Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
687 results
-
-
Seminar
-
SemSecuElec
When Electromagnetic Signals Reveal Obfuscated Malware: Deep and Machine Learning Use cases
Speaker : Duy-Phuc Pham et Damien Marion
The Internet of Things (IoT) is constituted of devices that are expo-nentially growing in number and in complexity. They use plentiful customized firmware and hardware, ignoring potential security issues, which make them a perfect victim for cybercriminals, especially malware authors.We will describe a new usage of side channel information to identify threats that are targeting the device. Using[…] -
-
-
Seminar
-
SemSecuElec
Laser-Based Attacks Against FPGA Bitstream Encryption
Speaker : Heiko Lohrke
Field programmable gate arrays (FPGAs) use encryption to protect the configuration data or “bitstream” containing the design to be run on the device. This encryption aims at protecting the intellectual property and other secrets contained in the bitstream and preventing e.g. cloning or tampering with an FPGA implementation.This talk will demonstrate how attackers can use failure analysis equipment[…] -
-
-
Seminar
-
SemSecuElec
Security challenges and opportunities in emerging device technologies: a case study on flexible electronics
Speaker : Nele Mentens - KU Leuven, Belgium
While traditional chips in bulk silicon technology are widely used for reliable and highly ef?cient systems, there are applications that call for devices in other technologies. On the one hand, novel device technologies need to be re-evaluated with respect to potential threats and attacks, and how these can be faced with existing and novel security solutions and methods. On the other hand,[…] -
-
-
Seminar
-
SemSecuElec
Calibration Done Right: Noiseless Flush+Flush Attacks
Speaker : Guillaume Didier
Caches leak information through timing measurements and so-called side-channel attacks. Several primitives exist with different requirements and trade-offs. Flush+Flush is a stealthy and fast cache attack primitive that uses the timing of the clflush instruction depending on the presence of a line in the cache. However, the CPU interconnect plays a bigger role than thought in these timings, and[…] -
-
-
Seminar
-
SemSecuElec
HardBlare, a hardware/software co-design approach for Information Flow Control
Speaker : Guillaume Hiet – Pascal Cotret
One way to increase the security level of computer systems is to rely on both software and hardware mechanisms. In this context, the HardBlare project proposes a software hardware co-design methodology to ensure that security properties are preserved all along the execution of the system but also during file storage. The HardBlare project is a multidisciplinary project between CentraleSupélec IETR[…] -
-
-
Seminar
-
SemSecuElec
Rank metric cryptography and its implementations
Speaker : Nicolas Aragon
In 2017, the NIST (National Institute for Standards and Technology) started astandardization process in order to select post-quantum encryption and digital signature schemes. Among the proposed solutions, two rank-metric based encryption schemes were selected for the second round of the standardization process: ROLLOand RQC.This raised questions about both the performance and the security of the[…] -