Dissertations / Theses on the topic 'Smartphones – Mesures de sûreté'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Smartphones – Mesures de sûreté.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Averlant, Guillaume. "Contrôle d'accès dynamique et architecture de sécurité pour la protection des applications sous Android." Thesis, Toulouse, INSA, 2019. http://www.theses.fr/2019ISAT0026.
Full textIn this thesis, we specifically focus on the Android environment. Indeed, we noticed a lack in the capabilities of the Android permission model against a number of emerging threats. To address these threats, we propose a security policy that complements the current Android permission system. This policy aims at restricting dynamically, i.e. based on the current smartphone execution context, the execution rights and the ability to access smartphone resources for each installed application. Besides the security benefits, the use of such a policy allows a user to have a tighter control over the access ofapplications to privacy-related data. This security policy is the first contribution of this thesis. Furthermore, we designed a security architecture that implements the access control mechanisms required to carry out such a policy. This second contribution is based on a so-called "multi-level" architecture, i.e. made up of several components of different privilege levels. Specifically, these have been implemented both in the Android framework, in the Linux kernel, and in a hypervisor. The last contribution of this thesis involves the realization of a prototype of this architecture on a development board, associated with the presentation of tests that showcase the effectiveness and relevance of the approach
Sabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.
Full textThe landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir advent, smartphones have become almost vital in the modern world. This has spurred many service providers to propose access to their services via mobile applications. Despite such big success, the use of smartphones for sensitive applications has not become widely popular. The reason behind this is that users, being increasingly aware about security, do not trust their smartphones to protect sensitive applications from attackers. The goal of this thesis is to strengthen users trust in their devices. We cover this trust problem with two complementary approaches: provable security and hardware primitives. In the first part, our goal is to demonstrate the limits of the existing technologies in smartphones architectures. To this end, we analyze two widely deployed systems in which careful design was applied in order to enforce their security guarantee: the Android KeyStore, which is the component shielding users cryptographic keys in Android smartphones, and the family of Secure Channel Protocols (SCPs) defined by the GlobalPlatform consortium. Our study relies on the paradigm of provable security. Despite being perceived as rather theoretical and abstract, we show that this tool can be handily used for real-world systems to find security vulnerabilities. This shows the important role that can play provable security for trust by being able to formally prove the absence of security flaws or to identify them if they exist. The second part focuses on complex systems that cannot cost-effectively be formally verified. We begin by investigating the dual-execution-environment approach. Then, we consider the case when this approach is built upon some particular hardware primitives, namely the ARM TrustZone, to construct the so-called Trusted Execution Environment (TEE). Finally, we explore two solutions addressing some of the TEE limitations. First, we propose a new TEE architecture that protects its sensitive data even when the secure kernel gets compromised. This relieves service providers of fully trusting the TEE issuer. Second, we provide a solution in which TEE is used not only for execution protection, but also to guarantee more elaborated security properties (i.e. self-protection and self-healing) to a complex software system like an OS kernel
Gitzinger, Louison. "Surviving the massive proliferation of mobile malware." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S058.
Full textNowadays, many of us are surrounded by smart devices that seamlessly operate interactively and autonomously together with multiple services to make our lives more comfortable. These smart devices are part of larger ecosystems, in which various companies collaborate to ease the distribution of applications between developers and users. However malicious attackers take advantage of them illegitimately to infect users' smart devices with malicious applications. Despite all the efforts made to defend these ecosystems, the rate of devices infected with malware is still increasing in 2020. In this thesis, we explore three research axes with the aim of globally improving malware detection in the Android ecosystem. We demonstrate that the accuracy of machine learning-based detection systems can be improved by automating their evaluation and by reusing the concept of AutoML to fine-tune learning algorithms parameters. We propose an approach to automatically create malware variants from combinations of complex evasion techniques to diversify experimental malware datasets in order to challenge existing detection systems. Finally, we propose methods to globally increase the quality of experimental datasets used to train and test detection systems
Sokolova, Karina. "Bridging the gap between Privacy by Design and mobile systems by patterns." Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0008/document.
Full textNowadays, smartphones and smart tablets generate, receive, store and transfer substantial quantities of data, providing services for all possible user needs with easily installable programs, also known as mobile applications. A number of sensors integrated into smartphones allow the devices to collect very precise information about the owner and his environment at any time. The important flow of personal and business data becomes hard to manage.The “Privacy by Design” approach with 7 privacy principles states privacy can be integrated into any system from the software design stage. In Europe, the Data Protection Directive (Directive 95/46/EC) includes “Privacy by Design” principles. The new General Data Protection Regulation enforces privacy protection in the European Union, taking into account modern technologies such as mobile systems and making “Privacy by Design” not only a benefit for users, but also a legal obligation for system designers and developers.The goal of this thesis is to propose pattern-oriented solutions to cope with mobile privacy problems, such as lack of transparency, lack of consent, poor security and disregard for purpose limitation, thus giving mobile systems more Privacy by (re) Design
Issoufaly, Taher. "Physical Tracking : menaces, performances et applications." Thesis, La Réunion, 2019. http://www.theses.fr/2019LARE0017/document.
