Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
667 résultats
-
-
Séminaire
-
SoSysec
Binary Edwards Curves for intrinsically secure ECC implementations for the IoT
Orateur : Antoine Loiseau (CEA)
Even if recent advances in public key cryptography tend to focus on algorithms able to survive the post quantum era, at present, there is a urgent need to propose fast, low power and securely implemented cryptography to address the immediate security challenges of the IoT. In this talk, we present a new set of Binary Edwards Curves which have been defined to achieve the highest security levels (up[…] -
-
-
Séminaire
-
SoSysec
When Good Components Go Bad: Formally Secure CompilationDespite Dynamic Compromise
Orateur : Catalin Hritcu (Inria Paris)
We propose a new formal criterion for secure compilation, providing strong end-to-end security guarantees for components written in unsafe, low-level languages with C-style undefined behavior. Our criterion is the first to model dynamic compromise in a system of mutually distrustful components running with least privilege. Each component is protected from all the others until it becomes[…] -
-
-
Séminaire
-
SoSysec
A Formal Analysis of 5G Authentication
Orateur : Sasa Radomirovic (University of Dundee)
Mobile communication networks connect much of the world’s population. The security of users’ calls, text messages, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP group has standardized the 5G AKA protocol for this purpose.In this talk, I will report on our formalization of the 5G standard’s AKA[…] -
-
-
Séminaire
-
SoSysec
Machine Learning for Computer Security Detection Systems: Practical Feedback and Solutions
Orateur : Anaël Beaugnon (ANSSI)
Machine learning based detection models can strengthen detection, but there remain some significant barriers to the widespread deployment of such techniques in operational detection systems. In this presentation, we identify the main challenges to overcome and we provide both methodological guidance and practical solutions to address them. The solutions we present are completely generic to be[…] -
-
-
Séminaire
-
SoSysec
The Internet of Backdoors
Orateur : par Sam L. Thomas (University of Birmingham, UK)
Complex embedded devices are becoming ever prevalent in our everyday lives, yet only a tiny amount of people consider the potential security and privacy implications of attaching such devices to our home, business and government networks. As demonstrated through recent publications from academia and blog posts from numerous industry figures, these devices are plagued by poor design choices[…] -
-
-
Séminaire
-
SoSysec
Subject Access Request and Proof of Ownership
Orateur : Cédric Lauradoux (INRIA Rhône-Alpes)
The GDPR (General Data Protection Regulation) provides rights on our data: access, rectification, objection, etc. However, this regulation is not binding on how we can exercise these rights. Data controllers have therefore deployed various methods to authenticate subject requests. We have analyzed how this authentication process can fail and examined its consequences. Our study shows that a key[…] -