Dependable Computing and Fault Tolerance

- tsf -


The work of the team focuses on the dependability of computing systems, i.e., the ability to deliver a service that can be justifiably trusted.


Our focus is on large and networked computing systems comprising a variety of components (supercomputers to embedded systems) in which software and services play a decisive role. It is important to take into account the evolution of such systems (functional, environmental, technological) involving new threats and classes of faults. Our research addresses four major challenges: mobility, evolvability and autonomy, openness, and reactivity. A key feature is the breadth of faults considered: accidental faults (physical, software) and malicious interaction faults. Our approach combines analytical and experimental methods to meet these challenges.

Architecture (Fault prevention and Fault tolerance)

Fault tolerance software for dynamic distributed systems

The challenge is to tolerate faults despite sources of uncertainty such as the locality of knowledge (no global view) and the asynchrony of distributed nodes.

+

Adaptive fault tolerance

Dynamic adaptation of fault tolerance mechanisms is a means of ensuring the persistence of dependability in the face of changes in the system or its environment.

+

Safety monitors for critical autonomous systems

This work focuses on autonomous robots and vehicles operating in spaces shared with humans. They implement monitoring mechanisms that can trigger safety interventions when a dangerous situation is detected.

+

Security architectures

The aim is to design architectures that are resistant to attacks and malicious acts.

+

Model-based intrusion detection

Our work focuses on intrusion detection in systems for which there are no existing attack bases: critical embedded systems and the Internet of Things. In these cases, intrusions cannot be detected by searching for known attack signatures, and a model-based approach is particularly relevant.

+

Personal data protection

The challenge is to enable the use of digital applications and services while protecting personal data.

+

On-line learning-based anomaly detection

This work focuses on the early detection of anomalies affecting services deployed in the cloud.

+

Multi-core architectures and mission-critical systems

Multi-core architectures introduce a lack of predictability in execution times. Nevertheless, their introduction in mission-critical systems will become essential to meet the growing need for embedded computing power. Our work aims to offer solutions to this problem.

+

Analysis (Fault removal and Fault forecasting)

Abstractions and models of connected dynamic systems

This work focuses on graphs as models of interaction structures, from an algorithmic point of view.

+

Experimental characterization of social interactions

This work exploits location data from human interaction, for example to deduce mobility models or to study collective decision-making processes.

+

Software testing of stand-alone systems

The focus is on simulation-based testing methods. The system is immersed in virtual worlds, where it is confronted with a wide range of test situations.

+

Vulnerability scans and security assessments

This work develops experimental methods for discovering vulnerabilities, and assessing the effectiveness of protection mechanisms against attacks.

+

Safety arguments and confidence quantification

The aim is to help build a safety case using formalized models. The work is based on Bayesian networks and belief functions (Dempster-Shafer theory).

+

Latest publications

2024

Journal articles

Cyrius Nugier, Vincent Migliore. Acceleration of Classic McEliece Post-Quantum Cryptosystem with Cache Processing. IEEE Micro, 2024, 44 (1), pp.59 - 68. ⟨10.1109/MM.2023.3304425⟩. ⟨hal-04232870⟩

2023

Journal articles

Armando Castañeda, Pierre Fraigniaud, Ami Paz, Sergio Rajsbaum, Matthieu Roy, et al.. Synchronous t-resilient consensus in arbitrary graphs. Information and Computation, 2023, 292, pp.105035. ⟨10.1016/j.ic.2023.105035⟩. ⟨hal-04287975⟩

Armando Castañeda, Aurélie Hurault, Philippe Quéinnec, Matthieu Roy. Tasks in modular proofs of concurrent algorithms. Information and Computation, 2023, 292 (Selected papers from SSS’2019, the 21st International Symposium on Stabilization, Safety, and Security of Distributed Systems), pp.105040. ⟨10.1016/j.ic.2023.105040⟩. ⟨hal-04086420⟩

Yassir Idmessaoud, Didier Dubois, Jérémie Guiochet. Confidence assessment in safety argument structure - Quantitative vs. qualitative approaches. International Journal of Approximate Reasoning, 2023, 165, pp.109100. ⟨10.1016/j.ijar.2023.109100⟩. ⟨hal-04342922⟩

Gaël Loubet, Eric Alata, Alexandru Takacs, Daniela Dragomirescu. A Survey on the Security Challenges of Low-Power Wireless Communication Protocols for Communicating Concrete in Civil Engineerings. Sensors, 2023, 23 (4), pp.1849. ⟨10.3390/s23041849⟩. ⟨hal-04154993⟩

Erwan Le Merrer, Ronan Pons, Gilles Trédan. Algorithmic audits of algorithms, and the law. AI and Ethics, 2023, pp.1-21. ⟨10.1007/s43681-023-00343-z⟩. ⟨hal-03583919v2⟩

Lamoussa Sanogo, Eric Alata, Alexandru Takacs, Daniela Dragomirescu. Intrusion Detection System for IoT: Analysis of PSD Robustness. Sensors, 2023, 23 (4), pp.2353. ⟨10.3390/s23042353⟩. ⟨hal-04154781⟩

Erwan Le Merrer, Gilles Trédan, Ali Yesilkanat. Modeling Rabbit-Holes on YouTube. Social Network Analysis and Mining, 2023, 13 (1), pp.100. ⟨10.1007/s13278-023-01105-9⟩. ⟨hal-03620039v2⟩

Books

Erwan Le Merrer, Gilles Trédan. What is a black box algorithm?: Tractatus of algorithmic decision-making. 2023. ⟨hal-03940259⟩

Conference papers

Florent Moriconi, Axel Ilmari Neergaard, Lucas Georget, Samuel Aubertin, Aurélien Francillon. Reflections on Trusting Docker: Invisible Malware in Continuous Integration Systems. 17th IEEE Workshop on Offensive Technologies (WOOT 2023), IEEE, May 2023, San Francisco (CA, USA), United States. ⟨10.1109/SPW59333.2023.00025⟩. ⟨hal-04087018⟩

Joris Guérin, Kevin Delmas, Raul Sena Ferreira, Jérémie Guiochet. Out-Of-Distribution Detection Is Not All You Need. The 37th AAAI conference on artificial intelligence (2023), Feb 2023, Washington DC, United States. ⟨hal-03870531v2⟩

Raul Sena Ferreira, Joris Guerin, Jeremie Guiochet, Hélène Waeselynck. SENA: Similarity-based Error-checking of Neural Activations. 27th European Conference on Artificial Intelligence - ECAI 2023, Sep 2023, Krakow, Poland. ⟨hal-04212952⟩

