Laboratoire d’Analyse et d’Architecture des Systèmes
S.DONATELLI, E.ALATA, A.BONDAVALLI, M.BECCUTI, D.CEROTTI, S.CHIARADONNA, ADAIDONE, G.DONDOSSOLA, F.DI GIANDOMENICO, G.FRANCESCHINIS, F.GARRONE, O.HAMOUDA, M.KAANICHE, P.LOLLINI, V.NICOMETTE
CNIT, TSF, CNR-ISTI, CESI
Rapport de Contrat : CRUTIAL, Project IST-FP6-STREP - 027513, Mai 2009, 89p. , N° 09236
Diffusable
117556E.LACOMBE, V.NICOMETTE, Y.DESWARTE
TSF
Manifestation avec acte : 18th EICAR Annual Conference, Berlin (Allemagne), 11-12 Mai 2009, 18p. , N° 09065
Diffusable
Plus d'informations
I.ALBERDI, V.NICOMETTE, P.OWEZARSKI
OLC, TSF
Rapport LAAS N°09058, Mars 2009, 20p.
Diffusion restreinte
Plus d'informations
L'interêt que suscitent les logiciels malicieux a crû d'une façon telle qu'aujourd'hui, toute une partie de l'industrie du logiciel leur est consacrée (antivirus, pare-feux, etc). Cependant, les événements passés nous ont montré que les logiciels tels que les antivirus, les mécanismes de protection des disques compact, les implémentations des protocoles cryptographiques ou les systèmes de mises a jour automatisés, possèdent eux aussi des vulnérabilités. Le but de cet article est de remettre en cause la confiance implicite accordée à une nouvelle catégorie de logiciels appelés collecteur de maliciels, plus particulièrement Nepenethes et PhP.HOP. Cet article présente deux exemples de détournement de ces logiciels (a priori destinés à améliorer la sécurité) de façon à ce qu'ils propagent des tentatives d'intrusion. Nous proposons ensuite quelques directions de recherche pour réduire le risque d'utilisation de ce type de logiciels, dont nous ne remettons en aucun cas le bien fondé.
A.SAIDANE, V.NICOMETTE, Y.DESWARTE
TSF
Revue Scientifique : IEEE Transactions on Dependable and Secure Computing, Vol.6, N°1, pp.45-58, Janvier 2009 , N° 06333
Diffusable
Plus d'informations
Nowadays, more and more information systems are connected to the Internet and offer Web interfaces to the general public or to a restricted set of users. Such openness makes them likely targets for intruders, and conventional protection techniques have been shown insufficient to prevent all intrusions in such open systems. This paper proposes a generic architecture to implement intrusion-tolerant Web servers. This architecture is based on redundancy and diversification principles, in order to increase the system resilience to attacks: usually, an attack targets a particular software, running on a particular platform, and fails on others. The architecture is composed of redundant proxies that mediate client requests to a redundant bank of diversified COTSfootnote{Commercial Off The Shelf.} application servers. The redundancy is deployed here to increase system availability and integrity. To improve performance, adaptive redundancy is applied: the redundancy level is selected according to the current alert level. The architecture can be used for static servers, i.e., for Web distribution of stable information (updated off-line), as well as for fully dynamic systems where information updates are executed immediately on an on-line database. The feasibility of this architecture has been demonstrated by implementing an example of a travel agency Web server.
E.ALATA, M.KAANICHE, V.NICOMETTE
TSF
Manifestation avec acte : 3ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR/SSI'2008), Loctudy (France), 13-17 Octobre 2008, pp.301-315 , N° 08376
Diffusable
Plus d'informations
V.NICOMETTE, D.POWELL, Y.DESWARTE, N.ABGHOUR, C.ZANON
TSF, Université Hassan II, 2I
Rapport LAAS N°08286, Juin 2008, 32p.
Diffusable
114025E.ALATA, I.ALBERDI, V.NICOMETTE, P.OWEZARSKI, M.KAANICHE
TSF, OLC
Revue Scientifique : Journal in Computer Virology, Vol.4, N°2, pp.127-136, Mai 2008 , N° 08246
Diffusable
Plus d'informations
High-interaction honeypots are interesting as they help understand how attacks unfold on a compromised machine. However, observations are generally limited to the operations performed by the attackers on the honeypot itself. Outgoing malicious activities carried out from the honeypot towards remote machines on the Internet are generally disallowed for legal liability reasons. It is particularly instructive, however, to observe activities initiated from the honeypot in order to monitor attacker behavior across different, possibly compromised remote machines. This paper proposes to this end a dynamic redirection mechanism of connections initiated from the honeypot. This mechanism gives the attacker the illusion of being actually connected to a remote machine whereas he is redirected to another local honeypot. The originality of the proposed redirection mechanism lies in its dynamic aspect: the redirections are made automatically on the fly. This mechanism has been implemented and tested on a Linux kernel. This paper presents the design and the implementation of this mechanism.
E.LACOMBE, F.RAYNAL, V.NICOMETTE
TSF, SOGETI ESEC
Revue Scientifique : Journal in Computer Virology, Vol.4, N°2, pp.135-157, Mai 2008 , N° 07643
Diffusable
Plus d'informations
This article deals with rootkit conception. We show how these particular malicious codes are innovative comparing to usual malware like virus, Trojan horses, etc. From that comparison, we introduce a functional architecture for rootkits. We also propose some criteria to characterize a rootkit and thus, to qualify and assess the different kinds of rootkits. We purposely adopt a global view with respect to this topic, that is, we do not restrict our study to the rootkit software. Namely, we also consider the communication between the attacker and his tool, and the induced interactions with the system. Obviously, we notice that the problems faced up during rootkit conception are close to those of steganography, while however showing the limits of such a comparison. Finally, we present a rootkit paradigm that runs in kernel-mode under Linux and also some new techniques in order to improve its stealth features.
I.ALBERDI, P.OWEZARSKI, V.NICOMETTE
OLC, TSF
Rapport LAAS N°08061, Mars 2008, 18p.
Non diffusable
113152S.DONATELLI, E.ALATA, A.BONDAVALLI, D.CEROTTI, ADAIDONE, S.CHIARADONNA, F.DI GIANDOMENICO, M.KAANICHE, V.NICOMETTE, F.ROMANI, L.SIMONCINI
CNIT, TSF, UNIFI, CNR-ISTI, CNUCE
Rapport de Contrat : CRUTIAL, Project IST-FP6-STREP - 027513, Janvier 2008, 44p. , N° 08029
Diffusable
Plus d'informations