Publications

Publications

Link to Google Scholar citations

Link to DBLP publications

For a full list of all publications since 1990: click here

  • J. Roux, E. Alata,  G. Auriol, M. Kaâniche, V. Nicomette, R. Cayre
    RadIoT: Radio Communications Intrusion Detection for IoT - A protocol Independent Approach
    The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), 01-03 Novembre 2018, Boston, IEEE CS. https://hal-laas.archives-ouvertes.fr/hal-01914981v1

  • G. Averlant, E. Alata,  M. Kaâniche, V. Nicomette, Y. Mao
    SAAC: Secure Android APplication Context - A runtime-based Policy and Its Architecture
    The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), 01-03 Novembre 2018, Boston, IEEE CS.

  • A. Damien, M. Fumey, E. Alata,  M. Kaâniche, V. Nicomette
    Anomaly-based Intrusion Detection for an Avionic Embedded System
    Aerospace Systems and Technology Conference (ASTC 2018), 06-08 Novembre 2018, Londres

  • J. Duchêne, E. Alata, V. Nicomette, M. Kaâniche, C. Le Guernic
    Specification-based protocol obfuscation
    48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2018), 25-28 Juin 2018, Luxembourg, IEEE CS, 12p. https://hal-laas.archives-ouvertes.fr/hal-01848573v1

  • C. Sauvanaud, M. Kaâniche, K. Kanoun, K. Lazri, G. Da Silva Guthemberg, Anomaly Detection and Diagnosis for Cloud services: Practical experiments and lessons learned.
    Journal of Systems and Software, Elsevier. Vol.139, pp. 84-106, Mai 2018. https://hal.laas.fr/hal-01864357

  • Y. Bachy, V. Nicomette, M. Kaâniche, E. Alata
    Smart-TV security: risk analysis and experiments on Smart-TV communication channels.
    Journal of Computer Virology and Hacking Techniques, Springer, 2018.  https://hal.archives-ouvertes.fr/hal-01761974. https://doi.org/10.1007/s11416-018-0320-3.

  • I. Studnia, E. Alata, V. Nicomette, M. Kaâniche, Y. Laarouchi
    A language-based intrusion detection approach for automotive embedded networks
    International Journal on Embedded Systems. Volume 10, Issue1, 2018. https://hal.archives-ouvertes.fr/hal-01419020/

  • J. Duchêne, C. Le Guernic, E. Alata, V. Nicomette, M. Kaâniche
    State of the art of network protocol reverse engineering tools
    Journal of Computer Virology and Hacking Techniques. Vol.14, N°1, pp 53–68. Février 2018. https://hal-laas.archives-ouvertes.fr/hal-01496958v1

  • J. Roux, E. Alata, G. Auriol, V. Nicomette, M. Kaâniche
    Toward an Intrusion Detection Approach for IoT based on Radio Communications profiling.
    13th European Dependable Computing Conference, Sep 2017, Geneva, Switzerland. 4p., 2017.  https://hal.laas.fr/hal-01561710

  • G. Averlant, B. Morgan, E. Alata, V. Nicomette, M. Kaâniche
    An Abstraction model and a comparative analysis of Intel and ARM hardware isolation mechanisms.
    The 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC-2017), Christchurch, Nouvelle Zélande,  Cali (Colombie), 22-25 janvier 2017, IEEE CS, 10p. https://hal.laas.fr/hal-01493597

  • B. Morgan, E. Alata, V. Nicomette, M. Kaâniche. Bypassing IOMMU protection against IO attacks. Latin-American Symposium on Dependable Computing (LADC-2016), Cali (Colombie), 19-21 octobre 2016, IEEE CS, 8p. https://hal.archives-ouvertes.fr/hal-01419962

  • C. Sauvanaud, K. Lazri, M. Kaâniche, K. Kanoun. Anomaly root cause localization in virtual network functions. 27th International Symposium on Software Reliability Engineering (ISSRE-2016), Ottawa, Canada, 23-27 Octobre 2016, IEEE CS, 10p. https://hal.archives-ouvertes.fr/hal-01419014/ . Selected in the list of most influential papers published at ISSRE its 30th first editions : "Highlights from 30 years of ISSRE" (http://2020.issre.net/issre-30-years-highlights.html)

  • B. Morgan, E. Alata, V. Nicomette, M. Kaâniche, G. Averlant. Design and implementation of a hardware assisted security architecture for software integrity monitoring. The 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), Zhangjiajie (Chine), 18-20 Novembre 2015, IEEE CS, 10p. https://hal.archives-ouvertes.fr/hal-01322882

