People

Mohamed Kaaniche

Mohamed Kaaniche

Team

TRUST : Trustworthy systems: foundations and practices

Direction

Direction Team

Contact details

Email :

Phone :

Links

News

1. photo officielle - mohamed kaâniche- adeline nazarenko- jocelyn mere- nadia pellefigue - lionel buchaillot -marianne perot ©Chloé Senat

LAAS-CNRS inaugurates its renovated buildings

Général

The official inauguration of buildings A and B, renovated under the 2015-2020 CPER programme, took place on 14 March 2025, after several years of renovation and energy-efficiency work on the most energy-inefficient buildings.

+

All news of Mohamed Kaaniche

Latest publications

2024

Conference papers

Romain Cayre, Vincent Nicomette, Guillaume Auriol, Mohamed Kaâniche, Aurélien Francillon. OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers. 2024 ACM Asia conference on Computer and Communications Security (ASIACCS)., Jul 2024, Singapore, Singapore. ⟨hal-04488826⟩

Florent Galtier, Guillaume Auriol, Vincent Nicomette, Paul L R Olivier, Romain Cayre, et al.. Wireless Modulation Identification: filling the gap in IoT networks security audit. 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '24), Jul 2024, Lausanne, Switzerland. ⟨hal-04675669⟩

Proceedings

Mohamed Kaâniche, Philippe Cuenot, Kevin Delmas, Jean Marc Gabriel, Adrien Gauffriau, et al.. ERTS 2024 - 12th European Congress on Embedded Real Time Software and Systems. 12th European Congress on Embedded Real Time Software and Systems (ERTS 2024), pp.1--489, 2024. ⟨hal-04643654⟩

2023

Other documents

Mohamed Kaâniche. LA GAZETTE DU GDR Sécurité informatique- En direct des Labos (LAAS-CNRS). 2023. ⟨hal-05030084⟩

2022

Journal articles

Rémi Adelin, Cyrius Nugier, Éric Alata, Vincent Nicomette, Vincent Migliore, et al.. Facing Emerging Challenges in Connected Vehicles: A Formally Proven, Legislation Compliant, and Post-Quantum Ready Security Protocol. Journal of Computer Virology and Hacking Techniques, 2022, ⟨10.1007/s11416-022-00426-1⟩. ⟨hal-03756650⟩

Book sections

Mohamed Kaâniche, Karama Kanoun. System dependability assessment -Interplay between research and practice. System Dependability and Analytics. Approaching System Dependability from Data, System and Analytics Perspectives, Springer, pp.393-404, 2022, Springer Series in Reliability Engineering, 978-3-031-02062-9. ⟨10.1007/978-3-031-02063-6_23⟩. ⟨hal-03739141⟩

Proceedings

Philippe Cuenot, Marie de Roquemaurel, Kevin Delmas, Jean-Marc Gabriel, Adrien Gauffriau, et al.. ERTS 2022 proceedings. 2022. ⟨hal-03704287⟩

2021

Journal articles

Pierre-François Gimenez, Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, et al.. RIDS: Radio intrusion detection and diagnosis system for wireless communications in smart environment. ACM Transactions on Cyber-Physical Systems, 2021, 5 (3), pp.Article No.: 24. ⟨10.1145/3441458⟩. ⟨hal-03123925⟩

Conference papers

Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, et al.. WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021), Jun 2021, Taipei (virtual), Taiwan. ⟨10.1109/DSN48987.2021.00049⟩. ⟨hal-03193299⟩

Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, et al.. InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021), Jun 2021, Taipei (virtual), Taiwan. ⟨10.1109/DSN48987.2021.00050⟩. ⟨hal-03193297v2⟩

Romain Cayre, Géraldine Marconato, Florent Galtier, Mohamed Kaâniche, Vincent Nicomette, et al.. Cross-protocol attacks: weaponizing a smartphone by diverting its Bluetooth controller. 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2021, Abu Dhabi, United Arab Emirates. ⟨10.1145/3448300.3468258⟩. ⟨hal-03355664⟩

Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, et al.. InjectaBLE : injection de trafic malveillant dans une connexion Bluetooth Low Energy. Symposium sur la sécurité des technologies de l'information et des communications (SSTIC 2021), Jun 2021, Rennes (en ligne), France. ⟨hal-03221143⟩

2020

Conference papers

Malcolm Bourdon, Eric Alata, Mohamed Kaâniche, Vincent Migliore, Vincent Nicomette, et al.. Anomaly detection using hardware performance counters on a large scale deployment. 10th European Congress Embedded Real Time Systems (ERTS 2020), Jan 2020, Toulouse, France. ⟨hal-03328254⟩

Florent Galtier, Romain Cayre, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette. A PSD-based fingerprinting approach to detect IoT device spoofing. 25th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2020), Dec 2020, Perth, Australia. ⟨10.1109/PRDC50213.2020.00015⟩. ⟨hal-02962655⟩

Malcolm Bourdon, Pierre-François Gimenez, Eric Alata, Mohamed Kaâniche, Vincent Migliore, et al.. Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices. 19th IEEE International Symposium on Network Computing and Applications (NCA 2020), Nov 2020, Cambridge, MA, United States. ⟨10.1109/NCA51143.2020.9306726⟩. ⟨hal-03328251⟩

Aliénor Damien, Pierre-François Gimenez, Nathalie Feyt, Vincent Nicomette, Mohamed Kaâniche, et al.. On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications. 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), Oct 2020, Coimbra, Portugal. pp.358-368, ⟨10.1109/ISSRE5003.2020.00041⟩. ⟨hal-03094215⟩

