Filtrer par type de contenu

Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.

Supprimer tous les filtres

673 résultats

    • Séminaire

    • SemSecuElec

    Bridging Deep Learning and Classical Profiled Side-Channel Attacks

    • 08 avril 2022

    • Thales ITSEF, Toulouse - Salle Pétri/Turing

    Orateur : Gabriel Zaid

    Over the recent years, the cryptanalysis community leveraged the potential of research on Deep Learning to enhance attacks. In particular, several studies have recently highlighted the benefits of Deep Learning based Side-Channel Attacks (DLSCA) to target real-world cryptographic implementations. While this new research area on applied cryptography provides impressive result to recover a secret[…]
    • Séminaire

    • SemSecuElec

    Lattice-based NIST candidates: abstractions and ninja tricks

    • 23 avril 2021

    • PQShield – United Kingdom - Web-Conférence

    Orateur : Thomas Prest

    I will present the remaining lattice-based candidates for standardization by NIST (2 signature schemes, 5 encryption schemes). At a high level, these can all be interpreted as straightforward instantiations of decades-old paradigms. But when we look under the hood, all of them make design choices which impact their security, efficiency and portability in distinct manners; we will discuss these.[…]
    • Séminaire

    • SemSecuElec

    Security of Hardware/Software Interfaces : Research Chair of the Cybersecurity Research Cluster

    • 22 juin 2018

    • Centrale-Supelec - Salles Petri/Turing

    Orateur : Guillaume Hiet

    We proposed to host a thematic semester on attacks based on the interaction between software and hardware. The goal would be to host one workshop, one summer school for young researchers, as well as multiple seminars and longer stays for researchers, spanning September 2019 to March or April 2020. This thematic semester will be funded by the DGA in the context of the Cybersecurity Research Cluster[…]
    • Séminaire

    • SemSecuElec

    When Electromagnetic Signals Reveal Obfuscated Malware: Deep and Machine Learning Use cases

    • 22 octobre 2021

    • Univ Rennes, CNRS, Inria, IRISA Rennes - Salle Petri/Turing

    Orateur : Duy-Phuc Pham et Damien Marion

    The Internet of Things (IoT) is constituted of devices that are expo-nentially growing in number and in complexity. They use plentiful customized firmware and hardware, ignoring potential security issues, which make them a perfect victim for cybercriminals, especially malware authors.We will describe a new usage of side channel information to identify threats that are targeting the device. Using[…]
    • Séminaire

    • SemSecuElec

    TRAITOR : a multi clock-glitch attack platform reproducing EMI effects at low-cost

    • 05 avril 2019

    • INRIA - Salles Pétri/Turing

    Orateur : Ludovic Claudepierre

    Electromagnetic injection (EMI) is a common and non-invasive technique used to perform fault attacks. In that case, an electromagnetic wave is radiated by an antenna in the close vicinity of the targeted microcontroller (STM32 in our case).The clock signal is generated thanks to a Phase-Locked-Loop (PLL). The PLL is highly sensitive to EMI and then induces severe disruption on the clock signal[…]
    • Séminaire

    • SemSecuElec

    Laser-Based Attacks Against FPGA Bitstream Encryption

    • 07 juin 2019

    • Technische Universität Berlin - Salles Petri/Turing

    Orateur : Heiko Lohrke

    Field programmable gate arrays (FPGAs) use encryption to protect the configuration data or “bitstream” containing the design to be run on the device. This encryption aims at protecting the intellectual property and other secrets contained in the bitstream and preventing e.g. cloning or tampering with an FPGA implementation.This talk will demonstrate how attackers can use failure analysis equipment[…]