19 results on '"Simon Bouget"'
Search Results
2. Key Update for the IoT Security Standard OSCORE.
- Author
-
Rikard Höglund, Marco Tiloca, Simon Bouget, and Shahid Raza
- Published
- 2023
- Full Text
- View/download PDF
3. Establishing End-to-End Secure Channel for IoT Devices through an Untrusted C-ITS Network.
- Author
-
Simon Bouget, Shahid Raza, and Martin Furuhed
- Published
- 2021
- Full Text
- View/download PDF
4. Distance-Bounding, Privacy-Preserving Attribute-Based Credentials.
- Author
-
Daniel Bosk, Simon Bouget, and Sonja Buchegger
- Published
- 2020
- Full Text
- View/download PDF
5. Pleiades: Distributed Structural Invariants at Scale.
- Author
-
Simon Bouget, Yérom-David Bromberg, Adrien Luxey, and François Taïani
- Published
- 2018
- Full Text
- View/download PDF
6. Mind the Gap: Autonomous Detection of Partitioned MANET Systems using Opportunistic Aggregation.
- Author
-
Simon Bouget, Yérom-David Bromberg, Hugues Mercier, Etienne Rivière, and François Taïani
- Published
- 2018
- Full Text
- View/download PDF
7. Security and trust preserving inter- and intra-cloud VM migrations.
- Author
-
Mudassar Aslam, Simon Bouget, and Shahid Raza
- Published
- 2021
- Full Text
- View/download PDF
8. Scalable Anti-KNN: Decentralized Computation of k-Furthest-Neighbor Graphs with HyFN.
- Author
-
Simon Bouget, Yérom-David Bromberg, François Taïani, and Anthony Ventresque
- Published
- 2017
- Full Text
- View/download PDF
9. Position paper: Toward an holistic approach of Systems of Systems.
- Author
-
Simon Bouget
- Published
- 2016
- Full Text
- View/download PDF
10. Strength in Numbers: Robust Tamper Detection in Crowd Computations.
- Author
-
Bimal Viswanath, Muhammad Ahmad Bashir, Muhammad Bilal Zafar, Simon Bouget, Saikat Guha 0002, Krishna P. Gummadi, Aniket Kate, and Alan Mislove
- Published
- 2015
- Full Text
- View/download PDF
11. Polystyrene: the Decentralized Data Shape That Never Dies.
- Author
-
Simon Bouget, Hoel Kervadec, Anne-Marie Kermarrec, and François Taïani
- Published
- 2014
- Full Text
- View/download PDF
12. Establishing End-to-End Secure Channel for IoT Devices through an Untrusted C-ITS Network
- Author
-
Shahid Raza, Martin Furuhed, and Simon Bouget
- Subjects
End-to-end principle ,business.industry ,Computer science ,Internet of Things ,business ,Secure channel ,Computer network - Published
- 2021
- Full Text
- View/download PDF
13. Security and trust preserving inter‐ and intra‐cloud VM migrations
- Author
-
Mudassar Aslam, Shahid Raza, and Simon Bouget
- Subjects
Focus (computing) ,Computer Networks and Communications ,Computer science ,business.industry ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,computer.software_genre ,Computer security ,Computer Science Applications ,Domain (software engineering) ,Trustworthiness ,Cloud provider ,Virtual machine ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,computer - Abstract
This paper focus on providing a secure and trustworthy solution for virtual machine (VM) migration within an existing cloud provider domain, and/or to the other federating cloud providers. The infr ...
- Published
- 2020
- Full Text
- View/download PDF
14. Distance-Bounding, Privacy-Preserving Attribute-Based Credentials
- Author
-
Sonja Buchegger, Daniel Bosk, and Simon Bouget
- Subjects
Privacy preserving ,Identification (information) ,Computer science ,Bounding overwatch ,ComputingMilieux_COMPUTERSANDSOCIETY ,Distance fraud ,Gas meter prover ,Computer security ,computer.software_genre ,Mathematical proof ,Protocol (object-oriented programming) ,computer - Abstract
Distance-bounding anonymous credentials could be used for any location proofs that do not need to identify the prover and thus could make even notoriously invasive mechanisms such as location-based services privacy-preserving. There is, however, no secure distance-bounding protocol for general attribute-based anonymous credentials. Brands and Chaum’s (EUROCRYPT’93) protocol combining distance-bounding and Schnorr identification comes close, but does not fulfill the requirements of modern distance-bounding protocols. For that, we need a secure distance-bounding zero-knowledge proof-of-knowledge resisting mafia fraud, distance fraud, distance hijacking and terrorist fraud.
