Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
644 résultats
-
-
Groupe de travail
Modélisation statistique et sécurité des générateurs d'aléa pour la cryptographie
Orateur : David Lubicz - DGA, IRMAR
Dans cet exposé on essaie d'expliquer ce que l'on entend pas méthodes statistiques et on donne des exemples concrets d'application dans la cybersécurité.-
Cryptography
-
-
-
Groupe de travail
Analyse statistique des extrêmes pour la modélisation d'évènements rares ou atypiques
Orateur : Gilles Stupfler - ENSAI
-
-
-
Séminaire
-
SoSysec
Binary Edwards Curves for intrinsically secure ECC implementations for the IoT
Orateur : Antoine Loiseau (CEA)
Even if recent advances in public key cryptography tend to focus on algorithms able to survive the post quantum era, at present, there is a urgent need to propose fast, low power and securely implemented cryptography to address the immediate security challenges of the IoT. In this talk, we present a new set of Binary Edwards Curves which have been defined to achieve the highest security levels (up[…] -
-
-
Séminaire
-
SoSysec
When Good Components Go Bad: Formally Secure CompilationDespite Dynamic Compromise
Orateur : Catalin Hritcu (Inria Paris)
We propose a new formal criterion for secure compilation, providing strong end-to-end security guarantees for components written in unsafe, low-level languages with C-style undefined behavior. Our criterion is the first to model dynamic compromise in a system of mutually distrustful components running with least privilege. Each component is protected from all the others until it becomes[…] -
-
-
Séminaire
-
SoSysec
A Formal Analysis of 5G Authentication
Orateur : Sasa Radomirovic (University of Dundee)
Mobile communication networks connect much of the world’s population. The security of users’ calls, text messages, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP group has standardized the 5G AKA protocol for this purpose.In this talk, I will report on our formalization of the 5G standard’s AKA[…] -
-
-
Séminaire
-
SoSysec
Machine Learning for Computer Security Detection Systems: Practical Feedback and Solutions
Orateur : Anaël Beaugnon (ANSSI)
Machine learning based detection models can strengthen detection, but there remain some significant barriers to the widespread deployment of such techniques in operational detection systems. In this presentation, we identify the main challenges to overcome and we provide both methodological guidance and practical solutions to address them. The solutions we present are completely generic to be[…] -