  • T. Probst, E. Alata, M. Kaâniche, V. Nicomette. Automated Evaluation of NIDS in Cloud Computing Virtual Infrastructures. 11th European Dependable Computing Conference (EDCC 2015), 7-11 Septembre 2015, Paris, IEEE CS. https://hal.archives-ouvertes.fr/hal-01212064

  • C. Sauvanaud, G. Silvestre, M. Kaâniche, K. Kanoun. Data Stream Clustering for Online Anomaly Detection in Cloud Applications. 11th European Dependable Computing Conference (EDCC 2015), 7-11 Septembre 2015, Paris, IEEE, 12p. https://hal.archives-ouvertes.fr/hal-01211774

  • G. Silvestre, C. Sauvanaud, M. Kaâniche, K. Kanoun. Tejo: a supervised anomaly detection scheme for NewSQL databases. 7th International Workshop on Software Engineering for Resilient Systems, 7-8th September 2015, LNCS, Springer, 13p. https://hal.archives-ouvertes.fr/hal-01211772

  • Y. Bachy, F. Basse, V. Nicomette, E. Alata, M. Kaâniche, J.-C. Courrèges, Pierre Lukjanenko. Smart-TV Security Analysis: practical experiments. 45thAnnual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2015), 22-25 Juin 2015, Rio de Janeiro (Brésil), IEEE CS, 8p. https://hal.archives-ouvertes.fr/hal-01178553

  • G. Silvestre, C. Sauvanaud, M. Kaâniche, K. Kanoun
    An Anomaly Detection Approach for Scale-out Storage Systems, 26th International Symposium on Computer Architecture and High Performance Computing (SBAC PAD 2014) , 22-24 Oct. 2014, Paris (France), 8p. https://hal.archives-ouvertes.fr/hal-01076212

  • T. Probst, E. Alata, M. Kaâniche, V. Nicomette
    An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures, 8th International Conference on Network and System Security (NSS 2014), 15-17 Oct. 2014, Xi’an (China),14p. https://hal.archives-ouvertes.fr/hal-01176045

  • J. Arlat, M. Diaz, M. Kaâniche
    Towards resilient cyber-physical systems: the ADREAM project, International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS 2014), 6-8 May 2014, Santorin (Greece), May 2014, 5p. https://hal.archives-ouvertes.fr/hal-01419019

  • R. Akrout, E. Alata, M. Kaâniche, V. Nicomette
    An automated black box approach for web vulnerabilities identification and attack scenario generation, Journal of the Brazilian Computer Society, Vol.20, N°1, pp.1-16, Jan. 2014. https://hal.archives-ouvertes.fr/hal-00985670

  • R. Ludinard, E. Totel, F. Tronel, V. Nicomette, M. Kaâniche, E. Alata, R. Akrout, Y. Bachy
    An Invariant-based Approach for Detecting Attacks against Data in Web Applications, International Journal of Secure Software Engineering (IJSSE), IGI-Global, vol 5, Issue 1, pp.19-38, 2014. https://hal.inria.fr/hal-01083296

  • K. Tiassou, K. Kanoun, M. Kaâniche, C. Seguin, C. Papadopoulos
    Aircraft operational reliability—A model-based approach and a case study, Reliablity Engineering & System Safety, Elsevier, vol 120, pp.163-176, 2013. Dec. 2013

  • G. Vache, M. Kaâniche, V. Nicomette
    A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach, The Computer Journal, Oxford University Press, British Computer Society, vol 56, n°4, pp. 422-439, 2013. https://hal.archives-ouvertes.fr/hal-00851782

  • I. Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaâniche, Y. Laarouchi
    Security of embedded automotive networks : state of the art and a research proposal,2nd International Workshop on Critical Automotive applications: Robustness and Safety, co-located with SAFECOMP-2013, 25 Sept. 2013. https://hal.archives-ouvertes.fr/hal-00848234

  • J. Guiochet, Q. A. Do Hoang, M. Kaâniche, D. Powell
    Model-based safety analysis of human-robot interactions: The MIRAS walking assistance robot, International Conference on Rehabilitation Robotics (ICORR), Seattle, USA, 7 p., 24-26 June 2013. https://hal.archives-ouvertes.fr/hal-00839296

