Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

633 results

    • Seminar

    • SoSysec

    Privacy in The 5G-AKA Authentication Protocol

    • January 18, 2019

    • Inria Center of the University of Rennes - -Petri/Turing room

    Speaker : Adrien Koutsos (LSV)

    The 5G mobile communications standards are being finalized, and drafts are now available. This standard describes the 5G-AKA authentication and key exchange protocol. The previous version of AKA (3G and 4G) are well-known for their lack of privacy against an active adversary (e.g. a user can be massively tracked using IMSI-catcher). This new version of AKA tries to offer more privacy, notably[…]
    • Seminar

    • SoSysec

    A theory of assertions for Dolev-Yao models

    • June 08, 2018

    • Inria Center of the University of Rennes - -Petri/Turing room

    Speaker : Vaishnavi Sundararajan (Chennai Mathematical Institute, India)

    We undertake an abstract study of certification in security protocols, concentrating on the logical properties and derivability of certificates. Specifically, we extend the Dolev-Yao model with a new class of objects called ‘assertions’, along with an associated algebra for deriving new assertions from old ones. We obtain complexity results for the derivability problem and active intruder problem[…]
    • Seminar

    • SoSysec

    La protection des flux en télévision numérique

    • November 22, 2019

    • Inria Center of the University of Rennes - -Petri/Turing room

    Speaker : Eric Desmicht (DGA)

    En télévision numérique, des flux numériques comportant de la vidéo sont mis à la disposition des utilisateurs via différents média (cable, satellite, TNT, IP…) et différentes techniques (broadcast, multicast, unicast, support numérique…). Pour garantir les revenus des opérateurs de télévision à péage proposant des contenus à forte valeur ajoutée, il est essentiel que seuls les consommateurs ayant[…]
    • Seminar

    • SoSysec

    Automated verification of privacy-type properties for security protocols

    • March 16, 2018

    • Inria Center of the University of Rennes - -Petri/Turing room

    Speaker : Ivan Gazeau (LORIA, Inria Nancy)

    The applied pi-calculus is a powerful framework to model protocols and to define security properties. In this symbolic model, it is possible to verify automatically complex security properties such as strong secrecy, anonymity and unlinkability properties which are based on equivalence of processes.In this talk, we will see an overview of a verification method used by a tool, Akiss. The tool is[…]
    • Seminar

    • SoSysec

    A Compositional and Complete approach to Verifying Privacy Properties using the Applied Pi-calculus

    • February 08, 2019

    • Inria Center of the University of Rennes - -Petri/Turing room

    Speaker : Ross Horne (University of Luxembourg)

    The pi-calculus was introduced for verifying cryptographic protocols by Abadi and Fournet in 2001. They proposed an equivalence technique, called bisimilarity, useful for verify privacy properties. It is widely acknowledged (cf. Paige and Tarjan 1987), that bisimilarity is more efficient to check than trace equivalence; however, surprisingly, tools based on the applied pi-calculus typically still[…]
    • Seminar

    • SoSysec

    How to decrypt without keys with GlobalPlatform SCP02 protocol

    • July 06, 2018

    • Inria Center of the University of Rennes - -Petri/Turing room

    Speaker : par Loic Ferreira (Orange Labs, IRISA)

    The GlobalPlatform SCP02 protocol is a security protocol implemented in smart cards, and used by transport companies, in the banking world and by mobile network operators (UICC/SIM cards). We describe how to perform a padding oracle attack against SCP02. The attack allows an adversary to efficiently retrieve plaintext bytes from an encrypted data field. We provide results of our experiments done[…]