EURECOM

Displaying 81-116 of 116 results

  • White Papers // Apr 2011

    Smart Hybrid-ARQ (SHARQ) for Cooperative Communication Via Distributed Relays in LTE-Advanced

    The work described in this paper proposes two Smart Hybrid-Automatic Repeat ReQuest (SHARQ) schemes with incremental redundancy, that are developed for a dual-hop network of two relays implementing cooperative communication. In a dual-hop network consisting of multiple relays, one of the most challenging tasks is to determine an appropriate trade-off...

    Provided By EURECOM

  • White Papers // Feb 2011

    Interference Sensitivity for Multi-User MIMO in LTE

    A recent idea of exploiting the promised gains of multi-user MIMO for future cellular standards as LTE by intelligent interference aware receivers instead of suboptimal single-user receivers is quite promising. However this detection strategy is based on the exploitation of the structure of interference which necessitates the knowledge of the...

    Provided By EURECOM

  • White Papers // Feb 2011

    The Multiplexing Gain of a Two-Cell MIMO Channel With Unequal CSI

    In this paper, the joint precoding across two distant transmitters (TXs) to two receivers (RXs), each equipped with one antenna is discussed. The authors consider a distributed Channel State Information (CSI) configuration where each TX has a separate local estimate of the channel. The authors assume that no communication is...

    Provided By EURECOM

  • White Papers // Feb 2011

    Mixed CSIT DL Channel: Gains with Interference Aware Receivers

    The Broadcast Channels (BC), a single transmitter transmitting data to multiple receivers, has been widely studied in literature mostly with and sometimes without the availability of Channel State Information at the Transmitter (CSIT). The authors study a very practical version of the BC where the transmitter has CSIT of some...

    Provided By EURECOM

  • White Papers // Feb 2011

    Deterministic Equivalent for the SINR of Regularized Zero-Forcing Precoding in Correlated MISO Broadcast Channels With Imperfect CSIT

    This paper considers the MISO broadcast channel with different spatial correlations of the user vector channels. The base station implements Regularized Zero-Forcing (RZF) precoding based on an imperfect channel estimation. The authors derive a deterministic equivalent of the Signal-to-Interference plus Noise Ratio (SINR) by applying novel results from the field...

    Provided By EURECOM

  • White Papers // Jan 2011

    Asymptotic Analysis of Regularized Zero-Forcing Precoding in MISO Broadcast Channels With Limited Feedback

    In this paper, the authors analyze the asymptotic sum-rate of Regularized Zero-Forcing (RZF) precoding in MISO broadcast channels with limited feedback, transmit correlation and path-loss. Their analysis assumes that the ratio of the number of transmit antennas M to the number of users K is bounded as (K;M) grow large....

    Provided By EURECOM

  • White Papers // Jan 2011

    Spatial Transmit Prefiltering for Frequency-Flat MIMO Transmission With Mean and Covariance Information

    In this paper techniques are proposed for combining information about the mean and the covariance of the channel for the purpose of MIMO transmission. (Partial) Channel State Information at the Transmitter (CSIT) is typically used in MIMO systems for the design of spatial prefiltering and waterfilling. For the purpose of...

    Provided By EURECOM

  • White Papers // Dec 2010

    Hardware Optimized Sample Rate Conversion for Software Defined Radio

    The evolution towards applications with increasing functionalities leads to the need of high flexible systems that support a high number of different standards while decreasing the required hardware space. Therefore, a high configurable platform being able to handle a multitude of standards is needed. One main issue is the tradeoff...

    Provided By EURECOM

  • White Papers // Nov 2010

    Low-Complexity Multiple-Relay Strategies for Improving Uplink Coverage in 4G Wireless Networks

    In this paper the authors present low-complexity coded-modulation strategies for distributed relaying in 4G wireless networks. The primary goal of these strategies is to improve coverage on the uplink while retaining high spectral efficiency through multiuser spatial-multiplexing using two or more relays between the users and the base station. They...