  • I. Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaâniche, Y. Laarouchi
    A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks, 2nd Workshop on Open Resilient human-aware Cyber-physical Systems (WORCS-2013), Budapest (Hungary), 24 June 2013. https://hal.archives-ouvertes.fr/hal-01176042

  • E. Alata, M. Kaâniche, V. Nicomette, R. Akrout
    An automated vulnerability-based approach for web applications attack scenarios generation, Latin-American Symposium on Dependable Computing (LADC-2013), Rio de Janeiro (Brésil), 2-5 April 2013, pp. 78-85, 2013. https://hal.archives-ouvertes.fr/hal-00985670

  • I. Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaâniche
    Survey of Security Problems in Cloud Computing Virtual Machines Computer and Electronics Security Applications Rendez-vous (C&ESAR 2012), Rennes (France), 20-22 Nov. 2012, pp.61-74, 2012. https://hal.archives-ouvertes.fr/hal-00761206

  • G. Vache,V. Nicomette, M. Kaâniche
    Security-related vulnerability life cycle analysis, 7th International Conference on Risks and Security of Internet and System (CRISIS-2012), Cork, Irlande, 10-12 Oct. 2012. https://hal.archives-ouvertes.fr/hal-00851866

  • J. Guiochet, Q. A. Do Hoang, M. Kaâniche, D. Powell
    Applying Existing Standards to a Medical Rehabilitation Robot: Limits and Challenges Workshop FW5: Safety in Human-Robot Coexistence & Interaction: How can Standardization and Research benefit from each other?, IEEE/RSJ Int. Conference Intelligent Robots and Systems (IROS2012), Portugal, 12 oct. 2012. https://hal.archives-ouvertes.fr/hal-01282195

  • K. Tiassou, K. Kanoun, M. Kaâniche, C. Seguin, C. Papadopoulos
    Impact of Operational Reliability re-Assessment during Aircraft Missions, 31st IEEE International Symposium on Reliable Distributed Systems (SRDS-2012), 8-11 Oct. 2012, Irvine, California, USA, 2012. https://hal.archives-ouvertes.fr/hal-01176048

  • I. Studnia, V. Nicomette, M. Kaâniche, E. Alata
    A distributed platform of high interaction honeypots and experimental results, 10th Annual Conference on Privacy, Security and Trust (PST 2012), Paris, France, 16-18 July, 2012. https://hal.archives-ouvertes.fr/hal-00706333

  • M.Kaâniche, A. van Moorsel
    It All depends, and increasingly so, IEEE Security and Privacy, IEEE Computer Society, Vol.9, N°6, pp.56-57, Nov. 2011

  • A. Bondavalli, O. Hamouda, M.Kaâniche, P. Lollini, I. Majzik, H. P. Schewefel,
    The HIDENETS holistic approach for the analysis of large critical mobile systems, IEEE Transactions on Mobile Computing, Vol. 10, n° 6, pp. 783-796, june 2011. https://hal.archives-ouvertes.fr/hal-00852105

  • V. Nicomette, M.Kaâniche, E. Alata, M. Herrb, Set-up and deployment of a high-interaction honeypot: experiment and lessons learned, Journal in Computer Virology, Vol. 7, N°2, pp.143-157, May 2011. https://hal.archives-ouvertes.fr/hal-00762596

  • O. Hamouda, M.Kaâniche, K. Kanoun, Dependability Assessment of Two Network Supported Automotive Applications In Dependability and Computer Engineering: Concepts for Software-Intensive Systems, L. Petre, K. Sere, and E. Troubitsyna (Eds), IGI Global, Hershey, PA, USA, ISBN 978-1-60960-749-4, April 2011

  • M.Kaâniche, Resilience assessment of critical infrastructures: from accidental to malicious threats, Workshop on Resilience Assessment of Critical Infrastructures (RACI) Latin-American Symposium on Dependable Computing (LADC 2011), São José dos Campos (Brésil), 25-29 April 2011, pp.35-36

  • M. Martinello, M.Kaâniche, K. Kanoun, Performability Evaluation of Web-based Services In Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, V. Cardellini, E. Casalicchio, K. Castelo Branco, J. Estrella, F.J. Monaco (Eds), IGI Global, Hershey, PA, USA, N°ISBN 9781609607951, March 2011, 20p.