Full textThe recent rise of smart-phones and connected objects has a deep impact its users lifestyle. In 2017, more than a billion and a half smart-phones were sold around the world. These ubiquitous devices, equipped with several wireless communication interfaces, have quickly become essential in the daily life of users with an intensive use. The wireless interfaces of these connected objects periodically transmit information on the network, some of which are user-specific and allow to identify and track their mobility. Tracking users by collecting the information generated by their wireless devices is called Wireless Physical Tracking. The opportunities offered by the Wireless Physical Tracking raised a lot of interest. Several applications have been developed and have brought innovation in several areas. Marketing companies use it to offer to their customers targeted advertising based on their movements in their area of activity. On a larger scale, Smart Cities or smart-cities analyse the movement of users in order to provide services for their inhabitants. Finally, in the field of research in mobile Ad-Hoc networks and DTNs, users mobility is a key element which need to be collected and analysed. However, the collection of this information without the consent of the users or without being properly protected induce a real risk to their privacy. It is around this context that this thesis is focused on. It’s divided into two parts. The first presents the PAN and WAN technologies, the state of the art of Wireless Physical Tracking methods and the adopted counter measures. The second part presents the contributions of the thesis which aims at developing new methods for Physical Tracking and analysing their performances compared to the existing methods. We first present an evaluate BPM, a bluetooth passive monitoring that allows to track the users of Classic Bluetooth device with a detection delay significantly lower than the methods previously used. We then focus on Bluetooth Low Energy and propose the use of a BLEB, a botnet of users tracking BLE objects with their smart-phones. Finally, we also focus on preserving users privacy through the proposal of PPCL, a privacy preserving crowdlocalisation method which allow to track users assets without being trackable
Grégoire, Ludivine. "Les mesures de sûreté : essai sur l'autonomie d'une notion." Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM1056.
Full textAt the moment, two forms of penalties oppose and complement each other: a classic shape and rétributive, the sentences, and a more modern and essentially preventive shape, the safety measures. These two criminal punishments, if they do not possess either the same foundations, or the same objectives, are nevertheless sometimes difficult to differentiate. The question of the relationships which they maintain is recurring but with regard to the constant increase of the number of safety measures in the penal law for these last years, it deserves from now on an answer. The latter will be brought in the form of the notion of autonomy which will on one hand allow to identify clearly safety measures and on the other hand to clear a set of more or less specific rules intended to clarify their legal regime. In this way, the legitimacy of the existence of safety measures can be confirmed
El, Gamal Tarek. "La sûreté des aéroports internationaux." Aix-Marseille 3, 2006. http://www.theses.fr/2006AIX32072.
Full textThomas, Yohann. "Policy-based response to intrusions through context activation." Télécom Bretagne, 2007. http://www.theses.fr/2007TELB0057.
Full textNous présentons dans cette thèse une nouvelle approche de réponse face aux menaces auxquelles les systèmes informatiques sont soumis. Cette approche est basée sur l'intégration de la notion de contre-mesure au sein même de la politique de sécurité. En particulier, la notion de contexte permet d'évaluer l'état courant du système, et d'exprimer la politique en fonction de cet état. Pour ce faire, le modèle de contrôle d'accès basé sur l'organisation (Or-BAC) est utilisé, distinguant la définition générique de la politique de son implémentation effective en fonction du contexte. Le contexte intègre aussi bien des paramètres spatiaux et temporels que des paramètres plus proprement liés au domaine de la sécurité opérationnelle, comme les alertes remontées par les systèmes de détection d'intrusions (IDS). Ces alertes permettent la caractérisation de la menace à laquelle est soumis le système d'information à un instant donné. Des contextes de menace sont instanciés par notre système de réponse, permettant de déclencher des mises a jour de la politique et son déploiement subséquent. Ainsi, le système est capable d'adapter dynamiquement ses paramètres de fonctionnement en considérant notamment la menace. Nous proposons une approche innovante établissant le lien entre la politique de sécurité et l'un des principaux moyens qui permet d'encontrôler le respect, à savoir les systèmes de détection d'intrusions. Ce lien n'existait pas jusqu'alors, c'est-à-dire que les violations de la politique de sécurité détectées par les IDS n'avaient que peu de conséquences sur les exigences de la politique de sécurité effectivement implementées par les points d'application. Pourtant, force est de constater que l'implementation de la politique ne doit pas être statique. En particulier, nous montrons qu'il est possible de gérer dynamiquement l'accès aux services et aux ressources en fonction de la menace. En outre, ce travail fournit un début de réponse a la problématique de la réactivité et de la pertinence de la réponse face aux menaces. La réponse aux attaques informatiques est le plus souvent gérée manuellement par l'opérateur de sécurité. Ce même opérateur de sécurité manque malheureusement bien souvent de réactivité et de discernement pour répondre de manière adéquate à la menace, notamment parce qu'il est bien souvent noyé sous le flot des alertes ; le travail d'analyse est fastidieux et difficile au vu du nombre de paramètres a considérer. D'un autre côté, les attaques se multiplient, les attaquants mettent de moins en moins de temps a pénétrer les systèmes et à produire des dégâts qui peuvent rapidement se chiffrer en millions d'euros pour les entreprises. Automatiser la réponse est donc une nécessité
Gualino, Tamonino Matthieu. "La gouvernance de la sûreté des transports." Thesis, Toulouse 1, 2015. http://www.theses.fr/2015TOU10068.
Full textLe résumé en anglais n'a pas été communiqué par l'auteur
Abdelnur, Humberto Jorge. "Gestion de vulnérabilités voix sur IP." Thesis, Nancy 1, 2009. http://www.theses.fr/2009NAN10005/document.
Full textVoIP networks are in a major deployment phase and are becoming widely accepted due to their extended functionality and cost efficiency. Meanwhile, as VoIP traffic is transported over the Internet, it is the target of a range of attacks that can jeopardize its proper functionality. Assuring its security becomes crucial. Among the most dangerous threats to VoIP, failures and bugs in the software implementation will continue rank high on the list of vulnerabilities. This thesis provides three contributions towards improving software security. The first is a VoIP specific security assessment framework integrated with discovery actions, data management and security attacks allowing to perform VoIP specific assessment tests. The second contribution consists in an automated approach able to discriminate message signatures and build flexible and efficient passive fingerprinting systems able to identify the source entity of messages in the network. The third contribution addresses the issue of detecting vulnerabilities using a stateful fuzzer. It provides an automated attack approach capable to track the state context of a target device and we share essential practical experience gathered over a two years period in searching for vulnerabilities in the VoIP space
Nguyen, Minh Huu. "Sécurisation de processeurs vis-à-vis des attaques par faute et par analyse de la consommation." Paris 6, 2011. http://www.theses.fr/2011PA066671.
