Laboratoire d’Analyse et d’Architecture des Systèmes
G.VACHE, V.NICOMETTE, M.KAANICHE
TSF
Manifestation avec acte : International Conference on Risks and Security of Internet and Systems 2012 du 10 octobre au 12 octobre 2012, Cork (Irelande), 2012, 14p. , N° 11044
Diffusable
128671K.TIASSOU, K.KANOUN, M.KAANICHE, C.SEGUIN, C.PAPADOPOULOS
TSF, ONERA, Airbus Op. Ltd
Manifestation avec acte : International Symposium on Reliable Distributed Systems ( SRDS ) 2012 du 08 octobre au 11 octobre 2012, Irvine (USA), 2012, 6p. , N° 12474
Lien : http://hal.archives-ouvertes.fr/hal-00755266
Diffusable
Plus d'informations
This paper addresses an aircraft mission operational reliability as resulting from component failures, environment changes, and maintenance facilities offered at the various stops involved in the mission. We will show how the on-line assessment of operational reliability will help adjust an aircraft mission, in case of major changes to equipment availability during the mission. The assessment is made possible thanks to the building and validation of a generic dependability model that is easily i) processed for the assignment of an initial mission, and ii) updated during mission accomplishment, following the occurrence of some specific major events. The generic model can be built as early as the design phase, by engineers who are specialist in dependability assessment, based on stochastic processes. Model update and processing, during aircraft operation, can be achieved by operators who are not necessarily familiar with stochastic processes in the way that they are being applied in this research. We will present examples of results that show the valuable role of operational dependability re-assessment during aircraft mission.
O.BALDELLON, J.C.FABRE, M.ROY
TSF
Manifestation avec acte : International Symposium on Reliable Distributed Systems ( SRDS ) 2012 du 08 octobre au 11 octobre 2012, Irvine (USA), 2012, 10p. , N° 12214
Diffusable
128574J.GUIOCHET, Q.A.DO HOANG, M.KAANICHE, D.POWELL
TSF
Manifestation avec acte : Intelligent Robots and Systems ( IROS ) 2012 du 07 octobre au 12 octobre 2012, Algarve (Portugal), 2012, 6p. , N° 12643
Diffusable
128594A.DESSIATNIKOFF, Y.DESWARTE, E.ALATA, V.NICOMETTE
TSF
Revue Scientifique : IEEE Security & Privacy, Vol.10, N°4, pp.71-74, Octobre 2012 , N° 12527
Non disponible
128159C.FAYOLLAS, J.C.FABRE, D.NAVARRE, P.PALANQUE, Y.DELERIS
TSF, IRIT-UPS, Airbus Operations
Manifestation avec acte : Pise (Italie), 15p. , N° 12581
Diffusable
128357G.VACHE, M.KAANICHE, V.NICOMETTE
TSF
Revue Scientifique : The Computer Journal, 25p., Septembre 2012, doi: 10.1093/comjnl/bxs112 , N° 11020
Diffusable
127965G.VACHE, M.KAANICHE, V.NICOMETTE
TSF
Manifestation avec acte : International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2012), Paris (France), 27-28 Août 2012, pp.60-71 , N° 12232
Diffusable
127885S.GAMBS, M.O.KILLIJIAN, M.NUNEZ DEL PRADO
IRISA, TSF
Rapport LAAS N°12409, Juillet 2012, 12p.
Lien : http://hal.archives-ouvertes.fr/hal-00718763
Diffusable
Plus d'informations
With the advent of GPS-equipped devices, more and more geolocated datasets are being collected everyday, thus raising the issue of the privacy risks incurred by the individuals whose movements are recorded. In this work, we focus on a specific inference attack called the de-anonymization attack, by which an adversary tries to infer the identity of a particular individual behind a mobility trace. More specifically, we propose an implementation based on a mobility model called Mobility Markov Chain (MMC). A MMC is built out from the mobility traces observed during the training phase and is used to perform the attack during the testing phase. We design distance metrics between MMCs and combine these distances to build de-anonymizers that can re-identify users in an anonymous dataset. Moreover, experimentations conducted on real datasets show that the attack is efficient in terms of accuracy and resilient to sanitization mechanisms.
I.STUDNIA, V.NICOMETTE, M.KAANICHE, E.ALATA
TSF
Manifestation avec acte : Privacy Security Trust (PST 2012), Paris (France), 16-18 Juillet 2012, 2p. , N° 12464
Lien : http://hal.archives-ouvertes.fr/hal-00706333
Diffusable
Plus d'informations
The increase of various malicious activities spreading on the Internet network are today a crucial problem. In order to understand the motivations and operating modes of the attackers, it is necessary to collect data characterizing these malicious activities. Their analysis enables to better face these attacks, anticipate new threats and better adpat the corresponding protection mechanisms. This paper proposes a distributed platform oh high interaction honeypots deployed for that purpose. The paper describes 1) the design and implementation of this platform, 2) the methodology used to collect and record data characterizing the malicious activities and 3) the first analyses carried out on this data.