Search - IFIP TC11: Security and Privacy Protection in Information Processing Systems Access content directly

Filter your results

38 results
Image document

Runtime Code Polymorphism as a Protection Against Side Channel Attacks

Damien Couroussé , Thierno Barry , Bruno Robisson , Philippe Jaillon , Olivier Potin , et al.
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.136-152, ⟨10.1007/978-3-319-45931-8_9⟩
Conference papers emse-01372223v1
Image document

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds

Tarik Moataz , Benjamin Justus , Indrakshi Ray , Nora Cuppens-Bouhlahia , Frédéric Cuppens , et al.
DBSec 2014 : the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Jul 2014, Vienne, Austria. pp.66-81, ⟨10.1007/978-3-662-43936-4_5⟩
Conference papers hal-01159841v1
Image document

Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems

Salvador Martínez , Joaquin Garcia-Alfaro , Frédéric Cuppens , Nora Cuppens-Bouhlahia , Jordi Cabot
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.218-233, ⟨10.1007/978-3-319-18467-8_15⟩
Conference papers hal-01152528v1
Image document

Analysis of QUIC session establishment and its implementations

Eva Gagliardi , Olivier Levillain
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.169-184, ⟨10.1007/978-3-030-41702-4_11⟩
Conference papers hal-02468596v1
Image document

Detection and Response to Data Exfiltration from Internet of Things Android Devices

Mariem Graa , Ivan Marco Lobe Kome , Nora Cuppens-Boulahia , Frédéric Cuppens , Vincent Frey
33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.339-354, ⟨10.1007/978-3-319-99828-2_24⟩
Conference papers hal-02023715v1
Image document

How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip

Sebanjila Kevin Bukasa , Ronan Lashermes , Hélène Le Bouder , Jean-Louis Lanet , Axel Legay
11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.93-109, ⟨10.1007/978-3-319-93524-9_6⟩
Conference papers hal-01875521v1
Image document

Embedded Eavesdropping on Java Card

Guillaume Barbu , Christophe Giraud , Vincent Guerin
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.37-48, ⟨10.1007/978-3-642-30436-1_4⟩
Conference papers hal-00706186v1
Image document

Automated classification of C&C connections through malware URL clustering

Nizar Kheir , Gregory Blanc , Hervé Debar , Joaquin Garcia-Alfaro , Dingqi Yang
2015 SEC : 30th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2015, Hamburg, Germany. pp.252 - 266, ⟨10.1007/978-3-319-18467-8_17⟩
Conference papers hal-01255089v1
Image document

Network Functions Virtualization Access Control as a Service

Manel Smine , David Espes , Nora Cuppens-Boulahia , Frédéric Cuppens
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.100-117, ⟨10.1007/978-3-030-49669-2_6⟩
Conference papers hal-03243624v1
Image document

Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase

Benjamin Justus , Frédéric Cuppens , Nora Cuppens-Bouhlahia , Julien Bringer , Hervé Chabanne , et al.
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.274-281, ⟨10.1007/978-3-642-39256-6_19⟩
Conference papers hal-01159831v1
Image document

Handling Stateful Firewall Anomalies

Frédéric Cuppens , Nora Cuppens-Boulahia , Joaquin Garcia Alfaro , Tarik Moataz , Xavier Rimasson
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers hal-00737170v1

ICT Systems Security and Privacy Protection

Nora Cuppens-Boulahia , Frédéric Cuppens , Sushil Jajodia , Anas Abou El Kalam , Thierry Sans
Springer, AICT-428, 2014, IFIP Advances in Information and Communication Technology, 978-3-642-55414-8. ⟨10.1007/978-3-642-55415-5⟩
Books hal-01370409v1
Image document

JACPoL: A Simple but Expressive JSON-based Access Control Policy Language

Hao Jiang , Ahmed Bouabdallah
WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers hal-01802720v1
Image document

Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers

Etienne Tehrani , Jean-Luc Danger , Tarik Graba
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.28-43, ⟨10.1007/978-3-030-20074-9_4⟩
Conference papers hal-02294599v1
Image document

PKI Interoperability: Still an Issue? A Solution in the X.509 Realm

Ahmad Samer Wazan , Romain Laborde , François Barrere , Abdelmalek Benzekri , David W. Chadwick
8th World Conference on Information Security Education (WISE), Jul 2013, Auckland, New Zealand. pp.68-82, ⟨10.1007/978-3-642-39377-8_8⟩
Conference papers hal-01463660v1
Image document

