Recherche - Archive ouverte HAL Accéder directement au contenu

Filtrer vos résultats

75 résultats
Image document

A PSD-based fingerprinting approach to detect IoT device spoofing

Florent Galtier , Romain Cayre , Guillaume Auriol , Mohamed Kaâniche , Vincent Nicomette
25th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2020), Dec 2020, Perth, Australia. ⟨10.1109/PRDC50213.2020.00015⟩
Communication dans un congrès hal-02962655v1

Evaluation quantitative de la sécurité: Approche basée sur les vulnérabilités

Géraldine Vache Marconato , Vincent Nicomette , Mohamed Kaâniche
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2013, 32 (1), pp.41-75
Article dans une revue hal-00851784v1
Image document

Smart-TV security analysis: practical experiments

Yann Bachy , Frédéric Basse , Vincent Nicomette , Eric Alata , Mohamed Kaâniche , et al.
International Conference on Dependable Systems and Networks, Jun 2015, Rio de Janeiro, Brazil
Communication dans un congrès hal-01178553v1
Image document

Bypassing DMA Remapping with DMA

Benoît Morgan , Guillaume Averlant , Eric Alata , Vincent Nicomette
Symposium sur le Sécurité des Technologies de l'Informatino et des Communications, Jun 2016, Rennes, France. 9p
Communication dans un congrès hal-01322881v1
Image document

InjectaBLE : injection de trafic malveillant dans une connexion Bluetooth Low Energy

Romain Cayre , Florent Galtier , Guillaume Auriol , Vincent Nicomette , Mohamed Kaâniche , et al.
Symposium sur la sécurité des technologies de l'information et des communications (SSTIC 2021), Jun 2021, Rennes (en ligne), France
Communication dans un congrès hal-03221143v1
Image document

IOMMU protection against I/O attacks: A vulnerability and a proof-of-concept

Benoît Morgan , Eric Alata , Vincent Nicomette , Mohamed Kaâniche
Journal of the Brazilian Computer Society, 2018, 24, pp.Article number: 2. ⟨10.1186/s13173-017-0066-7⟩
Article dans une revue hal-02877143v1
Image document

An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures

Thibaut Probst , Eric Alata , Mohamed Kaâniche , Vincent Nicomette
8th International Conference on Network and System Security (NSS 2014), Oct 2014, Xi'an, China. pp.1-14, ⟨10.1007/978-3-319-11698-3_1⟩
Communication dans un congrès hal-01176045v1
Image document

Mirage : un framework offensif pour l'audit du Bluetooth Low Energy

Romain Cayre , Jonathan Roux , Eric Alata , Vincent Nicomette , Guillaume Auriol
Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2019), Jun 2019, Rennes, France. pp.229-258
Communication dans un congrès hal-02268774v1
Image document

Survey of Security Problems in Cloud Computing Virtual Machines

Ivan Studnia , Eric Alata , Yves Deswarte , Mohamed Kaâniche , Vincent Nicomette
Computer and Electronics Security Applications Rendez-vous (C&ESAR 2012). Cloud and security:threat or opportunity, Nov 2012, Rennes, France. p. 61-74
Communication dans un congrès hal-00761206v1
Image document

A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks

Ivan Studnia , Vincent Nicomette , Eric Alata , Yves Deswarte , Mohamed Kaâniche , et al.
The 2nd Workshop on Open Resilient human-aware Cyber-physical Systems (WORCS-2013), co-located with the IEEE/IFIP Annual Symposium on Dependable Systems and Networks (DSN-2013), Jun 2013, Budapest, Hungary. pp.1-12
Communication dans un congrès hal-00852244v1
Image document

WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips

Romain Cayre , Florent Galtier , Guillaume Auriol , Vincent Nicomette , Mohamed Kaâniche , et al.
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021), Jun 2021, Taipei (virtual), Taiwan. ⟨10.1109/DSN48987.2021.00049⟩
Communication dans un congrès hal-03193299v1
Image document

A distributed plateform of high interaction honeypots and experimental results (extended version)

Ivan Studnia , Vincent Nicomette , Mohamed Kaâniche , Eric Alata
Privacy Security Trust (PST 2012), Jul 2012, Paris, France. 8p
Communication dans un congrès hal-00706333v1
Image document

Survey on security threats and protection mechanisms in embedded automotive networks

Ivan Studnia , Vincent Nicomette , Eric Alata , Yves Deswarte , Mohamed Kaâniche , et al.
2nd Workshop on Open Resilient Human-aware Cyber-Physical Systems (WORCS-2013), co-located with The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2013), Jun 2013, Budapest, Hungary. ⟨10.1109/DSNW.2013.6615528⟩
Communication dans un congrès hal-01176042v1
Image document

Une politique de contrôle d'accès à grains fins aux données pour les systèmes de transport intelligents

Rémi Adelin , Eric Alata , Vincent Migliore , Vincent Nicomette
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), May 2019, Erquy, France
Communication dans un congrès hal-03139756v1
Image document

