Filtrer par type de contenu

Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.

Supprimer tous les filtres

701 résultats

    • Séminaire

    • SoSysec

    The Battle Against Bots: Current Threats and New Directions to Counter Automated Attacks

    • 22 novembre 2024 (11:00 - 12:00)

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Elisa Chiapponi - Amadeus IT Group

    In today's digital landscape, the battle between industry and automated bots is an ever-evolving challenge. Attackers are leveraging advanced techniques such as residential proxies, CAPTCHA farms, and AI-enhanced fingerprint rotations to evade detection and execute functional abuse attacks, including web scraping, denial of inventory, and SMS pumping. This talk will explore ongoing efforts to[…]
    • SoSysec

    • Intrusion detection

    • Séminaire

    • SoSysec

    From Deciding Knowledge to Intrusion Detection

    • 13 septembre 2024 (11:00 - 12:00)

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Yannick Chevalier - Université de Toulouse

    By interpreting terms as distributions over strings, Abadi and Rogaway proved under suitable assumptions that indistinguishability in the computational setting, accepted as the impossibility for an observer to acquire knowledge from observing a protocol execution, is equivalent to formal equivalence in a symbolic setting. This result led to multiple results on “deciding knowledge” using static[…]
    • SoSysec

    • Intrusion detection

    • Séminaire

    • SemSecuElec

    Une approche langages pour comprendre et affronter les injections de fautes

    • 27 septembre 2024 (11:00 - 12:00)

    • Inria Center of the University of Rennes - Espace de conférences

    Orateur : Sébastien Michelland - Université Grenoble Alpes, Grenoble INP, LCIS

    Est-ce que votre dernier programme fonctionnerait si je sautais une ligne de code ? Deux ? Si je corrompais une variable aléatoirement ? Alors il ne résiste pas aux _attaques par injection de faute_, qui ciblent le matériel et produisent ce type d'effets. Pour être honnête, rien n'y résiste vraiment. Les efforts pour s'en protéger ont malgré tout bien progressé, principalement (et c'est peut-être[…]
    • SemSecuElec

    • Injection de fautes

    • Séminaire

    • SemSecuElec

    Acquisition and Exploitation of Traces from Connected Devices

    • 27 septembre 2024 (10:00 - 11:00)

    • Inria Center of the University of Rennes - - Petri/Turing room

    Orateur : Francesco Servida - École des Sciences Criminelles, Université de Lausanne

    This presentation aims to give an overview of the traces that can be obtained from connected objects as witnesses or actors at a crime scene. Using several scenarios we cover the challenges of detecting connected devices, the relevant locations for data retrieval and the techniques for acquiring said data. We then present how such data can be useful in helping to understand the dynamics of events[…]
    • SemSecuElec

    • Embedded systems

    • Séminaire

    • Cryptographie

    Finding short integer solutions when the modulus is small

    • 24 novembre 2023

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Eamonn Postlethwaite - King's College London

    We present cryptanalysis of the inhomogenous short integer solution (ISIS) problem for anomalously small moduli by exploiting the geometry of BKZ reduced bases of q-ary lattices. We apply this cryptanalysis to examples from the literature where taking such small moduli has been suggested. A recent work [Espitau–Tibouchi–Wallet–Yu, CRYPTO 2022] suggests small versions of the lattice signature[…]
    • Séminaire

    • Cryptographie

    Quantum Linear Key-recovery Attacks Using the QFT

    • 09 février 2024

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : André Schrottenloher - IRISA

    The Quantum Fourier Transform is a fundamental tool in quantum cryptanalysis, not only as the building block of Shor's algorithm, but also in attacks against symmetric cryptosystems. Indeed, hidden shift algorithms such as Simon's (FOCS 1994), which rely on the QFT, have been used to obtain attacks on some very specific block cipher structures. The Fourier Transform is also used in classical[…]