Filter by content type

Select one or more filters. This choice will reload the page to display the filtered results.

Remove all filters

718 results

    • Seminar

    • SoSysec

    Ransomware Detection Using Markov Chain Models Over File Headers

    • November 26, 2021

    • Inria Center of the University of Rennes - - Room TBD

    Speaker : David Lubicz (DGA-MI)

    In this paper, a new approach for the detection of ransomware based on the runtime analysis of their behaviour is presented. The main idea is to get samples by using a mini-filter to intercept write requests, then decide if a sample corresponds to a benign or a malicious write request. To do so, in a learning phase, statistical models of structured file headers are built using Markov chains. Then[…]
    • Seminar

    • SoSysec

    Reasoning over leaks of information for Access Control of Databases

    • October 13, 2022

    • Inria Center of the University of Rennes - - Room TBD

    Speaker : Pierre Bourhis (CNRS, CRISTAL)

    Controlling the access of data in Database management systems is a classical problem and it has been solved through different mechanisms. One of the most common mechanism implemented in most Database management systems is the mechanism of views, i.e defining the accessible data of a user as the result of a query. This mechanism is also used in principle in other systems such as in social networks.[…]
    • Seminar

    • SoSysec

    Les cyberopérations: entre technique et droit international. Attribution, preuve et responsabilité.

    • April 02, 2021

    • Inria Center of the University of Rennes - - Room TBD

    Speaker : Anne-Thida Norodom (Professeur de droit public, Université de Paris)

    L’objet de cette intervention est de montrer à quel point le juridique est dépendant du technique lorsqu’il s’agit de réguler les cyberopérations. L’approche choisie sera celle du droit international public, c’est-à-dire du droit applicable entre Etats. Alors qu’il existe un consensus au niveau international sur l’applicabilité du droit international dans le domaine numérique, les négociations en[…]
    • Seminar

    • SemSecuElec

    TRAITOR : a multi clock-glitch attack platform reproducing EMI effects at low-cost

    • April 05, 2019

    • INRIA - Salles Pétri/Turing

    Speaker : Ludovic Claudepierre

    Electromagnetic injection (EMI) is a common and non-invasive technique used to perform fault attacks. In that case, an electromagnetic wave is radiated by an antenna in the close vicinity of the targeted microcontroller (STM32 in our case).The clock signal is generated thanks to a Phase-Locked-Loop (PLL). The PLL is highly sensitive to EMI and then induces severe disruption on the clock signal[…]
    • Seminar

    • SemSecuElec

    Unique CAD-compatible SCA-security mechanisms, externally amplified coupling (EAC) attacks and (some) connection

    • June 25, 2021

    • Bar-Ilan University (BIU) - Web-Conférence

    Speaker : Itamar Levi

    In this seminar I will first discuss unique computer aided design (CAD) compatible SCA security mechanisms. I will present an approach which can significantly increase the physical security-level of a design, be implemented with conventional design-tools and which does not require any special technological-support. The method consists with a correct by-design utilization of power-management[…]
    • Seminar

    • SemSecuElec

    Bridging Deep Learning and Classical Profiled Side-Channel Attacks

    • April 08, 2022

    • Thales ITSEF, Toulouse - Salle Pétri/Turing

    Speaker : Gabriel Zaid

    Over the recent years, the cryptanalysis community leveraged the potential of research on Deep Learning to enhance attacks. In particular, several studies have recently highlighted the benefits of Deep Learning based Side-Channel Attacks (DLSCA) to target real-world cryptographic implementations. While this new research area on applied cryptography provides impressive result to recover a secret[…]