Luca Vittorio Sartori, Hélène Waeselynck, Jérémie Guiochet. Pairwise Testing Revisited for Structured Data With Constraints. IEEE International Conference on Software Testing, Verification and Validation (ICST 2023), Apr 2023, Dublin, Ireland. ⟨10.1109/ICST57152.2023.00027⟩. ⟨hal-03938378v2⟩

Alassane Sidibe, Gael Loubet, Alexandru Takacs, Lamoussa Sanogo, Daniela Dragomirescu. Battery-free Bluetooth Low Energy Wireless Sensor Powered by Radiative Wireless Power Transfer. NewCAS 2023, IEEE, Jun 2023, Edinburg,, United Kingdom. ⟨10.1109/NEWCAS57931.2023.10198088⟩. ⟨hal-04157047⟩

Maria Laura Brzezinski Meyer, Hélène Waeselynck, Fernand Cuesta. A Case Study on the "Jungle" Search for Industry-Relevant Regression Testing. 23rd IEEE International Conference on Software Quality, Reliability & Security (QRS 2023), Oct 2023, Chiang Mai, Thailand. ⟨10.1109/QRS60937.2023.00045⟩. ⟨hal-04294958⟩

Augustin Godinot, Erwan Le Merrer, Gilles Trédan, Camilla Penzo, François Taïani. Change-Relaxed Active Fairness Auditing. RJCIA 2023 - 21e Rencontres des Jeunes Chercheurs en Intelligence Artificiel, Association Française pour l'Intelligence Artificielle, Jul 2023, Strasbourg, France. pp.91-96. ⟨hal-04395914⟩

Preprints, Working Papers, ...

Philippe Leleux, Christina Schwarz, Martin Joachim Kühn, Carola Kruse, Ulrich Rüde. Complexity analysis and scalability of a matrix-free extrapolated geometric multigrid solver for curvilinear coordinates representations from fusion plasma applications. 2023. ⟨hal-04356523⟩

2022

Journal articles

Rémi Adelin, Cyrius Nugier, Éric Alata, Vincent Nicomette, Vincent Migliore, et al.. Facing Emerging Challenges in Connected Vehicles: A Formally Proven, Legislation Compliant, and Post-Quantum Ready Security Protocol. Journal of Computer Virology and Hacking Techniques, 2022, ⟨10.1007/s11416-022-00426-1⟩. ⟨hal-03756650⟩

Alexandre Albore, David Doose, Christophe Grand, Jérémie Guiochet, Charles Lesire, et al.. Skill-based design of dependable robotic architectures. Robotics and Autonomous Systems, 2022, 160, pp.104318. ⟨10.1016/j.robot.2022.104318⟩. ⟨hal-03927289⟩

Yuxiao Mao, Vincent Migliore, Vincent Nicomette. MATANA: A Reconfigurable Framework for Runtime Attack Detection Based on the Analysis of Microarchitectural Signals. Applied Sciences, 2022, 12 (3), pp.1452. ⟨10.3390/app12031452⟩. ⟨hal-03571995⟩

Klaus-Tycho Foerster, Andrzej Kamisinski, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan. Improved Fast Rerouting Using Postprocessing. IEEE Transactions on Dependable and Secure Computing, 2022, 19 (1), pp.537 - 550. ⟨10.1109/TDSC.2020.2998019⟩. ⟨hal-03048830⟩

Book sections

Mohamed Kaâniche, Karama Kanoun. System dependability assessment -Interplay between research and practice. System Dependability and Analytics. Approaching System Dependability from Data, System and Analytics Perspectives, Springer, pp.393-404, 2022, Springer Series in Reliability Engineering, 978-3-031-02062-9. ⟨10.1007/978-3-031-02063-6_23⟩. ⟨hal-03739141⟩

Conference papers

Mohamed El Mostadi, Hélène Waeselynck, Jean-Marc Gabriel. Virtual Test Scenarios for ADAS: Distance to Real Scenarios Matters!. 33nd IEEE Intelligent Vehicles Symposium (IV 2022), Jun 2022, Aachen, Germany. ⟨10.1109/IV51971.2022.9827170⟩. ⟨hal-03770653⟩

Klaus-Tycho Foerster, Juho Hirvonen, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Tredan. On the Price of Locality in Static Fast Rerouting. 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun 2022, Baltimore, United States. pp.215-226, ⟨10.1109/dsn53405.2022.00032⟩. ⟨hal-03859648⟩

Joris Guerin, Kevin Delmas, Jérémie Guiochet. Evaluation of Runtime Monitoring for UAV Emergency Landing. International Conference on Robotics and Automation (ICRA), May 2022, Philadelphia, United States. ⟨hal-03600856⟩

Esteban Perrotin, Matthieu Roy, Ariane Herbulot, Michel Devy, Fabrice Bousquet. Détection des lignes aéroportuaires par méthode hybride de filtrage particulaire et de réseaux de neurones. Congrès Reconnaissance des Formes, Image, Apprentissage et Perception (RFIAP 2022), Jul 2022, Vannes, France. ⟨hal-03788203⟩

Gabriela Medina, Jérémie Guiochet, Charles Lesire, Augustin Manecy. A skill fault model for autonomous systems. 4th International Workshop on Robotics Software Engineering (RoSE’22), Co-located with ICSE 2022, May 2022, Pittsburg (virtual), United States. ⟨10.1145/3526071.3527513⟩. ⟨hal-03609377v2⟩

Joris Guérin, Raul Sena Ferreira, Kevin Delmas, Jérémie Guiochet. Unifying Evaluation of Machine Learning Safety Monitors. 33rd IEEE International Symposium on Software Reliability Engineering (ISSRE 2022), Oct 2022, Charlotte, United States. ⟨10.1109/ISSRE55969.2022.00047⟩. ⟨hal-03765273⟩

Yassir Idmessaoud, Didier Dubois, Jérémie Guiochet. Uncertainty Elicitation and Propagation in GSN Models of Assurance Cases. 41st International Conference on Computer Safety, Reliability and Security (SAFECOMP 2022), Sep 2022, Munich, Germany. pp.1-14. ⟨hal-03704505⟩

Yassir Idmessaoud, Didier Dubois, Jérémie Guiochet. A qualitative counterpart of belief functions with application to uncertainty propagation in safety cases. 7th International Conference on Belief Functions (BELIEF 2022), Oct 2022, Paris, France. ⟨10.1007/978-3-031-17801-6_22⟩. ⟨hal-03709837⟩

