Laboratoire d’Analyse et d’Architecture des Systèmes
Y.LAAROUCHI, Y.DESWARTE, D.POWELL, J.ARLAT, E.DE NADAI
TSF, AIRBUS France
Manifestation avec acte : 12th European Workshop on Dependable Computing (EWDC 2009), Toulouse (France), 14-15 Mai 2009, 2p. , N° 09187
Lien : http://hal.archives-ouvertes.fr/hal-00381966/fr/
Diffusable
Plus d'informations
Ensuring safety in avionics has mostly been achieved through a complete separation between avionics software and open-world software, in order to avoid any interaction that could corrupt critical on-board systems. However, new aircraft generations need more interaction with off-board systems to offer extended services. The extent to which such interactions can be securely supported requires an in-depth characterization, analysis and control of potentially dangerous information flows. In this paper, we consider the safety aspect of such systems and detail the different viewpoints that justify the level of confidence that can placed on a system component.
E.LACOMBE, V.NICOMETTE, Y.DESWARTE
TSF
Manifestation avec acte : 18th EICAR Annual Conference, Berlin (Allemagne), 11-12 Mai 2009, 18p. , N° 09065
Diffusable
Plus d'informations
Y.DESWARTE, A.ABOU EL KALAM
TSF, IRIT-UPS
Ouvrage (contribution) : Handbook of Research on Social Dimensions of Semantic Technologies and Web Services, N°ISBN 978-1-60566-650-1, Mai 2009, Chapter XLIV, 21p. , N° 08540
Diffusable
Plus d'informations
The chapter proposes a new access control framework for Inter-Organizational Web Services: PolyOrBAC, extending OrBAC (Organization-Based Access Control Model) to specify rules for intra- as well as inter-organization access control and enforcing these rules by applying access control mechanisms dedicated to Web Services; it is also proposes a runtime model checker for the interactions between collaborating organizations, to verify their compliance with previously signed contracts.
Y.LAAROUCHI, Y.DESWARTE, D.POWELL, J.ARLAT, E.DE NADAI
AIRBUS France, TSF
Manifestation avec acte : Data Systems in Aerospace (DASIA 2009), Istanbul (Turquie), 26-29 Mai 2009, 5p. , N° 09027
Diffusable
117938M.GAD EL RAB, A.ABOU EL KALAM, Y.DESWARTE
TSF, IRIT-ENSEEIHT
Manifestation avec acte : 2009 IEEE International Workshop on Quantitative Evaluation of Large-scale Systems and Technologies (IEEE QuEST-09), Bradford (UK), 26-29 Mai 2009, pp.1124-1129 , N° 09007
Diffusable
Plus d'informations
Testing network-based security tools such as Intrusion Detection and Prevention Systems (IDS/IPS) differs from testing ordinary network tools (e.g., routers and switches). Basically, in addition to the parameters (such as bandwidth utilization, routing information and packets timing) that are important for network tools, security tools are more sensitive to issues like traffic composition, contents, and sessionlevel parameters. Generating a realistic synthetic traffic that keeps all the characteristics of the real traffic has proved to be difficult. For this reason, security testers often use real traffic traces in their test or evaluation. However, the available traces are often limited in number or size. Therefore, it is necessary to merge and manipulate traces to create a test environment that would be representative of the operational environment, and to inject attacks into the traffic. A variety of tools for recording, replaying as well as forging packets can be obtained easily, but there exist very few tools for manipulating traces so as to modify the traffic composition from the networking viewpoint. Among them, surprisingly there is no tool for manipulating traces without destructing their security-relevant characteristics. In this paper, we present a brief survey for trace manipulation and packet forging tools. Then we determine the requirements of tools for manipulating traces and injecting attacks while keeping their original characteristics. Finally, we present the architecture, and the implementation of our tool intended to fill this lack in security testing tools.
A.ABOU EL KALAM, A.BAINA, H.BEITOLLAHI, A.BESSANI, A.BONDAVALLI, M.CORREIA, ADAIDONE, W.DANTAS, G.DECONINCK, Y.DESWARTE, H.MONIZ, N.F.NEVES, P.SOUSA, P.VERISSIMO
IRIT-ENSEEIHT, TSF, KUL, FCUL Portugal, CNR-ISTI
Rapport de Contrat : CRUTIAL, Project IST-FP6-STREP - 027513, Avril 2009, 126p. , N° 09182
Diffusable
117281Y.LAAROUCHI, Y.DESWARTE, D.POWELL, J.ARLAT, E.DE NADAI
TSF, AIRBUS France
Manifestation avec acte : EuroSys Workshop on Virtualization Technology for Dependable Systems (VTDS'09), Nuremberg (Allemagne), 31 Mars - 3 Avril 2009, 5p. , N° 09078
Diffusable
Plus d'informations
A.SAIDANE, V.NICOMETTE, Y.DESWARTE
TSF
Revue Scientifique : IEEE Transactions on Dependable and Secure Computing, Vol.6, N°1, pp.45-58, Janvier 2009 , N° 06333
Diffusable
Plus d'informations
Nowadays, more and more information systems are connected to the Internet and offer Web interfaces to the general public or to a restricted set of users. Such openness makes them likely targets for intruders, and conventional protection techniques have been shown insufficient to prevent all intrusions in such open systems. This paper proposes a generic architecture to implement intrusion-tolerant Web servers. This architecture is based on redundancy and diversification principles, in order to increase the system resilience to attacks: usually, an attack targets a particular software, running on a particular platform, and fails on others. The architecture is composed of redundant proxies that mediate client requests to a redundant bank of diversified COTSfootnote{Commercial Off The Shelf.} application servers. The redundancy is deployed here to increase system availability and integrity. To improve performance, adaptive redundancy is applied: the redundancy level is selected according to the current alert level. The architecture can be used for static servers, i.e., for Web distribution of stable information (updated off-line), as well as for fully dynamic systems where information updates are executed immediately on an on-line database. The feasibility of this architecture has been demonstrated by implementing an example of a travel agency Web server.
A.BAINA, Y.DESWARTE, A.ABOU EL KALAM, M.KAANICHE
TSF, IRIT-ENSEEIHT
Manifestation avec acte : The Third International Conference on Risks and Security of Internet and Systems : CRISIS 2008, Tozeur (Tunisie), 28-30 Octobre 2008 , N° 08875
Diffusable
118974A.ABOU EL KALAM, Y.DESWARTE
IRIT-UPS, TSF
Manifestation avec acte : 3rd International Workshop on Critical Information Infrastructures Security (CRITIS 2008), Rome (Italie), 13-15 Octobre 2008, pp.115-128 , N° 08307
Diffusable
Plus d'informations