Events

Seminars, conferences, workshops..., find the agenda of scientific activities carried out by CREACH LABS

    • Seminar

    • SemSecuElec

    Covert Communication Channels Based On Hardware Trojans: Open-Source Dataset and AI-Based Detection

    • February 28, 2025 (10:00 - 11:00)

    • Inria Center of the University of Rennes - - IRISA - Salle Aurigny (D165)

    Speaker : Alan Díaz Rizo - Sorbonne Université Lip6

    The threat of Hardware Trojan-based Covert Channels (HT-CCs) presents a significant challenge to the security of wireless communications. In this work, we generate in hardware and make open-source a dataset for various HT-CC scenarios. The dataset represents transmissions from a HT-infected RF transceiver hiding a CC that leaks information. It encompasses a wide range of signal impairments, noise[…]
    • SemSecuElec

    • Machine learning

    • Hardware trojan

    • Seminar

    • SemSecuElec

    Measurement the thermal component of clock jitter used as entropy source by TRNGs

    • February 28, 2025 (11:00 - 12:00)

    • Inria Center of the University of Rennes - - IRISA - Salle Aurigny (D165)

    Speaker : Arturo GARAY - STMicroelectronics

    Introduction Measuring the thermal component of clock jitter as an entropy source for True Random Number Generators (TRNGs) is compulsory for the security and evaluation of clock-jitter based TRNGs. However, identifying and isolating the local thermal noise component from other noise sources, particularly flicker noise, while performing a precise measurement remains a challenge. Current[…]
    • SemSecuElec

    • TRNG

    • Seminar

    • Cryptography

    Efficient zero-knowledge proofs and arguments in the CL framework

    • March 07, 2025 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Agathe Beaugrand - Institut de Mathématiques de Bordeaux

    The CL encryption scheme, proposed in 2015 by Castagnos and Laguillaumie, is a linearly homomorphic encryption scheme, based on class groups of imaginary quadratic fields. The specificity of these groups is that their order is hard to compute, which means it can be considered unknown. This particularity, while being key in the security of the scheme, brings technical challenges in working with CL,[…]
    • Seminar

    • SoSysec

    Tackling obfuscated code through variant analysis and Graph Neural Networks

    • March 21, 2025 (11:00 - 12:00)

    • Inria Center of the University of Rennes - - Petri/Turing room

    Speaker : Roxane Cohen and Robin David - Quarkslab

    Existing deobfuscation techniques usually target specific obfuscation passes and assume a prior knowledge of obfuscated location within a program. Also, some approaches tend to be computationally costly. Conversely, few research consider bypassing obfuscation through correlation of various variants of the same obfuscated program or a clear program and a later obfuscated variant. Both scenarios are[…]
    • Malware analysis

    • Binary analysis

    • Obfuscation

Show all events

Focus

Conference on Informational Influence Warfare

Informational Influence Warfare (L2I) encompasses the entire range of techniques used to detect and counter adversary information maneuvers in cyberspace. It is based on a national doctrine that takes into account regulatory, ethical, and geopolitical considerations, as well as a vast technical corpus that includes automatic language processing, large-scale data mining, analysis of collective dynamics on social networks, and more traditional cybersecurity techniques such as protection and attack methods for information systems.

The DGA's Maitrise de l'Information technical center is the MinArm's technical expert in cybersecurity and, as such, has developed expertise in the field of L2I. In collaboration with the Defense Innovation Agency, we wish to share our main technical concerns, challenges, and use cases with the academic research community in order to facilitate the implementation of collaborative projects that we will fund through our research support mechanisms, particularly Creach Labs.

The objective of this conference is to bring together all teams within the scope of CREACH LABS as well as MinArm experts working on L2I to take a cross-look at the main research challenges and facilitate the implementation of collaborative projects, allow PhD students and post-docs to present their project progress, and provide teams with a comprehensive view of ongoing work and strategic directions to take.

More info
Focus-Conference L2I

News

News, highlights...discover the latest information from CREACH LABS

Show all news

Publications

Articles, theses, white papers... find scientific publications resulting from research works and scientific collaborations supported by CREACH LABS.

    • Article

    « Energy backdoor attack to deep neural networks »

    The transition to deep learning has led to a significant surge in computing complexity and energy consumption. This trend has prompted the adoption of acceleration hardware like tensor processing units (TPUs) and application specific integrated circuits (ASICs) to facilitate energy-efficient deployment on edge and mobile devices. However, recent studies have revealed their vulnerability to energy[…]
    • White paper

    « Security supervision »

    Security supervision is a field initiated in the 1980s. Even if the foundations of the field have remained unchanged for 40 years, the techniques for implementing them have of course greatly evolved.
    • Article

    « BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports »

    Malware analysis consists of studying a sample of suspicious code to understand it and producing a representation or explanation of this code that can be used by a human expert or a clustering/classification/detection tool. 
Show all publications