Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
14 results
-
CREACH LABS - annual postdoctoral and research engineer funding campaign
CREACH LABS launches its 2026 call for projects to fund postdoctoral and research engineer positions.November 04, 2025 -
-
Conference
-
Side-channel
-
Fuzzing
-
Protocols
-
Security policies
-
Vulnerability management
-
Embedded systems
Conférence sur la sécurité couche physique protocolaire
-
-
CREACH LABS, partner of the 2025 European Cyber Week
We will be present at the 10th edition of the European Cyber Week 2025! Join us on November 19-20, 2025, at the Couvent des Jacobins in Rennes.September 30, 2025 -
-
Conference
BITFLIP 2025 : CyBer, reliability and Tolerance of FauLts in electronic components
Following the success of the first edition of the “BITFLIP by DGA” conference (CyBer, reliability and Tolerance of FauLts in electronic components) in 2023, CREACH LABS in partnership with the DGA Information Superiority is organizing the second edition of BITFLIP during the European Cyber Week 2025. -
-
-
Thesis defense
-
Fault injection
-
Hardware architecture
Effects of synchronous clock glitch effect on the security of an integrated circuit
PhD : Amélie MAROTTA, Centre Inria de l'Université de Rennes, IRISA Context: the various sources of security vulnerability Fault injection is part of a bigger ecosystem of vulnerability exploitation methods, which it can be paired with. To make the study of the security challenges of electronic devices easier, we define three sources of vulnerabilities : software, microarchitectural, and physical[…] -
-
-
Thesis defense
Identification par apprentissage de l’empreinte radio-fréquence de dispositifs sensibles
PhD : Alice Chillet, Université de Rennes, IRISA L’identification de dispositifs dits sensibles est soumise à différentes contraintes de sécurité ou de consommation d’énergie, ce qui rend les méthodes d’identification classiques peu adaptées. Pour répondre à ces contraintes, il est possible d’utiliser les défauts intrinsèques de la chaîne de transmission des dispositifs pour les[…] -