Sorry, you need to enable JavaScript to visit this website.
Partager

Publications

 

Les publications de nos enseignants-chercheurs sont sur la plateforme HAL :

 

Les publications des thèses des docteurs du LTCI sont sur la plateforme HAL :

 

Retrouver les publications figurant dans l'archive ouverte HAL par année :

2017

  • Security Incident Response: Towards a Novel Decision-Making System
    • Souissi Samih
    • Serhrouchni Ahmed
    • Sliman Layth
    • Charroux Benoit
    , 2017, 557, pp.667-676. (10.1007/978-3-319-53480-0_66)
    DOI : 10.1007/978-3-319-53480-0_66
  • Security Incident Response: Towards a Novel Decision-Making System
    • Souissi Samih
    • Serhrouchni Ahmed
    • Sliman Layth
    • Charroux Benoit
    , 2017, pp.667-676. Cyber-attacks have become more complex and unpredictable. Due to their devastating impacts, choosing the appropriate response has become a priority for corporations. This paper introduces an incident response system based on a supervised machine learning model. It offers a framework to process alerts and enhance them to classify and defend against sophisticated attacks. Our method helps security analysts handle alerts and apply the most appropriate response mechanisms, thanks to a high level of abstraction of attack description and supervised learning model. The proposed system is flexible and takes into account several attack properties in order to simplify attack handling and aggregate defense mechanisms. The originality of our work is the ability of this system to provide a response to an attack the system face for the first time. (10.1007/978-3-319-53480-0_66)
    DOI : 10.1007/978-3-319-53480-0_66
  • Cache Timing Attacks from The SoCFPGA Coherency Port (Abstract Only)
    • Chaudhuri Sumanta
    , 2017, pp.295-296. In this presentation we show that side-channels arising from micro-architecture of SoCFPGAs could be a security risk. We present a FPGA trojan based on OpenCL which performs cache-timing attacks through the accelerator coherency port (ACP) of a SoCFPGA. Its primary goal is to derive physical addresses used by the Linux kernel on ARM Hard Processor System. With this information the trojan can then surgically change memory locations to gain privileges as in a rootkit. We present the customisation to the Altera OpenCL platform, and the OpenCL code to implement the trojan. We show that it is possible to accurately predict physical addresses and the page table entries corresponding to an arbitrary location in the heap after sufficient (~300) iterations, and by using a differential ranking. The attack can be refined by the known page table structure of the Linux kernel, to accurately determine the target physical address, and its corresponding page table entry. Malicious code can then be injected from FPGA, by redirecting page table entries. Since Linux kernel version 4.0-rc5 physical addresses are obfuscated from the normal user to prevent Rowhammer attacks. With information from ACP side-channel the above measure can be bypassed. (10.1145/3020078.3021802)
    DOI : 10.1145/3020078.3021802
  • Sketching for nearfield acoustic imaging of heavy-tailed sources
    • Fontaine Mathieu
    • Vanwynsberghe Charles
    • Liutkus Antoine
    • Badeau Roland
    , 2017, 10169, pp.80-88. We propose a probabilistic model for acoustic source localization with known but arbitrary geometry of the microphone array. The approach has several features. First, it relies on a simple nearfield acoustic model for wave propagation. Second, it does not require the number of active sources. On the contrary, it produces a heat map representing the energy of a large set of candidate locations, thus imaging the acoustic field. Second, it relies on a heavy-tail alpha-stable probabilistic model, whose most important feature is to yield an estimation strategy where the multichannel signals need to be processed only once in a simple on- line procedure, called sketching. This sketching produces a fixed-sized representation of the data that is then analyzed for localization. The resulting algorithm has a small computational complexity and in this paper, we demonstrate that it compares favorably with state of the art for localization in realistic simulations of reverberant environments. (10.1007/978-3-319-53547-0_8)
    DOI : 10.1007/978-3-319-53547-0_8
  • On the Use of Latent Mixing Filters in Audio Source Separation
