Accéder directement au contenu

Eric Alata

63
Documents

Publications

Image document

Intrusion Detection System for IoT: Analysis of PSD Robustness

Lamoussa Sanogo , Eric Alata , Alexandru Takacs , Daniela Dragomirescu
Sensors, 2023, 23 (4), pp.2353. ⟨10.3390/s23042353⟩
Article dans une revue hal-04154781v1
Image document

A Survey on the Security Challenges of Low-Power Wireless Communication Protocols for Communicating Concrete in Civil Engineerings

Gaël Loubet , Eric Alata , Alexandru Takacs , Daniela Dragomirescu
Sensors, 2023, 23 (4), pp.1849. ⟨10.3390/s23041849⟩
Article dans une revue hal-04154993v1
Image document

Facing Emerging Challenges in Connected Vehicles: A Formally Proven, Legislation Compliant, and Post-Quantum Ready Security Protocol

Rémi Adelin , Cyrius Nugier , Éric Alata , Vincent Nicomette , Vincent Migliore
Journal of Computer Virology and Hacking Techniques, 2022, ⟨10.1007/s11416-022-00426-1⟩
Article dans une revue hal-03756650v1
Image document

RIDS: Radio intrusion detection and diagnosis system for wireless communications in smart environment

Pierre-François Gimenez , Jonathan Roux , Eric Alata , Guillaume Auriol , Mohamed Kaâniche
ACM Transactions on Cyber-Physical Systems, 2021, 5 (3), pp.Article No.: 24. ⟨10.1145/3441458⟩
Article dans une revue hal-03123925v1
Image document

Computer-Security-Oriented Escape Room

Erwan Beguin , Solal Besnard , Adrien Cros , Barbara Joannes , Ombeline Leclerc-Istria
IEEE Security and Privacy Magazine, 2019, 17 (4), pp.78-83. ⟨10.1109/MSEC.2019.2912700⟩
Article dans une revue hal-02297796v1
Image document

Smart-TV security: risk analysis and experiments on Smart-TV communication channels

Yann Bachy , Vincent Nicomette , Mohamed Kaâniche , Eric Alata
Journal of Computer Virology and Hacking Techniques, 2019, 15 (1), pp.61-76. ⟨10.1007/s11416-018-0320-3⟩
Article dans une revue hal-01761974v1
Image document

IOMMU protection against I/O attacks: A vulnerability and a proof-of-concept

Benoît Morgan , Eric Alata , Vincent Nicomette , Mohamed Kaâniche
Journal of the Brazilian Computer Society, 2018, 24, pp.Article number: 2. ⟨10.1186/s13173-017-0066-7⟩
Article dans une revue hal-02877143v1
Image document

Addressing scalable, optimal and secure communications over LoRa networks: challenges and research directions

Nicola Accettura , Eric Alata , Pascal Berthou , Daniela Dragomirescu , Thierry Monteil
Internet Technology Letters, 2018, 1 (4), pp.e54. ⟨10.1002/itl2.54⟩
Article dans une revue hal-02063758v1
Image document

A language-based intrusion detection approach for automotive embedded networks

Ivan Studnia , Eric Alata , Vincent Nicomette , Mohamed Kaâniche , Youssef Laarouchi
International Journal of Embedded Systems, 2018, 10 (1), ⟨10.1504/IJES.2018.10010488⟩
Article dans une revue hal-01803432v1
Image document

State of the art of network protocol reverse engineering tools

Julien Duchene , Colas Le Guernic , Eric Alata , Vincent Nicomette , Mohamed Kaâniche
Journal of Computer Virology and Hacking Techniques, 2018, 14 (1), pp.53-68. ⟨10.1007/s11416-016-0289-8⟩
Article dans une revue hal-01496958v1
Image document

Outils pour la rétro-conception de protocoles : Analyse et classification

Julien Duchene , Colas Le Guernic , Eric Alata , Vincent Nicomette , Mohamed Kaâniche
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2016, 35 (6), pp.609-640. ⟨10.3166/tsi.35.609-640⟩
Article dans une revue hal-01864298v1
Image document

An automated black box approach for web vulnerability identification and attack scenario generation

