Ameni Souid
Master’s student in software engineering
under the direction of Prof. Luc Lavoie
After completing an internship at GRIIS in 2019, Ameni Souid joined the GRIIS student community to complete her master’s degree in software engineering. Her research interests focus on security and data protection.
Education
Diplôme national d’ingénieur, École nationale d’ingénieur de Sousse-Tunisie, applied computer science
Awards
Postgraduate Scholarship, Mitacs Globalink, 2020
Research Internship Award, Mitacs Globalink, 2019
Publications
2298129
Journal Article
Souid, Ameni
https://www.zotero.org/styles/springer-basic-author-date-no-et-al
50
date
desc
year
1
1
title
Souid A
5091
https://griis.ca/wp-content/plugins/zotpress/
2298129
Book Section
Souid, Ameni
https://www.zotero.org/styles/springer-basic-author-date-no-et-al
50
date
desc
year
1
1
title
Souid A
5091
https://griis.ca/wp-content/plugins/zotpress/
2298129
Conference Paper
Souid, Ameni
https://www.zotero.org/styles/springer-basic-author-date-no-et-al
50
date
desc
year
1
1
title
Souid A
5091
https://griis.ca/wp-content/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3A%22zotpress-733f3d421aa9f65797c1357182e96672%22%2C%22meta%22%3A%7B%22request_last%22%3A50%2C%22request_next%22%3A50%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%22XTXXMTLW%22%2C%22library%22%3A%7B%22id%22%3A2298129%7D%2C%22meta%22%3A%7B%22lastModifiedByUser%22%3A%7B%22id%22%3A8739163%2C%22username%22%3A%22coum2719%22%2C%22name%22%3A%22%22%2C%22links%22%3A%7B%22alternate%22%3A%7B%22href%22%3A%22https%3A%5C%2F%5C%2Fwww.zotero.org%5C%2Fcoum2719%22%2C%22type%22%3A%22text%5C%2Fhtml%22%7D%7D%7D%2C%22creatorSummary%22%3A%22Ecarot%20et%20al.%22%2C%22parsedDate%22%3A%222020-12%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EEcarot%20T%2C%20Dussault%20S%2C%20%3Cstrong%3ESouid%20A%3C%5C%2Fstrong%3E%2C%20Lavoie%20L%2C%20Ethier%20J-F%20%282020%29%20AppArmor%20For%20Health%20Data%20Access%20Control%3A%20Assessing%20Risks%20and%20Benefits.%20In%3A%202020%207th%20International%20Conference%20on%20Internet%20of%20Things%3A%20Systems%2C%20Management%20and%20Security%20%28IOTSMS%29.%20Paris%2C%20France%2C%20pp%201%26%23x2013%3B7%20%3Ca%20title%3D%27Cite%20in%20RIS%20Format%27%20class%3D%27zp-CiteRIS%27%20href%3D%27https%3A%5C%2F%5C%2Fgriis.ca%5C%2Fwp-content%5C%2Fplugins%5C%2Fzotpress%5C%2Flib%5C%2Frequest%5C%2Frequest.cite.php%3Fapi_user_id%3D2298129%26amp%3Bitem_key%3DXTXXMTLW%27%3ECite%3C%5C%2Fa%3E%20%20%3Ca%20title%3D%27Download%27%20class%3D%27zp-DownloadURL%27%20href%3D%27https%3A%5C%2F%5C%2Fieeexplore.ieee.org%5C%2Fdocument%5C%2F9340206%27%3EDownload%3C%5C%2Fa%3E%20%3Ca%20title%3D%27Download%27%20class%3D%27zp-DownloadURL%27%20href%3D%27https%3A%5C%2F%5C%2Fgriis.ca%5C%2Fwp-content%5C%2Fplugins%5C%2Fzotpress%5C%2Flib%5C%2Frequest%5C%2Frequest.dl.php%3Fapi_user_id%3D2298129%26amp%3Bdlkey%3DEQ5CSH6Y%26amp%3Bcontent_type%3Dapplication%5C%2Fpdf%27%3EDownload%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