Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Jean-Luc Richier"'
Autor:
Benoit Badrignans, Vincent Danjean, Jean-Guillaume Dumas, Philippe Elbaz-Vincent, Sabine Machenaud, Jean-Baptiste Orfila, Florian Pebay-Peyroula, François Pebay-Peyroula, Marie-Laure Potet, Maxime Puys, Jean-Luc Richier, Jean-Louis Roch
Publikováno v:
WCICSS 2017-IEEE World Congress on Industrial Control Systems Security
WCICSS 2017-IEEE World Congress on Industrial Control Systems Security, Dec 2017, Cambridge, United Kingdom
HAL
WCICSS 2017-IEEE World Congress on Industrial Control Systems Security, Dec 2017, Cambridge, United Kingdom
HAL
International audience; The security of industrial supervisory control and data acquisition systems (SCADA) has become a major concern since the Stuxnet worm in 2010. As these systems are connected to the physical world, this makes them possibly haza
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::ef00c50fec6537d5cfc70836ee1797fe
https://hal.science/hal-01657605
https://hal.science/hal-01657605
Publikováno v:
Third FME Workshop on Formal Methods in Software Engineering (Formalise’15)
Third FME Workshop on Formal Methods in Software Engineering (Formalise’15), 2015, Firenze, Italy. pp.6-12
Third FME Workshop on Formal Methods in Software Engineering (Formalise’15), 2015, Firenze, Italy. pp.6-12
International audience
Autor:
Nafees Qamar, Régine Laleau, Jérémy Milhau, Jean-Luc Richier, Mohamed Amine Labiadh, Yves Ledru, Akram Idani
Publikováno v:
International Journal of Information System Modeling and Design
International Journal of Information System Modeling and Design, IGI Global, 2015, 6 (1), pp.24-46
International Journal of Information System Modeling and Design, IGI Global, 2015, 6 (1), pp.24-46
Designing a security policy for an information system (IS) is a non-trivial task. Variants of the RBAC model can be used to express such policies as access-control rules associated to constraints. In this paper, we advocate that currently available t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6756b94d890d1d3523399b4a319a9a2f
https://hal.inria.fr/hal-00976108
https://hal.inria.fr/hal-00976108
Publikováno v:
ICST Workshops
Position Statement at SecTest2014, co-located with ICST2014
Position Statement at SecTest2014, co-located with ICST2014, 2014, Cleveland, Ohio, United States
Position Statement at SecTest2014, co-located with ICST2014
Position Statement at SecTest2014, co-located with ICST2014, 2014, Cleveland, Ohio, United States
International audience; In the Internet of services (IoS), web applications are the most common way to provide resources to the users. The complexity of these applications grew up with the number of different development techniques and technologies u
Publikováno v:
Fourth ACM Conference on Data and Application Security and Privacy (CODASPY 2014)
Fourth ACM Conference on Data and Application Security and Privacy (CODASPY 2014), 2014, Unknown, pp.37-48, ⟨10.1145/2557547.2557550⟩
CODASPY
Fourth ACM Conference on Data and Application Security and Privacy (CODASPY 2014), 2014, Unknown, pp.37-48, ⟨10.1145/2557547.2557550⟩
CODASPY
International audience; We present a black-box based smart fuzzing approach to detect cross-site scripting (XSS) vulnerabilities in web applications. The smartness is attributed to model inference and automated malicious input generation. The former
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3646ea951bd0b961995daa8a549ee92f
https://hal.inria.fr/hal-00976132
https://hal.inria.fr/hal-00976132
Publikováno v:
Computer Networks. 32:419-431
We present a synchronous framework for both modeling, specifying telephone systems, and detecting interactions among services. The detection process is based on automated testing techniques provided by the tool that we developed, Lutess. Lutess allow
Publikováno v:
WCRE
Working Conference in Reverse Engineering (WCRE 2013)
Working Conference in Reverse Engineering (WCRE 2013), 2013, Koblenz-Landau, Germany. pp.252-261
Working Conference in Reverse Engineering (WCRE 2013)
Working Conference in Reverse Engineering (WCRE 2013), 2013, Koblenz-Landau, Germany. pp.252-261
International audience; Fuzz testing consists of automatically generating and sending malicious inputs to an application in order to hopefully trigger a vulnerability. In order to be efficient, the fuzzing should answer questions such as: Where to se
Publikováno v:
CICS
CICS 2013-IEEE Symposium on Computational Intelligence in Cyber Security (held at SSCI 2013)
CICS 2013-IEEE Symposium on Computational Intelligence in Cyber Security (held at SSCI 2013), Apr 2013, Singapore, Singapore
CICS 2013-IEEE Symposium on Computational Intelligence in Cyber Security (held at SSCI 2013)
CICS 2013-IEEE Symposium on Computational Intelligence in Cyber Security (held at SSCI 2013), Apr 2013, Singapore, Singapore
Short paper - http://www.ntu.edu.sg/home/epnsugan/index_files/SSCI2013/index.html; International audience; Browsers have become an interface to perform a plethora of activities. This has necessitate the integration of various software components in b
Publikováno v:
ICST Workshops
SECTEST 2013-Fourth International Workshop on Security Testing (affiliated with ICST2013)
SECTEST 2013-Fourth International Workshop on Security Testing (affiliated with ICST2013), Mar 2013, Luxembourg, Luxembourg. pp.441-444, ⟨10.1109/ICSTW.2013.57⟩
SECTEST 2013-Fourth International Workshop on Security Testing (affiliated with ICST2013)
SECTEST 2013-Fourth International Workshop on Security Testing (affiliated with ICST2013), Mar 2013, Luxembourg, Luxembourg. pp.441-444, ⟨10.1109/ICSTW.2013.57⟩
International audience; In the "Internet of Services" (IoS) vision of the Internet, applications are developed as services using the web standards. Model-based testing combined with active model inference is one of the methods to test the application
Publikováno v:
Software Testing, Verification and Validation (ICST 2012)
SECTEST 2012-3rd International Workshop on Security Testing (affiliated with ICST)
SECTEST 2012-3rd International Workshop on Security Testing (affiliated with ICST), Apr 2012, Montreal, Canada. pp.815-817, ⟨10.1109/ICST.2012.181⟩
ICST
SECTEST 2012-3rd International Workshop on Security Testing (affiliated with ICST)
SECTEST 2012-3rd International Workshop on Security Testing (affiliated with ICST), Apr 2012, Montreal, Canada. pp.815-817, ⟨10.1109/ICST.2012.181⟩
ICST
Workshop website: http://www.spacios.eu/sectest2012/; International audience; We present an approach to detect web injection vulnerabilities by generating test inputs using a combination of model inference and evolutionary fuzzing. Model inference is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1423559566d139444e0061a9a2d2087b
https://hal.archives-ouvertes.fr/hal-00857294
https://hal.archives-ouvertes.fr/hal-00857294