Security of distributed systems is an increasingly serious concern, in particular with the massive development of the Internet. To cope with the threat growth, it is crucial to design more efficient mechanisms to protect our systems and networks. This research work proposes a contribution to the protection of computer systems against malicious activities, by tackling the problem through two approaches: an architectural one and an experimental one. The architectural approach consists in designing security architectures that are suited to counter current threats and we propose several solutions that were investigated through three different PhDs. The experimental approach focuses on methods and techniques that enable to capture the attacker b...
Understanding computer security requires a strong knowledge of the underlying technologies and a dee...
Today, the Internet is changing radically our habits, especially with the massive influx of the noma...
The original design of Internet did not take into consideration security aspects of the network; the...
Security of distributed systems is an increasingly serious concern, in particular with the massive d...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
La connexion de systèmes critiques à Internet pose de sérieux problèmes de sécurité. En effet, les t...
The connection of critical systems to the Internet is raising serious security problems, since the c...
The subject of this thesis is to propose an in-depth protection that can be enforced by the operatin...
This thesis aims to define the best strategy to secure the Information System I’m currently working ...
The Internet has become a great integration platform capable of efficiently interconnecting billions...
Les systèmes de contrôle-commande industriels (Industrial Control System, ICS) sont des infrastructu...
Since computer infrastructures are currently getting more vulnerable than ever, traditional security...
With the rise of Industry 4.0, many infrastructures were forced to open their networks to the Intern...
The main goal of this thesis is the development of malware analysis methods to help human analysts b...
Nowadays, attacks against computer systems may involve hardware components in order to bypass the nu...
Understanding computer security requires a strong knowledge of the underlying technologies and a dee...
Today, the Internet is changing radically our habits, especially with the massive influx of the noma...
The original design of Internet did not take into consideration security aspects of the network; the...
Security of distributed systems is an increasingly serious concern, in particular with the massive d...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
La connexion de systèmes critiques à Internet pose de sérieux problèmes de sécurité. En effet, les t...
The connection of critical systems to the Internet is raising serious security problems, since the c...
The subject of this thesis is to propose an in-depth protection that can be enforced by the operatin...
This thesis aims to define the best strategy to secure the Information System I’m currently working ...
The Internet has become a great integration platform capable of efficiently interconnecting billions...
Les systèmes de contrôle-commande industriels (Industrial Control System, ICS) sont des infrastructu...
Since computer infrastructures are currently getting more vulnerable than ever, traditional security...
With the rise of Industry 4.0, many infrastructures were forced to open their networks to the Intern...
The main goal of this thesis is the development of malware analysis methods to help human analysts b...
Nowadays, attacks against computer systems may involve hardware components in order to bypass the nu...
Understanding computer security requires a strong knowledge of the underlying technologies and a dee...
Today, the Internet is changing radically our habits, especially with the massive influx of the noma...
The original design of Internet did not take into consideration security aspects of the network; the...