Aléxis Génèrès, Michaël Lauer. Experimental Platform for Testing Cache Allocation Policies to Improve Linux Real-Time Behaviour. CARS - Critical Automotive applications: Robustness & Safety, Sep 2022, Zaragoza, Spain. ⟨hal-03782727v2⟩

Raul Sena Ferreira, Joris Guérin, Jérémie Guiochet, Hélène Waeselynck. SiMOOD: Evolutionary Testing Simulation with Out-Of-Distribution Images. 27th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2022), Nov 2022, Beijing, China. ⟨10.1109/PRDC55274.2022.00021⟩. ⟨hal-03779723⟩

Aléxis Génèrès, Michaël Lauer, Jean-Charles Fabre. Experimenting with Dynamic Cache Allocation to Improve Linux Real-Time Behaviour. 11th European Congress of Embedded Real Time Software and Systems, Jun 2022, Toulouse, France. ⟨hal-04044944⟩

Luca Vittorio Sartori, Jérémie Guiochet, Hélène Waeselynck, Aizar Antonio Berlanga Galvan, Simon Hébert-Vernhes, et al.. Integration of Test Generation Into Simulation-Based Platforms: An Experience Report. 3rd ACM/IEEE International Conference on Automation of Software Test, May 2022, Pittsburgh, United States. ⟨10.1145/3524481.3527236⟩. ⟨hal-03623613⟩

Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion, James Howe, Romain Malmain, et al.. Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC. International Workshop on Code-Based Cryptography, CBCrypto 2022, May 2022, Trondheim, Norway. pp.0. ⟨hal-04116827⟩

Romain Cayre, Clement Chaine, Guillaume Auriol, Vincent Nicomette, Geraldine Marconato. OASIS: un framework pour la détection d'intrusion embarquée dans les contrôleurs Bluetooth Low Energy. Symposium sur la sécurité des technologies de l'information et des communications (SSTIC 2022), Jun 2022, Rennes, France. ⟨hal-03898224⟩

Esteban Perrotin, Matthieu Roy, Ariane Herbulot, Michel Devy, Fabrice Bousquet. Towards the certification of vision based systems: modular architecture for airport line detection. 11th European Congress on Embedded Real-Time Systems, Jun 2022, Toulouse, France. ⟨hal-03717993⟩

Autres documents

Yassir Idmessaoud, Jérémie Guiochet, Didier Dubois. Questionnaire for estimating uncertainties in assurance cases. Rapport LAAS n° 22142. 2022. ⟨hal-03649068⟩

Proceedings

Philippe Cuenot, Marie de Roquemaurel, Kevin Delmas, Jean-Marc Gabriel, Adrien Gauffriau, et al.. ERTS 2022 proceedings. 2022. ⟨hal-03704287⟩

Reports

Erwan Le Merrer, Gilles Trédan, Ali Yesilkanat. YouTube Recommendations Do Predict Polls: A note on the 2022 French presidential election. [Research Report] Rapport LAAS n° 22136, Inria. 2022. ⟨hal-03655608⟩

Preprints, Working Papers, ...

Erwan Le Merrer, Gilles Trédan. Qu’est ce qu’un algorithme en boîte noire ? Tractatus des décisions algorithmiques. 2022. ⟨hal-03851597⟩

2021

Journal articles

Erwan Le Merrer, Gilles Trédan. Le problème du videur : la crédibilité des explications de l’IA en question. Interstices, 2021. ⟨hal-03310970⟩

Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan. On the Implications of Routing Models on Network Optimization. IEEE Transactions on Network and Service Management, 2021, 18 (4), pp.4756 - 4769. ⟨10.1109/TNSM.2021.3090312⟩. ⟨hal-03278920⟩

Pierre-François Gimenez, Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, et al.. RIDS: Radio intrusion detection and diagnosis system for wireless communications in smart environment. ACM Transactions on Cyber-Physical Systems, 2021, 5 (3), pp.Article No.: 24. ⟨10.1145/3441458⟩. ⟨hal-03123925⟩

Conference papers

Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, et al.. InjectaBLE : injection de trafic malveillant dans une connexion Bluetooth Low Energy. Symposium sur la sécurité des technologies de l'information et des communications (SSTIC 2021), Jun 2021, Rennes (en ligne), France. ⟨hal-03221143⟩

Igor Garcia Ballhausen Sampaio, Luigy Machaca, Jose Viterbo, Joris Guérin. A Novel Method for Object Detection using Deep Learning and CAD Models.. 23rd International Conference on Enterprise Information Systems (ICEIS2021), Apr 2021, Online, Portugal. ⟨hal-03213496⟩

Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, et al.. InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021), Jun 2021, Taipei (virtual), Taiwan. ⟨10.1109/DSN48987.2021.00050⟩. ⟨hal-03193297v2⟩

Mohamed El Mostadi, Hélène Waeselynck, Jean Marc Gabriel. Seven Technical Issues That May Ruin Your Virtual Tests for ADAS. 32nd IEEE Intelligent Vehicles Symposium, Jul 2021, Nagoya, Japan. ⟨10.1109/IV48863.2021.9575953⟩. ⟨hal-03377931v2⟩

Ahmed Aboukora, Guillaume Bonnet, Florent Galtier, Romain Cayre, Vincent Nicomette, et al.. A defensive man-in-middle approach to filter BLE packets. 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2021, Abou Dhabi (virtual), United Arab Emirates. ⟨10.1145/3448300.3468259⟩. ⟨hal-03560107⟩

Guillaume Brau, Mohammed Foughali. Contract-Based Verification of Model Transformations: A Formally Founded Approach. 36th ACM/SIGAPP Symposium On Applied Computing (SAC 2021), Mar 2021, Gwangju (virtual), South Korea. ⟨hal-03059942⟩

Klaus-Tycho Foerster, Juho Hirvonen, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan. On the Feasibility of Perfect Resilience with Local Fast Failover. 2nd Symposium on Algorithmic Principles of Computer Systems (APOCS 2021), Jan 2021, Alexandria (Virtual), United States. ⟨hal-03049009⟩

Adrien Hereau, Karen Godary-Dejean, Jérémie Guiochet, Didier Crestani. A Fault Tolerant Control Architecture Based on Fault Trees for an Underwater Robot Executing Transect Missions. ICRA 2021 - 38th IEEE International Conference on Robotics and Automation, May 2021, Xi’an, China. pp.2127-2133, ⟨10.1109/ICRA48506.2021.9561735⟩. ⟨lirmm-03228297⟩