Full textSaleh, Hayder. "Une architecture novatrice de sécurité à base de carte à puce Internet." Versailles-St Quentin en Yvelines, 2002. http://www.theses.fr/2002VERSA009.
Full textAbbes, Tarek. "Classification du trafic et optimisation des règles de filtrage pour la détection d'intrusions." Nancy 1, 2004. http://www.theses.fr/2004NAN10192.
Full textIn this dissertation we are interested by some bottlenecks that the intrusion detection faces, namely the high load traffic, the evasion techniques and the false alerts generation. In order to ensure the supervision of overloaded networks, we classify the traffic using Intrusion Detection Systems (IDS) characteristics and network security policies. Therefore each IDS supervises less IP traffic and uses less detection rules (with respect to traffics it analyses). In addition we reduce the packets time processing by a wise attack detection rules application. During this analysis we rely on a fly pattern matching strategy of several attack signatures. Thus we avoid the traffic reassembly previously used to deceive evasion techniques. Besides, we employ the protocol analysis with decision tree in order to accelerate the intrusion detection and reduce the number of false positives noticed when using a raw pattern matching method
Martinelli, Jean. "Protection d'algorithmes de chiffrement par blocs contre les attaques par canaux auxiliaires d'ordre supérieur." Versailles-St Quentin en Yvelines, 2011. http://www.theses.fr/2011VERS0043.
Full textTraditionally, a cryptographic algorithm is estimated through its resistance to "logical" attacks. When this algorithm is implanted within a material device, physical leakage can be observed during the computation and can be analyzed by an attacker in order to mount "side channel" attacks. The most studied side channel attack is the differential power analysis (DPA). First order DPA is now well known and can be prevented by securely proven countermeasures. In 2008, some results are known for second order, but none for third order. The goal of this thesis is to propose a frame for k-th order DPA where k>1. We developed several masking schemes as alternatives to the classical ones in order to propose a better complexity-security ratio. These schemes make use of various mathematical operations such as field multiplication or matrix product and cryptographic tools as secret sharing and multi-party computation. We estimated the security of the proposed schemes following a methodology using both theoretical analysis and practical results. At last we proposed an evaluation of the action of the word size of a cryptographic algorithm upon its resistance against side channel attacks, with respect to the masking scheme implemented
Balduzzi, Marco. "Mesures automatisées de nouvelles menaces sur Internet." Paris, Télécom ParisTech, 2011. http://www.theses.fr/2011ENST0042.
Full textLn the last twenty years, the Internet has grown from a simple, small network to a complex, large-scale system. While the Internet was originally used to offer static content that was organized around simple websites, today, it provides both content and services (e. G. Chat, e-mail, web) as weil as the outsourcing of computation and applications (e. G. Cloud computing). Attackers are not indifferent to the evolution of the Internet. Often driven by a flourishing underground economy, attackers are constantly looking for vulnerabilities, misconfigurations and novel techniques to access protected and authorized systems, to steal private information, or to deliver malicious content. To date, not much research has been conducted to measure the importance and extent of these emerging Internet threats. Conventional detection techniques cannot easily scale to large scale installations, and novel methodologies are required to analyze and discover bugs and vulnerabilities in these complex systems. Ln this thesis, we advance the state-of-art in large scale testing and measurement of Internet threats. We research lnto three novel classes of security problems that affect Internet systems that experienced a fast surge in popularity (i. E. , ClickJacking, HTIP Parameter Pollution, and commercial cloud computing services that allow the outsourcing of server infrastructures). We introduce the tirst, large scale attempt to estimate the prevalence and relevance of these problems on the Internet
Frinchaboy, Jenny. "Les mesures de sûreté : étude comparative des droits pénaux français et allemand." Thesis, Strasbourg, 2015. http://www.theses.fr/2015STRAA030.
Full textSecurity measures are at the heart of the current criminal policy, even though they raise a number of questions. Their place is very uncertain in French law, which has opted for a "single-track system", comprising only penalties, in the interest of simplification. Though, alongside the penalties, there are some security measures that are not always recognised as such, to the detriment of the coherence of the positive law. German law, on the contrary, has adopted a “dual-track system”, where penalties and security measures coexist within the criminal code. This system offers the advantage of recognizing the specificities of the security measures, which are not based on the guilt of the offender, but on his degree of danger. Although the distinction between the two categories of criminal sanctions is not an easy one, because of the areas of convergence, the two concepts cannot simply be treated as being the same. This comparative study of the emergence and the autonomy of the security measures concludes that a dualism of criminal sanctions should be introduced to the French criminal code with a complete own legal regime for the security measures, separate from the penalties’ regime, but in accordance with the basic principles of the criminal law
Griot, Laurent. "La fonction Sûreté dans les grandes entreprises françaises." Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020059.
Full textThe purpose of this thesis is to analyze the corporate security function in large French companies. It is approached from the contingency theory stand point. According to this approach, an effective organization is the one that is best suited to its environment. First, we analyze the criminal environment of French companies in order to demonstrate its influence on their life. We then review the literature on the security function to determine its essential characteristics.Thanks to this first part, we design an empirical analysis based on a survey in order to determine what is the organizational reality of corporate security function today in France. Our goal is also to determine the environmental characteristics that have the most influence on this organization.We conclude that, according to the literature on contingency theory, the size of the organization has a great influence. But the organization's international involvement is also a determining factor. The contribution of private corporations to national stability and to the production state security is also a key element in the organization of security departments in France
Mendy, Norbert Lucien. "Les attaques et la sécurité des systèmes informatiques." Paris 8, 2006. http://www.theses.fr/2006PA082735.