- Published
- 2020
- Full Text
- View/download PDF
15. Mind the Gap: Détection autonome de systèmes MANET partitionnés à l'aide d’agrégations opportunistes
- Author
-
Simon Bouget, Yerom-David Bromberg, Hugues Mercier, Riviere, Etienne, Francois Taiani, 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), the World Is Distributed Exploring the tension between scale and coordination (WIDE), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), Université de Neuchâtel (UNINE), Université Catholique de Louvain = Catholic University of Louvain (UCL), ANR-16-CE23-0016,PAMELA,Apprentissage automatique décentralisé et personnalisé sous contraintes(2016), Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-CentraleSupélec-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), and UCL - SST/ICTM/INGI - Pôle en ingénierie informatique
- Subjects
Computer science ,business.industry ,Network packet ,Distributed computing ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,020206 networking & telecommunications ,02 engineering and technology ,Mobile ad hoc network ,Partition (database) ,[INFO.INFO-MC]Computer Science [cs]/Mobile Computing ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,False positive paradox ,Wireless ,[INFO]Computer Science [cs] ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,business ,Wireless sensor network ,Limited resources ,Loss rate - Abstract
International audience; Mobile Ad-hoc Networks (MANETs) use limited-range wireless communications and are thus exposed to partitions when nodes fail or move out of reach of each other. Detecting partitions in MANETs is unfortunately a nontrivial task due to their inherently decentralized design and limited resources such as power or bandwidth. In this paper, we propose a novel and fully decentralized approach to detect partitions (and other large membership changes) in MANETs that is both accurate and resource efficient. We monitor the current composition of a MANET using the lightweight aggregation of compact membership-encoding filters. Changes in these filters allow us to infer the likelihood of a partition with a quantifiable level of confidence. We first present an analysis of our approach, and show that it can detect close to 100% of partitions under realistic settings, while at the same time being robust to false positives due to churn or dropped packets. We perform a series of simulations that compare against alternative approaches and confirm our theoretical results, including above 90% accurate detection even under a 40% message loss rate.
- Published
- 2018
- Full Text
- View/download PDF
16. Pleiades: Distributed Structural Invariants at Scale
- Author
-
François Taïani, Simon Bouget, Adrien Luxey, Yérom-David Bromberg, the World Is Distributed Exploring the tension between scale and coordination (WIDE), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), ANR-13-INFR-0003,SocioPlug,Cloud social sur des réseaux de plugs, pour un accès à l'information symétrique et respectueux de la vie privée(2013), Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-CentraleSupélec-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), and Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1)
- Subjects
Structure (mathematical logic) ,Computer science ,Node (networking) ,Distributed computing ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,Construct (python library) ,Overlay ,Design strategy ,Maintenance engineering ,Asynchronous communication ,0202 electrical engineering, electronic engineering, information engineering ,[INFO]Computer Science [cs] ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,Resilience (network) - Abstract
International audience; Modern large scale distributed systems increasingly espouse sophisticated distributed architectures characterized by complex distributed structural invariants. Unfortunately, maintaining these structural invariants at scale is time consuming and error prone, as developers must take into account asynchronous failures, loosely coordinated subsystems and network delays.To address this problem, we propose PLEIADES, a new framework to construct and enforce large-scale distributed structural invariants under aggressive conditions. PLEIADES combines the resilience of self-organizing overlays, with the expressiveness of an assembly-based design strategy. The result is a highly survivable framework that is able to dynamically maintain arbitrary complex distributed structures under aggressive crash failures. Our evaluation shows in particular that PLEIADES is able to restore the overall structure of a 25,600 node system in less than 11 asynchronous rounds after half of the nodes have crashed.