    Provided By EURECOM

  • White Papers // Nov 2010

    Linear Precoders for Multiuser MIMO for Finite Constellations and a Simplified Receiver Structure Under Controlled Interference

    This paper is an extension to the earlier proposed idea of exploiting the discrete constellation alphabets in linear precoding for the downlink of MultiUser (MU) MIMO. In the earlier work, it was shown that the transmission of controlled interference to the users bears the potential of exploiting the interference structure...

    Provided By EURECOM

  • White Papers // Nov 2010

    Beamforming on the MISO Interference Channel With Multi-User Decoding Capability

    This paper considers the Multiple-Input-Single-Output Interference Channel (MISO-IC) in which transmitters and receivers share the same time and frequency resources. The authors consider receivers with Interference Decoding Capability (IDC) so that the interference signal can be decoded and subtracted from the received signal. On the MISO-IC with single user decoding,...

    Provided By EURECOM

  • White Papers // Nov 2010

    Bag of Soft Biometrics for Person Identification New Trends and Challenges

    In this paper, the authors seek to provide insight on the general topic of soft biometrics. They firstly present a new refined definition of soft biometrics, emphasizing on the aspect of human compliance, and then proceed to identify candidate traits that accept this novel definition. They, then address relations between...

    Provided By EURECOM

  • White Papers // Oct 2010

    Comparison Between Viterbi Detectors for Magnetic Recording Channels, Based on Regressive and Autoregressive Noise Models

    A recent work presents a regressive noise model for the data-dependent correlated noise, at the output of a magnetic recording channel detector. This paper generalizes this channel model, considering digital equalization and a more efficient correlation matrix, in order to make a comparison with the usual detector in a more...

    Provided By EURECOM

  • White Papers // Sep 2010

    Space-Time Codes That Are Approximately Universal for the Parallel, Multi-Block and Cooperative DDF Channels

    Explicit codes are constructed that achieve the diversity-multiplexing gain tradeoff (DMT) of the cooperativerelay channel under the dynamic decode-and-forward protocol for any network size and for all numbers of transmit and receive antennas at the relays. Along the way, the authors prove that spacetime codes previously constructed in the literature...

    Provided By EURECOM

  • White Papers // Sep 2010

    A Scalable Interest-Oriented Peer-to-Peer Pub/Sub Network

    There has been a big challenge in structured peer-to-peer overlay network research area. Generally, a structured overlay network involves nodes evenly or based on their resource availabilities, and gathers nodes' resources to achieve some bigger tasks. The challenge here is to gather resources based on nodes' interests, and only interested...

    Provided By EURECOM

  • White Papers // Sep 2010

    Beamforming for the Underlay Cognitive MISO Interference Channel Via UL-DL Duality

    SINR duality is shown in a Multi-Input Single-Output (MISO) DownLink (DL) InterFerence Channel (IFC) and its UpLink (UL) Single-Input Multi-Output (SIMO) dual with linear Transmit (Tx) BeamFormers (BF). While UL-DL duality under the sum power constraint is well-established between the Broadcast Channel (BC) for the SINR balancing (max min SINR)...

    Provided By EURECOM

  • White Papers // Sep 2010

    Distribution Discontinuities Detection Using Algebraic Technique for Spectrum Sensing in Cognitive Radio

    In this paper, the authors propose a new Spectrum Sensing technique for spectrum distribution discontinuities detection using Algebraic Detection (AD). The presented mathematical background leading to such technique is based on operational calculus and differential algebra which offers a new stand point in sensing theory. Even if this background is...

    Provided By EURECOM

  • White Papers // Sep 2010

    Error Exponents for Backhaul-Constrained Parallel Relay Networks

    In this paper, the authors assess the random coding Error Exponents (EEs) corresponding to Decode-and-Forward (DF), Compress-and-Forward (CF) and Quantize-and-Forward (QF) relaying strategies for a Parallel Relay Network (PRN), consisting of a single source and two relays. Moreover, through numerical analysis they show that the EEs achieved by using QF...

