟨10.1109/NCA51143.2020.9306726⟩. ⟨hal-03328251⟩
  • Aliénor Damien, Pierre-François Gimenez, Nathalie Feyt, Vincent Nicomette, Mohamed Kaâniche, et al.. On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications. 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), Oct 2020, Coimbra, Portugal. pp.358-368, ⟨10.1109/ISSRE5003.2020.00041⟩. ⟨hal-03094215⟩
  • Aliénor Damien, Michael Marcourt, Vincent Nicomette, Eric Alata, Mohamed Kaâniche. Implementation of a Host-Based Intrusion Detection System for Avionic Applications. 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2019, Kyoto, Japan. pp.178-17809, ⟨10.1109/PRDC47002.2019.00048⟩. ⟨hal-03094199⟩
  • Rémi Adelin, Eric Alata, Vincent Migliore, Vincent Nicomette. Une politique de contrôle d'accès à grains fins aux données pour les systèmes de transport intelligents. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), May 2019, Erquy, France. ⟨hal-03139756⟩
  • Aliénor Damien, Nathalie Feyt, Vincent Nicomette, Eric Alata, Mohamed Kaâniche. Attack Injection into Avionic Systems through Application Code Mutation. 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), Sep 2019, San Diego, United States. pp.1-8, ⟨10.1109/DASC43569.2019.9081616⟩. ⟨hal-03094185⟩
  • Romain Cayre, Vincent Nicomette, Guillaume Auriol, Eric Alata, Mohamed Kaâniche, et al.. Mirage: towards a Metasploit-like framework for IoT. 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), Oct 2019, Berlin, Germany. ⟨hal-02346074⟩
  • Romain Cayre, Jonathan Roux, Eric Alata, Vincent Nicomette, Guillaume Auriol. Mirage : un framework offensif pour l'audit du Bluetooth Low Energy. Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2019), Jun 2019, Rennes, France. pp.229-258. ⟨hal-02268774⟩
  • Julien Duchene, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic. Specification-Based Protocol Obfuscation. DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg City, Luxembourg. pp.1-12, ⟨10.1109/DSN.2018.00056⟩. ⟨hal-01848573⟩
  • Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, et al.. RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Nov 2018, Cambridge, Massachusetts, United States. 8p. ⟨hal-01914981⟩
  • Guillaume Averlant, Eric Alata, Mohamed Kaâniche, Vincent Nicomette, Yuxiao Mao. SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture. IEEE 17th International Symposium on Network Computing and Applications (NCA 2018), Nov 2018, Cambridge, MA, United States. ⟨10.1109/NCA.2018.8548343⟩. ⟨hal-01982589⟩
  • Aliénor Damien, Marc Fumey, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. Anomaly based Intrusion Detection for an Avionic Embedded System. Aerospace Systems and Technology Conference (ASTC-2018), Nov 2018, Londres, United Kingdom. ⟨hal-01967646⟩
  • Jonathan Roux, Eric Alata, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche. Toward an Intrusion Detection Approach for IoT based on Radio Communications Profiling. 13th European Dependable Computing Conference, Sep 2017, Geneva, Switzerland. 4p. ⟨hal-01561710⟩
  • Guillaume Averlant, Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. An abstraction model and a comparative analysis of Intel and ARM hardware isolation mechanisms. The 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2017), Jan 2017, Christchurch, New Zealand. ⟨hal-01493597⟩
  • Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. Bypassing IOMMU Protection against I/O Attacks. 7th Latin-American Symposium on Dependable Computing (LADC’16), Oct 2016, Cali, Colombia. pp.145-150, ⟨10.1109/LADC.2016.31⟩. ⟨hal-01419962⟩
  • Benoît Morgan, Guillaume Averlant, Eric Alata, Vincent Nicomette. Bypassing DMA Remapping with DMA. Symposium sur le Sécurité des Technologies de l'Informatino et des Communications, Jun 2016, Rennes, France. 9p. ⟨hal-01322881⟩
  • Julien Duchene, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. Protocol reverse engineering: Challenges and obfuscation. The 11th International Conference on Risks and Security of Internet and Systems - CRiSIS 2016, Sep 2016, Roscoff, France. ⟨10.1007/978-3-319-54876-0_11⟩. ⟨hal-01388060⟩
  • Ivan Studnia, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Youssef Laarouchi. A language-based intrusion detection approach for automotive embedded networks. IEEE Pacific Rim International Symposium on Dependable Computing ( PRDC ), Nov 2015, Zhangjiajie, China. ⟨hal-01967640⟩
  • Yann Bachy, Frédéric Basse, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, et al.. Smart-TV security analysis: practical experiments. International Conference on Dependable Systems and Networks, Jun 2015, Rio de Janeiro, Brazil. ⟨hal-01178553⟩
  • Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège. Security of ISP Access Networks: practical experiments. 11th European Dependable Computing Conference - Dependability in Practice (EDCC 2015), Sep 2015, Paris, France. ⟨hal-01190054⟩
  • Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Guillaume Averlant. Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring. The 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), Nov 2015, Zhangjiajie, China. 10p., ⟨10.1109/PRDC.2015.46⟩. ⟨hal-01322882⟩
  • Benoît Morgan, Eric Alata, Vincent Nicomette, Guillaume Averlant. Abyme : un voyage au coeur des hyperviseurs récursifs. Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC), Jun 2015, Rennes, France. 29p. ⟨hal-01322880⟩
  • Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège, et al.. Protocole HbbTV et sécurité : quelques expérimentations. Symposium sur la sécurité des technologies de l’information et des communications, Jun 2015, Rennes, France. ⟨hal-01178550⟩
  • Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds. 11th European Dependable Computing Conference (EDCC 2015), Sep 2015, Paris, France. ⟨hal-01212064⟩
  • Benoît Morgan, Eric Alata, Vincent Nicomette. Tests d’intégrité d’hyperviseurs de machines virtuelles à distance et assisté par le matériel. Symposium sur la sécurité des technologies de l'information et des communications, Jun 2014, Rennes, France. ⟨hal-01493450⟩
  • Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures. 8th International Conference on Network and System Security (NSS 2014), Oct 2014, Xi'an, China. pp.1-14, ⟨10.1007/978-3-319-11698-3_1⟩. ⟨hal-01176045⟩
  • Eric Alata, Didier Le Botlan. Formalisation et génération d'injections. 9ème édition de la conférence Francophone SARSSI, May 2014, Lyon, France. 13p. ⟨hal-01022924⟩
  • Yann Bachy, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, et al.. Analyse de sécurité des box ADSL. Symposium sur la sécurité des technologies de l’information et des communications, Jun 2014, Rennes, France. ⟨hal-01178496⟩
  • Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, et al.. Security of embedded automotive networks: state of the art and a research proposal. SAFECOMP 2013 - Workshop CARS (2nd Workshop on Critical Automotive applications : Robustness & Safety) of the 32nd International Conference on Computer Safety, Reliability and Security, Sep 2013, Toulouse, France. pp.NA. ⟨hal-00848234⟩
  • Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, et al.. A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks. The 2nd Workshop on Open Resilient human-aware Cyber-physical Systems (WORCS-2013), co-located with the IEEE/IFIP Annual Symposium on Dependable Systems and Networks (DSN-2013), Jun 2013, Budapest, Hungary. pp.1-12. ⟨hal-00852244⟩
  • Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, et al.. Survey on security threats and protection mechanisms in embedded automotive networks. 2nd Workshop on Open Resilient Human-aware Cyber-Physical Systems (WORCS-2013), co-located with The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2013), Jun 2013, Budapest, Hungary. ⟨10.1109/DSNW.2013.6615528⟩. ⟨hal-01176042⟩
  • Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette, Yves Deswarte. An Approach for Security Evaluation and Analysis in Cloud Computing. Safecomp 2013 FastAbstract, Sep 2013, Toulouse, France. pp.NC. ⟨hal-00926367⟩
  • Eric Alata, Mohamed Kaâniche, Vincent Nicomette, Rim Akrout. An Automated Approach to Generate Web Applications Attack Scenarios. The 6th Latin-American Symposium on Dependable Computing (LADC-2013), Apr 2013, Rio de Janeiro, Brazil. pp.78-85, ⟨10.1109/LADC.2013.22⟩. ⟨hal-01176046⟩
  • Maxime Lastera, Eric Alata, Jean Arlat, Yves Deswarte, David Powell, et al.. Secure architecture for information systems in avionics. Embedded Real Time Software and Systems (ERTS2012), Feb 2012, Toulouse, France. 7p. ⟨hal-02263451⟩
  • Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata. A distributed plateform of high interaction honeypots and experimental results (extended version). Privacy Security Trust (PST 2012), Jul 2012, Paris, France. 8p. ⟨hal-00706333⟩
  • Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, et al.. Detecting Attacks Against Data in Web Applications. CRiSIS 2012 - 7th International Conference on Risks and Security of Internet and Systems, Oct 2012, Cork, Ireland. pp.1-8. ⟨hal-00735997⟩
  • Ivan Studnia, Eric Alata, Yves Deswarte, Mohamed Kaâniche, Vincent Nicomette. Survey of Security Problems in Cloud Computing Virtual Machines. Computer and Electronics Security Applications Rendez-vous (C&ESAR 2012). Cloud and security:threat or opportunity, Nov 2012, Rennes, France. p. 61-74. ⟨hal-00761206⟩
  • Anthony Dessiatnikoff, Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. A clustering approach for web vulnerabilities detection. 17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2011), Dec 2011, Pasadena, CA, United States. pp.194-203, ⟨10.1109/PRDC.2011.31⟩. ⟨hal-00755212⟩
  • Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette. Empirical analysis and statistical modeling of attack processes based on honeypots. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2006), Workshop on Empirical Evaluation of Dependability and Security (WEEDS), Jun 2006, France. pp.119-124. ⟨hal-00140367⟩
  • Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb. Lessons Learned from the deployment of a high-interaction honeypot. European Dependable Computing Conference, Oct 2006, France. pp.39-44. ⟨hal-00140355⟩
  • Eric Alata, Marc Dacier, Yves Deswarte, Mohamed Kaâniche, Kostya Kortchinsky, et al.. Collection and analysis of attack data based on honeypots deployed on the Internet. Workshop on Quality of protection (QoP 2005), Security Measurements and Metrics, Sep 2005, France. pp.79-92. ⟨hal-00140390⟩

Poster communications1 document

  • Benoît Morgan, Eric Alata. Détection de défaillance de gestionnaires de machines virtuelles. SARSSI 2013 : Sécurité des architectures réseaux et des systèmes d'information, Sep 2013, Mont-de-Marsan, France. 2013. ⟨hal-01493469⟩

Preprints, Working Papers, ...1 document

  • Angelo Monti, Eric Alata, Daniela Dragomirescu. Embedding security metadata into wireless communication signals using Polarization Shift Keying. 2019. ⟨hal-01994590⟩

Theses1 document

  • Eric Alata. Observation, caractérisation et modélisation de processus d'attaques sur Internet. Réseaux et télécommunications [cs.NI]. INSA de Toulouse, 2007. Français. ⟨tel-00280126⟩