Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
710 results
-
-
Seminar
-
SoSysec
Les cyberopérations: entre technique et droit international. Attribution, preuve et responsabilité.
Speaker : Anne-Thida Norodom (Professeur de droit public, Université de Paris)
L’objet de cette intervention est de montrer à quel point le juridique est dépendant du technique lorsqu’il s’agit de réguler les cyberopérations. L’approche choisie sera celle du droit international public, c’est-à-dire du droit applicable entre Etats. Alors qu’il existe un consensus au niveau international sur l’applicabilité du droit international dans le domaine numérique, les négociations en[…] -
-
-
Seminar
-
SoSysec
Reasoning over leaks of information for Access Control of Databases
Speaker : Pierre Bourhis (CNRS, CRISTAL)
Controlling the access of data in Database management systems is a classical problem and it has been solved through different mechanisms. One of the most common mechanism implemented in most Database management systems is the mechanism of views, i.e defining the accessible data of a user as the result of a query. This mechanism is also used in principle in other systems such as in social networks.[…] -
-
-
Seminar
-
SoSysec
An evaluation of Symbolic Execution Systems and the benefits of compilation with SymCC
Speaker : Aurélien Francillon (Eurecom)
In this talk I will discuss our recent work, together with Sebastian Poeplau, on Symbolic execution. Symbolic execution has become a popular technique for software testing and vulnerability detection, in particular, because it allows to generate test cases for difficult to reach program paths. However, a major impediment to practical symbolic execution is speed, especially when compared to near[…] -
-
-
Seminar
-
SoSysec
On MILP modelisations
Speaker : Christina Boura (UVSQ, CNRS, LMV)
Modelizing a problem using linear constraints and solving it by some Mixed Integer Linear Programming (MILP) solver is a popular approach in many domains of computer science. In this talk we present and compare different new techniques to modelize any subset of {0,1}^n for MILP. We then discuss the efficiency of our models by applying them to the search of differential paths, a classical problem[…] -
-
-
Seminar
-
SoSysec
Intrusion Detection Systems over an Encrypted Traffic: Problem and Solutions
Speaker : Sébastien Canard (Orange)
Privacy and data confidentiality are today at the heart of many discussions. But such data protection should not be done at the detriment of other security aspects. In the context of network traffic, intrusion detection system becomes in particular totally blind when the traffic is encrypted, making clients again vulnerable to known threats and attacks. Reconciling security and privacy is then one[…] -
-
-
Seminar
-
SoSysec
DroidGuard: A Deep Dive into SafetyNet
Speaker : Romain Thomas (Quarkslab)
SafetyNet is the Android component developed by Google to verify the devices’ integrity. These checks are used by the developers to prevent running applications on devices that would not meet security requirements but it is also used by Google to prevent bots, fraud and abuse.In 2017, Collin Mulliner & John Kozyrakis made one of the first public presentations about SafetyNet and a glimpse into the[…] -