Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
657 results
-
-
Seminar
-
SoSysec
The Internet of Backdoors
Speaker : par Sam L. Thomas (University of Birmingham, UK)
Complex embedded devices are becoming ever prevalent in our everyday lives, yet only a tiny amount of people consider the potential security and privacy implications of attaching such devices to our home, business and government networks. As demonstrated through recent publications from academia and blog posts from numerous industry figures, these devices are plagued by poor design choices[…] -
-
-
Seminar
-
SoSysec
Subject Access Request and Proof of Ownership
Speaker : Cédric Lauradoux (INRIA Rhône-Alpes)
The GDPR (General Data Protection Regulation) provides rights on our data: access, rectification, objection, etc. However, this regulation is not binding on how we can exercise these rights. Data controllers have therefore deployed various methods to authenticate subject requests. We have analyzed how this authentication process can fail and examined its consequences. Our study shows that a key[…] -
-
-
Seminar
-
SoSysec
Splitting the Linux Kernel for Fun and Profit
Speaker : Chris Dalton (HP, Bristol, UK)
This talk looks at a pragmatic attempt at strengthening the security properties of Linux by introducing a degree of intra-kernel protection into the Linux kernel (supported by CPU Virtualization silicon features). Consider it, if you like, an attempt at retrofitting a ‘micro-kernel’ interface into traditionally monolithic Linux whilst maintaining a single linux code base (yes it’s still Linux), no[…] -
-
-
Seminar
-
SoSysec
Anonymous Server-Aided Verification
Speaker : par Elena Pagnin (Chalmers University of Technology, Sweden)
Server-Aided Verification (SAV) is a method that can be employed to speed up the process of verifying signatures by letting the verifier outsource part of its computation load to a third party. Achieving fast and reliable verification under the presence of an untrusted server is an attractive goal in cloud computing and internet of things scenarios.In this talk I will describe a simple and[…] -
-
-
Seminar
-
SoSysec
Présentation des fondamentaux du management du risque et d’EBIOS Risk Manager
Speaker : Vincent Loriot (ANSSI)
Résumé :a. Présentation ANSSIb. Tendances de la menace cyber et démarche pour s’en protégerc. Fondamentaux de la méthode EBIOS Risk ManagerLa présentation théorique sera complétée avec un atelier pratique couvrant les sujets suivants :a. Les besoins et enjeux de sécuritéb. Les couples Source de Risque / Objectif Viséc. La cartographie de menace de l’écosystème -
-
-
Seminar
-
SoSysec
Privacy in The 5G-AKA Authentication Protocol
Speaker : Adrien Koutsos (LSV)
The 5G mobile communications standards are being finalized, and drafts are now available. This standard describes the 5G-AKA authentication and key exchange protocol. The previous version of AKA (3G and 4G) are well-known for their lack of privacy against an active adversary (e.g. a user can be massively tracked using IMSI-catcher). This new version of AKA tries to offer more privacy, notably[…] -