Publications personnelle

211documents trouvés

07697
01/12/2007

MoSAIC: mobile system availability integrity and confidentiality - Final progress report

M.O.KILLIJIAN, M.BANATRE, C.BRYCE, L.BLAIN, P.COUDERC, L.COURTES, Y.DESWARTE, D.MARTIN-GUILLEREZ, R.MOLVA, N.OUALHA, D.POWELL, Y.ROUDIER, I.SILVAIN

TSF, IRISA, 2I, EURECOM

Rapport de Contrat : ACI Sécurité & Informatique 2004, projet n° 04588, MoSAIC, Décembre 2007, 100p. , N° 07697

Diffusable

112454
07252
01/12/2007

Closed-circuit unobservable voice over IP

C.AGUILAR-MELCHOR, Y.DESWARTE, J.IGUTCHI-CARTIGNY

Université de Limoge, TSF

Manifestation avec acte : Annual Computer Security Applications Conference (ACSAC), Miami (USA), 10-14 Décembre 2007, 14p. , N° 07252

Diffusable

Plus d'informations

Abstract

Among all the security issues in Voice over IP (VoIP) communications, one of the most difficult to achieve is traffic analysis resistance. Indeed, classical approaches provide a reasonable degree of security but induce large roundtrip times that are incompatible with VoIP. In this paper, we describe some of the privacy and security issues derived from traffic analysis in VoIP. We also give an overview of how to provide low-latency VoIP communication with strong resistance to traffic analysis. Finally, we present a server which can provide such resistance to hundreds of users even if the server is compromised.

Mots-Clés / Keywords
Unobservability; Anonymity; Voice over IP; Low-Latency;

112812
07664
29/11/2007

Anonymous voice over IP communication

C.AGUILAR-MELCHOR, Y.DESWARTE

Université de Limoge, TSF

Rapport LAAS N°07664, Novembre 2007, 32p.

Diffusable

Plus d'informations

Mots-Clés / Keywords
Unobservability; Anonymity; Voice over IP;

112168
07282
01/10/2007

Defining categories to select representative attack test-cases

M.GAD EL RAB, A.ABOU EL KALAM, Y.DESWARTE

TSF, LIFO

Manifestation avec acte : 3rd Workshop on Quality of Protection (QoP'07), Alexandria (USA), 29 Octobre 2007, pp.40-42 , N° 07282

Lien : http://hal.archives-ouvertes.fr/hal-00168602/fr/

Diffusable

Plus d'informations

Abstract

To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against all known and unknown attacks is probably impossible. Nevertheless, a sensible selection of representative attacks is necessary to obtain an unbiased evaluation of such systems. To help in this selection, this paper suggests applying the same approach as in software testing: to overcome the problem of an unmanageably large set of possible inputs, software testers usually divide the data input domain into categories (or equivalence classes), and select representative instances from each category as test cases. We believe that the same principle could be applied to IDS testing if we have a reasonable classification. In this paper we make a thorough analysis of existing attack classifications in order to determine whether they could be helpful in selecting attack test cases. Based on our analysis, we construct a new scheme to classify attacks relying on those attributes that appear to be the best classification criteria. The proposed classification is mainly intended to be used for testing and evaluating IDS although it can be used for other purposes such as incident handling and intrusion reporting. We also apply the Classification Tree Method (CTM) to select attack test cases. As far as we know, this is the first time that this method is applied for this purpose.

Mots-Clés / Keywords
Intrusion detection systems; Attack; Evaluation; Test; Classification;

111903
07426
01/08/2007

Secure anonymization of healthcare records

A.ABOU EL KALAM, Y.DESWARTE

LIFO, TSF

Rapport LAAS N°07426, Août 2007, 22p.

Diffusable

111200
07118
01/07/2007

Access control for collaborative systems: a web services based approach

A.ABOU EL KALAM, Y.DESWARTE, A.BAINA, M.KAANICHE

LIFO, TSF

Manifestation avec acte : IEEE 2007 International Conference on Web Services (ICWS), Salt lake City (USA), 9-13 Juillet 2007, pp.1064-1071 , N° 07118

Diffusable

111460
07136
26/06/2007

Classification des attaques pour l'évaluation des IDS

A.ABOU EL KALAM, M.GAD EL RAB, Y.DESWARTE

LIFO, TSF

Manifestation avec acte : 2nd Conference on Security in Network Architectures and Information Systems (SAR-SSI 2007), Annecy (France), 12-15 Juin 2007, pp.101-112 , N° 07136

Diffusable

110487
07056
15/06/2007

Sécurité, protection de la vie privée et disponibilité

Y.DESWARTE, D.POWELL, Y.ROUDIER

TSF, EURECOM

Ouvrage (contribution) : ARAGO 31. Informatique Diffuse, OFTA, Paris, N°ISBN 2-906028-17-7, 2007, Chapitre XII, pp.301-344 , N° 07056

Diffusion restreinte

110441
07275
01/06/2007

Des technologies pour protéger la vie privée sur Internet

Y.DESWARTE

TSF

Conférence invitée : 14ème Colloque Informatique et Société. De l'insécurité numérique à la vulnérabilité de la société, Paris (France), 14-15 Juin 2007, pp.19-30 , N° 07275

Diffusable

110607
07119
01/03/2007

Access control for collaborative systems: a state of the art survey

A.BAINA, A.ABOU EL KALAM, Y.DESWARTE

TSF, LIFO

Rapport LAAS N°07119, Mars 2007, 13p.

Diffusable

109508
Pour recevoir une copie des documents, contacter doc@laas.fr en mentionnant le n° de rapport LAAS et votre adresse postale. Signalez tout problème de fonctionnement à sysadmin@laas.fr. http://www.laas.fr/pulman/pulman-isens/web/app.php/