Rim Akrout , Eric Alata , Mohamed Kaâniche , Vincent Nicomette
Journal of the Brazilian Computer Society, 2014, 20 (1), pp.1--16. ⟨10.1186/1678-4804-20-4⟩
Article dans une revue hal-00985670v1
Image document

La sécurité des box ADSL. Analyse de risques et expérimentations

Yann Bachy , Vincent Nicomette , Eric Alata , Mohamed Kaâniche , Jean-Christophe Courrège
Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information, 2014, 19 (6), pp.63-88. ⟨10.3166/isi.19.6.63-88⟩
Article dans une revue hal-01178546v1
Image document

Identification de vulnérabilités Web et génération de scénarios d'attaque

Rim Akrout , Eric Alata , Mohamed Kaâniche , Vincent Nicomette
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2014, 33 (9-10), pp.809-840. ⟨10.3166/tsi.33.809-840⟩
Article dans une revue hal-01967638v1
Image document

An Invariant-based Approach for Detecting Attacks against Data in Web Applications

Romaric Ludinard , Eric Totel , Frédéric Tronel , Vincent Nicomette , Mohamed Kaâniche
International journal of secure software engineering, 2014, 5 (1), pp.19-38. ⟨10.4018/ijsse.2014010102⟩
Article dans une revue hal-01083296v1
Image document

Set-up and deployment of a high-interaction honeypot: experiment and lessons learned

Vincent Nicomette , Mohamed Kaâniche , Eric Alata , Matthieu Herrb
Journal in Computer Virology, 2011, 7 (2), pp.143-157. ⟨10.1007/s11416-010-0144-2⟩
Article dans une revue hal-00762596v1
Image document

Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices

Malcolm Bourdon , Pierre-François Gimenez , Eric Alata , Mohamed Kaâniche , Vincent Migliore
19th IEEE International Symposium on Network Computing and Applications (NCA 2020), Nov 2020, Cambridge, MA, United States. ⟨10.1109/NCA51143.2020.9306726⟩
Communication dans un congrès hal-03328251v1
Image document

On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications

Aliénor Damien , Pierre-François Gimenez , Nathalie Feyt , Vincent Nicomette , Mohamed Kaâniche
2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), Oct 2020, Coimbra, Portugal. pp.358-368, ⟨10.1109/ISSRE5003.2020.00041⟩
Communication dans un congrès hal-03094215v1
Image document

Anomaly detection using hardware performance counters on a large scale deployment

Malcolm Bourdon , Eric Alata , Mohamed Kaâniche , Vincent Migliore , Vincent Nicomette
10th European Congress Embedded Real Time Systems (ERTS 2020), Jan 2020, Toulouse, France
Communication dans un congrès hal-03328254v1
Image document

A user privacy-centric access control policy of data for intelligent transportation systems

Rémi Adelin , Eric Alata , Vincent Migliore , Vincent Nicomette
Embedded Real Time Systems (ERTS), Jan 2020, Toulouse, France
Communication dans un congrès hal-03139783v1
Image document

Implementation of a Host-Based Intrusion Detection System for Avionic Applications

Aliénor Damien , Michael Marcourt , Vincent Nicomette , Eric Alata , Mohamed Kaâniche
2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2019, Kyoto, Japan. pp.178-17809, ⟨10.1109/PRDC47002.2019.00048⟩
Communication dans un congrès hal-03094199v1
Image document

Mirage : un framework offensif pour l'audit du Bluetooth Low Energy

Romain Cayre , Jonathan Roux , Eric Alata , Vincent Nicomette , Guillaume Auriol
Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2019), Jun 2019, Rennes, France. pp.229-258
Communication dans un congrès hal-02268774v1
Image document

Une politique de contrôle d'accès à grains fins aux données pour les systèmes de transport intelligents

Rémi Adelin , Eric Alata , Vincent Migliore , Vincent Nicomette
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), May 2019, Erquy, France
Communication dans un congrès hal-03139756v1
Image document

Mirage: towards a Metasploit-like framework for IoT

Romain Cayre , Vincent Nicomette , Guillaume Auriol , Eric Alata , Mohamed Kaâniche
2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), Oct 2019, Berlin, Germany
Communication dans un congrès hal-02346074v1
Image document