    • Girin Laurent
    • Badeau Roland
    , 2017, 10169, pp.225-235. In this paper, we consider the underdetermined convolutive audio source separation (UCASS) problem. In the STFT domain, we consider both source signals and mixing filters as latent random variables, and we propose to estimate each source image, i.e. each individual source-filter product, by its posterior mean. Although, this is a quite straightforward application of the Bayesian estimation theory, to our knowledge, there exist no similar study in the UCASS context. In this paper, we discuss the interest of this estimator in this context and com- pare it with the conventional Wiener filter in a semi-oracle configuration. (10.1007/978-3-319-53547-0_22)
    DOI : 10.1007/978-3-319-53547-0_22
  • Rigidity of quantum steering and one-sided device-independent verifiable quantum computation
    • Gheorghiu Alexandru
    • Wallden Petros
    • Kashefi Elham
    New Journal of Physics, Institute of Physics: Open Access Journals, 2017, 19 (2), pp.023043. The relationship between correlations and entanglement has played a major role in understanding quantum theory since the work of Einstein et al (1935 Phys. Rev. 47 777–80). Tsirelson proved that Bell states, shared among two parties, when measured suitably, achieve the maximum non-local correlations allowed by quantum mechanics (Cirel'son 1980 Lett. Math. Phys. 4 93–100). Conversely, Reichardt et al showed that observing the maximal correlation value over a sequence of repeated measurements, implies that the underlying quantum state is close to a tensor product of maximally entangled states and, moreover, that it is measured according to an ideal strategy (Reichardt et al 2013 Nature 496 456–60). However, this strong rigidity result comes at a high price, requiring a large number of entangled pairs to be tested. In this paper, we present a significant improvement in terms of the overhead by instead considering quantum steering where the device of the one side is trusted. We first demonstrate a robust one-sided device-independent version of self-testing, which characterises the shared state and measurement operators of two parties up to a certain bound. We show that this bound is optimal up to constant factors and we generalise the results for the most general attacks. This leads us to a rigidity theorem for maximal steering correlations. As a key application we give a one-sided device-independent protocol for verifiable delegated quantum computation, and compare it to other existing protocols, to highlight the cost of trust assumptions. Finally, we show that under reasonable assumptions, the states shared in order to run a certain type of verification protocol must be unitarily equivalent to perfect Bell states. (10.1088/1367-2630/aa5cff)
    DOI : 10.1088/1367-2630/aa5cff
  • Caveats with stochastic gradient and maximum likelihood based ICA for EEG
    • Montoya-Martínez Jair
    • Cardoso Jean-François
    • Gramfort Alexandre
    , 2017. Stochastic gradient (SG) is the most commonly used optimization technique for maximum likelihood based approaches to independent component analysis (ICA). It is in particular the default solver in public implementations of Infomax and variants. Motivated by experimental findings on electroencephalography (EEG) data, we report some caveats which can impact the results and interpretation of neuroscience findings. We investigate issues raised by controlling the step size in gradient updates combined with early stopping conditions, as well as initialization choices which can artificially generate biologically plausible brain sources, so called dipolar sources. We provide experimental evidence that pushing the convergence of Infomax using non stochastic solvers can reduce the number of highly dipolar components and provide a mathematical explanation of this fact. Results are presented on public EEG data.
  • Tracking Dependent Information Flows
    • Zhioua Zeineb
    • Roudier Yves
    • Ameur Boulifa Rabéa
    • Kechiche Takoua
    • Short Stuart
    , 2017, pp.179-189. (10.5220/0006209301790189)
    DOI : 10.5220/0006209301790189
  • Model-Driven Performance Evaluation and Formal Verification for Multi-level Embedded System Design
    • Genius Daniela
    • Li Letitia
    • Apvrille Ludovic
