Runtime analysis of whole-system provenance

T Pasquier, X Han, T Moyer, A Bates… - Proceedings of the …, 2018 - dl.acm.org
Identifying the root cause and impact of a system intrusion remains a foundational challenge
in computer security. Digital provenance provides a detailed history of the flow of information …

Discovering correlations: A formal definition of causal dependency among heterogeneous events

C Xosanavongsa, E Totel… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
In order to supervise the security of a large infrastructure, the administrator deploys multiple
sensors and intrusion detection systems on several critical places in the system. It is easier …

A small and adaptive coprocessor for information flow tracking in ARM SoCs

MA Wahab, P Cotret, MN Allah, G Hiet… - 2018 International …, 2018 - ieeexplore.ieee.org
DIFT (Dynamic Information Flow Tracking) has been a hot topic for more than a decade.
Unfortunately, existing hardware DIFT approaches have not been widely used neither by …

Hardware support for the security analysis of embedded software: applications on information flow control and malware analysis

MA Wahab - 2018 - hal.science
Information flow control (also known as Dynamic Information Flow Tracking, DIFT), allows a
user to detect several types of software attacks such as buffer overflow or SQL injections. In …

SPLinux: An Information Flow Secure Linux

P Vyas, RK Shyamasundar, B Patil… - 2021 IEEE Intl Conf …, 2021 - ieeexplore.ieee.org
Enforcement of information flow control (IFC) policies for OS to realize a sufficiently secure
OS has been a challenging area of research. In this paper, our primary objective has been to …

[PDF][PDF] Security at the Hardware/Software Interface

G Hiet - 2021 - hal.science
This document gives a synthetic overview of my research activities in the CIDRE team of the
IRISA laboratory since October 2010. After completing my Ph. D. in 2008 on policy-based …

Contributions à la sécurité des systèmes embarqués face aux attaques logiques et physiques

V Lapotre - 2023 - hal.science
Les systèmes embarqués se répandent massivement dans les infrastructures critiques
(industrie 4.0, ville intelligente, transports...) participant à l'augmentation de la surface …

Contrôle de flux d'information par utilisation conjointe d'analyse statique et dynamique accélérée matériellement

MN Allah - 2020 - theses.hal.science
Les systèmes embarqués étant de plus en plus présents dans nos vies, il est nécessaire de
protéger les données personnelles qui y sont stockées. En effet, les concepteurs …

CMCAP: Ephemeral Sandboxes for Adaptive Access Control

TH Bucuti, R Dantu, K Morozov - … of the 24th ACM Symposium on …, 2019 - dl.acm.org
We present CMCAP (context-mapped capabilities), a decentralized mechanism for
specifying and enforcing adaptive access control policies for resource-centric security …

[PDF][PDF] Muhammad Abdul WAHAB

JL DANGER - 2018 - hal.science
Embedded security is more and more crucial with the huge increase in the number of mobile
equipment dealing with sensible data (smartphones, tablets, etc.). Runtime efficient …