53 results

  • Thwarting covert adversaries in FHE pipelines

    • December 09, 2022

    • Inria Center of the University of Rennes - -Petri/Turing room

    Speaker : Sylvain Chatel (EPFL)

    Fully Homomorphic Encryption (FHE) enables computations to be executed directly on encrypted data without decryption, thus it is becoming an auspicious solution to protect the confidentiality of sensitive data without impeding its usability for the purpose of analytics. While many practical systems rely on FHE to achieve strong privacy guarantees, their constructions only consider an honest-but[…]
  • Programmable Network Security – Challenges and Opportunities

    • December 02, 2022

    • Inria Center of the University of Rennes - -Petri/Turing room

    Speaker : Sandra Scott-Hayward (Queen’s University Belfast)

    Society’s dependence on communication networks for all aspects of day-to-day living; business, education, entertainment etc. makes “the network” a very attractive target for malicious attack, which cyber criminals are only too eager to exploit, attempting to limit or block access to essential services (e.g., healthcare, banking, critical infrastructure etc.), disrupting our daily lives and causing[…]
  • Private Set Intersection and Other Private Information Sharing Protocols

    • November 07, 2022

    • Inria Center of the University of Rennes - -Petri/Turing room

    Speaker : Xavier Carpent (University of Nottingham)

    In this seminar, we will give an overview of Private Set Intersection (PSI), some of its constructions, use cases, and open research questions. The canonical PSI protocol allows Alice and Bob (both with their own set of elements) to interact in a way that Alice learns the intersection of the sets and nothing else. Numerous variants exist:cardinality of intersection only (how many elements in[…]
  • Reasoning over leaks of information for Access Control of Databases

    • October 13, 2022

    • Inria Center of the University of Rennes - -Petri/Turing room

    Speaker : Pierre Bourhis (CNRS, CRISTAL)

    Controlling the access of data in Database management systems is a classical problem and it has been solved through different mechanisms. One of the most common mechanism implemented in most Database management systems is the mechanism of views, i.e defining the accessible data of a user as the result of a query. This mechanism is also used in principle in other systems such as in social networks.[…]
  • Learning-Based Network Intrusion Detection: an Imbalanced, Constantly Evolving and Timely Problem

    • October 07, 2022

    • Inria Center of the University of Rennes - -Petri/Turing room

    Speaker : Maxime Pelcat (INSA Rennes)

    Network intrusion detection systems (NIDS) observe network traffic and aim to pinpoint intrusions, i.e. effective threats on the integrity, availability or confidentiality of services and data provided by this network. There are two types of NIDS:1) signature-based intrusion detection systems that identify known intrusions by referring to an existing knowledge base, and2) anomaly-based intrusion[…]
  • L’empoisonnement de données semble-t-il un risque réaliste ?

    • September 23, 2022

    • Inria Center of the University of Rennes - -Petri/Turing room

    Speaker : Adrien Chan-Hon-Tong (ONERA)

    Les attaques adversaires ont rencontré un fort écho dans la communauté de vision par ordinateur. Pour autant, via ce type d’attaque, un hacker ne peut modifier le comportement de l’algorithme ciblé que localement. Inversement, l’empoisonnement de données est en mesure de modifier globalement le comportement de l’algorithme visé, et, il n’est pas forcément détectable par un opérateur notamment si[…]