Full textHacking activities appeared around 1980 with first personal computers and since did not stop developing. At the beginning, this practice was primarily individual and playful. Now it is mainly made up by the activities of groups, with very various motivations. Today, due to the development of electronic means of communication, data security concerns a wider public. This thesis examines initially, from a technical and sociological point of view, attacks and defense mechanisms, and proposes a new concept of the security which is not only any centered on technical solutions but also takes in consideration the social dimension of the problem
Disson, Eric. "Sécurité des accès dans les systèmes d'information coopératifs." Lyon 3, 2001. http://www.theses.fr/2001LYO33032.
Full textKanoun, Wael. "Intelligent risk-aware system for activating and deactivating policy-based response." Télécom Bretagne, 2011. http://www.theses.fr/2011TELB0165.
Full textLa croissance de l'échelle des systèmes d'information critiques, combinée à l'augmentation continue de la fréquence et de la sophistication des attaques, rend les systèmes de réponses classiques inadéquats. Le système peut être la cible de plusieurs attaques simultanées, qui nécessitent l'activation de réponses différentes et contradictoires. En outre, une réponse peut avoir des effets collatéraux, comme (i) induire un coût intrinsèque sur le système, (ii) permettre et faciliter l'exécution d'autres attaques. Ainsi, les systèmes de réponse doivent être conçus d'une manière intelligente, pour optimiser l'activation des réponses appropriées, soit pour les automatiser, soit pour fournir une assistance à la décision aux administrateurs. Alors que la majorité des modèles de réponses existants considère seulement le coût des attaques et des réponses, nous adoptons une perspective plus générale basée sur le risque. Conformément à la définition du risque, nous considérons conjointement l'impact et la vraisemblance de succès des attaques en cours dans le processus de sélection de réponse. D'abord, nous proposons un workflow qui permet de réagir sur deux plans distincts, sur le plan tactique, et sur le plan stratégique. La réponse tactique est composée des contremesures élémentaires à portées limitées dans le système. Elles sont généralement liées à l'occurrence d'attaque en cours. En revanche, la réponse stratégique est spécifiée avec un langage formel qui permet d'exprimer des politiques de sécurité. Elles sont déployées globalement dans le système pour des menaces majeures. Ensuite, nous proposons un modèle pour la réponse tactique, basé sur une évaluation de risques dynamique. Quand une attaque en cours est détectée, nous évaluons le risque global en combinant l'impact potentiel avec la vraisemblance de succès de l'attaque. Les contremesures seront ordonnées par rapport à leur efficacité à réduire le risque global. Nous mettons l'accent sur le facteur de vraisemblance de succès, et nous proposons un modèle dynamique pour évaluer ce paramètre, en tenant compte du progrès de l'attaque en cours et l'état du système. Enfin, nous présentons un framework basé sur les risques pour l'activation et la désactivation de la réponse stratégique. Cette réponse est activée et déployée quand le risque de l'attaque en cours dépasse le coût cumulé de la réponse, et elle est maintenue tant que le risque reste présent. Contrairement aux systèmes existants, nous considérons la désactivation d'une réponse qui est effectuée lorsque le risque de l'attaque décroît, ou dés lors que le coût de la réponse devient important. Dans cette thèse, un service VoIP a été choisi pour valider nos propositions, tout en respectant les contraintes opérationnelles et de sécurité
Sedki, Karima. "Raisonnement sous incertitude et en présence des préférences : application à la détection d'intrusions et à la corrélation d'alertes." Artois, 2008. http://www.theses.fr/2008ARTO0403.
Full textThis thesis aims to study two important problems: representation of preferences with application to alert correlation and reasoning under uncertainty with application to intrusion detection problem. We focused on extensions of Qualitative Choice Logic (QCL) to represent complex preferences. Our aim is to propose new logics to address of QCL limitations and to represent different kinds of preferences such as prioritized and positive preferences. Moreover, this thesis aims to solve the problem of alert correlation that concerns reducing the large amounts of generated alerts by intrusion detection systems (IDSs). We propose an approach that incorporates administrator’s knowledge and preferences about alerts that he prefers to analyze or ignore. The idea is to encode administrator’s knowledge and preferences in the context of one of our developed logics and present to the administrator only preferred alerts. In the other hand, we are interested in the problem of intrusion detection that is a serious problem in computer security. Our objective is to detect network attacks before or after connection’s completion. Thus, we propose to represent this problem by a probabilistic graphical model used for classification purposes. To do this, we defined a set of attributes that describe network data and distinguish between normal and intrusive traffic. We have developed a preprocessing tool to extract the defined attributes and transform raw data to formatted one. Our tool can structure network data into finished or not finished connections that can be used for on-line or/and off-line attacks detection
Blond, Julien. "Modélisation et implantation d'une politique de sécurité d'un OS multi-niveaux via une traduction de FoCaLyze vers C." Paris 6, 2010. http://www.theses.fr/2010PA066370.
Full textZnaidi, Wassim. "Quelques propositions de solutions pour la sécurité des réseaux de capteurs sans fil." Lyon, INSA, 2010. http://theses.insa-lyon.fr/publication/2010ISAL0083/these.pdf.
