Eric Alata
63
Documents
Publications
|
Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices19th IEEE International Symposium on Network Computing and Applications (NCA 2020), Nov 2020, Cambridge, MA, United States. ⟨10.1109/NCA51143.2020.9306726⟩
Communication dans un congrès
hal-03328251v1
|
|
On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), Oct 2020, Coimbra, Portugal. pp.358-368, ⟨10.1109/ISSRE5003.2020.00041⟩
Communication dans un congrès
hal-03094215v1
|
|
Anomaly detection using hardware performance counters on a large scale deployment10th European Congress Embedded Real Time Systems (ERTS 2020), Jan 2020, Toulouse, France
Communication dans un congrès
hal-03328254v1
|
|
A user privacy-centric access control policy of data for intelligent transportation systemsEmbedded Real Time Systems (ERTS), Jan 2020, Toulouse, France
Communication dans un congrès
hal-03139783v1
|
|
Implementation of a Host-Based Intrusion Detection System for Avionic Applications2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2019, Kyoto, Japan. pp.178-17809, ⟨10.1109/PRDC47002.2019.00048⟩
Communication dans un congrès
hal-03094199v1
|
|
Mirage : un framework offensif pour l'audit du Bluetooth Low EnergySymposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2019), Jun 2019, Rennes, France. pp.229-258
Communication dans un congrès
hal-02268774v1
|
|
Une politique de contrôle d'accès à grains fins aux données pour les systèmes de transport intelligentsRendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), May 2019, Erquy, France
Communication dans un congrès
hal-03139756v1
|
|
Mirage: towards a Metasploit-like framework for IoT2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), Oct 2019, Berlin, Germany
Communication dans un congrès
hal-02346074v1
|
|
Attack Injection into Avionic Systems through Application Code Mutation2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), Sep 2019, San Diego, United States. pp.1-8, ⟨10.1109/DASC43569.2019.9081616⟩
Communication dans un congrès
hal-03094185v1
|
|
Anomaly based Intrusion Detection for an Avionic Embedded SystemAerospace Systems and Technology Conference (ASTC-2018), Nov 2018, Londres, United Kingdom
Communication dans un congrès
hal-01967646v1
|
|
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Nov 2018, Cambridge, Massachusetts, United States. 8p
Communication dans un congrès
hal-01914981v1
|
|
Specification-Based Protocol ObfuscationDSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg City, Luxembourg. pp.1-12, ⟨10.1109/DSN.2018.00056⟩
Communication dans un congrès
hal-01848573v1
|
|
SAAC: Secure Android Application Context a Runtime Based Policy and its ArchitectureIEEE 17th International Symposium on Network Computing and Applications (NCA 2018), Nov 2018, Cambridge, MA, United States. ⟨10.1109/NCA.2018.8548343⟩
Communication dans un congrès
hal-01982589v1
|
|
Toward an Intrusion Detection Approach for IoT based on Radio Communications Profiling13th European Dependable Computing Conference, Sep 2017, Geneva, Switzerland. 4p
Communication dans un congrès
hal-01561710v1
|
|
An abstraction model and a comparative analysis of Intel and ARM hardware isolation mechanismsThe 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2017), Jan 2017, Christchurch, New Zealand
Communication dans un congrès
hal-01493597v1
|
|
Bypassing DMA Remapping with DMASymposium sur le Sécurité des Technologies de l'Informatino et des Communications, Jun 2016, Rennes, France. 9p
Communication dans un congrès
hal-01322881v1
|
|
Protocol reverse engineering: Challenges and obfuscationThe 11th International Conference on Risks and Security of Internet and Systems - CRiSIS 2016, Sep 2016, Roscoff, France. ⟨10.1007/978-3-319-54876-0_11⟩
Communication dans un congrès
hal-01388060v1
|
|
Bypassing IOMMU Protection against I/O Attacks7th Latin-American Symposium on Dependable Computing (LADC’16), Oct 2016, Cali, Colombia. pp.145-150, ⟨10.1109/LADC.2016.31⟩
Communication dans un congrès
hal-01419962v1
|
|
Smart-TV security analysis: practical experimentsInternational Conference on Dependable Systems and Networks, Jun 2015, Rio de Janeiro, Brazil
Communication dans un congrès
hal-01178553v1
|
|
A language-based intrusion detection approach for automotive embedded networksIEEE Pacific Rim International Symposium on Dependable Computing ( PRDC ), Nov 2015, Zhangjiajie, China
Communication dans un congrès
hal-01967640v1
|
|
Protocole HbbTV et sécurité : quelques expérimentationsSymposium sur la sécurité des technologies de l’information et des communications, Jun 2015, Rennes, France
Communication dans un congrès
hal-01178550v1
|
|
Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds11th European Dependable Computing Conference (EDCC 2015), Sep 2015, Paris, France
Communication dans un congrès
hal-01212064v1
|
|
Security of ISP Access Networks: practical experiments11th European Dependable Computing Conference - Dependability in Practice (EDCC 2015), Sep 2015, Paris, France
Communication dans un congrès
hal-01190054v1
|
|
Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity MonitoringThe 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), Nov 2015, Zhangjiajie, China. 10p., ⟨10.1109/PRDC.2015.46⟩
Communication dans un congrès
hal-01322882v1
|
|
