599 results
-
Model Stealing Attacks Against Inductive Graph Neural Networks
Speaker : Yufei Han (INRIA)
Many real-world data come in the form of graphs. Graph neural networks (GNNs), a new family of machine learning (ML) models, have been proposed to fully leverage graph data to build powerful applications. In particular, the inductive GNNs, which can generalize to unseen data, become mainstream in this direction. Machine learning models have shown great potential in various tasks and have been[…] -
Implémentations sécurisées et évaluation pré-silicium contre les attaques physiques.
Speaker : Sofiane Takarabt
Side-channel attacks remain a permanent threat against embedded systems, thus reliable protections should be implemented and must be minutely evaluated. In this presentation, we study different possible ways to evaluate against such threats. We show how an evaluation can be carried out to validate a security level of a protected hardware implementation. This approach allows us to estimate in[…] -
Soutenance de thèse: Problème du logarithme discret sur des courbes elliptiques
Speaker : Andy Russon - Rennes 1 et Orange
L’usage des courbes elliptiques en cryptographie s’est largement répandu pour assurer la sécurité des communications ou de transactions financières. Cela est dû notamment au fait que la sécurité repose sur la difficulté du problème du logarithme discret qui permet d’utiliser les courbes elliptiques avec des paramètres qui assurent une efficacité.<br/> Dans cette thèse, nous abordons[…] -
Security and privacy in personal data management systems
Speaker : Nicolas Anciaux (INRIA)
Personal Data Management Systems (called PDMS) provide individuals with a hardware and/or software solution to manage their data under control. From a data management and security/privacy perspective, the issues involved are complex and differ significantly from the traditional database setting. The emergence of trusted execution environments (such as Intel SGX) could be a game changer. This[…] -
Browser fingerprinting: past, present and possible future
Speaker : Pierre Laperdrix (CRIStAL)
Browser fingerprinting has grown a lot since its debut in 2010. By collecting specific information in the browser, one can learn a lot about a device and its configuration. It has been shown in previous studies that it can even be used to track users online, bypassing current tracking methods like cookies. In this presentation, we will look at how this technique works and present an overview of[…] -
TBA
Speaker : Louiza Khati - Anssi
TBA lien: https://univ-rennes1-fr.zoom.us/j/97066341266?pwd=RUthOFV5cm1uT0ZCQVh6QUcrb1drQT09