Laboratoire d’Analyse et d’Architecture des Systèmes
M.GAD EL RAB, A.ABOU EL KALAM, Y.DESWARTE
TSF, IRIT-UPS
Manifestation avec acte : 3ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR/SSI'2008), Loctudy (France), 13-17 Octobre 2008, pp.197-210 , N° 08370
Diffusable
Plus d'informations
P.VERISSIMO, N.F.NEVES, M.CORREIA, Y.DESWARTE, A.ABOU EL KALAM, A.BONDAVALLI, A.DAIDONE
Lisboa, TSF, IRIT-UPS, UNIFI, LIFO
Ouvrage (contribution) : Architecting Dependable Systems V, Lecture Notes in Computer Science 5135, Springer, N°ISBN 978-3-540-85570-5, Septembre 2008, pp.1-27 , N° 08007
Diffusable
Plus d'informations
In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized nature, and to the pervasive interconnection of systems all over the world. We discuss how to overcome these problems and achieve resilience of critical information infrastructures, through adequate architectural constructs. The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures. We discuss four main aspects: trusted components which induce prevention; middleware devices that achieve runtime automatic tolerance and protection; trustworthiness monitoring mechanisms detecting and adapting to non-predicted situations; organization-level security policies and access control models capable of securing global information flows.
F.SEBE, J.DOMINGO-FERRER, A.MARTINEZ-BALLESTE, Y.DESWARTE, J.J.QUISQUATER
URV, TSF, UCL
Revue Scientifique : IEEE Transactions on Knowledge and Data Engineering, Vol.20, N°8, pp.1034-1038, Août 2008 , N° 07064
Diffusable
Plus d'informations
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of crucial importance. Remote data possession checking protocols permit to check that a remote server can access an uncorrupted file in such a way that the verifier does not need to know beforehand the entire file that is being verified. Unfortunately, current protocols only allow a limited number of successive verifications or are impractical from the computational point of view. In this paper, we present a new remote data possession checking protocol such that: i) it allows an unlimited number of file integrity verifications; ii) its maximum running time can be chosen at set-up time and traded off against storage at the verifier.
Y.LAAROUCHI, Y.DESWARTE, D.POWELL, J.ARLAT
TSF
Manifestation avec acte : Doctoral Consortium (DCSOFT 2008) of the 3rd International Conference on Software and Data Technologies (ICSOFT 2008), Porto (Portugal), 5-8 Juillet 2008, 5p. , N° 08290
Diffusable
Plus d'informations
M.GAD EL RAB, A.ABOU EL KALAM, Y.DESWARTE
TSF, IRIT-UPS
Manifestation avec acte : Seventh IEEE International Symposium on Network Computing and Applications (NCA 2008), Cambridge (USA), 10-12 Juillet 2008, pp.29-36 , N° 08199
Diffusable
Plus d'informations
With the massive surges of new malware, the intuitive detection techniques currently used in most security tools deem ineffective. Consequently, we urgently need better solutions that are established on solid theoretical basis. It becomes, thus, necessary to search for more efficient techniques and algorithms as well as taxonomies and models for attacks and malware. We present, in this paper, the analysis we made on both automatic malware and human-centric attacks, which allowed us to construct a model for attack process. The main objective of this work is to construct a model that can aide in the generation of real attack scenarios and use it in the evaluation of Intrusion Detection Systems. However, the model described here could have many other potential uses. For example, it can be used for writing executionbased signatures, event correlation, penetration testing, security simulations as well as security educations.
V.NICOMETTE, D.POWELL, Y.DESWARTE, N.ABGHOUR, C.ZANON
TSF, Université Hassan II, 2I
Rapport LAAS N°08286, Juin 2008, 32p.
Diffusable
114025A.ABOU EL KALAM, J.ERMONT, Y.DESWARTE
IRIT-UPS, TSF
Rapport LAAS N°08311, Juin 2008, 7p.
Diffusable
Plus d'informations
M.GAD EL RAB, A.ABOU EL KALAM, Y.DESWARTE
TSF, IRIT-UPS
Rapport LAAS N°08198, Avril 2008, 18p.
Diffusable
Plus d'informations
A.BAINA, A.ABOU EL KALAM, Y.DESWARTE, M.KAANICHE
TSF, IRIT-UPS
Manifestation avec acte : Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Arlington (USA), 16-19 Avril 2008, 20p. , N° 08010
Diffusable
Plus d'informations
A.ABOU EL KALAM, A.BAINA, H.BEITOLLAHI, A.BESSANI, A.BONDAVALLI, M.CORREIA, ADAIDONE, G.DECONINCK, Y.DESWARTE, F.GARRONE, F.GRANDONI, H.MONIZ, N.F.NEVES, TRIGOLE, P.SOUSA, P.VERISSIMO
IRIT-UPS, TSF, KUL, FCUL Portugal, UNIFI, Lisboa, CNR-ISTI, CESI, IEI
Rapport de Contrat : CRUTIAL, Project IST-FP6-STREP - 027513, Janvier 2008, 121p. , N° 08034
Diffusable
112775