Klaus-Tycho Foerster, Andrzej Kamisinski, Yvonne Anne Pignolet, Stefan Schmid, Gilles Trédan. Grafting Arborescences for Extra Resilience of Fast Rerouting Schemes. Infocom 2021, May 2021, Virtual, France. ⟨hal-03048997⟩

Claire Meymandi-Nejad, Esteban Perrotin, Ariane Herbulot, Michel Devy. Colorimetric Space Study: Application for Line Detection on Airport Areas. 7th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS 2021), Apr 2021, En ligne, France. pp.546-553, ⟨10.5220/0010456605460553⟩. ⟨hal-03650600⟩

Daniel Loche, Aléxis Génèrès, Michaël Lauer, Jean-Charles Fabre. Run-time Monitoring and Control for Temporal Fault Prevention in Mixed-criticality Systems. European Dependable Computing Conference (EDCC 2021), Intel; Fraunhofer IKS; LAAS, Sep 2021, Munich (virtual), Germany. pp.53-60, ⟨10.1109/EDCC53658.2021.00015⟩. ⟨hal-03275605⟩

Cyrius Nugier, Diane Leblanc-Albarel, Agathe Blaise, Simon Masson, Paul Huynh, et al.. An Upcycling Tokenization Method for Credit Card Numbers. SECRYPT 2021 - 18th International Conference on Security and Cryptography, Jul 2021, Online, France. ⟨hal-03220739⟩

Erwan Le Merrer, Benoît Morgan, Gilles Trédan. Setting the Record Straighter on Shadow Banning. INFOCOM 2021 - IEEE International Conference on Computer Communications, IEEE, May 2021, Virtual, Canada. pp.1-10, ⟨10.1109/INFOCOM42981.2021.9488792⟩. ⟨hal-03234771⟩

Clément Robert, Jérémie Guiochet, Hélène Waeselynck, Luca Vittorio Sartori. TAF: a tool for diverse and constrained test case generation. 21st IEEE International Conference on Software Quality, Reliability and Security (QRS), Dec 2021, Hanan Island, China. ⟨10.1109/QRS54544.2021.00042⟩. ⟨hal-03435959⟩

Esteban Perrotin, Claire Meymandi-Nejad, Ariane Herbulot, Michel Devy, Fabrice Bousquet. Détection des lignes aéroportuaires par méthode de filtrage particulaire: Évaluation de fonctions d'observations. ORASIS 2021, Centre National de la Recherche Scientifique [CNRS], Sep 2021, Saint Ferréol, France. ⟨hal-03339641⟩

Maria Laura Brzezinski Meyer. TSAI - Test Selection using Artificial Intelligence for the Support of Continuous Integration. 2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Oct 2021, Wuhan, China. pp.306-309, ⟨10.1109/ISSREW53611.2021.00092⟩. ⟨hal-03583925⟩

Raul Sena Ferreira, Jean Arlat, Jérémie Guiochet, Hélène Waeselynck. Benchmarking Safety Monitors for Image Classifiers with Machine Learning. 26th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2021), IEEE, Dec 2021, Perth, Australia. ⟨10.1109/PRDC53464.2021.00012⟩. ⟨hal-03362684⟩

Romain Cayre, Florent Galtier. Attaques inter-protocolaires par détournement du contrôleur Bluetooth d'un téléphone mobile. GT Sécurité des Systèmes, Logiciels et Réseaux, May 2021, En ligne, France. ⟨hal-03221148⟩

Yassir Idmessaoud, Didier Dubois, Jérémie Guiochet. Quantifying confidence of safety cases with belief functions. 6th International Conference on Belief Functions (BELIEF 2021), Oct 2021, Shanghai, China. ⟨10.1007/978-3-030-88601-1_27⟩. ⟨hal-03366274⟩

Romain Cayre, Géraldine Marconato, Florent Galtier, Mohamed Kaâniche, Vincent Nicomette, et al.. Cross-protocol attacks: weaponizing a smartphone by diverting its Bluetooth controller. 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2021, Abu Dhabi, United Arab Emirates. ⟨10.1145/3448300.3468258⟩. ⟨hal-03355664⟩

Joris Guérin, Kevin Delmas, Jérémie Guiochet. Certifying Emergency Landing for Safe Urban UAV. 7th International Workshop on Safety and Security of Intelligent Vehicles (SSIV 2021) at IEEE/IFIP Intern. Conf. on Dependable Systems and Networks (DSN), Jun 2021, Taipei (virtual), Taiwan. ⟨10.1109/DSN-W52860.2021.00020⟩. ⟨hal-03213534⟩

Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche, et al.. WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021), Jun 2021, Taipei (virtual), Taiwan. ⟨10.1109/DSN48987.2021.00049⟩. ⟨hal-03193299⟩

Autres documents

Yassir Idmessaoud, Jérémie Guiochet, Didier Dubois. Calculation of aggregation formulas for GSN argument types using belief functions. Rapport LAAS n° 21104. 2021. ⟨hal-03210201⟩

2020

Journal articles

Christophe Bertero, Jean-François Léon, Gilles Trédan, Matthieu Roy, Alexandre Armengaud. Urban-Scale NO2 Prediction with Sensors Aboard Bicycles: A Comparison of Statistical Methods Using Synthetic Observations. Atmosphere, 2020, 11 (9), pp.1014. ⟨10.3390/atmos11091014⟩. ⟨hal-02998998⟩

Bertrand Jayles, Ramon Escobedo, Roberto Pasqua, Christophe Zanon, Adrien Blanchet, et al.. Collective Information Processing in Human Phase Separation. Philosophical Transactions of the Royal Society B: Biological Sciences, 2020, 375 (1807), ⟨10.1098/rstb.2019.0801⟩. ⟨hal-02393253v2⟩

Erwan Le Merrer, Gilles Trédan. Remote explainability faces the bouncer problem. Nature Machine Intelligence, 2020, 2 (9), pp.529-539. ⟨10.1038/s42256-020-0216-z⟩. ⟨hal-03048809⟩

Hélène Fargier, Pierre-François Gimenez, Jérôme Mengin. Experimental Evaluation of Three Value Recommendation Methods in Interactive Configuration. Journal of Universal Computer Science, 2020, 26 (3), pp.318-342. ⟨hal-02940706v3⟩

Clément C. Robert, Thierry Sotiropoulos, Hélène Waeselynck, Jérémie Guiochet, Simon Vernhes. The virtual lands of Oz: testing an agribot in simulation. Empirical Software Engineering, 2020, 25 (3), pp.2025-2054. ⟨10.1007/s10664-020-09800-3⟩. ⟨hal-02436216⟩

