Vincent Nicomette

According to our database1, Vincent Nicomette authored at least 56 papers between 1995 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Smart-TV security: risk analysis and experiments on Smart-TV communication channels.
J. Computer Virology and Hacking Techniques, 2019

Computer-Security-Oriented Escape Room.
IEEE Security & Privacy, 2019

Implementation of a Host-Based Intrusion Detection System for Avionic Applications.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Mirage: Towards a Metasploit-Like Framework for IoT.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

2018
State of the art of network protocol reverse engineering tools.
J. Computer Virology and Hacking Techniques, 2018

IOMMU protection against I/O attacks: a vulnerability and a proof of concept.
J. Braz. Comp. Soc., 2018

A language-based intrusion detection approach for automotive embedded networks.
IJES, 2018

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Specification-Based Protocol Obfuscation.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling.
Proceedings of the 13th European Dependable Computing Conference, 2017

2016
Outils pour la rétro-conception de protocoles. Analyse et classification.
Technique et Science Informatiques, 2016

Bypassing IOMMU Protection against I/O Attacks.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

Protocol Reverse Engineering: Challenges and Obfuscation.
Proceedings of the Risks and Security of Internet and Systems, 2016

2015
Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds.
Proceedings of the 11th European Dependable Computing Conference, 2015

Security of ISP Access Networks: Practical Experiments.
Proceedings of the 11th European Dependable Computing Conference, 2015

Smart-TV Security Analysis: Practical Experiments.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Identification de vulnérabilités web et génération de scénarios d'attaque.
Technique et Science Informatiques, 2014

An automated black box approach for web vulnerability identification and attack scenario generation.
J. Braz. Comp. Soc., 2014

La sécurité des box ADSL. Analyse de risques et expérimentations.
Ingénierie des Systèmes d'Information, 2014

An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications.
IJSSE, 2014

A Tool to Analyze Potential I/O Attacks against PCs.
IEEE Security & Privacy, 2014

An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Évaluation quantitative de la sécurité. Approche basée sur les vulnérabilités.
Technique et Science Informatiques, 2013

A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach.
Comput. J., 2013

Security of embedded automotive networks: state of the art and a research proposal.
Proceedings of the SAFECOMP 2013, 2013

Low-Level Attacks on Avionics Embedded Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2013

An Automated Approach to Generate Web Applications Attack Scenarios.
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013

Survey on security threats and protection mechanisms in embedded automotive networks.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
Potential Attacks on Onboard Aerospace Systems.
IEEE Security & Privacy, 2012

A distributed platform of high interaction honeypots and experimental results.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Security-related vulnerability life cycle analysis.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Detecting attacks against data in web applications.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned.
Journal in Computer Virology, 2011

Enforcing kernel constraints by hardware-assisted virtualization.
Journal in Computer Virology, 2011

Intrusion-tolerant fine-grained authorization for Internet applications.
J. Syst. Archit., 2011

A Clustering Approach for Web Vulnerabilities Detection.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

I/O Attacks in Intel PC-based Architectures and Countermeasures.
Proceedings of the First SysSec Workshop 2011, 2011

2010
Une analyse empirique du comportement d'attaquants. Expérimentations et résultats.
Technique et Science Informatiques, 2010

Luth: Composing and Parallelizing Midpoint Inspection Devices.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Exploiting an I/OMMU vulnerability.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

2009
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers.
IEEE Trans. Dependable Sec. Comput., 2009

La protection des systèmes informatiques vis à vis des malveillances.
, 2009

2008
Rootkit modeling and experiments under Linux.
Journal in Computer Virology, 2008

Internet attacks monitoring with dynamic connection redirection mechanisms.
Journal in Computer Virology, 2008

2007
Empirical analysis and statistical modeling of attack processes based on honeypots
CoRR, 2007

2006
Collection and analysis of attack data based on honeypots deployed on the Internet.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Lessons learned from the deployment of a high-interaction honeypot.
Proceedings of the Sixth European Dependable Computing Conference, 2006

2001
An Internet Authorization Scheme Using Smart-Card-Based Security Kernels.
Proceedings of the Smart Card Programming and Security, 2001

1997
An Authorization Scheme For Distributed Object Systems.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

1996
La protection dans les systèmes à objets répartis.
PhD thesis, 1996

A Multilevel Security Model for Distributed Object Systems.
Proceedings of the Computer Security, 1996

Symbolic Rights and Vouchers for Access Control in Distributed Object Systems.
Proceedings of the Concurrency and Parallelism, 1996

1995
Implementing Fault Tolerant Applications using Reflective Object-Oriented Programming.
Proceedings of the Digest of Papers: FTCS-25, 1995


  Loading...