61 research outputs found
LogSafe: Secure and Scalable Data Logger for IoT Devices
As devices in the Internet of Things (IoT) increase in number and integrate with everyday lives, large amounts of personal information will be generated. With multiple discovered vulnerabilities in current IoT networks, a malicious attacker might be able to get access to and misuse this personal data. Thus, a logger that stores this information securely would make it possible to perform forensic analysis in case of such attacks that target valuable data. In this paper, we propose LogSafe, a scalable, fault-tolerant logger that leverages the use of Intel Software Guard Extensions (SGX) to store logs from IoT devices efficiently and securely. Using the security guarantees of SGX, LogSafe is designed to run on an untrusted cloud infrastructure and satisfies Confidentiality, Integrity, and Availability (CIA) security properties. Finally, we provide an exhaustive evaluation of LogSafe in order to demonstrate that it is capable of handling logs from a large number of IoT devices and at a very high data transmission rate
Cloud-Based Secure Logger for Medical Devices
A logger in the cloud capable of keeping a secure, time-synchronized and tamper-evident log of medical device and patient information allows efficient forensic analysis in cases of adverse events or attacks on interoperable medical devices. A secure logger as such must meet requirements of confidentiality and integrity of message logs and provide tamper-detection and tamper-evidence. In this paper, we propose a design for such a cloud-based secure logger using the Intel Software Guard Extensions (SGX) and the Trusted Platform Module (TPM). The proposed logger receives medical device information from a dongle attached to a medical device. The logger relies on SGX, TPM and standard encryption to maintain a secure communication channel even on an untrusted network and operating system. We also show that the logger is resilient against different kinds of attacks such as Replay attacks, Injection attacks and Eavesdropping attacks
Etude physico-chimique de la formation et de l'évolution des particules dans la ligne d'échappement des véhicules : modélisation et expérimentation
thèse de doctorat ULP Strasbourg soutenue le 9 décembre 2005 (Dir. P. Mirabel
Characterization of nanoporous carbons
Hitherto, adsorption has been traditionally used to study only the porous structure in disordered materials, while the structure of the solid phase skeleton has been probed by crystallographic methods such as x-ray diffraction. Here we show that for carbons density functional theory, suitably adapted to consider heterogeneity of the pore walls, can be reliably used to probe features of the solid structure hitherto accessibly only approximately even by crystallographic methods. We investigate a range of carbons, including commercial activated carbons, activated carbon fibres as well as coal chars prepared in our laboratory, and determine pore wall thickness distributions using argon adsorption. The results are corroborated by x-ray diffraction studies, which yield a parallelism indicator that correlates well with its counterpart determined from the adsorption-based pore wall thickness distributions. Further, characterization of progressively heated carbons using the proposed approach shows clear evidence of thickening of pore walls, confirmed by xrd
Classification de quelques cultivars de poirier en fonction de la ponte préférentielle et du mécanisme d'antibiosis de Psylla pyri L. (Homoptera-Psyllidae)
International audienc
Sensibilite de quelques cultivars de poiriers aux attaches de Psylla pyri L. (Homoptera : Psyllidae) en milieu artificiel
National audienc
Sensibilite de quelques cultivars de poiriers aux attaches de Psylla pyri L. (Homoptera : Psyllidae) en milieu artificiel
International audienc
- …