Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

15 results

  • CREACH LABS - Annual PhD Funding Campaign

    CREACH LABS launches its 2025 thesis grants campaign, joint with the DGA, AID, the Brittany Region and the EUR CyberSchool.
    November 06, 2024
  • CREACH LABS - annual postdoctoral and research engineer funding campaign

    CREACH LABS launches its 2026 call for projects to fund postdoctoral and research engineer positions.
    November 04, 2025
    • Conference

    • Side-channel

    • Fuzzing

    • Protocols

    • Security policies

    • Vulnerability management

    • Embedded systems

    Conférence sur la sécurité couche physique protocolaire

    • October 17, 2025 (09:00 - 15:30)

    • Centre Inria de l’Université de Rennes sur le campus de Beaulieu à Rennes. - Salle Petri-Turing

  • CREACH LABS, partner of the 2025 European Cyber Week

    We will be present at the 10th edition of the European Cyber Week 2025! Join us on November 19-20, 2025, at the Couvent des Jacobins in Rennes.
    September 30, 2025
    • Conference

    BITFLIP 2025 : CyBer, reliability and Tolerance of FauLts in electronic components

    • From November 19, 2025 to November 20, 2025 (09:00 - 18:00)

    • Couvent des Jacobins , 20 Place Saint-Anne, 35000 Rennes (France) - - Metro lines A & B - Station : Place Saint-Anne

    Following the success of the first edition of the “BITFLIP by DGA” conference (CyBer, reliability and Tolerance of FauLts in electronic components) in 2023, CREACH LABS in partnership with the DGA Information Superiority is organizing the second edition of BITFLIP during the European Cyber Week 2025.
    • Thesis defense

    • Fault injection

    • Hardware architecture

    Effects of synchronous clock glitch effect on the security of an integrated circuit

    • June 23, 2025 (14:00 - 17:00)

    • Amphithéâtre PNRB campus de Beaulieu - 263 Av. Général Leclerc - 35700 Rennes

    PhD : Amélie MAROTTA, Centre Inria de l'Université de Rennes, IRISA Context: the various sources of security vulnerability Fault injection is part of a bigger ecosystem of vulnerability exploitation methods, which it can be paired with. To make the study of the security challenges of electronic devices easier, we define three sources of vulnerabilities : software, microarchitectural, and physical[…]