Abyme : un voyage au coeur des hyperviseurs récursifsSymposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC), Jun 2015, Rennes, France. 29p
Communication dans un congrès
hal-01322880v1
|
|
Formalisation et génération d'injections9ème édition de la conférence Francophone SARSSI, May 2014, Lyon, France. 13p
Communication dans un congrès
hal-01022924v1
|
|
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures8th International Conference on Network and System Security (NSS 2014), Oct 2014, Xi'an, China. pp.1-14, ⟨10.1007/978-3-319-11698-3_1⟩
Communication dans un congrès
hal-01176045v1
|
|
Analyse de sécurité des box ADSLSymposium sur la sécurité des technologies de l’information et des communications, Jun 2014, Rennes, France
Communication dans un congrès
hal-01178496v1
|
|
Tests d’intégrité d’hyperviseurs de machines virtuelles à distance et assisté par le matérielSymposium sur la sécurité des technologies de l'information et des communications, Jun 2014, Rennes, France
Communication dans un congrès
hal-01493450v1
|
|
A Survey of Security Threats and Protection Mechanisms in Embedded Automotive NetworksThe 2nd Workshop on Open Resilient human-aware Cyber-physical Systems (WORCS-2013), co-located with the IEEE/IFIP Annual Symposium on Dependable Systems and Networks (DSN-2013), Jun 2013, Budapest, Hungary. pp.1-12
Communication dans un congrès
hal-00852244v1
|
|
Survey on security threats and protection mechanisms in embedded automotive networks2nd Workshop on Open Resilient Human-aware Cyber-Physical Systems (WORCS-2013), co-located with The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2013), Jun 2013, Budapest, Hungary. ⟨10.1109/DSNW.2013.6615528⟩
Communication dans un congrès
hal-01176042v1
|
|
An Approach for Security Evaluation and Analysis in Cloud ComputingSafecomp 2013 FastAbstract, Sep 2013, Toulouse, France. pp.NC
Communication dans un congrès
hal-00926367v1
|
|
Security of embedded automotive networks: state of the art and a research proposalSAFECOMP 2013 - Workshop CARS (2nd Workshop on Critical Automotive applications : Robustness & Safety) of the 32nd International Conference on Computer Safety, Reliability and Security, Sep 2013, Toulouse, France. pp.NA
Communication dans un congrès
hal-00848234v1
|
|
An Automated Approach to Generate Web Applications Attack ScenariosThe 6th Latin-American Symposium on Dependable Computing (LADC-2013), Apr 2013, Rio de Janeiro, Brazil. pp.78-85, ⟨10.1109/LADC.2013.22⟩
Communication dans un congrès
hal-01176046v1
|
|
A distributed plateform of high interaction honeypots and experimental results (extended version)Privacy Security Trust (PST 2012), Jul 2012, Paris, France. 8p
Communication dans un congrès
hal-00706333v1
|
|
Survey of Security Problems in Cloud Computing Virtual MachinesComputer and Electronics Security Applications Rendez-vous (C&ESAR 2012). Cloud and security:threat or opportunity, Nov 2012, Rennes, France. p. 61-74
Communication dans un congrès
hal-00761206v1
|
Detecting Attacks Against Data in Web ApplicationsCRiSIS 2012 - 7th International Conference on Risks and Security of Internet and Systems, Oct 2012, Cork, Ireland. pp.1-8
Communication dans un congrès
hal-00735997v1
|
|
|
Secure architecture for information systems in avionicsEmbedded Real Time Software and Systems (ERTS2012), Feb 2012, Toulouse, France. 7p
Communication dans un congrès
hal-02263451v1
|
|
A clustering approach for web vulnerabilities detection17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2011), Dec 2011, Pasadena, CA, United States. pp.194-203, ⟨10.1109/PRDC.2011.31⟩
Communication dans un congrès
hal-00755212v1
|
|
Empirical analysis and statistical modeling of attack processes based on honeypotsIEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2006), Workshop on Empirical Evaluation of Dependability and Security (WEEDS), Jun 2006, France. pp.119-124
Communication dans un congrès
hal-00140367v1
|
|
Lessons Learned from the deployment of a high-interaction honeypotEuropean Dependable Computing Conference, Oct 2006, France. pp.39-44
Communication dans un congrès
hal-00140355v1
|
|
Collection and analysis of attack data based on honeypots deployed on the InternetWorkshop on Quality of protection (QoP 2005), Security Measurements and Metrics, Sep 2005, France. pp.79-92
Communication dans un congrès
hal-00140390v1
|
|
A user privacy-centric access control policy of data for intelligent transportation systemsEmbedded Real Time Systems (ERTS), Jan 2020, Toulouse, France. 2020
Poster de conférence
hal-03756930v1
|
|
Une politique de contrôle d'accès à grains fins aux données pour les systèmes de transport intelligentsRendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), May 2019, Erquy, France. 2019
Poster de conférence
hal-03756890v1
|
|
Détection de défaillance de gestionnaires de machines virtuellesSARSSI 2013 : Sécurité des architectures réseaux et des systèmes d'information, Sep 2013, Mont-de-Marsan, France. , 2013
Poster de conférence
hal-01493469v1
|
|
Embedding security metadata into wireless communication signals using Polarization Shift Keying2019
Pré-publication, Document de travail
hal-01994590v1
|
|
Observation, caractérisation et modélisation de processus d'attaques sur InternetRéseaux et télécommunications [cs.NI]. INSA de Toulouse, 2007. Français. ⟨NNT : ⟩
Thèse
tel-00280126v1
|