Conference papers

Maria Laura Brzezinski Meyer, Yann Labit. Combining Machine Learning and Behavior Analysis Techniques for Network Security. 2020 International Conference on Information Networking (ICOIN), Jan 2020, Barcelona, Spain. pp.580-583, ⟨10.1109/icoin48656.2020.9016500⟩. ⟨hal-03190484⟩

Yuxiao Mao, Vincent Migliore, Vincent Nicomette. Reconfigurable Hardware for Microarchitectural Timing Attacks Detection. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2020), Dec 2020, online, France. ⟨hal-03138649⟩

Erwan Le Merrer, Benoît Morgan, Gilles Trédan. Bug ou ban ? Une Perspective Topologique sur le Shadow Banning. ALGOTEL 2020 – 22èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Sep 2020, Lyon, France. pp.1-4. ⟨hal-02875595⟩

Estèle Glize, Marie-José Huguet, Marc Lucas, Marion Sutton, Gilles Trédan. Clustering Sargassum Mats from Earth Observation Data. Machine Learning for Earth Observation - MACLEAN 2020, Sep 2020, Ghent, Belgium. ⟨hal-02938183⟩

Jean Ibarz, Michaël Lauer, Matthieu Roy, Jean-Charles Fabre, Olivier Flébus. Optimizing Vehicle-to-Cloud Data Transfers using Soft Real-Time Scheduling Concepts. RTNS 2020: 28th International Conference on Real-Time Networks and Systems, Jun 2020, virtual conference, France. pp.161-171, ⟨10.1145/3394810.3394818⟩. ⟨hal-03167058⟩

Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Geraldine Marconato. WazaBee : attaque de réseaux Zigbee par détournement de puces Bluetooth Low Energy. Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2020), Jun 2020, Rennes, France. ⟨hal-02778262⟩

Florent Galtier, Romain Cayre, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette. A PSD-based fingerprinting approach to detect IoT device spoofing. 25th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2020), Dec 2020, Perth, Australia. ⟨10.1109/PRDC50213.2020.00015⟩. ⟨hal-02962655⟩

Adrien Hereau, Karen Godary-Dejean, Jérémie Guiochet, Clément Robert, Thomas Claverie, et al.. Testing an Underwater Robot Executing Transect Missions in Mayotte. TAROS 2020 - 21st Annual Conference Towards Autonomous Robotic Systems, Sep 2020, Virtual, United Kingdom. pp.116-127, ⟨10.1007/978-3-030-63486-5_14⟩. ⟨lirmm-02895512⟩

Aliénor Damien, Pierre-François Gimenez, Nathalie Feyt, Vincent Nicomette, Mohamed Kaâniche, et al.. On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications. 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), Oct 2020, Coimbra, Portugal. pp.358-368, ⟨10.1109/ISSRE5003.2020.00041⟩. ⟨hal-03094215⟩

Malcolm Bourdon, Pierre-François Gimenez, Eric Alata, Mohamed Kaâniche, Vincent Migliore, et al.. Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices. 19th IEEE International Symposium on Network Computing and Applications (NCA 2020), Nov 2020, Cambridge, MA, United States. ⟨10.1109/NCA51143.2020.9306726⟩. ⟨hal-03328251⟩

Clément Robert, Jérémie Guiochet, Hélène Waeselynck. Testing a non-deterministic robot in simulation - How many repeated runs ?. The fourth IEEE International Conference on Robotic Computing (IRC 2020), Mar 2020, Taichung, Taiwan. 8p., ⟨10.1109/IRC.2020.00048⟩. ⟨hal-02444350⟩

Rémi Adelin, Eric Alata, Vincent Migliore, Vincent Nicomette. A user privacy-centric access control policy of data for intelligent transportation systems. Embedded Real Time Systems (ERTS), Jan 2020, Toulouse, France. ⟨hal-03139783⟩

Klaus-Tycho Foerster, Juho Hirvonen, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan. Brief Announcement: What Can(Not) Be Perfectly Rerouted Locally. 34th International Symposium on Distributed Computing (DISC 2020), Oct 2020, Virtual, France. ⟨10.4230/LIPIcs.DISC.2020.46⟩. ⟨hal-03049117⟩

Raul Sena Ferreira. Towards safety monitoring of ML-based perception tasks of autonomous systems. 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Oct 2020, Coimbra, Portugal. pp.135-138, ⟨10.1109/ISSREW51248.2020.00052⟩. ⟨hal-03252641⟩

Malcolm Bourdon, Eric Alata, Mohamed Kaâniche, Vincent Migliore, Vincent Nicomette, et al.. Anomaly detection using hardware performance counters on a large scale deployment. 10th European Congress Embedded Real Time Systems (ERTS 2020), Jan 2020, Toulouse, France. ⟨hal-03328254⟩

Anthony Favier, Antonin Messioux, Jérémie Guiochet, Jean-Charles Fabre, Charles Lesire. A hierarchical fault tolerant architecture for an autonomous robot. 6th Intern. Workshop on ​Safety and Security of Intelligent Vehicles (SSIV) at IEEE/IFIP Intern. Conf. on Dependable Systems and Networks (DSN), Jun 2020, Valence, Spain. ⟨10.1109/DSN-W50199.2020.00031⟩. ⟨hal-02558604⟩

Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan. Implications of Routing Coherence and Consistency on Network Optimization. IFIP Networking, Jun 2020, Paris (virtuel), France. ⟨hal-03049022⟩

Yassir Idmessaoud, Didier Dubois, Jérémie Guiochet. Belief functions for safety arguments confidence estimation : A comparative study. 14th International Conference on Scalable Uncertainty Management (SUM 2020), Research Centre on Knowledge and Data (KRDB); Free University of Bozen-Bolzano, Sep 2020, Bolzano, Italy. pp.1-15, ⟨10.1007/978-3-030-58449-8_10⟩. ⟨hal-02900485⟩

Daniel Loche, Michaël Lauer, Matthieu Roy, Jean-Charles Fabre. Safe Scheduling on Multicores: an approach leveraging multi-criticality and end-to-end deadlines. 10th European Congress on Embedded Real Time Software and Systems (ERTS 2020), Jan 2020, TOULOUSE, France. ⟨hal-02465340⟩

Yuxiao Mao, Vincent Migliore, Vincent Nicomette. REHAD: Using Low-Frequency Reconfigurable Hardware for Cache Side-Channel Attacks Detection. 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Sep 2020, Genova, Italy. ⟨10.1109/EuroS&PW51379.2020.00100⟩. ⟨hal-02949624⟩

