Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
681 results
-
-
Seminar
-
SoSysec
Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate
Speaker : Grégoire Menguy (CEA LIST)
Code obfuscation aims at protecting Intellectual Property and other secrets embedded into software from being retrieved. Recent works leverage advances in artificial intelligence (AI) with the hope of getting blackbox deobfuscators completely immune to standard (whitebox) protection mechanisms. While promising, this new field of AI-based, and more specifically search-based blackbox deobfuscation,[…] -
-
-
Seminar
-
SoSysec
Squirrel: a new approach to computer-assisted proofs of protocols in the computational model.
Speaker : David Baelde (ENS Cachan)
Formal methods have brought several approaches for proving that security protocols ensure the expected security and privacy properties. Most of the resulting tools analyze protocols in symbolic models, aka. Dolev-Yao-style models. Security in the symbolic model does not imply security in the cryptographer’s standard model, the computational model, where attackers are arbitrary (PPTIME) Turing[…] -
-
-
Seminar
-
SemSecuElec
Implémentations sécurisées et évaluation pré-silicium contre les attaques physiques.
Speaker : Sofiane Takarabt
Side-channel attacks remain a permanent threat against embedded systems, thus reliable protections should be implemented and must be minutely evaluated. In this presentation, we study different possible ways to evaluate against such threats. We show how an evaluation can be carried out to validate a security level of a protected hardware implementation. This approach allows us to estimate in[…] -
-
-
Seminar
-
SemSecuElec
One Fault Can Go A Long Way
Speaker : Shivam Bhasin
*Abstract:* Fault attacks are considered among critical threat to embedded cryptography. This talk will be divided into in two parts. The first part of the talk will explore application of faults on advanced security primitives. We present persistent fault analysis introduced at CHES 2017 and its capability to bypass state of the art fault countermeasures as well as higher-order masking with one[…] -
-
-
Seminar
-
SemSecuElec
Schindler-Itoh/Wiemers revisited: recovering full RSA/ECC private key from noisy side-channel observations
Speaker : Victor Lomné et Thomas Roche
Side-channel attacks on public-key cryptography (i.e. modular exponentiation for RSA or scalar multiplication for ECC) often boils down to distinguishing the 0s from the 1s in the binary representation of the secret exponent (resp. secret scalar).When state-of-the-art countermeasures are implemented, this detection must be errorless: thanks to masking techniques, erroneous masked exponents (resp.[…] -
-
-
Seminar
-
SemSecuElec
Rank metric cryptography and its implementations
Speaker : Nicolas Aragon
In 2017, the NIST (National Institute for Standards and Technology) started astandardization process in order to select post-quantum encryption and digital signature schemes. Among the proposed solutions, two rank-metric based encryption schemes were selected for the second round of the standardization process: ROLLOand RQC.This raised questions about both the performance and the security of the[…] -