This thesis deals with two major issues in the computer security field. The first is enhancing the security of Linux systems for scientific computation, the second is the protection of Windows workstations. In order to strengthen the security and measure the performances, we offer a common method for the distributed observation of system calls. It relies on reference monitors to ensure confidentiality and integrity. Our solution uses specific high performance computing technologies to lower the communication latencies between the SELinux and PIGA monitors. Benchmarks study the integration of these distributed monitors in the scientific computation. Regarding workstation security, we propose a new reference monitor implementing state of the ...
There is a permanent confrontation between malware and antiviruses, leading both parties to evolve c...
With the rise of Industry 4.0, many infrastructures were forced to open their networks to the Intern...
Virtual machine technology is rapidly gaining acceptance as a fundamental building block in enterpri...
La thèse porte sur deux enjeux importants de sécurité. Le premier concerne l’amélioration de la sécu...
The subject of this thesis is to propose an in-depth protection that can be enforced by the operatin...
Security of distributed systems is an increasingly serious concern, in particular with the massive d...
En considérant la vitesse avec laquelle la technologie des systèmes embarqués progresse, il n’est pa...
In this thesis, we are interested in the guaranty of the properties of integrity and confidentiality...
Le monitorage (monitoring) est une approche pour la sécurisation du code qui permet l'exécution d’un...
Les systèmes embarqués sont de plus en plus présents dans notre quotidien (e.g. cartes de crédits, s...
Critical systems, including embedded systems built around a single core microprocessor running a sof...
Processors are electronic components omnipresent in our daily lives. They are in our smartphones, co...
Current computing systems have to protect the data they hold and to fit easily into versatile workin...
De nos jours, nos appareils mobiles sont utilisés pour réaliser desopérations sensibles telles que d...
Cette thèse traite du problème d’une protection en profondeur qui puisse être assurée par un système...
There is a permanent confrontation between malware and antiviruses, leading both parties to evolve c...
With the rise of Industry 4.0, many infrastructures were forced to open their networks to the Intern...
Virtual machine technology is rapidly gaining acceptance as a fundamental building block in enterpri...
La thèse porte sur deux enjeux importants de sécurité. Le premier concerne l’amélioration de la sécu...
The subject of this thesis is to propose an in-depth protection that can be enforced by the operatin...
Security of distributed systems is an increasingly serious concern, in particular with the massive d...
En considérant la vitesse avec laquelle la technologie des systèmes embarqués progresse, il n’est pa...
In this thesis, we are interested in the guaranty of the properties of integrity and confidentiality...
Le monitorage (monitoring) est une approche pour la sécurisation du code qui permet l'exécution d’un...
Les systèmes embarqués sont de plus en plus présents dans notre quotidien (e.g. cartes de crédits, s...
Critical systems, including embedded systems built around a single core microprocessor running a sof...
Processors are electronic components omnipresent in our daily lives. They are in our smartphones, co...
Current computing systems have to protect the data they hold and to fit easily into versatile workin...
De nos jours, nos appareils mobiles sont utilisés pour réaliser desopérations sensibles telles que d...
Cette thèse traite du problème d’une protection en profondeur qui puisse être assurée par un système...
There is a permanent confrontation between malware and antiviruses, leading both parties to evolve c...
With the rise of Industry 4.0, many infrastructures were forced to open their networks to the Intern...
Virtual machine technology is rapidly gaining acceptance as a fundamental building block in enterpri...