    Provided By EURECOM

  • White Papers // Jun 2010

    Making Multiuser MIMO Work for LTE

    Underlining the viability of Multi-User (MU) MIMO for future wireless communications as Long Term Evolution (LTE), the authors propose in this paper a pre-coding strategy based on the low resolution LTE pre-coders which necessitates 2 bits feedback from the User Equipment (UE). The proposed strategy encompasses geometrical interference alignment at...

    Provided By EURECOM

  • White Papers // Jun 2010

    Online Data Backup: A Peer-Assisted Approach

    In this paper, the authors study the benefits of a peer-assisted approach to online backup applications, in which spare bandwidth and storage space of end-hosts complement that of an online storage service. Via simulations, they analyze the interplay between two key aspects of such applications: data placement and bandwidth allocation....

    Provided By EURECOM

  • White Papers // May 2010

    Relative Channel Reciprocity Calibration in MIMO/TDD Systems

    Channel State Information at the Transmitter (CSIT) can greatly improve the capacity of a wireless MIMO communication system. In a Time Division Duplex (TDD) system CSIT can be obtained by exploiting the reciprocity of the wireless channel. This however requires calibration of the Radio Frequency (RF) chains of the receiver...

    Provided By EURECOM

  • White Papers // May 2010

    Scheduling and CAC in IEEE 802.16 Fixed BWNs: A Comprehensive Survey and Taxonomy

    IEEE 802.16 technology has emerged as a competitive alternative to wireline broadband access solution. IEEE 802.16 can provide Quality of Service (QoS) guarantees for heterogeneous classes of traffic with different QoS requirements. The standard, however, leaves open the resource management and scheduling issues, which are crucial components to guarantee QoS...

    Provided By EURECOM

  • White Papers // May 2010

    Low Complexity Soft Detection for Spatially Multiplexed BICM MIMO OFDM System

    This paper presents a new approach to soft detection of spatial data streams in Multiple Input Multiple Output (MIMO) channels in slow fading channels. The authors focus on high spectral efficiency Bit Interleaved Coded Modulation (BICM) MIMO OFDM system where, after serial to parallel conversion and per antenna coding, spatial...

    Provided By EURECOM

  • White Papers // May 2010

    Channel Capacity for Linearly Precoded Multiuser MIMO for Discrete Constellations

    This paper is based on the idea of exploiting the discrete constellation alphabets in linear precoding for the downlink of MultiUser (MU) MIMO. The authors study the effect of discrete constellation inputs on the sum rate of different linear pre-coders while confining ourselves to the case of two single antenna...

    Provided By EURECOM

  • White Papers // Apr 2010

    Honeybot, Your Man in the Middle for Automated Social Engineering

    Automated social engineering poses a serious information security threat to human communications on the Internet since the attacks can easily scale to a large number of victims. The authors present a new attack that instruments human conversations for social engineering, or spamming. The detection rate is low, which becomes manifest...

    Provided By EURECOM

  • White Papers // Feb 2010

    Password Strength: An Empirical Analysis

    It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools can drastically reduce the number of attempts needed to guess a password. Quite surprisingly, however, existing literature does not provide a satisfying answer to...

    Provided By EURECOM

  • White Papers // Jan 2010

    Balancing Egoism and Altruism on Interference Channel: The MIMO Case

    This paper considers the so-called Multiple-Input-Multiple-Output interference channel (MIMO-IC) which has relevance in applications such as multi-cell coordination in cellular networks as well as spectrum sharing in cognitive radio networks among others. The authors address the design of precoding (i.e. beamforming) vectors at each sender with the aim of striking...

    Provided By EURECOM

  • White Papers // Jan 2010

    On Full Diversity Equalization for Precoded Block Transmission Systems

    Equalization techniques other than Maximum Likelihood Equalization (MLE) that collect full diversity offered by doubly selective channels are investigated. With appropriate precoding at the transmitter, it is known the both Linear Equalizers (LE) and MLE collect full multiplicative multipath-Doppler diversity available in the channel. The authors close the gap between...

    Provided By EURECOM

  • White Papers // Oct 2009

    Energy Efficiency of SISO Algorithms for Turbo-Decoding Message-Passing LDPC Decoders

    The decoding of LDPC codes using the turbo-decoding message-passing strategy is considered. This strategy can be used with different SISO message computation kernels. The authors analyze the suitability for VLSI implementation of various message computation algorithms in terms of implementation area, energy consumption and error-correcting performance. As one of the...