  • O. Hamouda, M.Kaâniche, K. Kanoun, Availability Modelling of a Virtual Black Box for Automotive Systems, 2nd International Workshop on Software Engineering for Resilient Systems (SERENE'10), Londres (GB), 15-16 April 2010, pp.52-60. https://hal.archives-ouvertes.fr/hal-00852263

  • A. Abou El Kalam, Y. Deswarte, A. Baina, M. Kaâniche
    PolyOrBAC: a security framework for critical infrastructures
    International Journal of Critical Infrastructure Protection, vol. 2, n°4, pp.154-169, November 2009. https://hal.archives-ouvertes.fr/hal-00851762

  • O. Hamouda, M. Kaaniche, K. Kanoun, “Safety modeling and evaluation of automated highway systems”, 2009 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2009), (Lisbon,  Portugal), 2009, pp. 73-82. https://hal.archives-ouvertes.fr/hal-00851779
    Abstract PDF © IEEE
     
  • A.-E. Rugina, K. Kanoun, M. Kaaniche, “The ADAPT tool: from AADL architectural models to stochastic petri nets through model transformation”, 7th European Dependable Computing Conference (EDCC-7), (Kaunas,  Lithuania), 7-9 may 2008, pp.85-90.
    Abstract PDF © IEEE
  • M. Kaâniche, P. Lollini, A. Bondavalli, K. Kanoun
    Modeling the Resilience of Large and Evolving Systems
    International Journal on Performability Engineering, Vol. 4, N°. 2, pp.153-168, April 2008. https://hal.archives-ouvertes.fr/hal-00756957
     
  • L. Courtès, O. Hamouda, M. Kaâniche, M.O. Killijian, D. Powell
    Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices
    IEEE International Pacific-Rim Symposium on Dependable Computing (PRDC-2007),  Melbourne (Australie), Dec. 2007. https://hal.archives-ouvertes.fr/hal-00851766
  • M. Kaâniche, E. Alata, V. Nicomette, Y. Deswarte, M. Dacier, “Empirical analysis and statistical modeling of attack processes based on honeypots”, Supplemental volume of the 2006 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2006),  Workshop on Empirical Evaluation of Dependability and Security (WEEDS), (Philadelphia, USA), 25-28 June 2006, pp.119-124. https://hal.archives-ouvertes.fr/hal-00140367
    Abstract PDF
     
  • E. Alata, V. Nicomette,M. Kaâniche, M. Dacier, M. Herrb, “Lessons Learned from the Deployment of a High-Interaction Honeypot”, 6th European Dependable Computing Conference (EDCC-6), (Coimbra,  Portugal), 2006, pp. 39-44. https://hal.archives-ouvertes.fr/hal-00140355
    Abstract PDF © IEEE
     
  • C. Simache, M. Kaâniche,“Availability assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx logfiles : a case study” in 2005 IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'2005), (Changsha, China), pp.49-56, December 2005. https://hal.archives-ouvertes.fr/hal-00140364
    Abstract PDF © IEEE
     
  • E. Alata, M. Dacier, Y. Deswarte, M. Kaâniche, K. Kortchinsky, V. Nicomette, V.H. Pham, F. Pouget, “Collection and Analysis of Attack data based on Honeypots deployed on the Internet” in 1st Workshop on Quality of Protection (QoP),  (Milano, Italy), 2005.
  • M. Martinello, M. Kaâniche, K. Kanoun, “Web Service Availability: Impact of Error Recovery and Traffic Model” in Reliability Engineering and System Safety, Elsevier, 89(1), 2005, pp. 6-16. https://www.sciencedirect.com/science/article/pii/S0951832004001723

  • M. Kaâniche, K. Kanoun, M. Rabah “Multi-level modeling approach for the availability assessment of e-business applications", in Software: Practice and Experience, John Wiley & Sons, Ltd, Vol.33, N°14, pp.1323-1341, 2003. https://hal.archives-ouvertes.fr/hal-00755223

  • M. Kaâniche, K. Kanoun, M. Martinello,“User-Perceived Availability of a web-based Travel Agency” in IEEE International Conference on Dependable Systems and Networks (DSN-2003), Performance and Dependability Symposium, (San Francisco, USA), 2003, pp. 709-718.
    Abstract PDF © IEEE

  • M. Kaâniche, Y. Leguedart, J. Arlat, T. Boyer, “An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models”, Safety Science, Elsevier. Issue 5, Vol.42, pp.385-403, Juin 2004. https://www.sciencedirect.com/science/article/pii/S092575350300078X
    Abstract PDF

  • C. Simache, M. Kaâniche,“Event Log based Windows NT and 2K Systems” in 2002 IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'2002), (Rsukuba, Japan), pp.311-15, 2002. 
    Abstract PDF © IEEE

