Zobrazeno 1 - 10
of 99
pro vyhledávání: '"Yves Deswarte"'
Publikováno v:
IEEE Security & Privacy. 12:60-66
Instead of making the CPU execute malware, I/O attacks exploit peripheral devices and, as such, can't be detected by traditional anti-malware techniques. The proposed multipurpose FPGA-based tool can help analyze such attacks and be programmed to mim
Publikováno v:
Security and Communication Networks. 7:1955-1973
Because attacks are becoming more frequent and more complex, intrusion detection systems IDSes need significant improvements to be able to detect new attacks and variants of already known attacks. It is thus necessary to assess precisely their qualit
Publikováno v:
IEEE Security & Privacy. 10:71-74
Because security is becoming a major concern for aircraft manufacturers and satellite makers, vulnerability discovery and countermeasures should be integrated into onboard computing systems early during their development. Attacks against aerospace co
Publikováno v:
Journal of Systems Architecture. 57:441-451
This paper presents the architecture of an authorization service proposed for composite operations involving many Internet partners. The main contributions of this paper are: (1) a scheme for access control systematically applied at the fine-grained
Publikováno v:
Journal in Computer Virology. 7:1-21
This article deals with kernel security protection. We propose a characterization of malicious kernel-targeted actions, based on how the way they act to corrupt the kernel. Then, we discuss security measures able to counter such attacks. We finally e
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 6:45-58
Nowadays, more and more information systems are connected to the Internet and offer Web interfaces to the general public or to a restricted set of users. Such openness makes them likely targets for intruders, and conventional protection techniques ha
Autor:
Francesc Sebé, Jean-Jacques Quisquater, Yves Deswarte, Josep Domingo-Ferrer, Antoni Martínez-Ballesté
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering. 20:1034-1038
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of crucial importance. Remote data possession checking protocols
Autor:
Yves Deswarte, Nuno Neves, Jonathan A. Poritz, Ian Welch, Paulo Veríssimo, Robert J. Stroud, Christian Cachin, David Powell
Publikováno v:
IEEE Security & Privacy Magazine. 4:54-62
The pervasive interconnection of systems throughout the world has given computer services a significant socioeconomic value that both accidental faults and malicious activity can affect. The classical approach to security has mostly consisted of tryi
Autor:
Carlos Aguilar Melchor, Yves Deswarte
Publikováno v:
annals of telecommunications - annales des télécommunications. 61:399-417
This paper presents an overview of the current and next solutions for privacy protection on the Internet. We highlight five categories of Privacy Enhancing Technologies (Pets). First, we introduce the multiple virtual identities that can represent a
Autor:
Yves Deswarte
Publikováno v:
annals of telecommunications - annales des télécommunications. 61:517-520
Cet article presente le projet europeen PRIME, avec ses objectifs, ses axes de recherches et les resultats attendus.