Full textThe self-organized growth of three-dimensional (3D) quantum dots has attracted a lot of interest for their potential applications in ptoelectronic and in nanophotonic devices. In this work, we study by optical spectroscopy lnAs/lnP and lnAs/GaAs quantum dots grown by molecular beam epitaxy (MBE) using the Stanski-Krastanov (SK) growth mode. The quantum dots are then embedded in an electric-field tunable device called « nanopixel ». Ln the case of the lnAs/lnP quantum dots, we focused on the impact of growth conditions like the cap thickness of the double cap process on the emission energy, the influence of the first cap, temperature effect and the exciton-biexciton system. In the case of lnAs/GaAs system, we studied the impact of the capping layer, the excited level sates, the excitonbi-exciton system, and the impact of temperature. We successfully fabricated nanopixels including a quantum dots layer inside the intrinsic region of a Schottky diode. First results showing the effect of an electric field on a single quantum dot emission are finally described
Haddad, Sonia. "Synthèse de réseaux sécurisés." Aix-Marseille 2, 2002. http://www.theses.fr/2002AIX22074.
Full textGarcia-Alfaro, Joaquin. "Platform of intrusion management : design and implementation." Télécom Bretagne, 2006. http://www.theses.fr/2006TELB0025.
Full textAujourd’hui les systèmes informatiques sont plus vulnérables aux activités malveillantes qu’auparavant. C’est pour cela que l’utilisation des mécanismes de sécurité traditionnaux est encore nécessaire mais pas suffisante. Nous devons élaborer des méthodes efficaces de détection et de réponse aux attaques afin d’arrêter les événements détectés. Nous présentons dans cette thèse la conception d’une architecture générale qui agira en tant que point central pour analyser et vérifier des politiques de sécurité réseaux, et pour contrôler et configurer – sans anomalies ou erreurs de configuration – des composants de sécurité préventifs et de détection. Nous présentons également un mécanisme de réponse basé sur une bibliothèque de différents types de contremesures. L’objectif de ce mécanisme est d’aider l’administrateur à choisir dans cette bibliothèque la contremesure la mieux adaptée quand une intrusion est détectée. Nous finissons par la présentation d’une infrastructure pour la communication des composants de notre plateforme, et d’un mécanisme pour la protection des composants de celle-ci. Toutes les propositions et approches introduites dans cette thèse ont été implémentées et évaluées. Nous présentons les résultats obtenus dans les sections respectives de cette dissertation
Falcone, Yliès Carlo. "Etude et mise en oeuvre de techniques de validation à l'exécution." Université Joseph Fourier (Grenoble), 2009. http://www.theses.fr/2009GRE10239.
Full textThis thesis deals with three dynamic validation techniques: runtime verification (monitoring), runtime enforcement, and testing from property. We consider these approaches in the absence of complete behavioral specification of the system under scrutiny. Our study is done in the context of the Safety-Progress classification of properties. This framework offers several advantages for specifying properties on systems. We adapt the results on this classification, initially dedicated to infinite sequences, to take into account finite sequences. Those sequences may be considered as abstract representations of a system execution. Relying on this general framework, we study the applicability of dynamic validation methods. We characterize the classes of monitorable, enforceable, and testable properties. Then, we proposed three generic approaches for runtime verification, enforcement, and testing. We show how it is possible to obtain, from a property expressed in the {\SP} framework, some verification, enforcement, and testing mechanisms for the property under consideration. Finally, we propose the tools j-VETO and j-POST implementing all the aforementioned results on Java programs
Nobelis, Nicolas. "Une architecture pour le transfert électronique sécurisé de document." Nice, 2008. http://www.theses.fr/2008NICE4054.
Full textIn our Information Era, various actors have expressed their needs related to electronic document transfer. These actors can be corporates (a company willing to send confidential schematics to its subcontractor), individuals (a person wishing to share his holiday pictures with his friend) or governments (an administration sending documents to another department). These needs are heterogeneous because they depend not only on the document being transferred, but also on the security properties to fulfill. To satisfy these different needs, numerous secure communication protocols have been developed. However, there is no bijection between the protocols and the needs: thus, it is difficult to associate the adequate protocol to a specific need. During their life cycles, the existing communication protocols can be managed (created, deployed, and used) by three roles, each of them having different objectives: non-expert user, protocol developer and system administrator. The first objective of this thesis is to help these roles find a solution to their problems. A component-based approach seems particularly suitable: in fact, software components allow to isolate specific functionalities for reuse and composition. Moreover, the use of such components enables applications to certify features which may be required by the users. In the context of this work, we define the notion of high level security components, each fulfilling a security property. These components have a generic interface which allows their use by various protocols and applications. The second objective of this thesis is to design an architecture named A. D. E. P. T. And dedicated to the electronic document transfer. This architecture, driven by security policies, relies on one or several assemblies of high level security components to satisfy users needs. These assemblies allow us to illustrate the functionalities of our components as well as their use by the aforementioned roles
Orset, Jean-Marie. "Une architecture de test passif appliquée à la détection des attaques dans les réseaux ad hoc." Evry, Institut national des télécommunications, 2007. http://www.theses.fr/2007TELE0002.
Full textHamieh, Ali. "La sécurité dans les réseaux sans fil ad hoc : les attaques jamming et les noeuds greedy." Versailles-St Quentin en Yvelines, 2012. http://www.theses.fr/2012VERS0009.
Full textAd hoc networks are vulnerable to security attacks such as greedy behaviors and jamming attacks. In this dissertation, we proposed RLGREEDY, an advancement for a detection system to identify and differentiate a greedy node without modifying MAC protocol. In effect this proposed system measures the waiting time of nodes to access the channel for detection of greedy nodes. Furthermore, concerning the detection of jamming, the system proposed in this thesis RLJAM focuses on calculating a correlation between error and correct reception times. To counter these jamming attacks, POWJAM and DIRJAM are proposed in this dissertation. Our first approach, POWJAM, is to hide the communications from reactive jammers through changing the transmission power and use of a different path for communication. The second approach, DIRJAM, is to react at jamming in wireless ad hoc networks using directional antenna, making minimal changes in reactive routing protocol to be reactive in the presence of jamming attacks
Fronsacq, Alexandre. "La sûreté des centrales nucléaires : approche juridique de la sûreté des centrales nucléaires de production d'électricité." Paris 1, 1999. http://www.theses.fr/1999PA010269.