    Provided By EURECOM

  • White Papers // Sep 2009

    Optimal Linear Precoder for Multiuser MIMO for Discrete Alphabets

    In this paper, the authors study the effect of discrete constellation alphabets on linear pre-coding for the downlink of Multi-User (MU) MIMO. They underline the fundamental difference in the approach of pre-coding if the alphabets are assumed to be discrete constellations rather than the idealized Gaussian assumption. They derive the...

    Provided By EURECOM

  • White Papers // Aug 2009

    Hybrid Pilot/Quantization Based Feedback in Multi-Antenna TDD Systems

    The communication between a multiple-antenna transmitter and multiple receivers (users) with either a single or multiple-antenna each can be significantly enhanced by providing the Channel State Information at the Transmitter (CSIT) of the users, as this allows for scheduling, beamforming and multiuser multiplexing gains. The traditional view on how to...

    Provided By EURECOM

  • White Papers // Jul 2009

    Analysis of User-Driven Peer Selection in Peer-to-Peer Backup and Storage Systems

    In this paper, the authors present a model of peer-to-peer backup and storage systems in which users have the ability to selfishly select remote peers they want to exchange data with. In their work, peer characteristics (e.g., on-line availability and dedicated bandwidth) play an important role and are reflected in...

    Provided By EURECOM

  • White Papers // Jun 2009

    On the Characterization of MU-MIMO Channels

    In this paper, the authors study the divergence of different links in wide-band Multi-User Multiple-Input Multiple-Output (MUMIMO) channels. The divergence is measured on several levels: spatial separation of the user's correlation matrices, co-linearity of the MIMO channel matrices, and correlation of large scale fading. The measurement data has been acquired...

    Provided By EURECOM

  • White Papers // Apr 2009

    Hierarchical Codes: A Flexible Trade-Off for Erasure Codes in Peer-to-Peer Storage Systems

    Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and maintained. The simplest redundancy scheme is replication, which however suffers from storage inefficiency. Another approach is erasure coding, which provides the same level of...

    Provided By EURECOM

  • White Papers // Mar 2009

    A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems

    In distributed storage systems, erasure codes represent an attractive solution to add redundancy to stored data while limiting the storage overhead. They are able to provide the same reliability as replication requiring much less storage space. Erasure coding breaks the data into pieces that are encoded and then stored on...

    Provided By EURECOM

  • White Papers // Mar 2006

    Adaptive Chip Level Equalization for HSDPA

    The authors consider a chip level decision-directed NLMS equalization scheme which targets estimating the total transmitted base station chip sequence in a decision-directed manner and using it as the desired response for equalizer adaptation. For this purpose, they explicitly use only the knowledge of the user-assigned HSPDSCH codes in order...

    Provided By EURECOM

  • White Papers // Feb 2012

    Link Abstraction for Multi-User MIMO in LTE Using Interference-Aware Receiver

    Most of the recent wireless communication systems are interference limited rather than noise limited. In the case of a very strong interferer the conventional assumption of the interference as Gaussian is extremely suboptimal. However, optimal (capacity achieving) receivers utilize some prior knowledge about the interference to reach optimality. The link...

    Provided By EURECOM

  • White Papers // Jan 2012

    Interference Relay Channel in 4G Wireless Networks

    In the next generation cellular systems, such as LTE-A (Release 10 and beyond), Relay Node (RN) deployment has been adopted due to its potentials in enlarging coverage and increasing system throughput, even with primitive relaying functionalities. For example, in LTE-A Release 10 only Type-I (non-transparent) RNs are considered wherein no...

    Provided By EURECOM

  • White Papers // Sep 2013

    ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage

    With the continuous and exponential increase of the number of users and the size of their data, data deduplication becomes more and more a necessity for cloud storage providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. The advantages of...

