Skip to main content

Showing 1–14 of 14 results for author: Tchana, A

.
  1. arXiv:2502.01193  [pdf, other

    cs.NI

    SigN: SIMBox Activity Detection Through Latency Anomalies at the Cellular Edge

    Authors: Anne Josiane Kouam, Aline Carneiro Viana, Philippe Martins, Cedric Adjih, Alain Tchana

    Abstract: Despite their widespread adoption, cellular networks face growing vulnerabilities due to their inherent complexity and the integration of advanced technologies. One of the major threats in this landscape is Voice over IP (VoIP) to GSM gateways, known as SIMBox devices. These devices use multiple SIM cards to route VoIP traffic through cellular networks, enabling international bypass fraud with los… ▽ More

    Submitted 3 February, 2025; originally announced February 2025.

  2. B-Side: Binary-Level Static System Call Identification

    Authors: Gaspard Thévenon, Kevin Nguetchouang, Kahina Lazri, Alain Tchana, Pierre Olivier

    Abstract: System call filtering is widely used to secure programs in multi-tenant environments, and to sandbox applications in modern desktop software deployment and package management systems. Filtering rules are hard to write and maintain manually, hence generating them automatically is essential. To that aim, analysis tools able to identify every system call that can legitimately be invoked by a program… ▽ More

    Submitted 23 October, 2024; originally announced October 2024.

    Comments: Accepted to appear in the 25th ACM/IFIP International Middleware Conference (Middleware'24)

  3. SecV: Secure Code Partitioning via Multi-Language Secure Values

    Authors: Peterson Yuhala, Pascal Felber, Hugo Guiroux, Jean-Pierre Lozi, Alain Tchana, Valerio Schiavoni, Gaël Thomas

    Abstract: Trusted execution environments like Intel SGX provide \emph{enclaves}, which offer strong security guarantees for applications. Running entire applications inside enclaves is possible, but this approach leads to a large trusted computing base (TCB). As such, various tools have been developed to partition programs written in languages such as C or Java into \emph{trusted} and \emph{untrusted} parts… ▽ More

    Submitted 20 December, 2023; v1 submitted 24 October, 2023; originally announced October 2023.

    Comments: 12 pages

  4. Montsalvat: Intel SGX Shielding for GraalVM Native Images

    Authors: Peterson Yuhala, Jämes Ménétrey, Pascal Felber, Valerio Schiavoni, Alain Tchana, Gaël Thomas, Hugo Guiroux, Jean-Pierre Lozi

    Abstract: The popularity of the Java programming language has led to its wide adoption in cloud computing infrastructures. However, Java applications running in untrusted clouds are vulnerable to various forms of privileged attacks. The emergence of trusted execution environments (TEEs) such as Intel SGX mitigates this problem. TEEs protect code and data in secure enclaves inaccessible to untrusted software… ▽ More

    Submitted 20 December, 2023; v1 submitted 1 May, 2023; originally announced May 2023.

    Comments: 13 pages, Proceedings of the 22nd International Middleware Conference

  5. arXiv:2305.00763  [pdf, other

    cs.CR

    SGX Switchless Calls Made Configless

    Authors: Peterson Yuhala, Michael Paper, Timothée Zerbib, Pascal Felber, Valerio Schiavoni, Alain Tchana

    Abstract: Intel's software guard extensions (SGX) provide hardware enclaves to guarantee confidentiality and integrity for sensitive code and data. However, systems leveraging such security mechanisms must often pay high performance overheads. A major source of this overhead is SGX enclave transitions which induce expensive cross-enclave context switches. The Intel SGX SDK mitigates this with a switchless c… ▽ More

    Submitted 7 July, 2023; v1 submitted 1 May, 2023; originally announced May 2023.

    Comments: 10 pages, 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

  6. arXiv:2301.02059  [pdf, other

    cs.NI cs.LG

    Zen: LSTM-based generation of individual spatiotemporal cellular traffic with interactions

    Authors: Anne Josiane Kouam, Aline Carneiro Viana, Alain Tchana

    Abstract: Domain-wide recognized by their high value in human presence and activity studies, cellular network datasets (i.e., Charging Data Records, named CdRs), however, present accessibility, usability, and privacy issues, restricting their exploitation and research reproducibility.This paper tackles such challenges by modeling Cdrs that fulfill real-world data attributes. Our designed framework, named Ze… ▽ More

    Submitted 5 January, 2023; originally announced January 2023.

    Report number: hal-03910141

  7. arXiv:2205.10929  [pdf, other

    cs.OS cs.CR

    rgpdOS: GDPR Enforcement By The Operating System

    Authors: Alain Tchana, Raphael Colin, Adrien Le Berre, Vincent Berger, Benoit Combemale, Natacha Crooks, Ludovic Pailler

    Abstract: The General Data Protection Regulation (GDPR) forces IT companies to comply with a number of principles when dealing with European citizens' personal data. Non-compliant companies are exposed to penalties which may represent up to 4% of their turnover. Currently, it is very hard for companies driven by personal data to make their applications GDPR-compliant, especially if those applications were d… ▽ More

    Submitted 30 May, 2022; v1 submitted 22 May, 2022; originally announced May 2022.

