Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
665 résultats
-
-
Séminaire
-
SoSysec
Les cyber opérations, entre opportunités stratégiques et contraintes opérationnelles
Orateur : Stéphane Taillat (Académie Militaire de Saint Cyr-Coëtquidan)
Le recours aux opérations numériques et au cyberespace s’est généralisé dans la gestion des crises et des conflits internationaux. Pour autant, aucune des cyber opérations étatiques ou prêtées à des États n’ont débouché sur des conflits armés ou sur une escalade significative des tensions. A ce titre, cette conférence cherche à s’interroger sur l’utilité stratégique des opérations numériques et du[…] -
-
-
Séminaire
-
SoSysec
Programmable Network Security – Challenges and Opportunities
Orateur : Sandra Scott-Hayward (Queen’s University Belfast)
Society’s dependence on communication networks for all aspects of day-to-day living; business, education, entertainment etc. makes “the network” a very attractive target for malicious attack, which cyber criminals are only too eager to exploit, attempting to limit or block access to essential services (e.g., healthcare, banking, critical infrastructure etc.), disrupting our daily lives and causing[…] -
-
-
Séminaire
-
SemSecuElec
Security of Hardware/Software Interfaces : Research Chair of the Cybersecurity Research Cluster
Orateur : Guillaume Hiet
We proposed to host a thematic semester on attacks based on the interaction between software and hardware. The goal would be to host one workshop, one summer school for young researchers, as well as multiple seminars and longer stays for researchers, spanning September 2019 to March or April 2020. This thematic semester will be funded by the DGA in the context of the Cybersecurity Research Cluster[…] -
-
-
Séminaire
-
SemSecuElec
Lattice-based NIST candidates: abstractions and ninja tricks
Orateur : Thomas Prest
I will present the remaining lattice-based candidates for standardization by NIST (2 signature schemes, 5 encryption schemes). At a high level, these can all be interpreted as straightforward instantiations of decades-old paradigms. But when we look under the hood, all of them make design choices which impact their security, efficiency and portability in distinct manners; we will discuss these.[…] -
-
-
Séminaire
-
SemSecuElec
TRAITOR : a multi clock-glitch attack platform reproducing EMI effects at low-cost
Orateur : Ludovic Claudepierre
Electromagnetic injection (EMI) is a common and non-invasive technique used to perform fault attacks. In that case, an electromagnetic wave is radiated by an antenna in the close vicinity of the targeted microcontroller (STM32 in our case).The clock signal is generated thanks to a Phase-Locked-Loop (PLL). The PLL is highly sensitive to EMI and then induces severe disruption on the clock signal[…] -
-
-
Séminaire
-
SemSecuElec
When Electromagnetic Signals Reveal Obfuscated Malware: Deep and Machine Learning Use cases
Orateur : Duy-Phuc Pham et Damien Marion
The Internet of Things (IoT) is constituted of devices that are expo-nentially growing in number and in complexity. They use plentiful customized firmware and hardware, ignoring potential security issues, which make them a perfect victim for cybercriminals, especially malware authors.We will describe a new usage of side channel information to identify threats that are targeting the device. Using[…] -