Filtrer par type de contenu

Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.

Supprimer tous les filtres

634 résultats

    • Séminaire

    • SemSecuElec

    Lattice-based NIST candidates: abstractions and ninja tricks

    • 23 avril 2021

    • PQShield – United Kingdom - Web-Conférence

    Orateur : Thomas Prest

    I will present the remaining lattice-based candidates for standardization by NIST (2 signature schemes, 5 encryption schemes). At a high level, these can all be interpreted as straightforward instantiations of decades-old paradigms. But when we look under the hood, all of them make design choices which impact their security, efficiency and portability in distinct manners; we will discuss these.[…]
    • Séminaire

    • SemSecuElec

    TRAITOR : a multi clock-glitch attack platform reproducing EMI effects at low-cost

    • 05 avril 2019

    • INRIA - Salles Pétri/Turing

    Orateur : Ludovic Claudepierre

    Electromagnetic injection (EMI) is a common and non-invasive technique used to perform fault attacks. In that case, an electromagnetic wave is radiated by an antenna in the close vicinity of the targeted microcontroller (STM32 in our case).The clock signal is generated thanks to a Phase-Locked-Loop (PLL). The PLL is highly sensitive to EMI and then induces severe disruption on the clock signal[…]
    • Séminaire

    • SemSecuElec

    When Electromagnetic Signals Reveal Obfuscated Malware: Deep and Machine Learning Use cases

    • 22 octobre 2021

    • Univ Rennes, CNRS, Inria, IRISA Rennes - Salle Petri/Turing

    Orateur : Duy-Phuc Pham et Damien Marion

    The Internet of Things (IoT) is constituted of devices that are expo-nentially growing in number and in complexity. They use plentiful customized firmware and hardware, ignoring potential security issues, which make them a perfect victim for cybercriminals, especially malware authors.We will describe a new usage of side channel information to identify threats that are targeting the device. Using[…]
    • Séminaire

    • SemSecuElec

    Security challenges and opportunities in emerging device technologies: a case study on flexible electronics

    • 06 mai 2022

    • Inria Center of the University of Rennes - Espace de conférences

    Orateur : Nele Mentens - KU Leuven, Belgium

    While traditional chips in bulk silicon technology are widely used for reliable and highly ef?cient systems, there are applications that call for devices in other technologies. On the one hand, novel device technologies need to be re-evaluated with respect to potential threats and attacks, and how these can be faced with existing and novel security solutions and methods. On the other hand,[…]
    • Séminaire

    • SemSecuElec

    Laser-Based Attacks Against FPGA Bitstream Encryption

    • 07 juin 2019

    • Technische Universität Berlin - Salles Petri/Turing

    Orateur : Heiko Lohrke

    Field programmable gate arrays (FPGAs) use encryption to protect the configuration data or “bitstream” containing the design to be run on the device. This encryption aims at protecting the intellectual property and other secrets contained in the bitstream and preventing e.g. cloning or tampering with an FPGA implementation.This talk will demonstrate how attackers can use failure analysis equipment[…]
    • Séminaire

    • SemSecuElec

    HardBlare, a hardware/software co-design approach for Information Flow Control

    • 22 juin 2018

    • Centrale-Supelec - Salles Petri/Turing

    Orateur : Guillaume Hiet – Pascal Cotret

    One way to increase the security level of computer systems is to rely on both software and hardware mechanisms. In this context, the HardBlare project proposes a software hardware co-design methodology to ensure that security properties are preserved all along the execution of the system but also during file storage. The HardBlare project is a multidisciplinary project between CentraleSupélec IETR[…]