22AppArmor%20For%20Health%20Data%20Access%20Control%3A%20Assessing%20Risks%20and%20Benefits%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Thibaud%22%2C%22lastName%22%3A%22Ecarot%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Samuel%22%2C%22lastName%22%3A%22Dussault%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ameni%22%2C%22lastName%22%3A%22Souid%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Luc%22%2C%22lastName%22%3A%22Lavoie%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jean-Fran%5Cu00e7ois%22%2C%22lastName%22%3A%22Ethier%22%7D%5D%2C%22abstractNote%22%3A%22The%20AppArmor%20Linux%20Security%20Module%20%28LSM%29%20is%20widely%20used%20on%20Linux%20operating%20systems%20as%20it%2C%20among%20other%20things%2C%20provides%20mandatory%20access%20control%20%28MAC%29%20and%20isolates%20processes.%20This%20isolation%20helps%20meet%20the%20privacy%20requirements%20for%20critical%20applications.%20These%20application%20security%20policies%20are%20defined%20with%20profiles%20loaded%20into%20the%20Linux%20system%20kernel.%20However%2C%20these%20access%20control%20mechanisms%20are%20far%20from%20covering%20all%20the%20rising%20demands%20for%20confidentiality%20enforcement%20regarding%20critical%20applications.%20This%20paper%20conducts%20a%20risks%20and%20benefits%20analysis%20to%20assess%20whether%20a%20healthcare%20infrastructure%20can%20safely%20rely%20on%20the%20AppArmor%20LSM%20to%20protect%20its%20sensitive%20data.%20Thus%2C%20the%20general%20architecture%20of%20AppAmor%20comes%20to%20be%20detailed.%20Then%2C%20a%20static%20code%20analysis%20is%20performed%20to%20study%20the%20data%20structures%20found%20in%20the%20LSM.%20Finally%2C%20the%20outbreak%20of%20would-be%20side-channel%20attacks%20from%20userspace%20is%20discussed%20while%20offering%20mitigation%20methods.%20The%20result%20of%20this%20analysis%20shows%20that%20the%20AppArmor%20LSM%20is%20susceptible%20to%20side-channel%20attacks%20and%20should%20be%20used%20as%20part%20of%20a%20more%20comprehensive%20defense-in-depth%20strategy.%22%2C%22date%22%3A%222020-12%22%2C%22proceedingsTitle%22%3A%222020%207th%20International%20Conference%20on%20Internet%20of%20Things%3A%20Systems%2C%20Management%20and%20Security%20%28IOTSMS%29%22%2C%22conferenceName%22%3A%222020%207th%20International%20Conference%20on%20Internet%20of%20Things%3A%20Systems%2C%20Management%20and%20Security%20%28IOTSMS%29%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1109%5C%2FIOTSMS52051.2020.9340206%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%5D%2C%22dateModified%22%3A%222022-10-13T00%3A24%3A29Z%22%7D%7D%5D%7D
2298129
Presentation
Souid, Ameni
https://www.zotero.org/styles/springer-basic-author-date-no-et-al
50
date
desc
year
1
1
title
Souid A
5091
https://griis.ca/wp-content/plugins/zotpress/
2298129
Report
Souid, Ameni
https://www.zotero.org/styles/springer-basic-author-date-no-et-al
50
date
desc
year
1
1
title
Souid A
5091