- Published
- 2018
- Full Text
- View/download PDF
17. Mind the Gap: Autonomous Detection of Partitioned MANET Systems using Opportunistic Aggregation
- Author
-
UCL - SST/ICTM/INGI - Pôle en ingénierie informatique, Simon Bouget, Yerom-David Bromberg, Hugues Mercier, Riviere, Etienne, Francois Taiani, 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), UCL - SST/ICTM/INGI - Pôle en ingénierie informatique, Simon Bouget, Yerom-David Bromberg, Hugues Mercier, Riviere, Etienne, Francois Taiani, and 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)
- Abstract
Mobile Ad-hoc Networks (MANETs) use limited- range wireless communications and are thus exposed to partitions when nodes fail or move out of reach of each other. Detecting partitions in MANETs is unfortunately a nontrivial task due to their inherently decentralized design and limited resources such as power or bandwidth. In this paper, we propose a novel and fully decentralized approach to detect partitions (and other large membership changes) in MANETs that is both accurate and resource efficient. We monitor the current composition of a MANET using the lightweight aggregation of compact membership-encoding filters. Changes in these filters allow us to infer the likelihood of a partition with a quantifiable level of confidence. We first present an analysis of our approach, and show that it can detect close to 100% of partitions under realistic settings, while at the same time being robust to false positives due to churn or dropped packets. We perform a series of simulations that compare against alternative approaches and confirm our theoretical results, including above 90% accurate detection even under a 40% message loss rate.
- Published
- 2018
18. Strength in Numbers
- Author
-
Krishna P. Gummadi, Alan Mislove, Muhammad Bilal Zafar, Simon Bouget, Saikat Guha, Aniket Kate, Muhammad Ahmad Bashir, and Bimal Viswanath
- Subjects
Focus (computing) ,Computer science ,Computation ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Rank (computer programming) ,Sybil attack ,Key (cryptography) ,Evasion (network security) ,Timestamp ,Crowd computing ,Computer security ,computer.software_genre ,computer - Abstract
Popular social and e-commerce sites increasingly rely on crowd computing to rate and rank content, users, products and businesses. Today, attackers who create fake (Sybil) identities can easily tamper with these computations. Existing defenses that largely focus on detecting individual Sybil identities have a fundamental limitation: Adaptive attackers can create hard-to-detect Sybil identities to tamper arbitrary crowd computations. In this paper, we propose Stamper, an approach for detecting tampered crowd computations that significantly raises the bar for evasion by adaptive attackers. Stamper design is based on two key insights: First, Sybil attack detection gains strength in numbers: we propose statistical analysis techniques that can determine if a large crowd computation has been tampered by Sybils, even when it is fundamentally hard to infer which of the participating identities are Sybil. Second, Sybil identities cannot forge the timestamps of their activities as they are recorded by system operators; Stamper analyzes these unforgeable timestamps to foil adaptive attackers. We applied Stamper to detect tampered computations in Yelp and Twitter. We not only detected previously known tampered computations with high accuracy, but also uncovered tens of thousands of previously unknown tampered computations in these systems.
- Published
- 2015
- Full Text
- View/download PDF
19. Polystyrene: the Decentralized Data Shape That Never Dies
- Author
-
Hoel Kervadec, Simon Bouget, Anne-Marie Kermarrec, François Taïani, École normale supérieure - Cachan, antenne de Bretagne (ENS Cachan Bretagne), École normale supérieure - Cachan (ENS Cachan), As Scalable As Possible: foundations of large scale dynamic distributed systems (ASAP), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA), ANR-10-LABX-0007,COMIN Labs,Digital Communication and Information Sciences for the Future Internet(2010), SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria), and Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)
- Subjects
business.industry ,Computer science ,Logical topology ,Survivability ,020206 networking & telecommunications ,Torus ,Extension topology ,Topology (electrical circuits) ,02 engineering and technology ,Network topology ,Decentralized computing ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Hypercube ,Routing (electronic design automation) ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,business ,Computer network - Abstract
International audience; Decentralized topology construction protocols organize nodes along a predefined topology (e.g. a torus, ring, or hypercube). Such topologies have been used in many contexts ranging from routing and storage systems, to publish-subscribe and event dissemination. Since most topologies assume no correlation between the physical location of nodes and their positions in the topology, they do not handle catastrophic failures well, in which a whole region of the topology disappears. When this occurs, the overall shape of the system typically gets lost. This is highly problematic in applications in which overlay nodes are used to map a virtual data space, be it for routing, indexing or storage. In this paper, we propose a novel decentralized approach that maintains the initial shape of the topology even if a large (consecutive) portion of the topology fails. Our approach relies on the dynamic decoupling between physical nodes and virtual ones enabling a fast reshaping. For instance, our results show that a 51,200-node torus converges back to a full torus in only 10 rounds after 50% of the nodes have crashed. Our protocol is both simple and flexible and provides a novel form of collective survivability that goes beyond the current state of the art.
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.