Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jaouhar Fattahi is active.

Publication


Featured researches published by Jaouhar Fattahi.


Advances in Software Engineering | 2011

Dynamic context-aware and limited resources-aware service adaptation for pervasive computing

Moeiz Miraoui; Chakib Tadj; Jaouhar Fattahi; Chokri Ben Amar

A pervasive computing system (PCS) requires that devices be context aware in order to provide proactively adapted services according to the current context. Because of the highly dynamic environment of a PCS, the service adaptation task must be performed during device operation. Most of the proposed approaches do not deal with the problem in depth, because they are either not really context aware or the problem itself is not thought to be dynamic. Devices in a PCS are generally hand-held, that is, they have limited resources, and so, in the effort to make them more reliable, the service adaptation must take into account this constraint. In this paper, we propose a dynamic service adaptation approach for a device operating in a PCS that is both context aware and limited resources aware. The approach is then modeled using colored Petri Nets and simulated using the CPN Tools, an important step toward its validation.


Archive | 2016

The Theory of Witness-Functions

Jaouhar Fattahi; Mohamed Mejri; Emil Pricop

Cryptographic protocols are distributed programs that ensure security in all communications. They guarantee agents authentication, data confidentiality, data integrity, atomicity of goods and money, non-repudiation, etc. They are used in all areas: e-commerce, military fields, electronic voting, etc. The use of cryptography is essential to ensure protocols’ security, however, it is not sufficient. Indeed, in the literature, a significant number of cryptographic protocols have long been considered safe, but they were shown faulty many years after their use. Saying that a protocol is correct or not is an undecidable problem in general. However, several methods (logic-based methods, Model-Checking-based methods, typing-based methods, etc.) have emerged to answer this hard question under restrictive assumptions and led to varying results. Here, we present a new formal method to analyze cryptographic protocols statically for the property of secrecy. It consists in inspecting the level of security of every component of exchanged messages in the protocol by new metrics, called witness-functions, and making sure that it does not diminish during its life cycle. If yes, we declare that the protocol keeps its secret inputs. We analyze here an amended version of the Woo-Lam protocol using the witness-functions’ theory.


international conference on electronics computers and artificial intelligence | 2015

Secrecy by witness-functions under equational theories

Jaouhar Fattahi; Mohamed Mejri

In this paper, we use the witness-functions to analyze cryptographic protocols for secrecy under nonempty equational theories. The witness-functions are safe metrics used to compute security. An analysis with a witness-function consists in making sure that the security of every atomic message does not decrease during its lifecycle in the protocol. The analysis gets more difficult under nonempty equational theories. Indeed, the intruder can take advantage of the algebraic properties of the cryptographic primitives to derive secrets. These properties arise from the use of mathematical functions, such as multiplication, addition, exclusive-or or modular exponentiation in the cryptosystems and the protocols. Here, we show how to use the witness-functions under nonempty equational theories and we run an analysis on the Needham-Schroeder-Lowe protocol under the cipher homomorphism. This analysis reveals that although this protocol is proved secure under the perfect encryption assumption, its security collapses under the homomorphic primitives. We show how the witness-functions help to illustrate an attack scenario on it and we propose an amended version to fix it.


systems, man and cybernetics | 2016

Formal reasoning on authentication in security protocols

Jaouhar Fattahi; Mohamed Mejri; Ridha Ghayoula; Emil Pricop

In this paper, we are proposing a new formal framework for reasoning on authentication in security protocols based on analytic functions. We give sufficient conditions that, if satisfied, the protocol is declared correct with respect to authentication. We validate our approach on the Yahalom-Lowe protocol. First, we show that it satisfies these few conditions, thus, we conclude that it is correct for authentication.


international conference on electronics computers and artificial intelligence | 2016

Considerations regarding security issues impact on systems availability

Emil Pricop; Sanda Florentina Mihalache; Nicolae Paraschiv; Jaouhar Fattahi; Florin Zamfir