    , 2017. The design methodology of an embedded system should start with a system-level partitioning dividing functions into hardware and software. However, since this partitioning decision is taken at a high level of abstraction, we propose regularly validating the selected partitioning during software development. The paper introduces a new model-based engineering process with a supporting toolkit, first performing system-level partitioning, and then assessing the partitioning choices thus obtained at different levels of abstraction during software design. This assessment shall in particular validate the assumptions made on system-level (e.g. on cache miss rates) that cannot be precisely determined without low-level hardware model. High-level partitioning simulations/verification rely on custom model-checkers and abstract models of software and hardware, while low-level prototyping simulations rely on automatically generated C-POSIX software code executing on a cycle-precise virtual prototyping platform. An automotive case study on an automatic braking applicationillustrates our complete approach.
  • A sparsity-based variational approach for the restoration of SMOS images from L1A data
    • Preciozzi Javier
    • Almansa Andrès
    • Musé Pablo
    • Durand Sylvain
    • Khazaal Ali
    • Rougé Bernard
    IEEE Transactions on Geoscience and Remote Sensing, Institute of Electrical and Electronics Engineers, 2017, 55 (5), pp.2811--2826. The Surface Moisture and Ocean Salinity (SMOS) mission senses ocean salinity and soil moisture by measuring Earth’s brightness temperature using interferometry in the L- band. These interferometry measurements known as visibilities constitute the SMOS L1A data product. Despite the L-band being reserved for Earth observation, the presence of illegal emitters causes radio frequency interference (RFI) that masks the energy radiated from the Earth and strongly corrupts the acquired images. Therefore, the recovery of brightness temperature from corrupted data by image restoration techniques is of major interest. In this paper, we propose a variational model to recover superresolved, denoised brightness temperature maps by decomposing the images into two components: an image T that models the Earth’s brightness temperature and an image O modeling (10.1109/TGRS.2017.2654864)
    DOI : 10.1109/TGRS.2017.2654864
  • Reliability analysis of spintronic device based logic and memory circuits
    • Wang You
    , 2017. Spin transfer torque magnetic tunnel junction (STT-MTJ) has been considered as a promising candidate for next generation of non-volatile memories and logic circuits, because it provides a perfect solution to overcome the bottleneck of increasing static power caused by CMOS technology scaling. However, its commercialization is limited by the poor reliability, which deteriorates severely with device scaling down. This thesis focuses on the reliability investigation of MTJ based non-volatile circuits. Firstly, a compact model of MTJ including main reliability issues is proposed and validated by the comparison with experimental data. Based on this accurate model, the reliability of typical circuits is analyzed and reliability optimization methodology is proposed. Finally, the stochastic switching behavior is utilized in some new designs of conventional applications.
  • Reliability Analysis of Spintronic Device Based Logic and Memory Circuits
    • Wang You
    , 2017. Spin transfer torque magnetic tunnel junction (STT-MTJ) has been considered as a promising candidate for next generation of non-volatile memories and logic circuits, because it provides a perfect solution to overcome the bottleneck of increasing static power caused by CMOS technology scaling. However, its commercialization is limited by the poor reliability, which deteriorates severely with device scaling down. This thesis focuses on the reliability investigation of MTJ based non-volatile circuits. Firstly, a compact model of MTJ including main reliability issues is proposed and validated by the comparison with experimental data. Based on this accurate model, the reliability of typical circuits is analyzed and reliability optimization methodology is proposed. Finally, the stochastic switching behavior is utilized in some new designs of conventional applications.
  • Optimal transportation to the entropy-power inequality
    • Rioul Olivier
