-
-
Upcoming
-
Thesis defense
Automated Generation of Vulnerable Variable Architectures
PhD : Pierre-Victor BESSON, CentraleSupélec, IRISA The goal of this thesis is to offer a new paradigm for the deployment of vulnerable architectures. This paradigm is able to describe an attack scenario on a high level of abstraction, before converting this description into multiple instances on a lower level, which may be deployed and attacked on a network. -
-
-
Upcoming
-
Thesis defense
Identification par apprentissage de l’empreinte radio-fréquence de dispositifs sensibles
PhD : Alice Chillet, Université de Rennes, IRISA L’identification de dispositifs dits sensibles est soumise à différentes contraintes de sécurité ou de consommation d’énergie, ce qui rend les méthodes d’identification classiques peu adaptées. Pour répondre à ces contraintes, il est possible d’utiliser les défauts intrinsèques de la chaîne de transmission des dispositifs pour les[…] -
-
-
Conference
-
Cryptography
-
TRNG
-
Hardware architecture
-
PUF
-
Embedded systems
Random Number Generators and Physical Unclonable Functions by DGA
The aim of this conference is to bring together some of the best European teams whether they come from the academic world, industry or administrations in order to have a meeting of minds on the main stakes for research, to boost collaborative projects, and allow researchers to have a global and shared vision of what is done and of the strategic directions to follow. -
-
-
Upcoming
-
Conference
-
Cryptography
Post-quantum cryptography by DGA
Building on the success of the 2021 and 2022 conferences, CREACH LABS is pleased to announce, in collaboration with the General Directorate of Armament (DGA) the 3rd edition of "post-quantum cryptography" conference at European Cyber Week 2024. -
-
-
Thesis defense
-
Side-channel
Optimizing data leakage exploitation in the context of screaming-channel attack
PhD Defense : Jérémy GUILLAUME Abstract: This thesis studies the challenges of implementing a screaming-channel attack: an attack exploiting the electromagnetic leakage and mixed-signal nature (analog and digital parts on the same silicon die) of a victim system to extract its secret data at a distance of several meters. In particular, Jeremy Guillaume explored various methods enabling an attacker[…] -
-
-
Conference
CREACH LABS Conference on Informational Influence Warfare
Information manipulation and influence warfare have been around since the dawn of civilization, but the advent of the digital age has amplified the technical means of combat, expanded the scope of operations, and raised the stakes to unprecedented levels, as information space takes on a central role in the functioning of modern societies -