  8. arXiv:2205.06842  [pdf, other

    cs.DC

    Virtual Disk Snapshot Management at Scale

    Authors: Kevin Nguetchouang, Theophile Dubuc, Stella Bitchebe, Alain Tchana, Pierre Olivier

    Abstract: Contrary to the other resources such as CPU, memory, and network, for which virtualization is efficiently achieved through direct access, disk virtualization is peculiar. In this paper, we make four contributions. Our first contribution is the characterization of disk utilization in a public large-scale cloud infrastructure. It reveals the presence of long snapshot chains, sometimes composed of up… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

  9. arXiv:2202.13483  [pdf, other

    cs.AR

    Out of Hypervisor (OoH): When Nested Virtualization Becomes Practical

    Authors: Stella Bitchebe, Alain Tchana

    Abstract: This paper introduces Out of Hypervisor (OoH), a new research axis close to nested virtualization. Instead of emulating a full virtual hardware inside a VM to support a hypervisor, the OoH principle is to individually expose current hypervisor-oriented hardware virtualization features to the guest OS so that its processes could also take benefit from those features. In fact, several hardware virtu… ▽ More

    Submitted 27 February, 2022; originally announced February 2022.

  10. arXiv:2104.04060  [pdf, other

    cs.DC cs.NI

    Network in Disaggregated Datacenters

    Authors: Brice Ekane, Yohan Pipereau, Boris Teabe, Alain Tchana, Gael Thomas, Noel de palma, Daniel Hagimont

    Abstract: Nowadays, datacenters lean on a computer-centric approach based on monolithic servers which include all necessary hardware resources (mainly CPU, RAM, network and disks) to run applications. Such an architecture comes with two main limitations: (1) difficulty to achieve full resource utilization and (2) coarse granularity for hardware maintenance. Recently, many works investigated a resource-centr… ▽ More

    Submitted 15 March, 2021; originally announced April 2021.

    Comments: 10 pages, 8 figures

  11. arXiv:2104.02987  [pdf, other

    cs.CR cs.LG

    Plinius: Secure and Persistent Machine Learning Model Training

    Authors: Peterson Yuhala, Pascal Felber, Valerio Schiavoni, Alain Tchana

    Abstract: With the increasing popularity of cloud based machine learning (ML) techniques there comes a need for privacy and integrity guarantees for ML data. In addition, the significant scalability challenges faced by DRAM coupled with the high access-times of secondary storage represent a huge performance bottleneck for ML systems. While solutions exist to tackle the security aspect, performance remains a… ▽ More

    Submitted 8 April, 2021; v1 submitted 7 April, 2021; originally announced April 2021.

  12. arXiv:2006.00380  [pdf, ps, other

    cs.OS

    Memory virtualization in virtualized systems: segmentation is better than paging

    Authors: Boris Teabe, Peterson Yuhala, Alain Tchana, Fabien Hermenier, Daniel Hagimont, Gilles Muller

    Abstract: The utilization of paging for virtual machine (VM) memory management is the root cause of memory virtualization overhead. This paper shows that paging is not necessary in the hypervisor. In fact, memory fragmentation, which explains paging utilization, is not an issue in virtualized datacenters thanks to VM memory demand patterns. Our solution Compromis, a novel Memory Management Unit, uses direct… ▽ More

    Submitted 30 May, 2020; originally announced June 2020.

  13. arXiv:2001.09991  [pdf, other

    cs.DC cs.OS

    Intel Page Modification Logging, a hardware virtualization feature: study and improvement for virtual machine working set estimation

    Authors: Stella Bitchebe, Djob Mvondo, Alain Tchana, Laurent Réveillère, Noël De Palma

    Abstract: Intel Page Modification Logging (PML) is a novel hardware feature for tracking virtual machine (VM) accessed memory pages. This task is essential in today's data centers since it allows, among others, checkpointing, live migration and working set size (WSS) estimation. Relying on the Xen hypervisor, this paper studies PML from three angles: power consumption, efficiency, and performance impact on… ▽ More

    Submitted 26 January, 2020; originally announced January 2020.

  14. arXiv:1901.01222  [pdf, other

    cs.OS

    Efficient, Dynamic Multi-tenant Edge Computation in EdgeOS

    Authors: Yuxin Ren, Vlad Nitu, Guyue Liu, Gabriel Parmer, Timothy Wood, Alain Tchana, Riley Kennedy

    Abstract: In the future, computing will be immersed in the world around us -- from augmented reality to autonomous vehicles to the Internet of Things. Many of these smart devices will offer services that respond in real time to their physical surroundings, requiring complex processing with strict performance guarantees. Edge clouds promise a pervasive computational infrastructure a short network hop away fr… ▽ More

    Submitted 4 January, 2019; originally announced January 2019.