Nombre de documents

37

CV de Vincent Nicomette


Communication dans un congrès28 documents

  • Guillaume Averlant, Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. An abstraction model and a comparative analysis of Intel and ARM hardware isolation mechanisms. The 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2017), Jan 2017, Christchurch, New Zealand. 2017, <http://prdc.dependability.org/PRDC2017/index.html>. <hal-01493597>
  • Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. Bypassing IOMMU Protection against I/O Attacks. 7th Latin-American Symposium on Dependable Computing (LADC’16), Oct 2016, Cali, Colombia. pp.145-150, 2016, Proceeding of the 7th Latin-American Symposium on Dependable Computing (LADC’16). <10.1109/LADC.2016.31>. <hal-01419962>
  • Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. Protocol reverse engineering: Challenges and obfuscation. The 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France. Lecture Notes in Computer Science, 10158, 2017, Risks and Security of Internet and Systems. <https://conferences.telecom-bretagne.eu/crisis/2016/>. <10.1007/978-3-319-54876-0_11>. <hal-01388060>
  • Benoît Morgan, Guillaume Averlant, Eric Alata, Vincent Nicomette. Bypassing DMA Remapping with DMA. Symposium sur le Sécurité des Technologies de l'Informatino et des Communications, Jun 2016, Rennes, France. 9p., 2016, Actes du colloque SSTIC 2016 (Symposium sur le Sécurité des Technologies de l'Informatino et des Communications). <hal-01322881>
  • Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds. 11th European Dependable Computing Conference (EDCC 2015), Sep 2015, Paris, France. <hal-01212064>
  • Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège, et al.. Protocole HbbTV et sécurité : quelques expérimentations. Symposium sur la sécurité des technologies de l’information et des communications, Jun 2015, Rennes, France. 2015, <https://www.sstic.org/2015/>. <hal-01178550>
  • Yann Bachy, Frédéric Basse, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, et al.. Smart-TV security analysis: practical experiments. International Conference on Dependable Systems and Networks, Jun 2015, Rio de Janeiro, Brazil. Dependable Systems and Networks (DSN), 2015, <http://2015.dsn.org/>. <hal-01178553>
  • Benoît Morgan, Eric Alata, Vincent Nicomette, Guillaume Averlant. Abyme : un voyage au coeur des hyperviseurs récursifs. Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC), Jun 2015, Rennes, France. 29p., 2015, Actes de la conférence SSTIC 2015 (Symposium sur la Sécurité des Technologies de l'Information et des Communications. <hal-01322880>
  • Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Guillaume Averlant. Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring. The 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), Nov 2015, Zhangjiajie, China. 10p., 2015, Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015). <10.1109/PRDC.2015.46>. <hal-01322882>
  • Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège. Security of ISP Access Networks: practical experiments. 11th European Dependable Computing Conference - Dependability in Practice (EDCC 2015), Sep 2015, Paris, France. 2015. <hal-01190054>
  • Benoît Morgan, Eric Alata, Vincent Nicomette. Tests d’intégrité d’hyperviseurs de machines virtuelles à distance et assisté par le matériel. Symposium sur la sécurité des technologies de l'information et des communications, Jun 2014, Rennes, France. Actes du colloque SSTIC 2014, 2014, <http://www.sstic.org>. <hal-01493450>
  • Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures. 8th International Conference on Network and System Security (NSS 2014), Oct 2014, Xi'an, China. pp.1-14, 2014, <10.1007/978-3-319-11698-3_1>. <hal-01176045>
  • Ivan Studnia, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Youssef Laarouchi. A language-based intrusion detection approach for automotive embedded networks. The 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), Nov 2014, Zhangjiajie, China. Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015). <hal-01419020>
  • Yann Bachy, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, et al.. Analyse de sécurité des box ADSL. Symposium sur la sécurité des technologies de l’information et des communications, Jun 2014, Rennes, France. SSTIC, 2014, 2014, <https://www.sstic.org/2014/>. <hal-01178496>
  • Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, et al.. Survey on security threats and protection mechanisms in embedded automotive networks. 2nd Workshop on Open Resilient Human-aware Cyber-Physical Systems (WORCS-2013), co-located with The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2013), Jun 2013, Budapest, Hungary. 2013, <10.1109/DSNW.2013.6615528>. <hal-01176042>
  • Eric Alata, Mohamed Kaâniche, Vincent Nicomette, Rim Akrout. An Automated Approach to Generate Web Applications Attack Scenarios. The 6th Latin-American Symposium on Dependable Computing (LADC-2013), Apr 2013, Rio de Janeiro, Brazil. IEEE Computer Society, pp.78-85, 2013, Proceedings of the 6th Latin-American Symposium on Dependable Computing (LADC-2013). <10.1109/LADC.2013.22>. <hal-01176046>
  • Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, et al.. A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks. The 2nd Workshop on Open Resilient human-aware Cyber-physical Systems (WORCS-2013), co-located with the IEEE/IFIP Annual Symposium on Dependable Systems and Networks (DSN-2013), Jun 2013, Budapest, Hungary. pp.1-12, 2013. <hal-00852244>
  • Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette, Yves Deswarte. An Approach for Security Evaluation and Analysis in Cloud Computing. Marc-Olivier Killijian. Safecomp 2013 FastAbstract, Sep 2013, Toulouse, France. pp.NC, 2013. <hal-00926367>
  • Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, et al.. Security of embedded automotive networks: state of the art and a research proposal. Matthieu ROY. SAFECOMP 2013 - Workshop CARS (2nd Workshop on Critical Automotive applications : Robustness & Safety) of the 32nd International Conference on Computer Safety, Reliability and Security, Sep 2013, Toulouse, France. pp.NA, 2013. <hal-00848234>
  • Géraldine Vache Marconato, Vincent Nicomette, Mohamed Kaâniche. Security-related vulnerability life cycle analysis. 7th International Conference on Risk and Security of Internet and Systems (CRiSIS-2012), Oct 2012, Cork, Ireland. IEEE Computer Society, pp.1-8, 2012, <10.1109/CRISIS.2012.6378954>. <hal-00851866>
  • Ivan Studnia, Eric Alata, Yves Deswarte, Mohamed Kaâniche, Vincent Nicomette. Survey of Security Problems in Cloud Computing Virtual Machines. Computer and Electronics Security Applications Rendez-vous (C&ESAR 2012). Cloud and security:threat or opportunity, Nov 2012, Rennes, France. p. 61-74, 2012. <hal-00761206>
  • Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, et al.. Detecting Attacks Against Data in Web Applications. CRiSIS 2012 - 7th International Conference on Risks and Security of Internet and Systems, Oct 2012, Cork, Ireland. pp.1-8, 2012. <hal-00735997>
  • Ivan Studnia, Vincent Nicomette, Mohamed Kaâniche, Eric Alata. A distributed plateform of high interaction honeypots and experimental results (extended version). Privacy Security Trust (PST 2012), Jul 2012, Paris, France. 8p., 2012. <hal-00706333>
  • Anthony Dessiatnikoff, Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. A clustering approach for web vulnerabilities detection. 17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2011), Dec 2011, Pasadena, CA, United States. IEEE Computer Society, pp.194-203, 2011, <10.1109/PRDC.2011.31>. <hal-00755212>
  • Ion Alberdi, Vincent Nicomette, Philippe Owezarski. Plateforme pour l'exécution contrôlée de logiciels malveillants. Colloque Francophone d'Ingenierie des Protocoles (CFIP), Oct 2009, Strasbourg, France. 12p., 2009. <hal-00387400>
  • Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb. Lessons Learned from the deployment of a high-interaction honeypot. IEEE Computer Society. European Dependable Computing Conference, Oct 2006, France. IEEE Computer Society, pp.39-44., 2006. <hal-00140355>
  • Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette. Empirical analysis and statistical modeling of attack processes based on honeypots. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2006), Workshop on Empirical Evaluation of Dependability and Security (WEEDS), Jun 2006, France. IEEE Computer Society, pp.119-124, 2006. <hal-00140367>
  • Eric Alata, Marc Dacier, Yves Deswarte, Mohamed Kaâniche, Kostya Kortchinsky, et al.. Collection and analysis of attack data based on honeypots deployed on the Internet. D. Gollmann, F. Massacci, A. Yautsiukhin. Workshop on Quality of protection (QoP 2005), Security Measurements and Metrics, Sep 2005, France. Springer, pp.79-92, 2005. <hal-00140390>