  • M. Kaâniche, J.-C. Laprie, J.-P.Blanquart, “A Framework for Dependability Engineering of Critical Computing Systems”, Safety Science, Elsevier. Issue 9, vol. 40, 2002, pp. 731-52. https://www.sciencedirect.com/science/article/pii/S0925753501000832
    Abstract PDF

  • C. Simache, M. Kaâniche,“Measurement-based Availability Analysis of Unix Systems in a Distributed Environment” in 12th IEEE International Symposium on Software Reliability Engineering (ISSRE'2001), Hong-Kong, pp.346-55, 2001. https://hal.archives-ouvertes.fr/hal-00852425
    Abstract PDF © IEEE

  • R. Ortalo, Y. Deswarte, M. Kaâniche “Experimenting with Quantitative Evaluation Tools for Monitoring Opertaional Security”, IEEE Transactions on Software Engineering, 25(5), pp.633-50, 1999.
    Abstract PDF © IEEE

  • N. Fota, M. Kaâniche, K. Kanoun “Dependability Evaluation of an Air-Traffic Control Computing System”, IEEE International Computer Performance and Dependability Symposium, 1998. IPDS '98, (Raleigh, NC, USA) pp.206-215. Published in. Performance Evaluation, Elsvier, 35(3-4), pp.253-73, 1999. https://hal.archives-ouvertes.fr/hal-00762602
    Abstract PDF © IEEE

  • Y. Deswarte, M. Kaâniche, P. Corneillie, J. Goodson, “SQUALE Dependability Assessment Criteria”, 18th International Conference on Computer Safety, Reliability and Security (SAFECOMP'99), (Toulouse, France), Lecture Notes on Computer Science 1698, Springer-Verlag,  pp.27-38, 1999.
    Abstract Available from Springer Link

  • M. Kaaniche, L. Romano, Z.Kalbarczyck, R. Iyer, R. Karcich, “A Hierarchical Approach for Dependability Analysis of a Cache-based RAID Storage Architecture”,  28th IEEE International Symposium on Fault-Tolerant Computing (FTCS'28), (Münich, Germany), pp.6-15, 1998. https://hal.archives-ouvertes.fr/hal-00140480
    Abstract PDF © IEEE

  • K. Kanoun, M. Kaâniche, J-C. Laprie, “Qualitative and Quantitative Reliability Assessment”,  IEEE Software, 13 (2), pp.77-86, 1997.
    Abstract PDF © IEEE

  • M. Kaâniche, K. Kanoun, “Reliability of a  Commercial Telecommunications systems”,  7th IEEE International International Symposium on Software Reliability Engineering (ISSRE'96), (New York, USA), pp.207-12, 1996. 
    Abstract PDF © IEEE

  • J-C. Laprie, M. Kaâniche, K. Kanoun, “Modeling Computer Systems Evolutions; Non-stationary Processes and Stochastic Petri Nets—Application to Dependability Growth”,  6th IEEE International Workshop on Petri Nets and Performance Models (PNPM'95), (Durham, NC, USA), pp.221-30, 1995. 
    Abstract PDF © IEEE

  • K. Kanoun, M. Kaâniche, C. Beounes, J-C. Laprie, J. Arlat “Reliability Growth of Fault-Tolerant Software”,  IEEE Transactions on Reliability, Special Issue on Fault-Tolerant Software, 42 (2), pp.205-19, 1993.
    Abstract PDF © IEEE

  • J-C. Laprie, K. Kanoun, C. Beounes, M. Kaâniche, “The KAT (Knowledge-Action-Transformation) Approach to the Modeling and Evaluation of Reliability and Availability Growth”,  IEEE Transactions on Software Engineering, Special Issue on Fault-Tolerant Software, 17 (4), pp.370-82, 1991.
    Abstract PDF © IEEE


These-HDR

  • Thèse: "Evaluation de la sûreté de fonctionnement informatique. Fautes physiques, fautes de conception, malveillances", Thèse de Doctorat (PhD), Institut National Polytechnique, Toulouse, 13 Janvier 1992, N°519, 189p
    Abstract PDF
     
  • HDR: "Evaluation de la sûreté de fonctionnement informatique. Fautes physiques, fautes de conception, malveillances", Habilitation à Diriger les Recherches, Institut National Polytechnique, Toulouse, 12 février 1999, N°129
    Abstract PDF