Control systems behavior can be analyzed taking into account a large number of parameters: performances, reliability, availability, security. Each control system presents various security vulnerabilities that affect in lower or higher measure its functioning. In this paper the authors present a method to assess the impact of security issues on the systems availability. A fuzzy model for estimating the availability of the system based on the security level and achieved availability coefficient (depending on MTBF and MTR) is developed and described. The results of the fuzzy inference system (FIS) are presented in the last section of the paper.


systems, man and cybernetics | 2016

Sidelobe level reduction in linear array pattern synthesis using Taylor-MUSIC algorithm for reliable IEEE 802.11 MIMO applications

Elies Ghayoula; Jaouhar Fattahi; Ridha Ghayoula; Emil Pricop; Grigore Stamatescu; Jean-Yves Chouinard; Ammar Bouallegue

The concepts of array processing and smart antenna give a promising solution to the significant increase of data rates in wireless transmission systems. In this paper, we deal with the problem of designing linear antenna arrays for specific radiation properties of MIMO applications based on Direction-Of-Arrival estimation and Taylor beamforming techniques. The objectives of this paper can be summarized as to minimize the maximum sidelobe level (SLL), combined the Taylor method and MUSIC (Multiple Signal Classification) algorithm. The performance of this hybrid optimization determines how well the system is convenient for a reliable wireless communication and interference reduction. This paper will discuss the application of MUSIC algorithm for linear array antenna (4, 8 and 16 antennas) in order to estimate the Direction-Of-Arrival of various angles of elevation and azimuth.


Archive | 2016

Innovative Fuzzy Approach on Analyzing Industrial Control Systems Security

Emil Pricop; Sanda Florentina Mihalache; Jaouhar Fattahi

Industrial control systems are now very important components of the critical infrastructures. The security threats upon industrial control systems endangers the proper functioning of energy production facilities, the power grid, water production and distribution, chemical and petrochemical plants, food production facilities. This chapter presents an overview of potential and registered threats of industrial control systems. A risk assessment on this matter it is of high importance and the chapter has as focus an innovative fuzzy based approach on industrial control systems security. Two fuzzy based models are introduced, one for the attacker profile and one for attack success rate estimation. Finally, an industrial case study is presented with conclusions to proposed models limitations and challenges.


systems, man and cybernetics | 2015

Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions

Jaouhar Fattahi; Mohamed Mejri; Emil Pricop

In this paper, we use witness-function to capture attack scenarios in cryptographic protocols. A witness-function is a protocol-dependent metric that attributes a reliable security level to every atomic message. We use these functions to prove the protocol correctness with respect to secrecy by proving that the security level of every atomic message never decreases throughout all consecutive receiving and sending steps of the protocol. In this paper, we analyze the defective variant of the Otway-Rees protocol and we demonstrate that the use of witness-functions can be a key element in tracing a well-known type flaw that this protocol involves.


international conference on electronics computers and artificial intelligence | 2015

A slow read attack using cloud

Darine Ameyed; Fehmi Jaafar; Jaouhar Fattahi

Cloud computing relies on sharing computing resources rather than having local servers or personal devices to handle applications. Nowadays, cloud computing has become one of the fastest growing fields in information technology. However, several new security issues of cloud computing have emerged due to its service delivery models. In this paper, we discuss the case of distributed denial-of-service (DDoS) attack using Cloud resources. First, we show how such attack using a cloud platform could not be detected by previous techniques. Then we present a tricky solution based on the cloud as well.


international conference on electronics computers and artificial intelligence | 2014

Secrecy by witness-functions on increasing protocols

Jaouhar Fattahi; Mohamed Mejri; Hanane Houmani

In this paper, we present a new formal method to analyze cryptographic protocols statically for the property of secrecy. It consists in inspecting the level of security of every component in the protocol and making sure that it does not diminish during its life cycle. If yes, it concludes that the protocol keeps its secret inputs. We analyze in this paper an amended version of the Woo-Lam protocol using this new method.

Collaboration


Dive into the Jaouhar Fattahi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Elies Ghayoula

Tunis El Manar University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chakib Tadj

École de technologie supérieure

View shared research outputs
Researchain Logo
Decentralizing Knowledge