    Provided By EURECOM

  • White Papers // Jul 2013

    Elastic SIEM: Elastic Detector Integrated With OSSIM

    Cloud computing adoption is rising fast. Flexibility, pay-per-use and available resources on-demand with the promise of lower ownership costs are a very attractive value proposition. On the other hand, Infrastructure as a Service (IaaS) providers, such as Amazon Web Services (AWS), are being asked for flexible cloud offerings while needing...

    Provided By EURECOM

  • White Papers // Jul 2013

    Secure Alert Tracking in Supply Chain

    Risk management practices, techniques and tools with respect to companies' supply chains have begun to receive more attention recently, as the need to improve supply chain performances has increased in order to keep the balance between financial considerations and those of the customer interests. With the multiplication of intermediate actors,...

    Provided By EURECOM

  • White Papers // Sep 2012

    Towards Assisted Remediation of Security Vulnerabilities

    Security vulnerabilities are still prevalent in systems despite the existence of their countermeasures for several decades. In order to detect the security vulnerabilities missed by developers, complex solutions are undertaken like static analysis, often after the development phase and with a loss of context. Although vulnerabilities are found, there is...

    Provided By EURECOM

  • White Papers // Jan 2013

    T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags

    One prominent application of RFID technology is the automation of safety inspections when transporting hazardous goods such as highly reactive chemicals in supply chains. Here, it is dangerous to place specific, reactive chemicals close to each other, because small leaks can already result in a threat to the life of...

    Provided By EURECOM

  • White Papers // Apr 2012

    Robust Data Sharing with Key-Value Stores

    A Key-Value Store (KVS) offers functions for storing and retrieving values associated with unique keys. KVSs have become the most popular way to access Internetscale \"Cloud\" storage systems. The authors present an efficient wait-free algorithm that emulates multi-reader multi-writer storage from a set of potentially faulty KVS replicas in an...

    Provided By EURECOM

  • White Papers // Apr 2012

    Broker-Based Private Matching

    Private matching solutions allow two parties to find common data elements over their own datasets without revealing any additional private information. The authors propose a new concept involving an intermediate entity in the private matching process: they consider the problem of broker-based private matching where end-entities do not interact with...

    Provided By EURECOM

  • White Papers // Apr 2012

    Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates

    The software running on electronic devices is regularly up-dated, these days. A vehicle consists of many such devices, but is operated in a completely different manner than consumer devices. Update operations are safety critical in the automotive domain. Thus, they demand for a very well secured process. The authors propose...

    Provided By EURECOM

  • White Papers // Apr 2012

    Security Vulnerabilities Detection and Protection Using Eclipse

    After a decade of existence, still, Cross-site scripting, SQL Injection and other of Input validation associated security vulnerabilities can cause severe damage once exploited. To analyze this fact, conducted an empirical study, while OWASP and SANS defined their respective risk-based approaches. Taking these results into consideration, three deficiencies can be...

    Provided By EURECOM

  • White Papers // Sep 2012

    Catch the Jammer in Wireless Sensor Network

    Jamming attacks can severely affect the performance of Wireless Sensor Networks (WSNs) due to their broadcast nature. The most reliable solution to reduce the impact of such attacks is to detect and localize the source of the attack. In this paper, the authors investigate the feasibility of localizing an omni-antenna...

    Provided By EURECOM

  • White Papers // Sep 2012

    Data Transfer Scheduling for P2P Storage

    In peer-to-peer storage and backup applications, large amounts of data have to be transferred between nodes. In general, recipient of data transfers are not chosen randomly from the whole set of nodes in the peer-to-peer networks, but they are chosen according to peer selection rules imposing several criteria, such as...

    Provided By EURECOM

  • White Papers // Jul 2011

    An Empirical Study of Availability in Friend-to-Friend Storage Systems

    Friend-to-friend networks, i.e. peer-to-peer networks where data are exchanged and stored solely through nodes owned by trusted users, can guarantee dependability, privacy and uncensorability by exploiting social trust. However, the limitation of storing data only on friends can come to the detriment of data availability: if no friends are online,...

