Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
652 results
-
-
Seminar
-
SoSysec
Intrusion Detection Systems over an Encrypted Traffic: Problem and Solutions
Speaker : Sébastien Canard (Orange)
Privacy and data confidentiality are today at the heart of many discussions. But such data protection should not be done at the detriment of other security aspects. In the context of network traffic, intrusion detection system becomes in particular totally blind when the traffic is encrypted, making clients again vulnerable to known threats and attacks. Reconciling security and privacy is then one[…] -
-
-
Seminar
-
SoSysec
Reasoning over leaks of information for Access Control of Databases
Speaker : Pierre Bourhis (CNRS, CRISTAL)
Controlling the access of data in Database management systems is a classical problem and it has been solved through different mechanisms. One of the most common mechanism implemented in most Database management systems is the mechanism of views, i.e defining the accessible data of a user as the result of a query. This mechanism is also used in principle in other systems such as in social networks.[…] -
-
-
Seminar
-
SoSysec
Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate
Speaker : Grégoire Menguy (CEA LIST)
Code obfuscation aims at protecting Intellectual Property and other secrets embedded into software from being retrieved. Recent works leverage advances in artificial intelligence (AI) with the hope of getting blackbox deobfuscators completely immune to standard (whitebox) protection mechanisms. While promising, this new field of AI-based, and more specifically search-based blackbox deobfuscation,[…] -
-
-
Seminar
-
SoSysec
Squirrel: a new approach to computer-assisted proofs of protocols in the computational model.
Speaker : David Baelde (ENS Cachan)
Formal methods have brought several approaches for proving that security protocols ensure the expected security and privacy properties. Most of the resulting tools analyze protocols in symbolic models, aka. Dolev-Yao-style models. Security in the symbolic model does not imply security in the cryptographer’s standard model, the computational model, where attackers are arbitrary (PPTIME) Turing[…] -
-
-
Seminar
-
SoSysec
Intriguing Properties of Adversarial ML Attacks in the Problem Space
Speaker : Fabio Pierazzi (King’s College London)
Recent research efforts on adversarial ML have investigated problem-space attacks, focusing on the generation of real evasive objects in domains where, unlike images, there is no clear inverse mapping to the feature space (e.g., software). However, the design, comparison, and real-world implications of problem-space attacks remain underexplored. In this talk, I will present two major contributions[…] -
-
-
Seminar
-
SoSysec
Thwarting covert adversaries in FHE pipelines
Speaker : Sylvain Chatel (EPFL)
Fully Homomorphic Encryption (FHE) enables computations to be executed directly on encrypted data without decryption, thus it is becoming an auspicious solution to protect the confidentiality of sensitive data without impeding its usability for the purpose of analytics. While many practical systems rely on FHE to achieve strong privacy guarantees, their constructions only consider an honest-but[…] -