Sommaire

Filtrer par type de contenu

Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.

Supprimer tous les filtres

687 résultats

    • Séminaire

    • SoSysec

    Breaking and fixing HB+DB: A Short Tale of Provable vs Experimental Security and Lightweight Designs

    • 02 février 2018

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Ioana Boureanu (University of Surrey)

    HB+ is a well-know authentication scheme purposely designed to be lightweight. However, HB+ is vulnerable to a key-recovery, man-in-the-middle (MiM) attack dubbed GRS. To this end, at WiSec2015, the HB+DB protocol added a distance-bounding dimension to HB+, which was experimentally shown to counteract the GRS attack.In this talk, we will exhibit however a number of security flaws in the HB+DB[…]
    • Séminaire

    • SoSysec

    Voting : You Can’t Have Privacy without Individual Verifiability

    • 01 mars 2019

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Joseph Lallemand (Loria)

    Electronic voting typically aims at two main security goals: vote privacy and verifiability. These two goals are often seen as antagonistic and some national agencies even impose a hierarchy between them: first privacy, and then verifiability as an additional feature. Verifiability typically includes individual verifiability (a voter can check that her ballot is counted); universal verifiability […]
    • Séminaire

    • SoSysec

    Port Contention Goes Portable: Port Contention Side Channels in Web Browsers

    • 13 mai 2022

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Thomas Rokicki (Univ Rennes, CNRS, IRISA)

    Microarchitectural side-channel attacks can derive secrets from the execution of vulnerable programs. Their implementation in web browsers represents a considerable extension of their attack surface, as a user simply browsing a malicious website, or even a malicious third-party advertisement in a benign cross-origin isolated website, can be a victim.In this talk, we present the first CPU port[…]
    • Séminaire

    • SoSysec

    The PINED-RQ Family: Differentially Private Indexes for Range Query Processing in Clouds

    • 13 novembre 2020

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Tristan Allard (IRISA, Université de Rennes 1)

    Performing non- aggregate range queries on cloud stored data, while achieving both privacy and efficiency is a challenging problem. With the PINED-RQ family of techniques, we propose constructing a differentially private index to an outsourced encrypted dataset. Efficiency is enabled by using a cleartext index structure to perform range queries. Security relies on both differential privacy (of the[…]
    • Séminaire

    • SoSysec

    Contemporary Issues in Digital Forensics

    • 31 janvier 2020

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Ben Martini (University of South Australia)

    The discipline of digital forensics, or as it was then known ‘forensic computing’, began with a focus on retrieving admissible evidence from computer systems (typically personal computers). However, with the increased pervasiveness of connected digital technologies in the last 20 years, a wide variety of new and complex sources of digital evidence have emerged. This has presented a range of[…]
    • Séminaire

    • SoSysec

    Differentially Private Linear Sketches: Efficient Implementations and Applications

    • 10 février 2023 (09:30 - 10:30)

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Fuheng Zhao (University of California Santa Barbara)

    Linear sketches have been widely adopted to process fast data streams, and they can be used to accurately answer frequency estimation, approximate top K items, and summarize data distributions. When data are sensitive, it is desirable to provide privacy guarantees for linear sketches to preserve private information while delivering useful results with theoretical bounds. To address these[…]