Publications personnelle

211documents trouvés

09187
28/05/2009

Criticality and confidence issues in avionics

Y.LAAROUCHI, Y.DESWARTE, D.POWELL, J.ARLAT, E.DE NADAI

TSF, AIRBUS France

Manifestation avec acte : 12th European Workshop on Dependable Computing (EWDC 2009), Toulouse (France), 14-15 Mai 2009, 2p. , N° 09187

Lien : http://hal.archives-ouvertes.fr/hal-00381966/fr/

Diffusable

Plus d'informations

Abstract

Ensuring safety in avionics has mostly been achieved through a complete separation between avionics software and open-world software, in order to avoid any interaction that could corrupt critical on-board systems. However, new aircraft generations need more interaction with off-board systems to offer extended services. The extent to which such interactions can be securely supported requires an in-depth characterization, analysis and control of potentially dangerous information flows. In this paper, we consider the safety aspect of such systems and detail the different viewpoints that justify the level of confidence that can placed on a system component.

Mots-Clés / Keywords
Dependability; Safety; Fault tolerance; Critical systems; Avionics;

117576
09065
01/05/2009

A hardware-assisted virtualization based approach on how to protect the kernel space from malicious actions

E.LACOMBE, V.NICOMETTE, Y.DESWARTE

TSF

Manifestation avec acte : 18th EICAR Annual Conference, Berlin (Allemagne), 11-12 Mai 2009, 18p. , N° 09065

Diffusable

Plus d'informations

Mots-Clés / Keywords
Malicious kernel actions; Kernel security protection; Hardware-assisted virtualization;

117665
08540
01/05/2009

PolyOrBAC: an access control model for Inter-organizational web services

Y.DESWARTE, A.ABOU EL KALAM

TSF, IRIT-UPS

Ouvrage (contribution) : Handbook of Research on Social Dimensions of Semantic Technologies and Web Services, N°ISBN 978-1-60566-650-1, Mai 2009, Chapter XLIV, 21p. , N° 08540

Diffusable

Plus d'informations

Abstract

The chapter proposes a new access control framework for Inter-Organizational Web Services: PolyOrBAC, extending OrBAC (Organization-Based Access Control Model) to specify rules for intra- as well as inter-organization access control and enforcing these rules by applying access control mechanisms dedicated to Web Services; it is also proposes a runtime model checker for the interactions between collaborating organizations, to verify their compliance with previously signed contracts.

Mots-Clés / Keywords
Security policy; Security models; Access contro enforcement; Web services security; Runtime model checking;

117766
09027
01/05/2009

Ensuring safety and security for avionics: a case study

Y.LAAROUCHI, Y.DESWARTE, D.POWELL, J.ARLAT, E.DE NADAI

AIRBUS France, TSF

Manifestation avec acte : Data Systems in Aerospace (DASIA 2009), Istanbul (Turquie), 26-29 Mai 2009, 5p. , N° 09027

Diffusable

117938
09007
01/05/2009

Manipulation of network traffic traces for security evaluation

M.GAD EL RAB, A.ABOU EL KALAM, Y.DESWARTE

TSF, IRIT-ENSEEIHT

Manifestation avec acte : 2009 IEEE International Workshop on Quantitative Evaluation of Large-scale Systems and Technologies (IEEE QuEST-09), Bradford (UK), 26-29 Mai 2009, pp.1124-1129 , N° 09007

Diffusable

Plus d'informations

Abstract

Testing network-based security tools such as Intrusion Detection and Prevention Systems (IDS/IPS) differs from testing ordinary network tools (e.g., routers and switches). Basically, in addition to the parameters (such as bandwidth utilization, routing information and packets timing) that are important for network tools, security tools are more sensitive to issues like traffic composition, contents, and sessionlevel parameters. Generating a realistic synthetic traffic that keeps all the characteristics of the real traffic has proved to be difficult. For this reason, security testers often use real traffic traces in their test or evaluation. However, the available traces are often limited in number or size. Therefore, it is necessary to merge and manipulate traces to create a test environment that would be representative of the operational environment, and to inject attacks into the traffic. A variety of tools for recording, replaying as well as forging packets can be obtained easily, but there exist very few tools for manipulating traces so as to modify the traffic composition from the networking viewpoint. Among them, surprisingly there is no tool for manipulating traces without destructing their security-relevant characteristics. In this paper, we present a brief survey for trace manipulation and packet forging tools. Then we determine the requirements of tools for manipulating traces and injecting attacks while keeping their original characteristics. Finally, we present the architecture, and the implementation of our tool intended to fill this lack in security testing tools.