Attack Injection into Avionic Systems through Application Code Mutation

Aliénor Damien , Nathalie Feyt , Vincent Nicomette , Eric Alata , Mohamed Kaâniche
2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), Sep 2019, San Diego, United States. pp.1-8, ⟨10.1109/DASC43569.2019.9081616⟩
Communication dans un congrès hal-03094185v1
Image document

Anomaly based Intrusion Detection for an Avionic Embedded System

Aliénor Damien , Marc Fumey , Eric Alata , Mohamed Kaâniche , Vincent Nicomette
Aerospace Systems and Technology Conference (ASTC-2018), Nov 2018, Londres, United Kingdom
Communication dans un congrès hal-01967646v1
Image document

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

Jonathan Roux , Eric Alata , Guillaume Auriol , Mohamed Kaâniche , Vincent Nicomette
17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Nov 2018, Cambridge, Massachusetts, United States. 8p
Communication dans un congrès hal-01914981v1
Image document

Specification-Based Protocol Obfuscation

Julien Duchene , Eric Alata , Vincent Nicomette , Mohamed Kaâniche , Colas Le Guernic
DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg City, Luxembourg. pp.1-12, ⟨10.1109/DSN.2018.00056⟩
Communication dans un congrès hal-01848573v1
Image document

SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture

Guillaume Averlant , Eric Alata , Mohamed Kaâniche , Vincent Nicomette , Yuxiao Mao
IEEE 17th International Symposium on Network Computing and Applications (NCA 2018), Nov 2018, Cambridge, MA, United States. ⟨10.1109/NCA.2018.8548343⟩
Communication dans un congrès hal-01982589v1
Image document

Toward an Intrusion Detection Approach for IoT based on Radio Communications Profiling

Jonathan Roux , Eric Alata , Guillaume Auriol , Vincent Nicomette , Mohamed Kaâniche
13th European Dependable Computing Conference, Sep 2017, Geneva, Switzerland. 4p
Communication dans un congrès hal-01561710v1
Image document

An abstraction model and a comparative analysis of Intel and ARM hardware isolation mechanisms

Guillaume Averlant , Benoît Morgan , Eric Alata , Vincent Nicomette , Mohamed Kaâniche
The 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2017), Jan 2017, Christchurch, New Zealand
Communication dans un congrès hal-01493597v1
Image document

Bypassing DMA Remapping with DMA

Benoît Morgan , Guillaume Averlant , Eric Alata , Vincent Nicomette
Symposium sur le Sécurité des Technologies de l'Informatino et des Communications, Jun 2016, Rennes, France. 9p
Communication dans un congrès hal-01322881v1
Image document

Protocol reverse engineering: Challenges and obfuscation

Julien Duchene , Colas Le Guernic , Eric Alata , Vincent Nicomette , Mohamed Kaâniche
The 11th International Conference on Risks and Security of Internet and Systems - CRiSIS 2016, Sep 2016, Roscoff, France. ⟨10.1007/978-3-319-54876-0_11⟩
Communication dans un congrès hal-01388060v1
Image document

Bypassing IOMMU Protection against I/O Attacks

Benoît Morgan , Eric Alata , Vincent Nicomette , Mohamed Kaâniche
7th Latin-American Symposium on Dependable Computing (LADC’16), Oct 2016, Cali, Colombia. pp.145-150, ⟨10.1109/LADC.2016.31⟩
Communication dans un congrès hal-01419962v1
Image document

Smart-TV security analysis: practical experiments

Yann Bachy , Frédéric Basse , Vincent Nicomette , Eric Alata , Mohamed Kaâniche
International Conference on Dependable Systems and Networks, Jun 2015, Rio de Janeiro, Brazil
Communication dans un congrès hal-01178553v1
Image document

A language-based intrusion detection approach for automotive embedded networks

Ivan Studnia , Eric Alata , Vincent Nicomette , Mohamed Kaâniche , Youssef Laarouchi
IEEE Pacific Rim International Symposium on Dependable Computing ( PRDC ), Nov 2015, Zhangjiajie, China
Communication dans un congrès hal-01967640v1
Image document

Protocole HbbTV et sécurité : quelques expérimentations

Yann Bachy , Vincent Nicomette , Eric Alata , Mohamed Kaâniche , Jean-Christophe Courrège
Symposium sur la sécurité des technologies de l’information et des communications, Jun 2015, Rennes, France
Communication dans un congrès hal-01178550v1
Image document

Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds

Thibaut Probst , Eric Alata , Mohamed Kaâniche , Vincent Nicomette
11th European Dependable Computing Conference (EDCC 2015), Sep 2015, Paris, France
Communication dans un congrès hal-01212064v1
Image document

Security of ISP Access Networks: practical experiments

Yann Bachy , Vincent Nicomette , Eric Alata , Mohamed Kaâniche , Jean-Christophe Courrège
11th European Dependable Computing Conference - Dependability in Practice (EDCC 2015), Sep 2015, Paris, France
Communication dans un congrès hal-01190054v1
Image document

Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring

Benoît Morgan , Eric Alata , Vincent Nicomette , Mohamed Kaâniche , Guillaume Averlant
The 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), Nov 2015, Zhangjiajie, China. 10p., ⟨10.1109/PRDC.2015.46⟩
Communication dans un congrès hal-01322882v1
Image document

Abyme : un voyage au coeur des hyperviseurs récursifs

Benoît Morgan , Eric Alata , Vincent Nicomette , Guillaume Averlant
Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC), Jun 2015, Rennes, France. 29p
Communication dans un congrès hal-01322880v1
Image document

Formalisation et génération d'injections

Eric Alata , Didier Le Botlan
9ème édition de la conférence Francophone SARSSI, May 2014, Lyon, France. 13p
Communication dans un congrès hal-01022924v1
Image document

An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures

Thibaut Probst , Eric Alata , Mohamed Kaâniche , Vincent Nicomette
8th International Conference on Network and System Security (NSS 2014), Oct 2014, Xi'an, China. pp.1-14, ⟨10.1007/978-3-319-11698-3_1⟩
Communication dans un congrès hal-01176045v1
Image document

Analyse de sécurité des box ADSL

Yann Bachy , Vincent Nicomette , Eric Alata , Yves Deswarte , Mohamed Kaâniche
Symposium sur la sécurité des technologies de l’information et des communications, Jun 2014, Rennes, France
Communication dans un congrès hal-01178496v1
Image document

Tests d’intégrité d’hyperviseurs de machines virtuelles à distance et assisté par le matériel

Benoît Morgan , Eric Alata , Vincent Nicomette
Symposium sur la sécurité des technologies de l'information et des communications, Jun 2014, Rennes, France
Communication dans un congrès hal-01493450v1
Image document

A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks

Ivan Studnia , Vincent Nicomette , Eric Alata , Yves Deswarte , Mohamed Kaâniche
The 2nd Workshop on Open Resilient human-aware Cyber-physical Systems (WORCS-2013), co-located with the IEEE/IFIP Annual Symposium on Dependable Systems and Networks (DSN-2013), Jun 2013, Budapest, Hungary. pp.1-12
Communication dans un congrès hal-00852244v1
Image document

Survey on security threats and protection mechanisms in embedded automotive networks

Ivan Studnia , Vincent Nicomette , Eric Alata , Yves Deswarte , Mohamed Kaâniche
2nd Workshop on Open Resilient Human-aware Cyber-Physical Systems (WORCS-2013), co-located with The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2013), Jun 2013, Budapest, Hungary. ⟨10.1109/DSNW.2013.6615528⟩
Communication dans un congrès hal-01176042v1
Image document

An Approach for Security Evaluation and Analysis in Cloud Computing

Thibaut Probst , Eric Alata , Mohamed Kaâniche , Vincent Nicomette , Yves Deswarte
Safecomp 2013 FastAbstract, Sep 2013, Toulouse, France. pp.NC
Communication dans un congrès hal-00926367v1
Image document

Security of embedded automotive networks: state of the art and a research proposal

Ivan Studnia , Vincent Nicomette , Eric Alata , Yves Deswarte , Mohamed Kaâniche
SAFECOMP 2013 - Workshop CARS (2nd Workshop on Critical Automotive applications : Robustness & Safety) of the 32nd International Conference on Computer Safety, Reliability and Security, Sep 2013, Toulouse, France. pp.NA
Communication dans un congrès hal-00848234v1
Image document

