62 results
-
Cybersecurity of industrial systems. Open problems and some ideas.
Speaker : Stéphane Mocanu (Inria Rhône-Alpes)
Research in cybersecurity of SCADA systems is a relatively recent field developed mainly into the last decade. Despite the manufacturers progress in hardening the security of device SCADA systems are still prone to severe vulnerabilities and specialized countermeasures are still incipient. This talk aims to present the open problems seen from the boundary between computer science and control[…] -
Contemporary Issues in Digital Forensics
Speaker : Ben Martini (University of South Australia)
The discipline of digital forensics, or as it was then known ‘forensic computing’, began with a focus on retrieving admissible evidence from computer systems (typically personal computers). However, with the increased pervasiveness of connected digital technologies in the last 20 years, a wide variety of new and complex sources of digital evidence have emerged. This has presented a range of[…] -
Intrusion Detection Systems over an Encrypted Traffic: Problem and Solutions
Speaker : Sébastien Canard (Orange)
Privacy and data confidentiality are today at the heart of many discussions. But such data protection should not be done at the detriment of other security aspects. In the context of network traffic, intrusion detection system becomes in particular totally blind when the traffic is encrypted, making clients again vulnerable to known threats and attacks. Reconciling security and privacy is then one[…] -
Présentation des fondamentaux du management du risque et d’EBIOS Risk Manager
Speaker : Vincent Loriot (ANSSI)
Résumé :a. Présentation ANSSIb. Tendances de la menace cyber et démarche pour s’en protégerc. Fondamentaux de la méthode EBIOS Risk ManagerLa présentation théorique sera complétée avec un atelier pratique couvrant les sujets suivants :a. Les besoins et enjeux de sécuritéb. Les couples Source de Risque / Objectif Viséc. La cartographie de menace de l’écosystème -
La protection des flux en télévision numérique
Speaker : Eric Desmicht (DGA)
En télévision numérique, des flux numériques comportant de la vidéo sont mis à la disposition des utilisateurs via différents média (cable, satellite, TNT, IP…) et différentes techniques (broadcast, multicast, unicast, support numérique…). Pour garantir les revenus des opérateurs de télévision à péage proposant des contenus à forte valeur ajoutée, il est essentiel que seuls les consommateurs ayant[…] -
Subject Access Request and Proof of Ownership
Speaker : Cédric Lauradoux (INRIA Rhône-Alpes)
The GDPR (General Data Protection Regulation) provides rights on our data: access, rectification, objection, etc. However, this regulation is not binding on how we can exercise these rights. Data controllers have therefore deployed various methods to authenticate subject requests. We have analyzed how this authentication process can fail and examined its consequences. Our study shows that a key[…]