Mots-Clés / Keywords
Security testing; IDS evaluation; Network traffic generation;

117618
09182
30/04/2009

Architecture, services and protocols for CRUTIAL. CRUTIAL Deliverable D18

A.ABOU EL KALAM, A.BAINA, H.BEITOLLAHI, A.BESSANI, A.BONDAVALLI, M.CORREIA, ADAIDONE, W.DANTAS, G.DECONINCK, Y.DESWARTE, H.MONIZ, N.F.NEVES, P.SOUSA, P.VERISSIMO

IRIT-ENSEEIHT, TSF, KUL, FCUL Portugal, CNR-ISTI

Rapport de Contrat : CRUTIAL, Project IST-FP6-STREP - 027513, Avril 2009, 126p. , N° 09182

Diffusable

117281
09078
01/03/2009

Enhancing dependability in avionics using virtualization

Y.LAAROUCHI, Y.DESWARTE, D.POWELL, J.ARLAT, E.DE NADAI

TSF, AIRBUS France

Manifestation avec acte : EuroSys Workshop on Virtualization Technology for Dependable Systems (VTDS'09), Nuremberg (Allemagne), 31 Mars - 3 Avril 2009, 5p. , N° 09078

Diffusable

Plus d'informations

Mots-Clés / Keywords
Dependability; Virtualization; Fault tolerance; Avionics; Critical systems;

117373
06333
01/01/2009

The design of a generic intrusion tolerant architecture for Web servers

A.SAIDANE, V.NICOMETTE, Y.DESWARTE

TSF

Revue Scientifique : IEEE Transactions on Dependable and Secure Computing, Vol.6, N°1, pp.45-58, Janvier 2009 , N° 06333

Diffusable

Plus d'informations

Abstract

Nowadays, more and more information systems are connected to the Internet and offer Web interfaces to the general public or to a restricted set of users. Such openness makes them likely targets for intruders, and conventional protection techniques have been shown insufficient to prevent all intrusions in such open systems. This paper proposes a generic architecture to implement intrusion-tolerant Web servers. This architecture is based on redundancy and diversification principles, in order to increase the system resilience to attacks: usually, an attack targets a particular software, running on a particular platform, and fails on others. The architecture is composed of redundant proxies that mediate client requests to a redundant bank of diversified COTSfootnote{Commercial Off The Shelf.} application servers. The redundancy is deployed here to increase system availability and integrity. To improve performance, adaptive redundancy is applied: the redundancy level is selected according to the current alert level. The architecture can be used for static servers, i.e., for Web distribution of stable information (updated off-line), as well as for fully dynamic systems where information updates are executed immediately on an on-line database. The feasibility of this architecture has been demonstrated by implementing an example of a travel agency Web server.

Mots-Clés / Keywords
Dependability; Security; Intrusion tolerance; Distributed systems; Web servers; Survivability;

116498
08875
28/10/2008

Access Control for Cooperative Systems: A Comparative Analysis

A.BAINA, Y.DESWARTE, A.ABOU EL KALAM, M.KAANICHE

TSF, IRIT-ENSEEIHT

Manifestation avec acte : The Third International Conference on Risks and Security of Internet and Systems : CRISIS 2008, Tozeur (Tunisie), 28-30 Octobre 2008 , N° 08875

Diffusable

118974
08307
13/10/2008

Critical infrastructures security modeling, enforcement and runtime checking

A.ABOU EL KALAM, Y.DESWARTE

IRIT-UPS, TSF

Manifestation avec acte : 3rd International Workshop on Critical Information Infrastructures Security (CRITIS 2008), Rome (Italie), 13-15 Octobre 2008, pp.115-128 , N° 08307

Diffusable

Plus d'informations

Mots-Clés / Keywords
Security policies and models; Access control enforcement; Security of critical infrastructures; Runtime model checking;

115201
Pour recevoir une copie des documents, contacter doc@laas.fr en mentionnant le n° de rapport LAAS et votre adresse postale. Signalez tout problème de fonctionnement à sysadmin@laas.fr. http://www.laas.fr/pulman/pulman-isens/web/app.php/