Full textLongevialle, Christophe. "Contribution à la sécurisation d'un réseau d'information élaborée, par cryptographie et "pare-feu" informatique : application à une base de gestion de rssources humaines." Marne-la-Vallée, 2004. http://www.theses.fr/2004MARN0187.
Full textPham, Van-Hau. "De l'identification d'événements d'attaques dans des traces recueillies sur des pots de miel." Paris, Télécom ParisTech, 2009. http://www.theses.fr/2009ENST0017.
Full textLnternet security is a major issue nowadays. Several research initiatives have been carried out to understand the Internet security threats. Recently, a domain has emerged called attack attribution that aims at studying the modus operandi of the attacks and at identifying the characteristics of the groups responsible for the observed attacks. The work presented in this thesis participates to the efforts in this area. We show in this work that, starting from network traces collected over two years on a distributed system of low interaction honeypots, one can extract meaningful and useful knowledge about the attackers. To reach this goal, the thesis makes several important contributions. First of all, we show that attack traces can be automatically grouped into three distinct classes, corresponding to different attack phenomena. We have defined, implemented and validated algorithms to automatically group large amount of traces per category. Secondly, we show that, for two of these classes, so called micro and macro attack events can be identified that span a limited amount of time. These attack events represent a key element to help identifying specific activities that would, otherwise, be lost in the so called attack background radiation noise. Here too, a new framework has been defined, implemented and validated over 2 years of traces. Hundreds of significant attack events have been found in our traces. Last but not least, we showed that, by grouping attack events together, it was possible to highlight the modus operandi of the organizations responsible for the attacks. The experimental validation of our approach led to the identification of dozens of so called zombie armies. Their main characteristics are presented in the thesis and they reveal new insights on the dynamics of the attacks carried ou over the Internet
Rébaï, Raja. "Optimisation de réseaux de télécommunications avec sécurisation." Paris 9, 2000. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2000PA090025.
Full textDuc, Guillaume. "Support matériel, logiciel et cryptographique pour une éxécution sécurisée de processus." Télécom Bretagne, 2007. http://www.theses.fr/2007TELB0041.
Full textThe majority of the solutions to the issue of computer security (algorithms, protocols, secure operating systems, applications) are running on insecure hardware architectures that may be vulnerable to physical (bus spying, modification of the memory content, etc. ) or logical (malicious operating system) attacks. Several secure architectures, which are able to protect the confidentiality and the correct execution of programs against such attacks, have been proposed for several years. After the presentation of some cryptographic bases and a review of the main secure architectures proposed in the litterature, we will present the secure architecture CryptoPage. This architecture guarantees the confidentiality of the code and the data of applications and the correct execution against hardware or software attacks. In addition, it also includes a mechanism to reduce the information leakage on the address bus, while keeping reasonable performances. We will also study how to delegate some security operations of the architecture to an untrusted operating system in order to get more flexibility but without compromising the security of thearchitecture. Finally, some other important mechanism are studied: encrypted processid entification, attestations of the results, management of software signals, management of the threads, inter-process communication
Vache, Géraldine. "Evaluation quantitative de la sécurité informatique : approche par les vulnérabilités." Toulouse, INSA, 2009. http://eprint.insa-toulouse.fr/archive/00000356/.
Full textThis thesis presents a new approach for quantitative security evaluation for computer systems. The main objective of this work is to define and evaluate several quantitative measures. These measures are probabilistic and aim at quantifying the environment influence on the computer system security considering vulnerabilities. Initially, we identified the three factors that have a high influence on system state: 1) the vulnerability life cycle, 2) the attacker behaviour and 3) the administrator behaviour. We studied these three factors and their interdependencies and distinguished two main scenarios based on nature of vulnerability discovery, i. E. Malicious or non malicious. This step allowed us to identify the different states of the system considering the vulnerability exploitation process and to define four measures relating to the states of the system: vulnerable, exposed, compromised, patched and secure. To evaluate these measures, we modelled the process of system compromising by vulnerability exploitation. Afterwards, we characterized the vulnerability life cycle events quantitatively, using real data from a vulnerability database, in order to assign realistic values to the parameters of the models. The simulation of these models enabled to obtain the values of the four measures we had defined. Finally, we studied how to extend the modelling to consider several vulnerabilities. So, this approach allows the evaluation of measures quantifying the influences of several factors on the system security
Abdoul, Soukour Anas. "Planification d’employés dans le secteur de la sûreté aéroportuaire." Amiens, 2012. http://www.theses.fr/2012AMIE0110.
Full textIn this thesis, we present a staff scheduling problem in airport security service. The work developed here is held as part of CIFRE thesis (2009-2012), with collaboration of ICTS France, MIS laboratory of the University of Picardy Jules verne, HeuDiaSyc laboratory of the University of Technology of Compiègne and with the ANRT. Elaborating planning is a hard process which requires satisfying legal constraints, employee's satisfaction and client's satisfaction. Staff scheduling problem is commonly solved in several steps (days-off scheduling, shift scheduling, and staff assignment). We focus on the last step staff assignment. First we propose a mathematical modeling of the problem and then propose approximate solving methods by providing two algorithms, a greedy algorithm and a global assignment algorithm which provide an initial solution. This solution will be improved by an iterative time out Destruction/Construction algorithm which alternates partial destruction and reconstruction steps. Then we propose a simulated annealing algorithm, and we propose a memetic algorithm based on a local search which uses three neighborhoods. These algorithms have been validated on real cases. Besides providing better solutions than the software currently used, these algorithms enable to provide solutions with significant improvements towards initial solution
Heerde, Harold Johann Wilhelm van. "Privacy-aware data management by means of data degradation." Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0031.
