Cristel Pelsser
Cristel Pelsser
Home
Awards
Publications
Talks
Activities
Tools
Jobs
Contact
Light
Dark
Automatic
Security
Supervising Smart Home Device Interactions: A Profile-Based Firewall Approach
Despite their ubiquity, the security of Internet of Things devices is unsatisfactory, as demonstrated by several attacks. The IETF’s …
François De Keersmaeker
,
Ramin Sadre
,
Cristel Pelsser
PDF
Cite
URL
Protection contre les fuites de données : un environnement micro-services sécurisé
Les fuites de données au repos sont malheureusement courantes et en augmentation, entrainant des pertes de profits pour les entreprises …
L. Miller
,
P. Merindol
,
A. Gallais
,
C. Pelsser
PDF
Cite
URL
Towards Secure and Leak-Free Workflows Using Microservice Isolation
Data leaks and breaches are on the rise. They result in huge losses of money for businesses like the movie industry, as well as a loss …
L. Miller
,
P. Merindol
,
A. Gallais
,
C. Pelsser
PDF
Cite
URL
A Taxonomy of Attacks Using BGP Blackholing
BGP blackholing is a common technique used to mitigate DDoS attacks. Generally, the victim sends in a request for traffic to the …
Loïc Miller
,
Cristel Pelsser
PDF
Cite
DOI
BGP Communities: Even more Worms in the Routing Can
BGP communities are a mechanism widely used by operators to manage policy, mitigate attacks, and engineer traffic; e.g., to drop …
Florian Streibelt
,
Franziska Lichtblau
,
Robert Beverly
,
Anja Feldmann
,
Cristel Pelsser
,
Georgios Smaragdakis
,
Randy Bush
PDF
Cite
URL
Leveraging Inter-domain Stability for BGP Dynamics Analysis
In the Internet, Autonomous Systems continuously exchange routing information via the BGP protocol: the large number of networks …
Thomas Green
,
Anthony Lambert
,
Cristel Pelsser
,
Dario Rossi
PDF
Cite
DOI
Leveraging interdomain stability for squeezed and juicy BGP dynamics
In the Internet, Autonomous Systems continuously exchange routing information via the BGP protocol: the large number of networks …
Thomas Green
,
Anthony Lambert
,
Dario Rossi
,
Cristel Pelsser
PDF
Cite
URL
Enforcing RPKI-based routing policy on the data plane at an internet exchange
Over a decade of work has gone into securing the BGP rout- ing control plane. Through all this, there has been an oft repeated refrain, …
Josh Bailey
,
Dean Pemberton
,
Andy Linton
,
Cristel Pelsser
,
Randy Bush
PDF
Cite
DOI
Enforcing RPKI-Based Routing Policy on the Data Plane at an Internet Exchange
Over a decade of work has gone into securing the BGP rout- ing control plane. Through all this, there has been an oft repeated refrain, …
Josh Bailey
,
Dean Pemberton
,
Andy Linton
,
Cristel Pelsser
,
Randy Bush
PDF
Cite
URL
Collaborative Repository for Cybersecurity Data and Threat Information
In this paper, we attempt to show how to build a collaborative repository for cybersecurity data and threat information by building on …
Jean Lorchat
,
Cristel Pelsser
,
Romain Fontugne
PDF
Cite
DOI
Cite
×