https://griis.ca/wp-content/plugins/zotpress/
2298129
Thesis
Souid, Ameni
https://www.zotero.org/styles/springer-basic-author-date-no-et-al
50
date
desc
year
1
1
title
Souid A
5091
https://griis.ca/wp-content/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3A%22zotpress-48c22569ca663db6de1158a4422e927e%22%2C%22meta%22%3A%7B%22request_last%22%3A0%2C%22request_next%22%3A0%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%225FIXDZYJ%22%2C%22library%22%3A%7B%22id%22%3A2298129%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Souid%22%2C%22parsedDate%22%3A%222024%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%3Cstrong%3ESouid%20A%3C%5C%2Fstrong%3E%20%282024%29%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fsavoirs.usherbrooke.ca%5C%2Fhandle%5C%2F11143%5C%2F21482%27%3EProposition%20de%20mod%5Cu00e9lisation%20de%20la%20d%5Cu00e9fense%20en%20profondeur%20des%20actifs%20informationnels%20appuy%5Cu00e9e%20par%20une%20ontologie%3C%5C%2Fa%3E.%20M%5Cu00e9moire%20de%20maitrise%2C%20Universit%5Cu00e9%20de%20Sherbrooke%20%3Ca%20title%3D%27Cite%20in%20RIS%20Format%27%20class%3D%27zp-CiteRIS%27%20href%3D%27https%3A%5C%2F%5C%2Fgriis.ca%5C%2Fwp-content%5C%2Fplugins%5C%2Fzotpress%5C%2Flib%5C%2Frequest%5C%2Frequest.cite.php%3Fapi_user_id%3D2298129%26amp%3Bitem_key%3D5FIXDZYJ%27%3ECite%3C%5C%2Fa%3E%20%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22thesis%22%2C%22title%22%3A%22Proposition%20de%20mod%5Cu00e9lisation%20de%20la%20d%5Cu00e9fense%20en%20profondeur%20des%20actifs%20informationnels%20appuy%5Cu00e9e%20par%20une%20ontologie%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ameni%22%2C%22lastName%22%3A%22Souid%22%7D%5D%2C%22abstractNote%22%3A%22Les%20syst%5Cu00e8mes%20d%27information%20ont%20jou%5Cu00e9%20un%20r%5Cu00f4le%20primordial%20dans%20la%20transformation%20num%5Cu00e9rique%20des%20organisations.%20Celles-ci%2C%20pour%20assurer%20la%20continuit%5Cu00e9%20et%20l%27int%5Cu00e9grit%5Cu00e9%20de%20leurs%20activit%5Cu00e9s%2C%20ont%20rapidement%20ressenti%20le%20besoin%20de%20mettre%20en%20place%20des%20m%5Cu00e9canismes%20pour%20renforcer%20la%20protection%20de%20leurs%20actifs.%20Dans%20ce%20contexte%20la%20notion%20de%20%5Cu00abd%5Cu00e9fense%20en%20profondeur%5Cu00bb%20se%20d%5Cu00e9marque%2C%20visant%20une%20protection%20multicouche%20des%20actifs.%20Afin%20de%20formaliser%20cette%20approche%2C%20nous%20introduisons%20l%27ontologie%20de%20d%5Cu00e9fense%20en%20profondeur%20des%20actifs%20informationnels%20%28ODPA%3A%20Ontology%20for%20Deep%20Protection%20of%20Information%20Assets%29.%20Son%20objectif%20est%20d%27obtenir%20une%20repr%5Cu00e9sentation%20homog%5Cu00e8ne%2C%20robuste%20et%20exploitable%20de%20l%27ensemble%20des%20%5Cu00e9l%5Cu00e9ments%20de%20s%5Cu00e9curit%5Cu00e9.%20La%20mise%20en%20place%20d%27une%20telle%20ontologie%20soul%5Cu00e8ve%20plusieurs%20d%5Cu00e9fis.