2019

Journal articles

Yann Bachy, Vincent Nicomette, Mohamed Kaâniche, Eric Alata. Smart-TV security: risk analysis and experiments on Smart-TV communication channels. Journal of Computer Virology and Hacking Techniques, 2019, 15 (1), pp.61-76. ⟨10.1007/s11416-018-0320-3⟩. ⟨hal-01761974⟩

Conference papers

Romain Cayre, Vincent Nicomette, Guillaume Auriol, Eric Alata, Mohamed Kaâniche, et al.. Mirage: towards a Metasploit-like framework for IoT. 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), Oct 2019, Berlin, Germany. ⟨hal-02346074⟩

Aliénor Damien, Michael Marcourt, Vincent Nicomette, Eric Alata, Mohamed Kaâniche. Implementation of a Host-Based Intrusion Detection System for Avionic Applications. 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2019, Kyoto, Japan. pp.178-17809, ⟨10.1109/PRDC47002.2019.00048⟩. ⟨hal-03094199⟩

Aliénor Damien, Nathalie Feyt, Vincent Nicomette, Eric Alata, Mohamed Kaâniche. Attack Injection into Avionic Systems through Application Code Mutation. 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), Sep 2019, San Diego, United States. pp.1-8, ⟨10.1109/DASC43569.2019.9081616⟩. ⟨hal-03094185⟩

2018

Journal articles

Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. IOMMU protection against I/O attacks: A vulnerability and a proof-of-concept. Journal of the Brazilian Computer Society, 2018, 24, pp.Article number: 2. ⟨10.1186/s13173-017-0066-7⟩. ⟨hal-02877143⟩

Ivan Studnia, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Youssef Laarouchi. A language-based intrusion detection approach for automotive embedded networks. International Journal of Embedded Systems, 2018, 10 (1), ⟨10.1504/IJES.2018.10010488⟩. ⟨hal-01803432⟩

Julien Duchene, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. State of the art of network protocol reverse engineering tools. Journal of Computer Virology and Hacking Techniques, 2018, 14 (1), pp.53-68. ⟨10.1007/s11416-016-0289-8⟩. ⟨hal-01496958⟩

Carla Sauvanaud, Mohamed Kaâniche, Karama Kanoun, Kahina Lazri, Guthemberg Silvestre. Anomaly Detection and Diagnosis for Cloud services: Practical experiments and lessons learned. Journal of Systems and Software, 2018, 139, pp.84-106. ⟨10.1016/j.jss.2018.01.039⟩. ⟨hal-01864357⟩

Conference papers

Aliénor Damien, Marc Fumey, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. Anomaly based Intrusion Detection for an Avionic Embedded System. Aerospace Systems and Technology Conference (ASTC-2018), Nov 2018, Londres, United Kingdom. ⟨hal-01967646⟩

Guillaume Averlant, Eric Alata, Mohamed Kaâniche, Vincent Nicomette, Yuxiao Mao. SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture. IEEE 17th International Symposium on Network Computing and Applications (NCA 2018), Nov 2018, Cambridge, MA, United States. ⟨10.1109/NCA.2018.8548343⟩. ⟨hal-01982589⟩

Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, et al.. RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Nov 2018, Cambridge, Massachusetts, United States. 8p. ⟨hal-01914981⟩

Julien Duchene, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic. Specification-Based Protocol Obfuscation. DSN 2018 - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun 2018, Luxembourg City, Luxembourg. pp.1-12, ⟨10.1109/DSN.2018.00056⟩. ⟨hal-01848573⟩

2017

Conference papers

Julien Duchene, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. Protocol reverse engineering: Challenges and obfuscation. The 11th International Conference on Risks and Security of Internet and Systems - CRiSIS 2016, Sep 2016, Roscoff, France. ⟨10.1007/978-3-319-54876-0_11⟩. ⟨hal-01388060⟩

Jonathan Roux, Eric Alata, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche. Toward an Intrusion Detection Approach for IoT based on Radio Communications Profiling. 13th European Dependable Computing Conference, Sep 2017, Geneva, Switzerland. 4p. ⟨hal-01561710⟩

Guillaume Averlant, Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. An abstraction model and a comparative analysis of Intel and ARM hardware isolation mechanisms. The 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2017), Jan 2017, Christchurch, New Zealand. ⟨hal-01493597⟩

2016

Journal articles

Julien Duchene, Colas Le Guernic, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. Outils pour la rétro-conception de protocoles : Analyse et classification. Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2016, 35 (6), pp.609-640. ⟨10.3166/tsi.35.609-640⟩. ⟨hal-01864298⟩

Conference papers

Carla Sauvanaud, Kahina Lazri, Mohamed Kaâniche, Karama Kanoun. Towards Black-Box Anomaly Detection in Virtual Network Functions. The 46th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2016), Jun 2016, TOULOUSE, France. pp.254 - 257, ⟨10.1109/DSN-W.2016.17⟩. ⟨hal-01419016⟩

Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche. Bypassing IOMMU Protection against I/O Attacks. 7th Latin-American Symposium on Dependable Computing (LADC’16), Oct 2016, Cali, Colombia. pp.145-150, ⟨10.1109/LADC.2016.31⟩. ⟨hal-01419962⟩

Carla Sauvanaud, Kahina Lazri, Mohamed Kaâniche, Karama Kanoun. Anomaly Detection and Root Cause Localization in Virtual Network Functions. 27th International Symposium on Software Reliability Engineering (ISSRE 2016), Oct 2016, Ottawa, Canada. pp.196 - 206, ⟨10.1109/ISSRE.2016.32⟩. ⟨hal-01419014⟩

Master thesis

Javier Alcaraz, Mohamed Kaâniche, Carla Sauvanaud. Anomaly Detection in Cloud Applications. Machine Learning [cs.LG]. 2016. ⟨hal-01406168⟩