Skip to main content

Showing 1–5 of 5 results for author: Roudier, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:1410.4305  [pdf, other

    cs.CR cs.SE eess.SY

    Model the System from Adversary Viewpoint: Threats Identification and Modeling

    Authors: Muhammad Sabir Idrees, Yves Roudier, Ludovic Apvrille

    Abstract: Security attacks are hard to understand, often expressed with unfriendly and limited details, making it difficult for security experts and for security analysts to create intelligible security specifications. For instance, to explain Why (attack objective), What (i.e., system assets, goals, etc.), and How (attack method), adversary achieved his attack goals. We introduce in this paper a security a… ▽ More

    Submitted 16 October, 2014; originally announced October 2014.

    Comments: In Proceedings AIDP 2014, arXiv:1410.3226

    Journal ref: EPTCS 165, 2014, pp. 45-58

  2. On User Availability Prediction and Network Applications

    Authors: Matteo Dell'Amico, Maurizio Filippone, Pietro Michiardi, Yves Roudier

    Abstract: User connectivity patterns in network applications are known to be heterogeneous, and to follow periodic (daily and weekly) patterns. In many cases, the regularity and the correlation of those patterns is problematic: for network applications, many connected users create peaks of demand; in contrast, in peer-to-peer scenarios, having few users online results in a scarcity of available resources. O… ▽ More

    Submitted 30 April, 2014; originally announced April 2014.

    Comments: Accepted for publication in IEEE/ACM Transactions on Networking

  3. Towards the Model-Driven Engineering of Secure yet Safe Embedded Systems

    Authors: Ludovic Apvrille, Yves Roudier

    Abstract: We introduce SysML-Sec, a SysML-based Model-Driven Engineering environment aimed at fostering the collaboration between system designers and security experts at all methodological stages of the development of an embedded system. A central issue in the design of an embedded system is the definition of the hardware/software partitioning of the architecture of the system, which should take place as e… ▽ More

    Submitted 7 April, 2014; originally announced April 2014.

    Comments: In Proceedings GraMSec 2014, arXiv:1404.1634

    Journal ref: EPTCS 148, 2014, pp. 15-30

  4. arXiv:1010.0626  [pdf, other

    cs.NI

    Back To The Future: On Predicting User Uptime

    Authors: Matteo Dell'Amico, Pietro Michiardi, Yves Roudier

    Abstract: Correlation in user connectivity patterns is generally considered a problem for system designers, since it results in peaks of demand and also in the scarcity of resources for peer-to-peer applications. The other side of the coin is that these connectivity patterns are often predictable and that, to some extent, they can be dealt with proactively. In this work, we build predictors aiming to dete… ▽ More

    Submitted 4 October, 2010; originally announced October 2010.

  5. arXiv:0907.3402  [pdf, ps, other

    cs.CR

    Measuring Password Strength: An Empirical Analysis

    Authors: Matteo Dell'Amico, Pietro Michiardi, Yves Roudier

    Abstract: We present an in-depth analysis on the strength of the almost 10,000 passwords from users of an instant messaging server in Italy. We estimate the strength of those passwords, and compare the effectiveness of state-of-the-art attack methods such as dictionaries and Markov chain-based techniques. We show that the strength of passwords chosen by users varies enormously, and that the cost of atta… ▽ More

    Submitted 20 July, 2009; originally announced July 2009.

    Comments: 15 pages, 9 figures