An Automated Approach to Generate Web Applications Attack Scenarios

Eric Alata , Mohamed Kaâniche , Vincent Nicomette , Rim Akrout
The 6th Latin-American Symposium on Dependable Computing (LADC-2013), Apr 2013, Rio de Janeiro, Brazil. pp.78-85, ⟨10.1109/LADC.2013.22⟩
Communication dans un congrès hal-01176046v1
Image document

A distributed plateform of high interaction honeypots and experimental results (extended version)

Ivan Studnia , Vincent Nicomette , Mohamed Kaâniche , Eric Alata
Privacy Security Trust (PST 2012), Jul 2012, Paris, France. 8p
Communication dans un congrès hal-00706333v1
Image document

Survey of Security Problems in Cloud Computing Virtual Machines

Ivan Studnia , Eric Alata , Yves Deswarte , Mohamed Kaâniche , Vincent Nicomette
Computer and Electronics Security Applications Rendez-vous (C&ESAR 2012). Cloud and security:threat or opportunity, Nov 2012, Rennes, France. p. 61-74
Communication dans un congrès hal-00761206v1

Detecting Attacks Against Data in Web Applications

Romaric Ludinard , Eric Totel , Frédéric Tronel , Vincent Nicomette , Mohamed Kaâniche
CRiSIS 2012 - 7th International Conference on Risks and Security of Internet and Systems, Oct 2012, Cork, Ireland. pp.1-8
Communication dans un congrès hal-00735997v1
Image document

Secure architecture for information systems in avionics

Maxime Lastera , Eric Alata , Jean Arlat , Yves Deswarte , David Powell
Embedded Real Time Software and Systems (ERTS2012), Feb 2012, Toulouse, France. 7p
Communication dans un congrès hal-02263451v1
Image document

A clustering approach for web vulnerabilities detection

Anthony Dessiatnikoff , Rim Akrout , Eric Alata , Mohamed Kaâniche , Vincent Nicomette
17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2011), Dec 2011, Pasadena, CA, United States. pp.194-203, ⟨10.1109/PRDC.2011.31⟩
Communication dans un congrès hal-00755212v1
Image document

Empirical analysis and statistical modeling of attack processes based on honeypots

Mohamed Kaâniche , Yves Deswarte , Eric Alata , Marc Dacier , Vincent Nicomette
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2006), Workshop on Empirical Evaluation of Dependability and Security (WEEDS), Jun 2006, France. pp.119-124
Communication dans un congrès hal-00140367v1
Image document

Lessons Learned from the deployment of a high-interaction honeypot

Eric Alata , Vincent Nicomette , Mohamed Kaâniche , Marc Dacier , Matthieu Herrb
European Dependable Computing Conference, Oct 2006, France. pp.39-44
Communication dans un congrès hal-00140355v1
Image document

Collection and analysis of attack data based on honeypots deployed on the Internet

Eric Alata , Marc Dacier , Yves Deswarte , Mohamed Kaâniche , Kostya Kortchinsky
Workshop on Quality of protection (QoP 2005), Security Measurements and Metrics, Sep 2005, France. pp.79-92
Communication dans un congrès hal-00140390v1
Image document

A user privacy-centric access control policy of data for intelligent transportation systems

Rémi Adelin , Eric Alata , Vincent Migliore , Vincent Nicomette
Embedded Real Time Systems (ERTS), Jan 2020, Toulouse, France. 2020
Poster de conférence hal-03756930v1
Image document

Une politique de contrôle d'accès à grains fins aux données pour les systèmes de transport intelligents

Rémi Adelin , Eric Alata , Vincent Migliore , Vincent Nicomette
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), May 2019, Erquy, France. 2019
Poster de conférence hal-03756890v1
Image document

Détection de défaillance de gestionnaires de machines virtuelles

Benoît Morgan , Eric Alata
SARSSI 2013 : Sécurité des architectures réseaux et des systèmes d'information, Sep 2013, Mont-de-Marsan, France. , 2013
Poster de conférence hal-01493469v1
Image document

Observation, caractérisation et modélisation de processus d'attaques sur Internet

Eric Alata
Réseaux et télécommunications [cs.NI]. INSA de Toulouse, 2007. Français. ⟨NNT : ⟩
Thèse tel-00280126v1