Skip to main content

Showing 1–6 of 6 results for author: Nicomette, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.22515  [pdf, other

    cs.CR cs.AI

    In-context learning for the classification of manipulation techniques in phishing emails

    Authors: Antony Dalmiere, Guillaume Auriol, Vincent Nicomette, Pascal Marchand

    Abstract: Traditional phishing detection often overlooks psychological manipulation. This study investigates using Large Language Model (LLM) In-Context Learning (ICL) for fine-grained classification of phishing emails based on a taxonomy of 40 manipulation techniques. Using few-shot examples with GPT-4o-mini on real-world French phishing emails (SignalSpam), we evaluated performance against a human-annotat… ▽ More

    Submitted 26 June, 2025; originally announced June 2025.

  2. arXiv:2506.20228  [pdf, other

    cs.CR

    Measuring Modern Phishing Tactics: A Quantitative Study of Body Obfuscation Prevalence, Co-occurrence, and Filter Impact

    Authors: Antony Dalmiere, Zheng Zhou, Guillaume Auriol, Vincent Nicomette, Pascal Marchand

    Abstract: Phishing attacks frequently use email body obfuscation to bypass detection filters, but quantitative insights into how techniques are combined and their impact on filter scores remain limited. This paper addresses this gap by empirically investigating the prevalence, co-occurrence patterns, and spam score associations of body obfuscation techniques. Analysing 386 verified phishing emails, we quant… ▽ More

    Submitted 25 June, 2025; originally announced June 2025.

  3. arXiv:1811.03934  [pdf, other

    cs.CR cs.NI

    RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

    Authors: Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre

    Abstract: Internet-of-Things (IoT) devices are nowadays massively integrated in daily life: homes, factories, or public places. This technology offers attractive services to improve the quality of life as well as new economic markets through the exploitation of the collected data. However, these connected objects have also become attractive targets for attackers because their current security design is ofte… ▽ More

    Submitted 9 November, 2018; originally announced November 2018.

    Journal ref: International Symposium on Network Computing and Applications - IEEE-NCA 2018, Nov 2018, Cambridge, Massachusetts, United States. 2018

  4. Specification-Based Protocol Obfuscation

    Authors: Julien Duchene, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Colas Le Guernic

    Abstract: This paper proposes a new obfuscation technique of a communication protocol that is aimed at making the reverse engineering of the protocol more complex. The obfuscation is based on the transformation of protocol message format specification. The obfuscating transformations are applied to the Abstract Syntax Tree (AST) representation of the messages and mainly concern the ordering or aggregation o… ▽ More

    Submitted 25 July, 2018; originally announced July 2018.

    Journal ref: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Jun 2018, Luxembourg City, France. IEEE, 2018

  5. arXiv:0704.0861  [pdf

    cs.PF cs.CR

    Empirical analysis and statistical modeling of attack processes based on honeypots

    Authors: Mohamed Kaaniche, Y. Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette

    Abstract: Honeypots are more and more used to collect data on malicious activities on the Internet and to better understand the strategies and techniques used by attackers to compromise target systems. Analysis and modeling methodologies are needed to support the characterization of attack processes based on the data collected from the honeypots. This paper presents some empirical analyses based on the da… ▽ More

    Submitted 6 April, 2007; originally announced April 2007.

    Journal ref: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2006) (25/06/2006) 119-124

  6. arXiv:0704.0858  [pdf

    cs.CR

    Lessons Learned from the deployment of a high-interaction honeypot

    Authors: Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Marc Dacier, Matthieu Herrb

    Abstract: This paper presents an experimental study and the lessons learned from the observation of the attackers when logged on a compromised machine. The results are based on a six months period during which a controlled experiment has been run with a high interaction honeypot. We correlate our findings with those obtained with a worldwide distributed system of lowinteraction honeypots.

    Submitted 6 April, 2007; originally announced April 2007.

    Journal ref: Proc. 6th European Dependable Computing Conference (EDCC-6), Coimbra (Portugal), 18-20 octobre 2006 (18/10/2006) 39-44