Events
Seminars, conferences, workshops..., find the agenda of scientific activities carried out by CREACH LABS
-
-
Seminar
-
SemSecuElec
Anomalies Mitigation for Horizontal Side Channel Attacks with Unsupervised Neural Networks
Speaker : Gauthier Cler - SERMA Safety & Security
The success of horizontal side-channel attacks heavily depends on the quality of the traces as well as the correct extraction of interest areas, which are expected to contain relevant leakages. If former is insufficient, this will consequently degrade the identification capability of potential leakage candidates and often render attacks inapplicable. This work assess the relevance of neural[…]-
SemSecuElec
-
Side-channel
-
Machine learning
-
-
-
Seminar
-
SemSecuElec
Cryptanalytical extraction of complex Neural Networks in black-box settings
Speaker : Benoit COQUERET - INRIA, Thales CESTI
With the widespread development of artifical intelligence, Deep Neural Networks (DNN) have become valuable intellectual property (IP). In the past few years, software and hardware-based attacks targetting at the weights of the DNN have been introduced allowing potential attacker to gain access to a near-perfect copy of the victim's model. However, these attacks either fail against more complex[…]-
SemSecuElec
-
Side-channel
-
Machine learning
-
-
-
Seminar
-
Cryptography
Soutenance de thèse : Cryptanalyse de schémas de cryptographie à clé publique (Cryptanalysis of public-key cryptosystems)
Speaker : Paul Kirchner - IRISA
Résumé : La cryptanalyse de schémas de cryptographie à clé publique repose sur un ensemble de techniques algorithmiques et algébriques en théorie des nombres. Dans une première partie de cette thèse, nous présentons des améliorations de l’algorithme LLL, dû à Lenstra, Lenstra et Lovasz pour réduire un réseau euclidien, c’est-à-dire réduire la norme et orthogonaliser le plus possible les vecteurs[…]-
Cryptography
-
-
-
Seminar
-
Cryptography
Oblivious Transfer from Zero-Knowledge Proofs (or how to achieve round-optimal quantum Oblivious Transfer without structure)
Speaker : Léo Colisson - Université Grenoble Alpes
We provide a generic construction to turn any classical Zero-Knowledge (ZK) protocol into a composable oblivious transfer (OT) protocol (the protocol itself involving quantum interactions), mostly lifting the round-complexity properties and security guarantees (plain-model/statistical security/unstructured functions…) of the ZK protocol to the resulting OT protocol. Such a construction is unlikely[…]-
Cryptography
-
Focus
Conference on Informational Influence Warfare
Informational Influence Warfare (L2I) encompasses the entire range of techniques used to detect and counter adversary information maneuvers in cyberspace. It is based on a national doctrine that takes into account regulatory, ethical, and geopolitical considerations, as well as a vast technical corpus that includes automatic language processing, large-scale data mining, analysis of collective dynamics on social networks, and more traditional cybersecurity techniques such as protection and attack methods for information systems.
The DGA's Maitrise de l'Information technical center is the MinArm's technical expert in cybersecurity and, as such, has developed expertise in the field of L2I. In collaboration with the Defense Innovation Agency, we wish to share our main technical concerns, challenges, and use cases with the academic research community in order to facilitate the implementation of collaborative projects that we will fund through our research support mechanisms, particularly Creach Labs.
The objective of this conference is to bring together all teams within the scope of CREACH LABS as well as MinArm experts working on L2I to take a cross-look at the main research challenges and facilitate the implementation of collaborative projects, allow PhD students and post-docs to present their project progress, and provide teams with a comprehensive view of ongoing work and strategic directions to take.

News
News, highlights...discover the latest information from CREACH LABS
-
CREACH LABS - annual postdoctoral and research engineer funding campaign
CREACH LABS launches its 2025 call for projects to fund postdoctoral and research engineer positions.November 08, 2024 -
CREACH LABS - Annual PhD Funding Campaign
CREACH LABS launches its 2025 thesis grants campaign, joint with the DGA, AID, the Brittany Region and the EUR CyberSchool.November 04, 2024 -
CREACH LABS, Partner of European Cyber Week 2024
CREACH LABS is pleased to invite you to join us from November 18th to 21st, 2024 at the Couvent des Jacobins in Rennes during the European Cyber Week, Europe's leading cybersecurity and cyberdefense event.October 28, 2024
Publications
Articles, theses, white papers... find scientific publications resulting from research works and scientific collaborations supported by CREACH LABS.
-
-
Article
« Energy backdoor attack to deep neural networks »
The transition to deep learning has led to a significant surge in computing complexity and energy consumption. This trend has prompted the adoption of acceleration hardware like tensor processing units (TPUs) and application specific integrated circuits (ASICs) to facilitate energy-efficient deployment on edge and mobile devices. However, recent studies have revealed their vulnerability to energy[…] -
-
-
White paper
« Security supervision »
Security supervision is a field initiated in the 1980s. Even if the foundations of the field have remained unchanged for 40 years, the techniques for implementing them have of course greatly evolved. -
-
-
Article
« BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports »
Malware analysis consists of studying a sample of suspicious code to understand it and producing a representation or explanation of this code that can be used by a human expert or a clustering/classification/detection tool. -
Jobs
Discover job opportunities (PhDs, postdocs, research engineer positions...) from CREACH LABS-funded projects and our partner organizations.