As embedded systems are more and more present in our lives, it is necessary to protect the personal data stored in such systems. Application developers can unintentionally introduce vulnerabilities that can be exploited by attackers to compromise the confidentiality or integrity of the system. One of the solutions to prevent this is to use reactive mechanisms to monitor the behavior of the system while it is running. In this thesis, we propose a generic anomaly detection approach combining hardware and software aspects, based on dynamic information flow tracking (DIFT). DIFT consists of attaching labels representing security levels to information containers, for example files, and specifying an information flow policy to describe the author...
Nous cherchons à améliorer l'état de l'art des implémentations de contrôle de flux d'information dan...
International audienceSecurity in embedded systems remains a major concern. Untrustworthy authoritie...
International audienceSecurity is a major issue nowadays for the embedded systems community. Untrust...
As embedded systems are more and more present in our lives, it is necessary to protect the personal ...
Les systèmes embarqués étant de plus en plus présents dans nos vies, il est nécessaire de protéger l...
Information flow control (also known as Dynamic Information Flow Tracking, DIFT), allows a user to d...
Information flow control (also known as Dynamic Information Flow Tracking, DIFT), allows a user to d...
Modern organisations rely intensively on information and communicationtechnology infrastructures. Su...
Critical systems, including embedded systems built around a single core microprocessor running a sof...
Les systèmes critiques, parmi lesquels les systèmes embarqués construits autour d'un microprocesseur...
We look forward to improving the implementations of information flow control mechanisms in Linux Ope...
National audienceSecurity in embedded systems is a major concern for several years. Untrustworthy au...
Dynamic information flow tracking (DIFT) has been proven an effective technique to track data usage;...
Version non-définitive - présentée le jour de la soutenance.Computer security is now a crucial issue...
International audienceThis work details a hardware-assisted approach for information flow tracking i...
Nous cherchons à améliorer l'état de l'art des implémentations de contrôle de flux d'information dan...
International audienceSecurity in embedded systems remains a major concern. Untrustworthy authoritie...
International audienceSecurity is a major issue nowadays for the embedded systems community. Untrust...
As embedded systems are more and more present in our lives, it is necessary to protect the personal ...
Les systèmes embarqués étant de plus en plus présents dans nos vies, il est nécessaire de protéger l...
Information flow control (also known as Dynamic Information Flow Tracking, DIFT), allows a user to d...
Information flow control (also known as Dynamic Information Flow Tracking, DIFT), allows a user to d...
Modern organisations rely intensively on information and communicationtechnology infrastructures. Su...
Critical systems, including embedded systems built around a single core microprocessor running a sof...
Les systèmes critiques, parmi lesquels les systèmes embarqués construits autour d'un microprocesseur...
We look forward to improving the implementations of information flow control mechanisms in Linux Ope...
National audienceSecurity in embedded systems is a major concern for several years. Untrustworthy au...
Dynamic information flow tracking (DIFT) has been proven an effective technique to track data usage;...
Version non-définitive - présentée le jour de la soutenance.Computer security is now a crucial issue...
International audienceThis work details a hardware-assisted approach for information flow tracking i...
Nous cherchons à améliorer l'état de l'art des implémentations de contrôle de flux d'information dan...
International audienceSecurity in embedded systems remains a major concern. Untrustworthy authoritie...
International audienceSecurity is a major issue nowadays for the embedded systems community. Untrust...