Publications personnelle

211documents trouvés

08370
01/10/2008

Modélisation des processus d'attaques pour l'évaluation des IDS

M.GAD EL RAB, A.ABOU EL KALAM, Y.DESWARTE

TSF, IRIT-UPS

Manifestation avec acte : 3ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR/SSI'2008), Loctudy (France), 13-17 Octobre 2008, pp.197-210 , N° 08370

Diffusable

Plus d'informations

Mots-Clés / Keywords
Attaques; Maliciel; Modèle; Test; Evaluation; Génération d'attaques; IDS;

115837
08007
29/09/2008

The CRUTIAL architecture for critical information infrastructures

P.VERISSIMO, N.F.NEVES, M.CORREIA, Y.DESWARTE, A.ABOU EL KALAM, A.BONDAVALLI, A.DAIDONE

Lisboa, TSF, IRIT-UPS, UNIFI, LIFO

Ouvrage (contribution) : Architecting Dependable Systems V, Lecture Notes in Computer Science 5135, Springer, N°ISBN 978-3-540-85570-5, Septembre 2008, pp.1-27 , N° 08007

Diffusable

Plus d'informations

Abstract

In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized nature, and to the pervasive interconnection of systems all over the world. We discuss how to overcome these problems and achieve resilience of critical information infrastructures, through adequate architectural constructs. The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures. We discuss four main aspects: trusted components which induce prevention; middleware devices that achieve runtime automatic tolerance and protection; trustworthiness monitoring mechanisms detecting and adapting to non-predicted situations; organization-level security policies and access control models capable of securing global information flows.

115012
07064
01/08/2008

Efficient remote data possession checking in critical information infrastructures

F.SEBE, J.DOMINGO-FERRER, A.MARTINEZ-BALLESTE, Y.DESWARTE, J.J.QUISQUATER

URV, TSF, UCL

Revue Scientifique : IEEE Transactions on Knowledge and Data Engineering, Vol.20, N°8, pp.1034-1038, Août 2008 , N° 07064

Diffusable

Plus d'informations

Abstract

Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of crucial importance. Remote data possession checking protocols permit to check that a remote server can access an uncorrupted file in such a way that the verifier does not need to know beforehand the entire file that is being verified. Unfortunately, current protocols only allow a limited number of successive verifications or are impractical from the computational point of view. In this paper, we present a new remote data possession checking protocol such that: i) it allows an unlimited number of file integrity verifications; ii) its maximum running time can be chosen at set-up time and traded off against storage at the verifier.

112811
08290
24/07/2008

Safety and security architectures for avionics

Y.LAAROUCHI, Y.DESWARTE, D.POWELL, J.ARLAT

TSF

Manifestation avec acte : Doctoral Consortium (DCSOFT 2008) of the 3rd International Conference on Software and Data Technologies (ICSOFT 2008), Porto (Portugal), 5-8 Juillet 2008, 5p. , N° 08290

Diffusable

Plus d'informations

Mots-Clés / Keywords
Critical systems; Integrity levels; Virtualization; Information flow validation;

114513
08199
23/07/2008

Execution patterns in automatic malware and human-centric attacks

M.GAD EL RAB, A.ABOU EL KALAM, Y.DESWARTE

TSF, IRIT-UPS

Manifestation avec acte : Seventh IEEE International Symposium on Network Computing and Applications (NCA 2008), Cambridge (USA), 10-12 Juillet 2008, pp.29-36 , N° 08199

Diffusable

Plus d'informations

Abstract

With the massive surges of new malware, the intuitive detection techniques currently used in most security tools deem ineffective. Consequently, we urgently need better solutions that are established on solid theoretical basis. It becomes, thus, necessary to search for more efficient techniques and algorithms as well as taxonomies and models for attacks and malware. We present, in this paper, the analysis we made on both automatic malware and human-centric attacks, which allowed us to construct a model for attack process. The main objective of this work is to construct a model that can aide in the generation of real attack scenarios and use it in the evaluation of Intrusion Detection Systems. However, the model described here could have many other potential uses. For example, it can be used for writing executionbased signatures, event correlation, penetration testing, security simulations as well as security educations.

114492
08286
17/06/2008

Fine-grained authorization for internet applications

V.NICOMETTE, D.POWELL, Y.DESWARTE, N.ABGHOUR, C.ZANON

TSF, Université Hassan II, 2I

Rapport LAAS N°08286, Juin 2008, 32p.

Diffusable

114025
08311
01/06/2008

Specification and verification of security properties of e-contracts

A.ABOU EL KALAM, J.ERMONT, Y.DESWARTE

IRIT-UPS, TSF

Rapport LAAS N°08311, Juin 2008, 7p.

Diffusable

Plus d'informations

Mots-Clés / Keywords
e-contract security; Timed automata; Model-checking;

114179
08198
28/04/2008

A model-driven approach for attack-scenario generation

M.GAD EL RAB, A.ABOU EL KALAM, Y.DESWARTE

TSF, IRIT-UPS

Rapport LAAS N°08198, Avril 2008, 18p.

Diffusable

Plus d'informations

Mots-Clés / Keywords
Security; Attack modeling; Intrusion detection systems; Evaluation; Testing; Constraint programming;

113655
08010
14/04/2008

A collaborative access control framework for critical infrastructures

A.BAINA, A.ABOU EL KALAM, Y.DESWARTE, M.KAANICHE

TSF, IRIT-UPS

Manifestation avec acte : Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Arlington (USA), 16-19 Avril 2008, 20p. , N° 08010

Diffusable

Plus d'informations

Mots-Clés / Keywords
Critical infrastructure; Critical information infrastructure; Security; Access control policies and models; Collaboration; Interopérabilité;

113532
08034
29/01/2008

Preliminary specification of services and protocols. CRUTIAL Deliverable D10

A.ABOU EL KALAM, A.BAINA, H.BEITOLLAHI, A.BESSANI, A.BONDAVALLI, M.CORREIA, ADAIDONE, G.DECONINCK, Y.DESWARTE, F.GARRONE, F.GRANDONI, H.MONIZ, N.F.NEVES, TRIGOLE, P.SOUSA, P.VERISSIMO

IRIT-UPS, TSF, KUL, FCUL Portugal, UNIFI, Lisboa, CNR-ISTI, CESI, IEI

Rapport de Contrat : CRUTIAL, Project IST-FP6-STREP - 027513, Janvier 2008, 121p. , N° 08034

Diffusable

112775
Pour recevoir une copie des documents, contacter doc@laas.fr en mentionnant le n° de rapport LAAS et votre adresse postale. Signalez tout problème de fonctionnement à sysadmin@laas.fr. http://www.laas.fr/pulman/pulman-isens/web/app.php/