HDR1 document

  • Vincent Nicomette. La protection des systèmes informatiques vis à vis des malveillances. Informatique [cs]. Institut National Polytechnique de Toulouse - INPT, 2009. <tel-00450536>

Thèse1 document

  • Vincent Nicomette. La protection dans les systèmes à objets répartis. Réseaux et télécommunications [cs.NI]. Institut National Polytechnique de Toulouse - INPT, 1996. Français. <tel-00175252>

Article dans une revue7 documents

  • Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. An automated black box approach for web vulnerability identification and attack scenario generation. Journal of the Brazilian Computer Society, Springer Verlag, 2014, 20 (1), pp.1--16. <10.1186/1678-4804-20-4>. <hal-00985670>
  • Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, et al.. An Invariant-based Approach for Detecting Attacks against Data in Web Applications. International Journal of Secure Software Engineering, 2014, 5 (1), pp.19-38. <http://www.igi-global.com/article/an-invariant-based-approach-for-detecting-attacks-against-data-in-web-applications/109579>. <10.4018/ijsse.2014010102>. <hal-01083296>
  • Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège. La sécurité des box ADSL. Analyse de risques et expérimentations. Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information, Lavoisier, 2014, 19 (6), pp.63-88. <http://isi.revuesonline.com/resnum.jsp?editionId=1891&Submit2.x=5&Submit2.y=1>. <10.3166/isi.19.6.63-88>. <hal-01178546>
  • Géraldine Vache Marconato, Vincent Nicomette, Mohamed Kaâniche. évaluation quantitative de la sécurité. Approche basée sur les vulnérabilités. Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2013, 32 (1), pp.41-75. <10.3166/tsi.32.41-75>. <hal-01212202>
  • Géraldine Vache Marconato, Vincent Nicomette, Mohamed Kaâniche. Evaluation quantitative de la sécurité: Approche basée sur les vulnérabilités. Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2013, 32 (1), pp.41-75. <hal-00851784>
  • Géraldine Vache Marconato, Mohamed Kaâniche, Vincent Nicomette. A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach. The Computer Journal, Oxford University Press (UK), 2013, 56 (4), pp.422-439. <10.1093/comjnl/bxs112>. <hal-00851782>
  • Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Matthieu Herrb. Set-up and deployment of a high-interaction honeypot: experiment and lessons learned. Journal in Computer Virology, Springer Verlag, 2011, 7 (2), pp.143-157. <10.1007/s11416-010-0144-2>. <hal-00762596>