A Pre-processing Composition for Secret Key Recovery on Android Smartphone

Yuto Nakano , Youssef Souissi , Robert Nguyen , Laurent Sauvage , Jean-Luc Danger , et al.
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.76-91, ⟨10.1007/978-3-662-43826-8_6⟩
Conference papers hal-01400921v1
Image document

Formal Framework for the Evaluation of Waveform Resynchronization Algorithms

Sylvain Guilley , Karim Khalfallah , Victor Lomne , Jean-Luc Danger
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.100-115, ⟨10.1007/978-3-642-21040-2_7⟩
Conference papers hal-01573296v1
Image document

Specification and Deployment of Integrated Security Policies for Outsourced Data

Anis Bkakria , Frédéric Cuppens , Nora Cuppens-Bouhlahia , David Gross-Amblard
28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '14), Jul 2014, Vienne, Austria. pp.17 - 32, ⟨10.1007/978-3-662-43936-4_2⟩
Conference papers hal-01087467v1
Image document

Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes

Edwin Bourget , Frédéric Cuppens , Nora Cuppens-Bouhlahia , Samuel Dubus , Simon Foley , et al.
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.38-47, ⟨10.1007/978-3-319-95729-6_3⟩
Conference papers hal-01954422v1
Image document

Removing Problems in Rule-Based Policies

Zheng Cheng , Jean-Claude Royer , Massimo Tisi
SEC 2019 : ICT Systems Security and Privacy Protection, Jun 2019, Lisbon, Portugal. pp.120-133, ⟨10.1007/978-3-030-22312-0_9⟩
Conference papers hal-02169342v1
Image document

Firewall Policies Provisioning Through SDN in the Cloud

Nora Cuppens , Salaheddine Zerkane , Yanhuang Li , David Espes , Philippe Le Parc , et al.
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.293-310, ⟨10.1007/978-3-319-61176-1_16⟩
Conference papers hal-01684362v1

Managing Secure Inter-slice Communication in 5G Network Slice Chains

Luis Suárez , David Espes , Frédéric Cuppens , Cao-Thanh Phan , Philippe Bertin , et al.
Managing Secure Inter-slice Communication in 5G Network Slice Chains, pp.24-41, 2020, ⟨10.1007/978-3-030-49669-2_2⟩
Book sections hal-02876588v1
Image document

Detection of Side Channel Attacks Based on Data Tainting in Android Systems

Mariem Graa , Nora Cuppens-Boulahia , Frédéric Cuppens , Jean-Louis Lanet , Routa Moussaileb
SEC 2017 - 32th IFIP International Conference on ICT Systems Security and Privacy Protection, May 2017, Rome, Italy. pp.205-218, ⟨10.1007/978-3-319-58469-0_14⟩
Conference papers hal-01648994v1

Ex-SDF: an extended service dependency framework for intrusion impact assessment

Nizar Kheir , Nora Cuppens-Bouhlahia , Frédéric Cuppens , Hervé Debar
25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.148-160, ⟨10.1007/978-3-642-15257-3_14⟩
Conference papers hal-00565624v1
Image document

Information Security Theory and Practice

Maryline Laurent , Thanassis Giannetsos
Springer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩
Books hal-03173895v1
Image document

Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems

Julien Bringer , Hervé Chabanne , Daniel Le Métayer , Roch Lescuyer
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.313-327
Conference papers hal-01633672v1
Image document

Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud

Yanhuang Li , Nora Cuppens-Boulahia , Jean-Michel Crom , Frédéric Cuppens , Vincent Frey
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.105-118, ⟨10.1007/978-3-319-33630-5_8⟩
Conference papers hal-01369546v1
Image document

Software Defined Networking Reactive Stateful Firewall

Salah Eddine S. E. Zerkane , Philippe Le Parc , Frederic Cuppens , David Espes
31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. pp.119-132, ⟨10.1007/978-3-319-33630-5_9⟩
Conference papers hal-01333445v1
Image document

Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures

Guillaume Barbu , Guillaume Duc , Philippe Hoogvorst
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩
Conference papers hal-00692171v1

Data and Applications Security and Privacy XXVI

Nora Cuppens-Bouhlahia , Frédéric Cuppens , Joaquin Garcia Alfaro
Springer, LNCS-7371, pp.329, 2012, Lecture Notes in Computer Science, 978-3-642-31539-8. ⟨10.1007/978-3-642-31540-4⟩
Books hal-01164720v1