Runtime analysis of whole-system provenance
Identifying the root cause and impact of a system intrusion remains a foundational challenge
in computer security. Digital provenance provides a detailed history of the flow of information …
in computer security. Digital provenance provides a detailed history of the flow of information …
Discovering correlations: A formal definition of causal dependency among heterogeneous events
In order to supervise the security of a large infrastructure, the administrator deploys multiple
sensors and intrusion detection systems on several critical places in the system. It is easier …
sensors and intrusion detection systems on several critical places in the system. It is easier …
A small and adaptive coprocessor for information flow tracking in ARM SoCs
DIFT (Dynamic Information Flow Tracking) has been a hot topic for more than a decade.
Unfortunately, existing hardware DIFT approaches have not been widely used neither by …
Unfortunately, existing hardware DIFT approaches have not been widely used neither by …
Hardware support for the security analysis of embedded software: applications on information flow control and malware analysis
MA Wahab - 2018 - hal.science
Information flow control (also known as Dynamic Information Flow Tracking, DIFT), allows a
user to detect several types of software attacks such as buffer overflow or SQL injections. In …
user to detect several types of software attacks such as buffer overflow or SQL injections. In …
SPLinux: An Information Flow Secure Linux
Enforcement of information flow control (IFC) policies for OS to realize a sufficiently secure
OS has been a challenging area of research. In this paper, our primary objective has been to …
OS has been a challenging area of research. In this paper, our primary objective has been to …
[PDF][PDF] Security at the Hardware/Software Interface
G Hiet - 2021 - hal.science
This document gives a synthetic overview of my research activities in the CIDRE team of the
IRISA laboratory since October 2010. After completing my Ph. D. in 2008 on policy-based …
IRISA laboratory since October 2010. After completing my Ph. D. in 2008 on policy-based …
Contributions à la sécurité des systèmes embarqués face aux attaques logiques et physiques
V Lapotre - 2023 - hal.science
Les systèmes embarqués se répandent massivement dans les infrastructures critiques
(industrie 4.0, ville intelligente, transports...) participant à l'augmentation de la surface …
(industrie 4.0, ville intelligente, transports...) participant à l'augmentation de la surface …
Contrôle de flux d'information par utilisation conjointe d'analyse statique et dynamique accélérée matériellement
MN Allah - 2020 - theses.hal.science
Les systèmes embarqués étant de plus en plus présents dans nos vies, il est nécessaire de
protéger les données personnelles qui y sont stockées. En effet, les concepteurs …
protéger les données personnelles qui y sont stockées. En effet, les concepteurs …
CMCAP: Ephemeral Sandboxes for Adaptive Access Control
We present CMCAP (context-mapped capabilities), a decentralized mechanism for
specifying and enforcing adaptive access control policies for resource-centric security …
specifying and enforcing adaptive access control policies for resource-centric security …
[PDF][PDF] Muhammad Abdul WAHAB
JL DANGER - 2018 - hal.science
Embedded security is more and more crucial with the huge increase in the number of mobile
equipment dealing with sensible data (smartphones, tablets, etc.). Runtime efficient …
equipment dealing with sensible data (smartphones, tablets, etc.). Runtime efficient …