    , 2017. We present a simple proof of the entropy-power inequality using an optimal transportation argument which takes the form of a simple change of variables. The same argument yields a reverse inequality involving a conditional differential entropy which has its own interest. It can also be generalized in various ways. The equality case is easily captured by this method and the proof is formally identical in one and several dimensions. (10.1109/ITA.2017.8023467)
    DOI : 10.1109/ITA.2017.8023467
  • A Bayesian Experimental Design Approach Maximizing Information Gain for Human-Computer Interaction
    • Liu Wanyu
    • Lucas d'Oliveira Rafael
    • Beaudouin-Lafon Michel
    • Rioul Olivier
    , 2017, pp.1. A new information-theoretic approach based on Bayesian Experimental Design (BED) is applied to human-computer interaction, and in particular to multi-scale navigation. Instead of simply executing user commands, our BIG (Bayesian Information Gain) technique is modeling user behavior and tries to gain information by maximizing the expected mutual information provided by the users' subsequent input.
  • Multiple-objectives architecture optimization by composition of model transformations
    • Rahmoun Smail
    , 2017. In this thesis, we propose a new exploration approach to tackle design space exploration problems involving multiple conflicting non functional properties. More precisely, we propose the use of model transformation compositions to automate the production of architectural alternatives, and multiple-objective evolutionary algorithms to identify near-optimal architectural alternatives. Model transformations alternatives are mapped into evolutionary algorithms and combined with genetic operators such as mutation and crossover. Taking advantage of this contribution, we can (re)-use different model transformations, and thus solve different multiple-objective optimization problems. In addition to that, model transformations can be chained together in order to ease their maintainability and re-usability, and thus conceive more detailed and complex systems.
  • Micro- and Nanophotonic Technologies Application to Optical Communications
    • Gallion Philippe
    , 2017.
  • MCMC design-based non-parametric regression for rare-event. Application to nested risk computations
    • Fort Gersende
    • Gobet Emmanuel
    • Moulines Éric
    Monte Carlo Methods and Applications, De Gruyter, 2017, 23 (1), pp.21--42. We design and analyze an algorithm for estimating the mean of a function of a conditional expectation, when the outer expectation is related to a rare-event. The outer expectation is evaluated through the average along the path of an ergodic Markov chain generated by a Markov chain Monte Carlo sampler. The inner conditional expectation is computed as a non-parametric regression, using a least-squares method with a general function basis and a design given by the sampled Markov chain. We establish non asymptotic bounds for the L2-empirical risks associated to this least-squares regression; this generalizes the error bounds usually obtained in the case of i.i.d. observations. Global error bounds are also derived for the nested expectation problem. Numerical results in the context of financial risk computations illustrate the performance of the algorithms.
  • Topology and dimensioning of a maritime MANET coupled with a satellite network
    • Kessab Achraf
    , 2017. In the first part of this thesis, we tackle the initialization of the network in this hierarchical context. We propose a statistical model enabling a network designer to perceive the requirements in terms of equipments, channel bandwidth, antenna configurations, antenna radiation pattern, achievable data rates for instance. In order to guarantee fully connected MANET, we introduce an analytical tool to estimate the required inter-staff-ships and inter-shipmasters coverage radii. Then we study the multi-hop end-to-end communications and we propose several routing protocols to enhance the delays. Afterwards, we focus on the contribution of the satellite backhaul with a comparative study qualifying the needs in Hybrid Stations “HSs” and a strategy to access to these gateways. In a second part, we emphasis on the radio resource outage occurrence and the dimensioning matter to optimize the allocated bandwidth to the network. We investigate stochastic geometry tools to provide an analytical model enabling to foresee the amount of required radio resources by the active nodes with a certain Quality of Service “QoS” and several Multiple Inputs Multiple Outputs “MIMO” antenna configurations in the maritime context. We consider first the centralized access scheme where all communications are performed via the shipmasters that are in charge of the radio resource management. Then we focus on the distributed access scheme with Aloha Medium Access Control “MAC” protocol where nodes are authorized to access to the shared bandwidth arbitrarily and unilaterally. Simulation and numerical results are provided to evaluate the performances in terms of required bandwidth, aggregate capacity.
