Registration is compulsory for each talk and must be made at least 48 hours in advance for all "on-site" participants.
Presentation of the seminar
-
Information systems and networks have become indispensable aids in our everyday lives. In addition to highly visible uses as mobile phones or personal computers, it is worth mentioning applications more subtle but equally important for economic activity such as cloud computing, industrial control systems, electrical networks. In fact, our society nurtures a growing dependence towards information systems which makes economic and sovereignty issues related to security increasingly important.
At the same time, due to their increasing complexity, their ubiquity, and multiplicity of risks associated with malicious or fraudulent use, ensuring an acceptable level of security seems close to impossible. Many questions related to the control of the security of softwares and information systems are thus at the origin of an intense scientific activity. We can cite for example intrusion detection, vulnerability research, proof of protocols, static analysis, virtualization…
From the interaction of all these themes, emerges a deep scientific domain that forms a point of contact between fundamental research and applications with a strong economic potential. Rennes metropolitan area is home to many talents in this field of research, both in academia and industry. This seminar aims to become a natural platform to gather, stimulate and promote Rennes security research and development community by confronting it to the best achievements of international research.
-
-
Tristan Allard (Université de Rennes)
-
Louis Rilling (DGA)
-
Nadia Derouault (Inria) - assistant
-
-
The program committee is in charge of the organization and the program of the seminar.
Its members are:- Tristan Allard (Université de Rennes)
- Guillaume Doyen (IMT Atlantique)
- Teddy Furon (Inria)
- Guillaume Hiet (CentraleSupélec)
- Joseph Lallemand (CNRS)
- David Lubicz (DGA-MI)
- Louis Rilling (DGA-MI)
- Mohamed Sabt (Université de Rennes)
- Sandrine Turgis (Université de Rennes)
Practical infos
Next sessions
-
Vers l’émergence d’un droit européen pour la Blockchain : Une approche sous l’angle de la Privacy et de l’encadrement des crypto-actifs
Speaker : Damien Franchi - Univ Rennes, IODE
La Blockchain, technologie derrière Bitcoin, fait l’objet d’un encadrement juridique de plusen plus important, en particulier de la part de l’Union européenne. Curieusement, le mot« Blockchain » n’apparaît pas dans les textes l’encadrant. Les expressions « technologie deregistres distribués » (Distributed ledger technology, DLT), ou, parfois, « registreélectronique » lui sont plutôt privilégiées.[…]-
SoSysec
-
Law
-
-
Blockchain and digital currencies: between European regulation and technological challenges
Speaker : Loïc Miller - CentraleSupélec
As the European Union develops a legal framework for crypto-assets and data protection, the technological question underlying the emergence of a genuine digital currency remains open. Blockchain today stands as an interdisciplinary field of study at the crossroads of computer science, economics, and law. This presentation will place the ongoing regulatory framework in perspective with the[…]-
SoSysec
-
Distributed systems
-
-
Hardware-Software Co-Designs for Microarchitectural Security
Speaker : Lesly-Ann Daniel - EURECOM
Microarchitectural optimizations, such as caches and speculative out-of-order execution, are essential for achieving high performance. However, these same mechanisms also open the door to attacks that can undermine software-enforced security policies. The current gold standard for defending against such attacks is the constant-time programming discipline, which prohibits secret-dependent control[…]-
SoSysec
-
Hardware/software co-design
-
Micro-architectural vulnerabilities
-
-
Should I trust or should I go? A deep dive into the (not so reliable) web PKI trust model
Speaker : Romain Laborde - University of Toulouse
The padlock shown in the URL bar of our favorite web browser indicates that we are connected using a secure HTTPS connection and providing some sense of security. Unfortunately, the reality is slightly more complex. The trust model of the underlying Web PKI is invalid, making TLS a colossus with feet of clay. In this talk, we will dive into the trust model of the web PKI ecosystem to understand[…]-
SoSysec
-
Protocols
-
Network
-
Subscribe to the mailing list
A mailing list is available for announcements concerning SoSySeC seminar