Autres documents

Rémi Adelin, Eric Alata, Vincent Migliore, Vincent Nicomette. A user privacy-centric access control policy of data for intelligent transportation systems. Embedded Real Time Systems (ERTS), Jan 2020, Toulouse, France. 2020. ⟨hal-03756930⟩

2019

Journal articles

Rui Wang, Jérémie Guiochet, Gilles Motet, Walter Schön. Safety Case Confidence Propagation Based on Dempster-Shafer theory. International Journal of Approximate Reasoning, 2019, 107, pp.46-64. ⟨10.1016/j.ijar.2019.02.002⟩. ⟨hal-02012942⟩

Erwan Le Merrer, Patrick Pérez, Gilles Trédan. Adversarial frontier stitching for remote neural network watermarking. Neural Computing and Applications, 2019, 32 (13), pp.9233-9244. ⟨10.1007/s00521-019-04434-z⟩. ⟨hal-02264449⟩

Achour Mostefaoui, Michel Raynal, Matthieu Roy. Time-Efficient Read/Write Register in Crash-prone Asynchronous Message-Passing Systems. Computing, 2019, 101 (1), pp.3-17. ⟨10.1007/s00607-018-0615-8⟩. ⟨hal-01784210⟩

Pascal Acco, Guillaume Auriol, Elodie Chanthery, M.-A Détourbe, Pierre Emmanuel Hladik, et al.. An Interdisciplinary Capstone Design Experience on Critical Embedded Systems using Agile Methods. Journal sur l'enseignement des sciences et technologies de l'information et des systèmes, 2019, 18 (0001), 23p. ⟨10.1051/j3ea/20190001⟩. ⟨hal-02189482⟩

Yann Bachy, Vincent Nicomette, Mohamed Kaâniche, Eric Alata. Smart-TV security: risk analysis and experiments on Smart-TV communication channels. Journal of Computer Virology and Hacking Techniques, 2019, 15 (1), pp.61-76. ⟨10.1007/s11416-018-0320-3⟩. ⟨hal-01761974⟩

Erwan Beguin, Solal Besnard, Adrien Cros, Barbara Joannes, Ombeline Leclerc-Istria, et al.. Computer-Security-Oriented Escape Room. IEEE Security and Privacy Magazine, 2019, 17 (4), pp.78-83. ⟨10.1109/MSEC.2019.2912700⟩. ⟨hal-02297796⟩

Conference papers

Klaus-Tycho Foerster, Andrzej Kamisiński, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan. Bonsai: Efficient Fast Failover Routing Using Small Arborescences. 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun 2019, Portland, United States. pp.276-288, ⟨10.1109/DSN.2019.00039⟩. ⟨hal-03049100⟩

Romain Cayre, Jonathan Roux, Eric Alata, Vincent Nicomette, Guillaume Auriol. Mirage : un framework offensif pour l'audit du Bluetooth Low Energy. Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC 2019), Jun 2019, Rennes, France. pp.229-258. ⟨hal-02268774⟩

Klaus-Tycho Foerster, Yvonne Anne Pignolet, Stefan Schmid, Gilles Trédan. CASA: Congestion and Stretch Aware Static Fast Rerouting. IEEE Conference on Computer Communications (IEEE INFOCOM 2019), Apr 2019, Paris, France. ⟨10.1109/INFOCOM.2019.8737438⟩. ⟨hal-02043761⟩

Carlos Aguilar Melchor, Marc-Olivier Killijian, Cédric Lefebvre, Thomas Ricosset. A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib. International Conference on Security for Information Technology and Communications (SECITC 2018), Nov 2018, Bucharest, Romania. pp.425-442, ⟨10.1007/978-3-030-12942-2_32⟩. ⟨hal-02381395⟩

Guillaume Auriol, Sonia Ben Dhia, Elodie Chanthery, Pierre-Emmanuel Hladik, Didier Le Botlan, et al.. Activité pédagogique sur la création d'un jeu d'évasion. 6ème Colloque Pédagogie & Formation - groupe INSA, May 2019, Bourges, France. ⟨hal-02307883⟩

Romain Cayre, Vincent Nicomette, Guillaume Auriol, Eric Alata, Mohamed Kaâniche, et al.. Mirage: towards a Metasploit-like framework for IoT. 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), Oct 2019, Berlin, Germany. ⟨hal-02346074⟩

Armando Castañeda, Pierre Fraigniaud, Ami Paz, Sergio Rajsbaum, Matthieu Roy, et al.. A Topological Perspective on Distributed Network Algorithms. 26th International Colloquium on Structural Information and Communication Complexity (SIROCCO 2019), Jul 2019, L'Aquila, Italy. ⟨10.1007/978-3-030-24922-9_1⟩. ⟨hal-02433511⟩

Aliénor Damien, Nathalie Feyt, Vincent Nicomette, Eric Alata, Mohamed Kaâniche. Attack Injection into Avionic Systems through Application Code Mutation. 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), Sep 2019, San Diego, United States. pp.1-8, ⟨10.1109/DASC43569.2019.9081616⟩. ⟨hal-03094185⟩

Rémi Adelin, Eric Alata, Vincent Migliore, Vincent Nicomette. Une politique de contrôle d'accès à grains fins aux données pour les systèmes de transport intelligents. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), May 2019, Erquy, France. ⟨hal-03139756⟩

Armando Castañeda, Pierre Fraigniaud, Ami Paz, Sergio Rajsbaum, Matthieu Roy, et al.. Synchronous t-Resilient Consensus in Arbitrary Graphs. 21st International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2019), Oct 2019, Pisa, Italy. ⟨10.1007/978-3-030-34992-9_5⟩. ⟨hal-02433524⟩

Aliénor Damien, Michael Marcourt, Vincent Nicomette, Eric Alata, Mohamed Kaâniche. Implementation of a Host-Based Intrusion Detection System for Avionic Applications. 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2019, Kyoto, Japan. pp.178-17809, ⟨10.1109/PRDC47002.2019.00048⟩. ⟨hal-03094199⟩

Daniel Loche, Michaël Lauer, Matthieu Roy, Jean-Charles Fabre. Mixed Critical Automotive Embedded Applications on Multicores: A Safe Scheduling Approach for Dependability. 5th International Workshop on Critical Automotive Applications: Robustness & Safety, Sep 2019, Naples, Italy. ⟨hal-02303216⟩