Full textService-providers collect more and more privacy-sensitive information, even though it is hard to protect this information against hackers, abuse of weak privacy policies, negligence, and malicious database administrators. In this thesis, we take the position that endless retention of privacy-sensitive information will inevitably lead to unauthorized data disclosure. Limiting the retention of privacy-sensitive information limits the amount of stored data and therefore the impact of such a disclosure. Removing data from a database system is not a straightforward task; data degradation has an impact on the storage structure, indexing, transaction management, and logging mechanisms. To show the feasibility of data degradation, we provide several techniques to implement it; mainly, a combination of keeping data sorted on degradation time and using encryption techniques where possible. The techniques are founded with a prototype implementation and a theoretical analysis
Rabah, Mourad. "Évaluation de la sûreté de fonctionnement de systèmes multiprocesseurs à usage multiple." Toulouse, INPT, 2000. http://www.theses.fr/2000INPT021H.
Full textMahbouli, Chawky. "Transport et sûreté : de la prévention à l'assurance." Paris 1, 2008. http://www.theses.fr/2008PA010335.
Full textTrabelsi, Slim. "Services spontanés sécurisés pour l'informatique diffuse." Phd thesis, Télécom ParisTech, 2008. http://pastel.archives-ouvertes.fr/pastel-00004140.
Full textDefrenne, Jean. "Modélisation de la partie opérative - impact sur la sécurité et la maintenance des automatismes à évolution séquentielle." Lille 1, 1986. http://www.theses.fr/1986LIL10045.
Full textFadlallah, Ahmad. "Des solutions pour la traçabilité des attaques Internet." Paris, ENST, 2008. http://www.theses.fr/2008ENST0012.
Full textThe Denial of Service (DoS) attacks are a real threat for the availability and stability of the Internet. Their continuous growth was the main motivation of our research, which starts with a thorough analysis of these attacks. The second step in our research was to study the existing DoS defense solutions. Our study provides an analysis of the most well known defense schemes, their advantages and limitations. In particular, we were interested in studying attack traceback solutions, given their important role in the framework of DoS defense. The analysis of different categories of traceback schemes led us to establish a number of requirements for an effective and deployable traceback solution. Our first solution proposes to mix two existing traceback techniques: packet marking and packet logging in order to mutually solve their problems. Our second solution tries to solve the storage overhead problem of the first solution. It is based on out-of-band signaling, which allows tracing IP flows through generating signaling messages. We enhance this solution by mixing the out of band signaling with packet marking. This method significantly reduces the bandwidth overhead of the previous solution while respecting the rest of performance, security and deployment requirements
Saadi, Rachid. "The Chameleon : un système de sécurité pour utilisateurs nomades en environnements pervasifs et collaboratifs." Lyon, INSA, 2009. http://theses.insa-lyon.fr/publication/2009ISAL0040/these.pdf.
Full textWhile the trust is easy to set up between the known participants of a communication, the evaluation of trust becomes a challenge when confronted with unknown environment. It is more likely to happen that the collaboration in the mobile environment will occur between totally unknown parties. An approach to handle this situation has long been to establish some third parties that certify the identities, roles and/or rights of both participants in a collaboration. In a completely decentralized environment, this option is not sufficient. To decide upon accesses one prefer to rely only on what is presented to him by the other party and by the trust it can establish, directly by knowing the other party or indirectly, and vice-versa. Hence a mobile user must for example present a set of certificates known in advance and the visited site may use these certificates to determine the trust he can have in this user and thus potentially allow an adapted access. In this schema the mobile user must know in advance where she wants to go and what she should present as identifications. This is difficult to achieve in a global environment. Moreover, the user likes to be able to have an evaluation of the site she is visiting to allow limited access to her resources. And finally, an user does not want to bother about the management of her security at fine grain while preserving her privacy. Ideally, the process should be automatized. Our work was lead to define the Chameleon architecture. Thus the nomadic users can behave as chameleons by taking the "colors" of their environments enriching their nomadic accesses. It relies on a new T2D trust model which is characterized by support for the disposition of trust. Each nomadic user is identified by a new morph certification model called X316. The X316 allows to carry out the trust evaluation together with the roles of the participants while allowing to hide some of its elements, preserving the privacy of its users
Razafindraibe, Hanitriniaina Mamitiana Alin. "Analyse et amélioration de la logique double rail pour la conception de circuits sécurisés." Montpellier 2, 2006. http://www.theses.fr/2006MON20117.
Full textContes, Arnaud. "Une architecture de sécurité hiérarchique, adaptable et dynamique pour la Grille." Nice, 2005. http://www.theses.fr/2005NICE4025.
Full textWhereas security is a key notion in the world of distributed applications, its numerous concepts are a difficult step to overcome when constructing such applications. Current middlewares provide all major security-related technologies. However developers still have to select the more accurate one and handle all its underlying processes which is particularly difficult with dynamic, grid-enabled applications. To facilitate the use of security concepts in such applications, tis thesis presents a decentralised security model which takes care of security requirements expressed by all actors (resource provides, administrators, users) involved in a computation. The model is implemented outside the application source code. Its configuration is read from external policy files allowing the adaptation of the application’s security according to its deployments. It has been conceived to handle specific behaviors which could happen during a distributed application life-cycle (use of newly discovered resources, remote object creation)
Carlinet, Yannick. "Supervision de trafic au niveau applicatif : application à la sécurité et à l'ingénierie des réseaux." Rennes 1, 2010. https://tel.archives-ouvertes.fr/tel-00536850.
Full textTraffic monitoring at the application level: application to security and network engineering. The work presented in this document deals with traffic monitoring in the core network, at the application level. The benefits of traffic monitoring in the layer-7 is illustrated thanks to several studies
Masmoudi, Khaled. "Gestion de la confiance dans les réseaux personnels." Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0002.
