Sommaire

56 résultats

  • Code Encryption for Confidentiality and Execution Integrity down to Control Signals

    • 18 octobre 2024 (10:00 - 11:00)

    • Inria Center of the University of Rennes - - Métivier room

    Orateur : Théophile Gousselot - Mines Saint-Etienne, CEA, Leti, Centre CMP, F - 13541 Gardanne France

    Embedded devices face software and physical fault injections to either extract or tamper with code in memory. The code execution and code intellectual property are threatened. Some existing countermeasures provide Control Flow Integrity (CFI) extended with the confidentiality and integrity of the instructions by chaining all of them through a cryptographic encryption primitive. While tampering[…]
    • SemSecuElec

    • Fault injection

    • Micro-architectural vulnerabilities

    • Hardware countermeasures

  • Une approche langages pour comprendre et affronter les injections de fautes

    • 27 septembre 2024 (11:00 - 12:00)

    • IETR - University of Rennes - Campus de BEAULIEU - Bâtiment 11D, salle numéro 18

    Orateur : Sébastien Michelland - Université Grenoble Alpes, Grenoble INP, LCIS

    Est-ce que votre dernier programme fonctionnerait si je sautais une ligne de code ? Deux ? Si je corrompais une variable aléatoirement ? Alors il ne résiste pas aux _attaques par injection de faute_, qui ciblent le matériel et produisent ce type d'effets. Pour être honnête, rien n'y résiste vraiment. Les efforts pour s'en protéger ont malgré tout bien progressé, principalement (et c'est peut-être[…]
    • SemSecuElec

    • Injection de fautes

  • Acquisition and Exploitation of Traces from Connected Devices

    • 27 septembre 2024 (10:00 - 11:00)

    • Inria Center of the University of Rennes - - Petri/Turing room

    Orateur : Francesco Servida - École des Sciences Criminelles, Université de Lausanne

    This presentation aims to give an overview of the traces that can be obtained from connected objects as witnesses or actors at a crime scene. Using several scenarios we cover the challenges of detecting connected devices, the relevant locations for data retrieval and the techniques for acquiring said data. We then present how such data can be useful in helping to understand the dynamics of events[…]
    • SemSecuElec

    • Embedded systems

  • Security challenges and opportunities in emerging device technologies: a case study on flexible electronics

    • 06 mai 2022

    • IETR - University of Rennes - Campus de BEAULIEU - Bâtiment 11D, salle numéro 18

    Orateur : Nele Mentens - KU Leuven, Belgium

    While traditional chips in bulk silicon technology are widely used for reliable and highly ef?cient systems, there are applications that call for devices in other technologies. On the one hand, novel device technologies need to be re-evaluated with respect to potential threats and attacks, and how these can be faced with existing and novel security solutions and methods. On the other hand,[…]
  • Side Channel Analysis: Instruction extraction and Information estimation

    • 06 mai 2022

    • CEA-LETI; Université de Montpellier, LIRMM - Salle Pétri/Turing

    Orateur : Valence Cristiani

    Side-channel usually aims at extracting cryptographic secrets from electronic devices through their physical leakages. However, these channels can leak other sensitive information. The first part of this talk will present a study of side channel-based disassembling (SCBD) that aims to recover instructions executed by a microcontroller. The main threat represented by SCBD is that it potentially[…]
  • Bridging Deep Learning and Classical Profiled Side-Channel Attacks

    • 08 avril 2022

    • Thales ITSEF, Toulouse - Salle Pétri/Turing

    Orateur : Gabriel Zaid

    Over the recent years, the cryptanalysis community leveraged the potential of research on Deep Learning to enhance attacks. In particular, several studies have recently highlighted the benefits of Deep Learning based Side-Channel Attacks (DLSCA) to target real-world cryptographic implementations. While this new research area on applied cryptography provides impressive result to recover a secret[…]