Luca Vittorio Sartori. Simulation-based testing to improve safety of autonomous robots. 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Oct 2019, Berlin, Germany. ⟨10.1109/ISSREW.2019.00053⟩. ⟨hal-02495251⟩

Erwan Le Merrer, Gilles Trédan. Application-aware adaptive partitioning for graph processing systems. MASCOTS 2019 - 27th IEEE International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Oct 2019, Rennes, France. pp.235-240, ⟨10.1109/MASCOTS.2019.00033⟩. ⟨hal-02193594⟩

Armando Castañeda, Aurélie Hurault, Philippe Quéinnec, Matthieu Roy. Tasks in Modular Proofs of Concurrent Algorithms. 21st International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2019), Oct 2019, Pisa, Italy. pp.69-83, ⟨10.1007/978-3-030-34992-9_6⟩. ⟨hal-02903005⟩

Autres documents

Rémi Adelin, Eric Alata, Vincent Migliore, Vincent Nicomette. Une politique de contrôle d'accès à grains fins aux données pour les systèmes de transport intelligents. Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), May 2019, Erquy, France. 2019. ⟨hal-03756890⟩

Preprints, Working Papers, ...

Angelo Monti, Eric Alata, Daniela Dragomirescu. Embedding security metadata into wireless communication signals using Polarization Shift Keying. 2019. ⟨hal-01994590⟩

Softwares, Prototypes and Demonstrators

  • SMOF (Safety Monitoring Framework) J. Guiochet, H. Waeselynck, 2018: https://www.laas.fr/projects/smof
  • YOUCAN (Hazard model-based analysis with HAZOP-UML.) J. Guiochet, 2018: https://www.laas.fr/projects/HAZOPUML
  • Osmosis (Open Source Material fOr Safety assessment of Intelligent Systems), J. Guiochet, H. Waeselynck, 201X: https://osmosis.gitlab.io/index.html
  • NFLib is a library created to optimize the computing performance of arithmetic operations performed on polynomes, M.-O. Killijian, C. Aguilar Melchor et al.: https://github.com/quarkslab/NFLIb
  • XPIR (Private Information Retrieval for Everyone), M.-O. Killijian, C. Aguilar Melchor et al., 201X: https://github.com/XPIR-team/XPIR
    library dedicated to the construction of PIR protocols
  • MIRAGE, V. Nicomette, R. Cayre et al., 2019, https://homepages.laas.fr/rcayre/mirage-documentation/
    a framework for vulnerability analysis and security auditing of connected objects
  • GEPETO (GEoPrivacy-Enhancing TOolkit), M.-O. Killijian, M. Nunez del Prado Cortez, S. Gambs (Univ. Rennes), 2014 (Diffusion with GIT. License CeCILL-B)
    GEPETO is a flexible software that can be used to visualize, sanitize, perform inference attacks and measure the utility of a particular geolocated dataset. The main objective of GEPETO is to enable a data curator (e.g., a company, a governmental agency or a data protection authority) to design, tune, experiment and evaluate various sanitization algorithms and inference attacks as well as visualizing the following results and evaluating the resulting trade-off between privacy and utility.
  • MARACAS (CBSE Middleware for adaptive fault tolerance), J. C. Fabre, M. Roy, M. Stoicescu, 2014 (Restricted diffusion)
    This middleware illustrates how fault tolerance mechanisms can be adapted and combined online. Different types of changes related to the evolution of the resource requirements, the applications, or the fault model during operation, could be at the origin of the dynamic reconfiguration of fault tolerance mechanisms. A set of mechanisms has been developed to show the capabilities of the CBSE approach based a reflective medium to perform agile dependable systems. It is meant to be a proof of concepts. The techniques behind the proposed approach are applicable to many application areas.
  • ARINC 653 Simulator, M. Cronel, J. C. Fabre, G. Bustamente, R. Palustran, M. Roy: https://github.com/makrin/ARINC653-simulator (Licenses MIT and CeCILL-B, Diffusion with GIT)
    A simulator of the executive support ARINC 653 standard for IMA systems has been developed on Unix. It emulates time and space partitionning concepts and also inter-partitions communication mechanisms.
  • IronHIDE (outil d’analyse des attaques par entrées-sorties), E. Alata, Y. Deswarte, F. Lone Sang, V. Nicomette, (Restricted diffusion)
    IronHIDE is an FPGA-based I/O controller dedicated to the analysis of vulnerabilities at the interface between the hardware and software components. This controller has the advantage of interfacing with the PCI-Express bus and can be used  to generate valid and invalid requests on the bus to identify potential I/O attacks.
  • MINOTOR (Monitoring tool for timing and behavioral analysis), O. Baldellon, J. C. Fabre, M. Roy
    A model driven distributed monitoring system for timing and behavioral analysis. The tool is based on a formal framework that extends the semantics of Petri nets to be able to execute it online on partial executions and distributed observation environments.
  • SOUK (Social Observation of hUman Kinetics), E. Alata, R. Akrout, Y. Bachy, A. Dessiatnikoff, M. Kaâniche, V. Nicomette, 2012 (Restricted diffusion)
    SOUK integrates a set of algorithms enabling the processing of geo-locates data, the extraction of social contacts, as well ad the analysis and representation of the social interaction networks.
  • WASAPY (Web Applications Security Assessment in Python), E. Alata, R. Akrout, Y. Bachy, A. Dessiatnikoff, M. Kaâniche, V. Nicomette, 2012 (Restricted diffusion)
    The objective of this software is to identify in an automated way web applications vulnerabilities. This is accomplished by performing a combinational scan of the web site and actually exploiting vulnerabilities. Specially crafted requests derived from a grammar are submitted to the application, and the corresponding responses are analyzed using clustering techniques. This approach has two advantages. The first one is the ability of the software to continue its analysis after exploiting a vulnerability. In particular, pages accessible after exploiting the vulnerability can be processed automatically. The second advantage is its ability to identify vulnerabilities that are activated only after performing a particular action sequence on the site.
  • HAZOP-UML (Risk analysis for the identification and validation of safety requirements), Q.A. Do Hoang, D. Martin-Guillerez, J. Guiochet, D.Powell, 2011 (Restricted diffusion)
    HAZOP-UML is a tool for model-based safety analysis. This tool allows to model UML (Unified Modeling Language) sequence and use case diagrams, which are used to generate deviation tables applying the HAZOP technique (HAZard OPerability).
  • STELAE (Systems TEst LAnguage Environment), R. Guduvan, H. Waeselynck, V Wiels (ONERA), G. Durrieu (ONERA), Y. Fusero (Cassidian), M. Schieber (Cassidian), 2010 (Restricted diffusion)
    STELAE is a model-driven environment for the development of tests of avionic systems. It includes customizable graphical and textual editors for abstract test models, checkers, and finally template-based transformations towards code executable on top of a real industrial test platform (the U-Test platform of Cassidian Test & Services). The core part of STELAE is a metamodel capturing a rich set of domain-specific concepts.
  • STANCE (Structural ANalysis of Counter Examples), T. Bochot (ONERA & Airbus), K. Cabrera, P. Virelizier (Airbus), H. Waeselynck, V. Wiels (ONERA)
    STANCE aids in the debugging of Simulink models, when a lengthy counterexample is returned by the model checker. It performs a structural analysis of the model’s paths activated by the counterexample and extracts relevant information to explain the observed violation. STANCE may also be used to guide the model checker toward the search for different counterexamples, exhibiting new path activation patterns and thus new ways to violate the property.
  • TERMOS (TEst Requirement language for MObile Setting), P. André, Z. Micskei (BUTE), M.D. Nguyen, N. Rivière, H. Waeselynck, 2009 (Restricted diffusion)
    TERMOS is a formal language based on UML Sequence Diagrams used for the testing of mobile applications, integrated into UML support technology. The tool contains: (i) a UML profile for the editing of verification scenarios (positive and negative requirements, test purposes) with spatial and event views, (ii) an Eclipse plugin for the automated checking of traces. The checking of traces against scenarios combines graph matching and event order analysis. The graph matching part searches for occurrences of the target sequence of spatial configurations. The event order analysis relies on an automaton-based semantics of sequence diagrams.
  • MASS (Multi Agent Simulator Software), J.H. Collet, 2007 (Restricted diffusion)
    MASS is a simulator based on mobile agents in two or three dimensions. Agents are activated asynchronously with a scheduler, and each one executes a state machine. The software runs on a Windows platform. It has been parallelized to take advantage of multicore processors.

