Vincent Nicomette

Orcid: 0000-0001-9482-004X

According to our database1, Vincent Nicomette authored at least 70 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Ten years of studies on the security of connected objects: a wrap-up (keynote abstract).
Proceedings of the 30th Computer & Electronics Security Application Rendezvous Conference (C&ESAR 2023) co-located with the 8th European Cyber Week (ECW 2023), 2023

2022
Facing emerging challenges in connected vehicles: a formally proven, legislation compliant, and post-quantum ready security protocol.
J. Comput. Virol. Hacking Tech., 2022

2021
RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment.
ACM Trans. Cyber Phys. Syst., 2021

Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

A defensive man-in-middle approach to filter BLE packets.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
A PSD-based fingerprinting approach to detect IoT device spoofing.
Proceedings of the 25th IEEE Pacific Rim International Symposium on Dependable Computing, 2020

Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

REHAD: Using Low-Frequency Reconfigurable Hardware for Cache Side-Channel Attacks Detection.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Smart-TV security: risk analysis and experiments on Smart-TV communication channels.
J. Comput. Virol. Hacking Tech., 2019

Computer-Security-Oriented Escape Room.
IEEE Secur. Priv., 2019

Implementation of a Host-Based Intrusion Detection System for Avionic Applications.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Mirage: Towards a Metasploit-Like Framework for IoT.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

2018
State of the art of network protocol reverse engineering tools.
J. Comput. Virol. Hacking Tech., 2018

IOMMU protection against I/O attacks: a vulnerability and a proof of concept.
J. Braz. Comput. Soc., 2018

A language-based intrusion detection approach for automotive embedded networks.
Int. J. Embed. Syst., 2018

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Specification-Based Protocol Obfuscation.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling.
Proceedings of the 13th European Dependable Computing Conference, 2017

2016
Outils pour la rétro-conception de protocoles. Analyse et classification.
Tech. Sci. Informatiques, 2016

Bypassing IOMMU Protection against I/O Attacks.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

Protocol Reverse Engineering: Challenges and Obfuscation.
Proceedings of the Risks and Security of Internet and Systems, 2016

2015
Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds.
Proceedings of the 11th European Dependable Computing Conference, 2015

Security of ISP Access Networks: Practical Experiments.
Proceedings of the 11th European Dependable Computing Conference, 2015

Smart-TV Security Analysis: Practical Experiments.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Identification de vulnérabilités web et génération de scénarios d'attaque.
Tech. Sci. Informatiques, 2014

An automated black box approach for web vulnerability identification and attack scenario generation.
J. Braz. Comput. Soc., 2014

La sécurité des box ADSL. Analyse de risques et expérimentations.
Ingénierie des Systèmes d Inf., 2014

An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications.
Int. J. Secur. Softw. Eng., 2014

A Tool to Analyze Potential I/O Attacks against PCs.
IEEE Secur. Priv., 2014

An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Évaluation quantitative de la sécurité. Approche basée sur les vulnérabilités.
Tech. Sci. Informatiques, 2013

A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach.
Comput. J., 2013

Security of embedded automotive networks: state of the art and a research proposal.
Proceedings of the SAFECOMP 2013, 2013

Low-Level Attacks on Avionics Embedded Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2013

An Automated Approach to Generate Web Applications Attack Scenarios.
Proceedings of the Sixth Latin-American Symposium on Dependable Computing, 2013

Survey on security threats and protection mechanisms in embedded automotive networks.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
Potential Attacks on Onboard Aerospace Systems.
IEEE Secur. Priv., 2012

A distributed platform of high interaction honeypots and experimental results.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Security-related vulnerability life cycle analysis.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Detecting attacks against data in web applications.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned.
J. Comput. Virol., 2011

Enforcing kernel constraints by hardware-assisted virtualization.
J. Comput. Virol., 2011

Intrusion-tolerant fine-grained authorization for Internet applications.
J. Syst. Archit., 2011

A Clustering Approach for Web Vulnerabilities Detection.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

I/O Attacks in Intel PC-based Architectures and Countermeasures.
Proceedings of the First SysSec Workshop 2011, 2011

2010
Une analyse empirique du comportement d'attaquants. Expérimentations et résultats.
Tech. Sci. Informatiques, 2010

Luth: Composing and Parallelizing Midpoint Inspection Devices.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Exploiting an I/OMMU vulnerability.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

2009
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers.
IEEE Trans. Dependable Secur. Comput., 2009

La protection des systèmes informatiques vis à vis des malveillances.
, 2009

2008
Rootkit modeling and experiments under Linux.
J. Comput. Virol., 2008

Internet attacks monitoring with dynamic connection redirection mechanisms.
J. Comput. Virol., 2008

2007
Empirical analysis and statistical modeling of attack processes based on honeypots
CoRR, 2007

2006
Collection and analysis of attack data based on honeypots deployed on the Internet.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Lessons learned from the deployment of a high-interaction honeypot.
Proceedings of the Sixth European Dependable Computing Conference, 2006

2003
An intrusion tolerant architecture for dynamic content internet servers.
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003

2001
An Internet Authorization Scheme Using Smart-Card-Based Security Kernels.
Proceedings of the Smart Card Programming and Security, 2001

1997
An Authorization Scheme For Distributed Object Systems.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

1996
La protection dans les systèmes à objets répartis.
PhD thesis, 1996

A Multilevel Security Model for Distributed Object Systems.
Proceedings of the Computer Security, 1996

Symbolic Rights and Vouchers for Access Control in Distributed Object Systems.
Proceedings of the Concurrency and Parallelism, 1996

1995
Implementing Fault Tolerant Applications using Reflective Object-Oriented Programming.
Proceedings of the Digest of Papers: FTCS-25, 1995


  Loading...