58 research outputs found

    Moniteur hybride de flux d'information pour un langage supportant des pointeurs

    Get PDF
    National audienceLes nouvelles approches combinant contrÎle dynamique et statique de flux d'information sont prometteuses puisqu'elles permettent une approche permissive tout en garantissant la correction de l'analyse réalisée vis-à-vis de la non-interférence. Dans ce papier, nous présentons une approche hybride de suivi de flux d'information pour un langage gérant des pointeurs. Nous formalisons la sémantique d'un moniteur sensible aux flux de données qui combine analyse statique et dynamique. Nous prouvons ensuite la correction de notre moniteur vis-à-vis de la non-interférence

    The Cardinal Abstraction for Quantitative Information Flow

    Get PDF
    International audienceQualitative information flow aims at detecting information leaks, whereas the emerging quantitative techniques target the estimation of information leaks. Quantifying information flow in the presence of low inputs is challenging, since the traditional techniques of approximating and counting the reachable states of a program no longer suffice. This paper proposes an automated quantitative information flow analysis for imperative deterministic programs with low inputs. The approach relies on a novel abstract domain, the cardinal abstraction, in order to compute a precise upper-bound over the maximum leakage of batch-job programs. We prove the soundness of the cardinal abstract domain by relying on the framework of abstract interpretation. We also prove its precision with respect to a flow-sensitive type system for the two-point security lattice

    ModĂ©lisation et Évaluation des Attaques CiblĂ©es dans un Overlay StructurĂ©

    Get PDF
    Session SĂ©curitĂ© RĂ©seauInternational audienceDans cet article, nous nous intĂ©ressons aux attaques ciblĂ©es dans le cadre des systĂšmes pair-Ă -pair large Ă©chelle. Ces attaques ont pour but d'affaiblir les nƓuds ciblĂ©s de maniĂšre Ă  diminuer leur capacitĂ© Ă  fournir ou Ă  utiliser des services de l'overlay. Pour se prĂ©munir de telles attaques, nous tirons parti du clustering de l'overlay sous-jacent. Cela permet de mettre en place un systĂšme de churn induit prĂ©servant la rĂ©partition alĂ©atoire des identifiants des nƓuds dans l'overlay et ainsi rendre impossible toute prĂ©diction de l'adversaire quant Ă  celle-ci. Nous montrons qu'en randomisant lĂ©gĂšrement les opĂ©rations Ă©lĂ©mentaires de l'overlay, ainsi qu'en introduisant des temps de sĂ©jour adaptĂ©s, l'effet de ces attaques ciblĂ©es est sensiblement amoindri, et la propagation des effets de l'attaque Ă  l'ensemble du systĂšme est Ă©vitĂ©e

    Toward a distributed storage system leveraging the DSL infrastructure of an ISP

    Get PDF
    International audienceInternet Service Providers~(ISP) furnishing cloud storage services usually rely on big data centers. These centralized architectures induce many drawbacks in terms of scalability, reliability, and high access latency as data centers are single points of failure and are not necessarily located close to the users. This paper introduces Mistore, a distributed storage system aiming at guaranteeing data availability, durability, low access latency by leveraging the Digital Subscriber Line~(DSL) infrastructure of an ISP. Mistore uses the available storage resources of a large number of home gateways and points of presence respectively for content storage and caching facilities reducing the role of the data center to a load balancer. Mistore also targets data consistency by providing multiple types of consistency criteria on content and a versioning system allowing users to get access to any prior versions of their contents

    Dependability Evaluation of Cluster-based Distributed Systems

    Get PDF
    19International audienceAwerbuch and Scheideler have shown that peer-to-peer overlay networks can survive Byzantine attacks only if malicious nodes are not able to predict what will be the topology of the network for a given sequence of join and leave operations. In this paper we inves- tigate adversarial strategies by following speci c protocols. Our analysis demonstrates rst that an adversary can very quickly subvert overlays based on distributed hash tables by simply never triggering leave operations. We then show that when all nodes (honest and malicious ones) are imposed on a limited lifetime, the system eventually reaches a stationary regime where the ratio of polluted clusters is bounded, independently from the initial amount of corruption in the system

    Brief Announcement: Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems

    Get PDF
    International audienceAwerbuch and Scheideler have shown that peer-to-peer overlays networks can only survive Byzantine attacks if malicious nodes are not able to predict what will be the topology of the network for a given sequence of join and leave operations. A prerequisite for this condition to hold is to guarantee that nodes identifiers randomness is continuously preserved. However targeted join/leave attacks may quickly endanger the relevance of such an assumption. Inducing churn has been shown to be the other fundamental ingredient to preserve randomness. Several strategies based on these principles have been proposed. Most of them are based on locally induced churn. However either they have been proven incorrect or they involve a too high level of complexity to be practically acceptable. The other ones, based on globally induced churn, enforce limited lifetime for each node in the system. However, these solutions keep the system in an unnecessary hyper-activity, and thus need to impose strict restrictions on nodes joining rate which clearly limit their applicability to open systems. In this paper we propose to leverage the power of clustering to design a provably correct and practically usable solution that preserves randomness under a bounded adversary

    Ground deformation monitoring of the eruption offshore Mayotte

    Get PDF
    In May 2018, the Mayotte island, located in the Indian Ocean, was affected by an unprecedented seismic crisis, followed by anomalous on-land surface displacements in July 2018. Cumulatively from July 1, 2018 to December 31, 2021, the horizontal displacements were approximately 21 to 25 cm eastward, and subsidence was approximately 10 to 19 cm. The study of data recorded by the on-land GNSS network, and their modeling coupled with data from ocean bottom pressure gauges, allowed us to propose a magmatic origin of the seismic crisis with the deflation of a deep source east of Mayotte, that was confirmed in May 2019 by the discovery of a submarine eruption, 50 km offshore of Mayotte ([Feuillet et al., 2021]). Despite a non-optimal network geometry and receivers located far from the source, the GNSS data allowed following the deep dynamics of magma transfer, via the volume flow monitoring, throughout the eruption

    Detecting illegal system calls using a data-oriented detection model

    No full text
    Part 9: Intrusion DetectionInternational audienceThe most common anomaly detection mechanisms at application level consist in detecting a deviation of the control-flow of a program. A popular method to detect such anomaly is the use of application sequences of system calls. However, such methods do not detect mimicry attacks or attacks against the integrity of the system call parameters. To enhance such detection mechanisms, we propose an approach to detect in the application the corruption of data items that have an influence on the system calls. This approach consists in building automatically a data-oriented behaviour model of an application by static analysis of its source code. The proposed approach is illustrated on various examples, and an injection method is experimented to obtain an approximation of the detection coverage of the generated mechanisms
    • 

    corecore