THESIS / HDR

2023

Rémi Adelin, Thèse: Protection des données des véhicules connectés : une approche cryptographique reposant sur le chiffrement basé attributs

Cyrius Nugier, Thèse: Adaptation d'Outils Cryptographiques pour un Contexte Post-Quantique

Raul Sena Ferreira, Thèse: Développement d'un cadre générique pour surveiller et gérer la sécurité des systèmes autonomes pendant l'exécution

Florent Galtier, Thèse: Sécurité des réseaux sans-fil à courte et longue portée basée sur des mécanismes de monitoring de la couche physique

2022

Yassir Idmessaoud, Thèse: Évaluation de l'incertitude dans des argumentaires de sûreté : une approche basée sur la théorie de Dempster-Shafer

Yuxiao Mao, Thèse: Détection dynamique d'attaques logicielles et matérielles basée sur l'analyse de signaux microarchitecturaux

Daniel Loche, Thèse: Prévention des fautes temporelles sur architectures multicoeur pour les systèmes à criticité mixte

Romain Cayre, Thèse: Approches offensives et défensives pour la sécurité des protocoles de communication sans fil de l'IoT

2021

Jean Ibarz, Thèse: Equilibrage de charge efficace et adaptatif avec contraintes temporelles pour les véhicules connectés

Clément Robert, Thèse: Génération et analyse de tests pour les systèmes autonomes

Malcolm Bourdon, Thèse: Détection d'intrusion basée sur l'analyse de compteurs matériels pour des objets connectés

2020

Christophe Bertero, Thèse: Perception de l'environnement urbain à l'aide d'une flotte de capteurs sur des vélos : application à la pollution de l'air

Aliénor Damien, Thèse: Sécurité par analyse comportementale de fonctions embarquées sur plateformes avioniques modulaires intégrées

Matthieu Amy, Thèse: Systèmes résilients pour l'automobile: d'une approche à composants à une approche à objets de la tolérance aux fautes adaptatives sur ROS

2019

Guillaume Averlant, Thèse: Contrôle d'accès dynamique et architecture de sécurité pour la protection des applications sous Android

Gilles Trédan, Habilitation à diriger des recherches: Capturer des graphes binaires

Lola Masson, Thèse: Moniteurs de sécurité pour des systèmes autonomes : élicitation interactive des règles de sécurité

2018

Julien Duchene, Thèse: Développement et évaluation d'obfuscations de protocoles basées sur la spécification

Matthieu Roy, Habilitation à diriger des recherches: Adaptation dans les systèmes dynamiques : une vision informatique de la résilience

William Excoffon, Thèse: Résilience des systèmes informatiques adaptatifs : modélisation, analyse et quantification

Rui Wang, Thèse: Confiance dans un argumentaire de sécurité - un cadre d'évaluation basé sur la théorie des fonctions de croyance

2016

Joris Barrier, Thèse: Chiffrement homomorphe appliqué au retrait d'information privé

Carla Sauvanaud, Thèse: Monitoring et détection d'anomalie par apprentissage dans les infrastructures virtualisées

Benoît Morgan, Thèse: Protection des systèmes informatiques vis-à-vis des malveillances : un hyperviseur de sécurité assisté par le matériel

Roberto Pasqua, Thèse: Inférence et modèles de données personnelles : mobilité sociale, proximité spatiale

2015

Jérémie Guiochet, Habilitation à diriger des recherches: Vers des robots collaboratifs autonomes sûrs de fonctionnement

Thibaut Probst, Thèse: Evaluation et analyse des mécanismes de sécurité des réseaux dans les infrastructures virtuelles de cloud computing

Ivan Studnia, Thèse: Détection d'intrusion pour des réseaux embarqués automobiles : une approche orientée langage

Yann Bachy, Thèse: Sécurité des équipements grand public connectés à Internet : évaluation des liens de communication

Moussa Traoré, Thèse: Protocoles de sécurité pour établir les distances et authentifier la position pour les appareils mobiles

Ludovic Pintard, Thèse: Des analyses de sécurité à la validation expérimentale par injection de fautes - Le cas des systèmes embarqués automobile

Quynh Anh Do Hoang, Thèse: Analyse et justification de la sécurité de systèmes robotiques en interaction physique avec l’humain

2014

Hélène Martorell, Thèse: Architecture et processus de développement permettant la mise à jour dynamique de systèmes embarqués automobiles

Olivier Baldellon, Thèse: Supervision en ligne de propriétés temporelles dans les systèmes distribués temps-réel

REJOINDRE

Notre équipe de recherche

Pour plus d’informations sur les offres d’emploi, vous pouvez contacter