Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
633 results
-
-
Seminar
-
SoSysec
DroidGuard: A Deep Dive into SafetyNet
Speaker : Romain Thomas (Quarkslab)
SafetyNet is the Android component developed by Google to verify the devices’ integrity. These checks are used by the developers to prevent running applications on devices that would not meet security requirements but it is also used by Google to prevent bots, fraud and abuse.In 2017, Collin Mulliner & John Kozyrakis made one of the first public presentations about SafetyNet and a glimpse into[…] -
-
-
Seminar
-
SoSysec
Browser fingerprinting: past, present and possible future
Speaker : Pierre Laperdrix (CRIStAL)
Browser fingerprinting has grown a lot since its debut in 2010. By collecting specific information in the browser, one can learn a lot about a device and its configuration. It has been shown in previous studies that it can even be used to track users online, bypassing current tracking methods like cookies. In this presentation, we will look at how this technique works and present an overview of[…] -
-
-
Seminar
-
SoSysec
Intrusion Detection Systems over an Encrypted Traffic: Problem and Solutions
Speaker : Sébastien Canard (Orange)
Privacy and data confidentiality are today at the heart of many discussions. But such data protection should not be done at the detriment of other security aspects. In the context of network traffic, intrusion detection system becomes in particular totally blind when the traffic is encrypted, making clients again vulnerable to known threats and attacks. Reconciling security and privacy is then one[…] -
-
-
Seminar
-
SoSysec
Private Set Intersection and Other Private Information Sharing Protocols
Speaker : Xavier Carpent (University of Nottingham)
In this seminar, we will give an overview of Private Set Intersection (PSI), some of its constructions, use cases, and open research questions. The canonical PSI protocol allows Alice and Bob (both with their own set of elements) to interact in a way that Alice learns the intersection of the sets and nothing else. Numerous variants exist:cardinality of intersection only (how many elements in[…] -
-
-
Seminar
-
SoSysec
Squirrel: a new approach to computer-assisted proofs of protocols in the computational model.
Speaker : David Baelde (ENS Cachan)
Formal methods have brought several approaches for proving that security protocols ensure the expected security and privacy properties. Most of the resulting tools analyze protocols in symbolic models, aka. Dolev-Yao-style models. Security in the symbolic model does not imply security in the cryptographer’s standard model, the computational model, where attackers are arbitrary (PPTIME) Turing[…] -
-
-
Seminar
-
SoSysec
Port Contention Goes Portable: Port Contention Side Channels in Web Browsers
Speaker : Thomas Rokicki (Univ Rennes, CNRS, IRISA)
Microarchitectural side-channel attacks can derive secrets from the execution of vulnerable programs. Their implementation in web browsers represents a considerable extension of their attack surface, as a user simply browsing a malicious website, or even a malicious third-party advertisement in a benign cross-origin isolated website, can be a victim.In this talk, we present the first CPU port[…] -