    Provided By EURECOM

  • White Papers // Nov 2012

    HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems

    Expressing security policies to govern distributed systems is a complex and error-prone task. Policies are hard to understand, often expressed with unfriendly syntax, making it difficult for security administrators and for business analysts to create intelligible specifications. The authors introduce the Hierarchical Policy Language for Distributed Systems (HiPoLDS), which has...

    Provided By EURECOM

  • White Papers // Sep 2013

    Towards the Model-Driven Engineering of Security Requirements for Embedded Systems

    This paper discusses why and how security requirements engineering must be adapted to the model-driven approach usually adopted to design and develop embedded systems. In particular, the authors discuss to what extent the elicitation of security requirements and the Y-chart partitioning approach, a central design methodology in embedded systems, can...

    Provided By EURECOM

  • White Papers // Sep 2013

    Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting

    Fingerprinting 802.11 devices has been proposed to identify devices in order to mitigate IEEE 802.11 weaknesses. However, important limitations prevent any real deployment. On the first hand, fingerprinting has a low accuracy when the devices have similar hardware and software. On the second hand, attackers may forge signatures to impersonate...

    Provided By EURECOM

  • White Papers // Mar 2013

    A P2P Based Usage Control Enforcement Scheme Resilient to Re-injection Attacks

    Existing privacy controls based on access control techniques do not prevent massive dissemination of private data by malevolent acquaintances of social network, unauthorized duplication of files or personal messages, or persistence of some files in third-party operated storage beyond their deletion by their owners. The authors suggest a usage control...

    Provided By EURECOM

  • White Papers // Jun 2013

    The Role of Phone Numbers in Understanding Cyber-Crime Schemes

    Internet and telephones are part of everyone's modern life. Unfortunately, several criminal activities also rely on these technologies to reach their victims. While the use and importance of the Internet has been largely studied, previous work overlooked the role that phone numbers can play in understanding online threats. In this...

    Provided By EURECOM

  • White Papers // Jul 2012

    A Measurement Study of the Wuala On-line Storage Service

    Wuala is a popular online backup and file sharing system that has been successfully operated for several years. Very little is known about the design and implementation of Wuala. The authors capture the network traffic exchanged between the machines participating in Wuala to reverse engineer the design and operation of...

    Provided By EURECOM

  • White Papers // Jan 2013

    Secure Product Tracking in Supply Chain

    In this paper, the authors propose a secure and efficient product tracking mechanism implemented using wireless sensor nodes. This mechanism aims at tracking goods, and actions performed by each actor of the supply chain, while preserving the actors' privacy. Their solution is based on generating identifiers of the actors and...

    Provided By EURECOM

  • White Papers // Sep 2012

    Computing the Nash Equilibria of Intruder Classification Games

    The authors investigate the problem of classifying an intruder of two different types (spy or spammer). The classification is based on the number of file server and mail server attacks a network defender observes during a fixed window. The spammer naively attacks (with a known distribution) his main target: the...

    Provided By EURECOM

  • White Papers // Nov 2012

    A General Scalable and Accurate Decentralized Level Monitoring Method for Large-Scale Dynamic Service Provision in Hybrid Clouds

    Hybrid cloud computing combines private clouds with geographically-distributed resources from public clouds, desktop grids or in-house gateways to provide the most flexibility of each kind of cloud platforms. Service provisioning for wide-area applications such as cloud backup or cloud network games is sensitive to wide-area network metric such as round...

    Provided By EURECOM

  • White Papers // Jun 2012

    Enabling Message Security for RESTful Services

    The security and dependability of cloud applications require strong confidence in the communication protocol used to access web resources. The mainstream service providers nowadays are shifting to REST-based services in the detriment of SOAP-based ones. REST proposes a lightweight approach to consume resources with no specific encapsulation, thus lacking of...

    Provided By EURECOM

  • White Papers // Mar 2012

    HiPoLDS: A Security Policy Language for Distributed Systems

    Expressing security policies to govern distributed systems is a complex and error-prone task. Policies are hard to understand, often expressed with unfriendly syntax, making it difficult to security administrators and to business analysts to create intelligible specifications. The authors introduce the Hierarchical Policy Language for Distributed Systems (HiPoLDS). HiPoLDS has...