Computer-Security-Oriented Escape Room

Erwan Beguin , Solal Besnard , Adrien Cros , Barbara Joannes , Ombeline Leclerc-Istria , et al.
IEEE Security and Privacy Magazine, 2019, 17 (4), pp.78-83. ⟨10.1109/MSEC.2019.2912700⟩
Article dans une revue hal-02297796v1
Image document

La sécurité des box ADSL. Analyse de risques et expérimentations

Yann Bachy , Vincent Nicomette , Eric Alata , Mohamed Kaâniche , Jean-Christophe Courrège
Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information, 2014, 19 (6), pp.63-88. ⟨10.3166/isi.19.6.63-88⟩
Article dans une revue hal-01178546v1
Image document

Protocol reverse engineering: Challenges and obfuscation

Julien Duchene , Colas Le Guernic , Eric Alata , Vincent Nicomette , Mohamed Kaâniche
The 11th International Conference on Risks and Security of Internet and Systems - CRiSIS 2016, Sep 2016, Roscoff, France. ⟨10.1007/978-3-319-54876-0_11⟩
Communication dans un congrès hal-01388060v1
Image document

Anomaly based Intrusion Detection for an Avionic Embedded System

Aliénor Damien , Marc Fumey , Eric Alata , Mohamed Kaâniche , Vincent Nicomette
Aerospace Systems and Technology Conference (ASTC-2018), Nov 2018, Londres, United Kingdom
Communication dans un congrès hal-01967646v1
Image document

A defensive man-in-middle approach to filter BLE packets

Ahmed Aboukora , Guillaume Bonnet , Florent Galtier , Romain Cayre , Vincent Nicomette , et al.
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2021, Abou Dhabi (virtual), United Arab Emirates. ⟨10.1145/3448300.3468259⟩
Communication dans un congrès hal-03560107v1
Image document

Toward an Intrusion Detection Approach for IoT based on Radio Communications Profiling

Jonathan Roux , Eric Alata , Guillaume Auriol , Vincent Nicomette , Mohamed Kaâniche
13th European Dependable Computing Conference, Sep 2017, Geneva, Switzerland. 4p
Communication dans un congrès hal-01561710v1
Image document

A user privacy-centric access control policy of data for intelligent transportation systems

Rémi Adelin , Eric Alata , Vincent Migliore , Vincent Nicomette
Embedded Real Time Systems (ERTS), Jan 2020, Toulouse, France. 2020
Poster de conférence hal-03756930v1
Image document

Identification de vulnérabilités Web et génération de scénarios d'attaque

Rim Akrout , Eric Alata , Mohamed Kaâniche , Vincent Nicomette
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2014, 33 (9-10), pp.809-840. ⟨10.3166/tsi.33.809-840⟩
Article dans une revue hal-01967638v1
Image document

On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications

Aliénor Damien , Pierre-François Gimenez , Nathalie Feyt , Vincent Nicomette , Mohamed Kaâniche , et al.
2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), Oct 2020, Coimbra, Portugal. pp.358-368, ⟨10.1109/ISSRE5003.2020.00041⟩
Communication dans un congrès hal-03094215v1
Image document

Anomaly detection using hardware performance counters on a large scale deployment

Malcolm Bourdon , Eric Alata , Mohamed Kaâniche , Vincent Migliore , Vincent Nicomette , et al.
10th European Congress Embedded Real Time Systems (ERTS 2020), Jan 2020, Toulouse, France
Communication dans un congrès hal-03328254v1
Image document

Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds

Thibaut Probst , Eric Alata , Mohamed Kaâniche , Vincent Nicomette
11th European Dependable Computing Conference (EDCC 2015), Sep 2015, Paris, France
Communication dans un congrès hal-01212064v1
Image document

An Approach for Security Evaluation and Analysis in Cloud Computing

Thibaut Probst , Eric Alata , Mohamed Kaâniche , Vincent Nicomette , Yves Deswarte
Safecomp 2013 FastAbstract, Sep 2013, Toulouse, France. pp.NC
Communication dans un congrès hal-00926367v1
Image document

Set-up and deployment of a high-interaction honeypot: experiment and lessons learned

Vincent Nicomette , Mohamed Kaâniche , Eric Alata , Matthieu Herrb
Journal in Computer Virology, 2011, 7 (2), pp.143-157. ⟨10.1007/s11416-010-0144-2⟩
Article dans une revue hal-00762596v1
Image document

Reconfigurable Hardware for Microarchitectural Timing Attacks Detection

Yuxiao Mao , Vincent Migliore , Vincent Nicomette
Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2020), Dec 2020, online, France
Communication dans un congrès hal-03138649v1
Image document

A clustering approach for web vulnerabilities detection

Anthony Dessiatnikoff , Rim Akrout , Eric Alata , Mohamed Kaâniche , Vincent Nicomette
17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2011), Dec 2011, Pasadena, CA, United States. pp.194-203, ⟨10.1109/PRDC.2011.31⟩
Communication dans un congrès hal-00755212v1
Image document

A vulnerability life cycle based security modeling and evaluation approach

Géraldine Vache Marconato , Mohamed Kaâniche , Vincent Nicomette
The Computer Journal, 2013, 56 (4), pp.422 - 439. ⟨10.1093/comjnl/bxs112⟩
Article dans une revue hal-01911985v1