Skip to main content

Showing 1–7 of 7 results for author: Debar, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.10139  [pdf

    cs.CR

    White paper on cybersecurity in the healthcare sector. The HEIR solution

    Authors: Konstantinos Lampropoulos, Apostolis Zarras, Eftychia Lakka, Polyanthi Barmpaki, Kostas Drakonakis, Manos Athanatos, Herve Debar, Andreas Alexopoulos, Aristeidis Sotiropoulos, George Tsakirakis, Nikos Dimakopoulos, Dimitris Tsolovos, Matthias Pocs, Michalis Smyrlis, Ioannis Basdekis, Georgios Spanoudakis, Ovidiu Mihaila, Bogdan Prelipcean, Eliot Salant, Sotiris Athanassopoulos, Petros Papachristou, Ioannis Ladakis, John Chang, Evangelos Floros, Konstantinos Smyrlis , et al. (7 additional authors not shown)

    Abstract: The healthcare sector is increasingly vulnerable to cyberattacks due to its growing digitalization. Patient data, including medical records and financial information, are at risk, potentially leading to identity theft and patient safety concerns. The European Union and other organizations identify key areas for healthcare system improvement, yet the industry still grapples with inadequate security… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

    Comments: 70 pages, 48 figures

  2. arXiv:2111.08510  [pdf, other

    cs.CL cs.AI cs.LG

    CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its Description

    Authors: Mustafizur Shahid, Hervé Debar

    Abstract: When a new computer security vulnerability is publicly disclosed, only a textual description of it is available. Cybersecurity experts later provide an analysis of the severity of the vulnerability using the Common Vulnerability Scoring System (CVSS). Specifically, the different characteristics of the vulnerability are summarized into a vector (consisting of a set of metrics), from which a severit… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

    Comments: 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA), Dec 2021, Pasadena, United States

  3. arXiv:1912.11831  [pdf, other

    cs.CR cs.LG cs.NE eess.SP

    Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders

    Authors: Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar

    Abstract: Nowadays, IoT devices have been widely deployed for enabling various smart services, such as, smart home or e-healthcare. However, security remains as one of the paramount concern as many IoT devices are vulnerable. Moreover, IoT malware are constantly evolving and getting more sophisticated. IoT devices are intended to perform very specific tasks, so their networking behavior is expected to be re… ▽ More

    Submitted 26 December, 2019; originally announced December 2019.

    Journal ref: 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA), Sep 2019, Cambridge, United States. pp.1-5

  4. An n-sided polygonal model to calculate the impact of cyber security events

    Authors: Gustavo Gonzalez-Granadillo, Joaquin Garcia-Alfaro, Hervé Debar

    Abstract: This paper presents a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) in a polygonal systems of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP addresses, communication protocols, physical and logical resources, etc.). Every axis is composed of entities that contribute to the execution of the… ▽ More

    Submitted 16 November, 2017; originally announced November 2017.

    Comments: 16 pages, 5 figures, 2 tables, 11th International Conference on Risks and Security of Internet and Systems, (CRiSIS 2016), Roscoff, France, September 2016

  5. Combining Technical and Financial Impacts for Countermeasure Selection

    Authors: Gustavo Gonzalez-Granadillo, Christophe Ponchel, Gregory Blanc, Hervé Debar

    Abstract: Research in information security has generally focused on providing a comprehensive interpretation of threats, vulnerabilities, and attacks, in particular to evaluate their danger and prioritize responses accordingly. Most of the current approaches propose advanced techniques to detect intrusions and complex attacks but few of these approaches propose well defined methodologies to react against a… ▽ More

    Submitted 16 October, 2014; originally announced November 2014.

    Comments: In Proceedings AIDP 2014, arXiv:1410.3226

    Journal ref: EPTCS 165, 2014, pp. 1-14

  6. arXiv:0902.0469  [pdf, other

    cs.CR

    Formalization of malware through process calculi

    Authors: Gregoire Jacob, Eric Filiol, Herve Debar

    Abstract: Since the seminal work from F. Cohen in the eighties, abstract virology has seen the apparition of successive viral models, all based on Turing-equivalent formalisms. But considering recent malware such as rootkits or k-ary codes, these viral models only partially cover these evolved threats. The problem is that Turing-equivalent models do not support interactive computations. New models have th… ▽ More

    Submitted 20 April, 2009; v1 submitted 3 February, 2009; originally announced February 2009.

    Comments: Corrected version from CSF reviews Shorter version submitted to ESORICS

  7. arXiv:0902.0322  [pdf, other

    cs.CR

    Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions

    Authors: Gregoire Jacob, Herve Debar, Eric Filiol

    Abstract: Most behavioral detectors of malware remain specific to a given language and platform, mostly PE executables for Windows. The objective of this paper is to define a generic approach for behavioral detection based on two layers respectively responsible for abstraction and detection. The first abstraction layer remains specific to a platform and a language. This first layer interprets the collecte… ▽ More

    Submitted 2 February, 2009; originally announced February 2009.