  • Cryptographically Secure Shield for Security IPs Protection
    • Ngo Xuan-Thuy
    • Danger Jean-Luc
    • Guilley Sylvain
    • Graba Tarik
    • Mathieu Yves
    • Najm Zakaria
    • Bhasin Shivam
    IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers, 2017, 66 (2). (10.1109/TC.2016.2584041)
    DOI : 10.1109/TC.2016.2584041
  • Self-coherent phase reference sharing for continuous-variable quantum key distribution
    • Marie Adrien
    • Alleaume Romain
    Physical Review A, American Physical Society, 2017, 95 (1), pp.012316.
  • Asymmetrical Length Biasing for Energy Efficient Digital Circuits
    • Veirano Francisco
    • Naviner Lirida
    • Silveira Fernando
    , 2017.
  • Métasurfaces et antennes : nouvelles perspectives pour l’aéronautique et le spatial
    • Lepage A. C.
    • Begaud Xavier
    , 2017.
  • Infliximab quantitation in human plasma by liquid chromatography-tandem mass spectrometry: towards a standardization of the methods?
    • Jourdil Jean-François
    • Lebert Dorothee
    • Gautier-Veyret Élodie
    • Lemaitre Florian
    • Bonaz Bruno
    • Picard Guillaume
    • Tonini Julia
    • Stanke-Labesque Françoise
    Analytical and Bioanalytical Chemistry, Springer Verlag, 2017, 409 (5), pp.1195-1205. Infliximab (IFX) is a chimeric monoclonal antibody targeting tumor necrosis factor-alpha. It is currently approved for the treatment of certain rheumatic diseases or inflammatory bowel diseases. Clinical studies have suggested that monitoring IFX concentrations could improve treatment response. However, in most studies, IFX was quantified using ELISA assays, the resulting discrepancies of which raised concerns about their reliability. Here, we describe the development and validation of a liquid chromatography-tandem mass spectrometry (LC-MS/MS) method for IFX quantification in human plasma. Full-length stable-isotope-labeled antibody (SIL-IFX) was added to plasma samples as internal standard. Samples were then prepared using Mass Spectrometry Immuno Assay (MSIA™) followed by trypsin digestion and submitted to multiple reaction monitoring (MRM) for quantification of IFX. The chromatographic run lasted 13 min. The range of quantification was 1 to 26 mg/L. For two internal quality controls spiked with 6 and 12 mg/L of IFX, the method was reproducible (coefficients of variation (CV%): 12.7 and 2.1), repeatable (intra-day CV%: 5.5 and 5.0), and accurate (inter-day and intra-day deviations from nominal values: +6.4 to +3.7 % and 5.5 to 9.2 %, respectively). There was no cross - contamination effect. Samples from 45 patients treated with IFX were retrospectively analyzed by LC-MS/MS and results were compared to those obtained with an in-house ELISA assay and the commercial Lisa Tracker® method. Good agreement was found between LC-MS/MS and in-house ELISA (mean underestimation of 13 % for in-house ELISA), but a significant bias was found with commercial ELISA (mean underestimation of 136 % for commercial ELISA). This method will make it possible to standardize IFX quantification between laboratories. Graphical Abstract Interassay comparison of the three methods: LC-MS/MS vs inhouse ELISA assay or vs Lisa Tracker® ELISA assays, Passing & Bablok (a) and Bland & Altman (b) for the comparison of LC-MS/MS vs in-house ELISA assay; Passing & Bablok (10.1007/s00216-016-0045-4)
    DOI : 10.1007/s00216-016-0045-4
  • Conferencing in Wyner's Asymmetric Interference Network: Effect of Number of Rounds
    • Wigger Michèle
    • Timo Roy
    • Shamai Shlomo
    IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2017, 63 (2), pp.1199 - 1226.
  • k-Nearest Neighbours Classification Based Sybil Attack Detection in Vehicular Networks
    • Gu Pengwenlong
    • Khatoun Rida
    • Begriche Youcef
    • Serhrouchni Ahmed
    , 2017.