On security research towards future mobile network generations

D Rupprecht, A Dabrowski, T Holz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …

Parsifal: A pragmatic solution to the binary parsing problems

O Levillain - 2014 IEEE Security and Privacy Workshops, 2014 - ieeexplore.ieee.org
Parsers are pervasive software basic blocks: as soon as a program needs to communicate
with another program or to read a file, a parser is involved. However, writing robust parsers …

Writing parsers like it is 2017

P Chifflier, G Couprie - 2017 IEEE Security and Privacy …, 2017 - ieeexplore.ieee.org
Despite being known since a long time, memory violations are still a very important cause of
security problems in low-level programming languages containing data parsers. We address …

A study of the TLS ecosystem

O Levillain - 2016 - theses.hal.science
SSL/TLS, a 20-year old security protocol, has become a major component securing network
communications, from HTTPS e-commerce and social network sites to Virtual Private …

[PDF][PDF] Advancing memory-corruption attacks and defenses

C Liebchen - 2018 - tuprints.ulb.tu-darmstadt.de
Adversaries exploit software vulnerabilities in modern software to compromise computer
systems. While the amount and sophistication of such attacks is constantly increasing, most …

Investigating Automatic Code Generation for Network Packet Parsing

S McQuistin, V Band, D Jacob… - 2021 IFIP Networking …, 2021 - ieeexplore.ieee.org
Use of formal protocol description techniques and code generation can reduce bugs in
network packet parsing code. However, such techniques are themselves complex, and don't …

Mitigating cryptographic mistakes by design

M Blochberger, T Petersen, H Federrath - 2019 - dl.gi.de
Developers struggle to integrate cryptographic functionality into their applications. Many
mistakes have been identified by related work and tools have been developed for detecting …

[PDF][PDF] Enhancing the security of 4G and 5G mobile networks on protocol layer two

D Rupprecht - 2021 - scholar.archive.org
Mobile networks are an integral part of our daily communication as they provide mobile
access to information. They serve as a medium for many use cases, including, but not limited …

Certified semantics and analysis of JavaScript

M Bodin - 2016 - theses.hal.science
JavaScript is a trending programming language. It is not used in applications in which
security may be an important issue. It thus becomes important to be able to control the …

[PDF][PDF] Architecture système sécurisée de sonde IDS réseau

P Chifflier, A Fontaine - Computer & Electronics Security Applications …, 2014 - cyber.gouv.fr
Résumé Les systèmes de détection d'intrusion réseau (NIDS 1) sont largement utilisés pour
effectuer la supervision de sécurité. Ces systèmes sont cependant eux-mêmes peu …