    Provided By EURECOM

  • White Papers // Apr 2012

    PRICE: PRivacy preserving Incentives for Cooperation Enforcement

    Many incentive mechanisms have been proposed to foster cooperation among nodes in Peer-To-Peer (P2P) networks. Unfortunately, most of existing solutions rely on the existence of an online centralized authority that is in charge of a fair distribution and transaction of credits (incentives) between peers. Such centralized mechanisms mainly suffer from...

    Provided By EURECOM

  • White Papers // Nov 2012

    On the Resilience of the Dependability Framework to the Intrusion of New Security Threats

    Initially thought of with a strong emphasis on accidental faults, it has paid more attention over the years to intentional ones and, thus, to classical security concepts as well. Recently, a couple of incidents have received a lot of attention: the Hydraq and Stuxnet worms outbreaks. They have been used...

    Provided By EURECOM

  • White Papers // Jun 2013

    Effective and Efficient Security Policy Engines for Automotive On-Board Networks

    The configuration of security mechanisms in automotive onboard networks makes it necessary to define and deploy adapted security policies. This paper discusses how to design policy engines that implement an effective enforcement in such architectures despite the complexity of the protocol stacks of on-board electronic control units. It also evaluates...

    Provided By EURECOM

  • White Papers // May 2013

    Reference Monitors for Security and Interoperability in OAuth 2.0

    OAuth 2.0 is a recent IETF standard devoted to providing authorization to clients requiring access to specific resources over HTTP. It was recently adopted by major internet players like Google, Facebook, and Microsoft. It has been pointed out that this framework is potentially subject to security issues, as well as...

    Provided By EURECOM

  • White Papers // May 2013

    Evolving Security Requirements in Multi-Layered Service-Oriented-Architectures

    Due to today's rapidly changing corporate environments, business processes are increasingly subject to dynamic configuration and evolution. The evolution of new deployment architectures, as illustrated by the move towards mobile platforms and the Internet of services, and the introduction of new security regulations (imposed by national and international regulatory bodies,...

    Provided By EURECOM

  • White Papers // Jun 2013

    Bootstrapping Security Associations in Opportunistic Networks

    Key management in opportunistic networks is a challenging problem that cannot be solved with existing solutions. In this paper, the authors analyze the requirements of key management in the framework of opportunistic networks and content-based forwarding. This key management solution relies on two phases: a first phase where nodes are...

    Provided By EURECOM

  • White Papers // Apr 2014

    Private and Dynamic Time-Series Data Aggregation With Trust Relaxation

    With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solution that allows the data analyzer to compute global statistics over the set of individual inputs that are...

    Provided By EURECOM

  • White Papers // Mar 2006

    Adaptive Chip Level Equalization for HSDPA

    The authors consider a chip level decision-directed NLMS equalization scheme which targets estimating the total transmitted base station chip sequence in a decision-directed manner and using it as the desired response for equalizer adaptation. For this purpose, they explicitly use only the knowledge of the user-assigned HSPDSCH codes in order...

    Provided By EURECOM

  • White Papers // Feb 2014

    Toward Black-Box Detection of Logic Flaws in Web Applications

    Web applications play a very important role in many critical areas, including online banking, health care, and personal communication. This, combined with the limited security training of many web developers, makes web applications one of the most common targets for attackers. In the past, researchers have proposed a large number...

    Provided By EURECOM

  • White Papers // Jul 2014

    A Large-Scale Analysis of the Security of Embedded Firmwares

    As embedded systems are more than ever present in society, their security is becoming an increasingly important issue. However, based on the results of many recent analyses of individual firmware images, embedded systems acquired a reputation of being insecure. Despite these facts, the authors still lack a global understanding of...

    Provided By EURECOM

  • White Papers // Dec 2013

    Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares

    To address the growing concerns about the security of embedded systems, it is important to perform accurate analysis of firmware binaries, even when the source code or the hardware documentation is not available. However, research in this field is hindered by the lack of dedicated tools. For example, dynamic analysis...

    Provided By EURECOM