Full textWith the advent of new networking paradigms and evolutions, spanning from distributed and self-organized systems such as ad hoc networks, P2P networks or grids, to pervasive computing, wireless mesh networks or embedded devices, many research effort have been conducted to bring the previous theoretic concepts into real life. Security protocols have to fulfill a new requirement : how is it possible to establish trust between parties without any a priori credential, central administration or shared context ? We go even farther in this dissertation : what if each single party was a heterogeneous distributed domain ? This thesis builds a layered architecture with a set of cryptographic protocols, meant to establish trust between devices and services belonging to different users through their Personal Networks. In the first part, the trust vector is an out-of-band channel, based on proximity. The resulting protocols combine identity-based cryptography to link identities to cryptographic material, and cryptographically-generated addresses to provide identity ownership. These new identifiers form a novel namespace that allows cross-layer trust establishment. The de facto security negotiation protocols, namely Internet Key Exchange protocol and Transport layer Security handshake sub-protocol, provide end-to-end secure tunnel establishment, but fail to fit scenarios when a domain controller has to define the security parameters for a device under its supervision. We define in the second part of this dissertation how extensions could be applied to fullfill the previous requirement and delegate tunnel negotiation to a third party. Security validation results and the details of a preliminary implementation are also provided. Last, we design a framework for establishing trust basing on the entity behavior within a group of Personal Networks that share a part of their devices and services. Focusing on service discovery, we show that reputation-based trust can be applied to mitigate selfishness and fake announcements in a federation of Personal Networks
Majorczyk, Frédéric. "Détection d’intrusions comportementale par diversification de COTS : application au cas des serveurs web." Rennes 1, 2008. https://tel.archives-ouvertes.fr/tel-00355366.
Full textInformation systems’ security is a fundamental issue. It is necessary to define a security policy for these systems and check that it is not violated. Preventive security mechanisms are generally insufficient. Intrusion detection systems (IDSes) can be used to detect violations of the security policy, that is intrusions. Intrusion tolerance tools and techniques can also be used. Our work is in the intrusion detection field and allows some intrusion tolerance. In classical anomaly-based approaches, it is necessary to build a behavioral model of the observed entity. To the contrary, in our approach, the behavioral model is implicit and is composed by the other software components in the architecture. This approach comes from the dependability field and is based on N-versions programming. We propose using COTS instead of specifically developped versions. Using COTS introduces some issues that we have taken into account in our general intrusion detection model. We have proposed solutions to bypass these issues. We have proposed two intrusion detection approaches based on this architecture : the first one following a black-box approach and the second one following a graybox approach. We have applied these approaches to web servers and evaluated the false positive and true positive rates of our IDSes
Maingot, Vincent. "Conception sécurisée contre les attaques par fautes et par canaux cachés." Grenoble INPG, 2009. https://tel.archives-ouvertes.fr/tel-00399450.
Full textL'évolution des besoins en sécurité des applications grand public a entraîné la multiplication du nombre de systèmes sur puces doués de capacités de chiffrement. En parallèle, l'évolution des techniques de cryptanalyse permet d'attaquer les implantations des méthodes de chiffrement utilisées dans ces applications. Cette thèse porte sur le développement d'une méthodologie permettant l'évaluation de la robustesse apportée par des protections intégrées dans le circuit. Cette évaluation est basée d'une part sur l'utilisation de plates-formes laser pour étudier les types de fautes induits dans un prototype de circuit sécurisé ; et d'autre part, sur l'utilisation d'une méthode basée sur des simulations pendant la phase de conception pour comparer l'influence sur les canaux cachés de protections contre les fautes. Cette méthodologie a été utilisée dans un premier temps sur le cas simple d'un registre protégé par redondance d'information, puis sur des primitives cryptographiques telles qu'une S-Box AES et des co-processeurs AES et RSA. Ces deux études ont montré que l'ajout de capacités de détection ou de correction améliore la robustesse du circuit face aux différentes attaques
Mouelhi, Tejeddine. "Testing and modeling seurity mechanisms in web applications." Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0151.
Full textThis thesis focuses on the issue of security testing of web-applications, considering the internal part of a system (access control policies) and then its interfaces (bypass testing and shielding). The proposed approaches led to address the issue of modeling the security policies as well as the testing artifacts, using Model-Driven Engineering as the underlying technology to propose elements for a model-driven security process. Concerning the internal part of a system, we first study the differences between classical functional tests and test targeting the security mechanisms explicitly (so called security tests). In this context, we adapted mutation analysis to assess and qualify security tests. Then, we proposed three complementary approaches dealing with access control testing; the first one is based on pair-wise technique and allows access control tests to be generated automatically, while the second approach allows functional tests to be selected and transformed into security tests. Finally, the last approach focuses on detecting hidden access control mechanisms, which harm the flexibility of the access control mechanisms and their ability to evolve. To complete all these approaches which focus on the internal part of the application, we tackled the issue of testing the interface and especially the bypass-testing. We leveraged the ideas of bypass-testing and used automated analysis of the web application to provide a new approach for testing and shielding web applications against bypass-attacks, which occur when malicious users bypass client-side input validation. The work on access control testing led us to focus on proposing new model-driven approaches for developing and integrating access control mechanisms in a way that guarantees better quality and testability. Two research directions were explored for this purpose. The first one is based on a metamodel and provides a complete MDE process for automatically specifying, and integrating (semi-automatically) access control policies. This approach takes into account testing at the early stage of modeling and provides a generic certification process based on mutation. Finally, the second approach is based on model composition and allows an automated integration of the access control policy, and more importantly the automated reconfiguration of the system when the access control policy needs to evolve