%20Tout%20d%27abord%2C%20quels%20sont%20les%20m%5Cu00e9thodes%20et%20mod%5Cu00e8les%20les%20plus%20adapt%5Cu00e9s%20pour%20repr%5Cu00e9senter%20efficacement%20la%20multitude%20d%27actifs%20et%20les%20diverses%20couches%20de%20d%5Cu00e9fense%3F%20Ensuite%2C%20comment%20garantir%20que%20cette%20ontologie%2C%20une%20fois%20%5Cu00e9labor%5Cu00e9e%2C%20offre%20une%20couverture%20exhaustive%20et%20pertinente%20des%20menaces%20potentielles%20tout%20en%20%5Cu00e9tant%20suffisamment%20agile%20pour%20s%27adapter%20%5Cu00e0%20l%27%5Cu00e9volution%20des%20risques%3F%20Les%20outils%20actuels%20de%20gestion%20de%20la%20s%5Cu00e9curit%5Cu00e9%20de%20l%27information%20se%20basent%20souvent%20sur%20des%20approches%20fragment%5Cu00e9es%2C%20parfois%20redondantes%20et%20ne%20r%5Cu00e9pondant%20pas%20toujours%20aux%20besoins%20sp%5Cu00e9cifiques%20des%20organisations.%20Ces%20outils%20manquent%20souvent%20de%20formalisation%20et%20s%27appuient%20sur%20des%20pratiques%20empiriques%20plut%5Cu00f4t%20que%20sur%20des%20m%5Cu00e9thodologies%20formelles.%20Dans%20ce%20contexte%2C%20nous%20pr%5Cu00e9sentons%20ODPA%2C%20un%20cadre%20de%20r%5Cu00e9f%5Cu00e9rence%20visant%20%5Cu00e0%20offrir%20une%20repr%5Cu00e9sentation%20syst%5Cu00e9matique%20et%20exhaustive%20des%20actifs%20%5Cu00e0%20s%5Cu00e9curiser%20et%20des%20m%5Cu00e9canismes%20de%20d%5Cu00e9fense%20associ%5Cu00e9s.%20L%27ontologie%20ODPA%20est%20con%5Cu00e7ue%20pour%20d%5Cu00e9crire%20en%20d%5Cu00e9tail%20les%20%5Cu00e9l%5Cu00e9ments%20constitutifs%20relatifs%20%5Cu00e0%20la%20s%5Cu00e9curit%5Cu00e9%2C%20ainsi%20que%20les%20contraintes%20d%27int%5Cu00e9grit%5Cu00e9%20associ%5Cu00e9es.%20Gr%5Cu00e2ce%20%5Cu00e0%20des%20algorithmes%20de%20construction%20sp%5Cu00e9cifiques%2C%20cette%20ontologie%20vise%20%5Cu00e0%20offrir%20une%20vision%20coh%5Cu00e9rente%2C%20structur%5Cu00e9e%20et%20%5Cu00e9volutive%20de%20la%20d%5Cu00e9fense%20en%20profondeur.%20L%27objectif%20est%20de%20faciliter%20la%20mise%20en%20%5Cu0153uvre%20de%20strat%5Cu00e9gies%20de%20d%5Cu00e9fense%20adapt%5Cu00e9es%20aux%20besoins%20des%20organisations.%20De%20plus%2C%20compte%20tenu%20de%20l%27importance%20croissante%20de%20la%20protection%20des%20donn%5Cu00e9es%20de%20sant%5Cu00e9%2C%20l%27ontologie%20ODPA%20pourrait%20%5Cu00e9ventuellement%20%5Cu00eatre%20appliqu%5Cu00e9e%20dans%20ce%20contexte%20sp%5Cu00e9cifique.%20Elle%20pourrait%20ainsi%20contribuer%20%5Cu00e0%20renforcer%20la%20s%5Cu00e9curit%5Cu00e9%20des%20informations%20de%20sant%5Cu00e9%20et%20%5Cu00e0%20garantir%20la%20confidentialit%5Cu00e9%20des%20donn%5Cu00e9es%20des%20patients%22%2C%22thesisType%22%3A%22M%5Cu00e9moire%20de%20maitrise%22%2C%22university%22%3A%22Universit%5Cu00e9%20de%20Sherbrooke%22%2C%22date%22%3A%222024%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fsavoirs.usherbrooke.ca%5C%2Fhandle%5C%2F11143%5C%2F21482%22%2C%22collections%22%3A%5B%5D%2C%22dateModified%22%3A%222024-03-25T20%3A56%3A47Z%22%7D%7D%5D%7D
Souid A (2024) Proposition de modélisation de la défense en profondeur des actifs informationnels appuyée par une ontologie. Mémoire de maitrise, Université de Sherbrooke Cite