59 résultats
-
Les cyberopérations: entre technique et droit international. Attribution, preuve et responsabilité.
Orateur : Anne-Thida Norodom (Professeur de droit public, Université de Paris)
L’objet de cette intervention est de montrer à quel point le juridique est dépendant du technique lorsqu’il s’agit de réguler les cyberopérations. L’approche choisie sera celle du droit international public, c’est-à-dire du droit applicable entre Etats. Alors qu’il existe un consensus au niveau international sur l’applicabilité du droit international dans le domaine numérique, les négociations en[…] -
Canadian and Québec approaches to contact tracing
Orateur : Sébastien Gambs (Université du Québec à Montréal, Canada)
Contact tracing applications have been deployed in many countries as a complementary measure to fight Covid-19 by enabling to automatically notify individuals who have been in contact with infected persons. However, the choice of the design of a particular application is not innocent as it has a direct impact on its security as well as on the privacy of its user. In this talk, I will review the[…] -
The PINED-RQ Family: Differentially Private Indexes for Range Query Processing in Clouds
Orateur : Tristan Allard (IRISA, Université de Rennes 1)
Performing non- aggregate range queries on cloud stored data, while achieving both privacy and efficiency is a challenging problem. With the PINED-RQ family of techniques, we propose constructing a differentially private index to an outsourced encrypted dataset. Efficiency is enabled by using a cleartext index structure to perform range queries. Security relies on both differential privacy (of the[…] -
An evaluation of Symbolic Execution Systems and the benefits of compilation with SymCC
Orateur : Aurélien Francillon (Eurecom)
In this talk I will discuss our recent work, together with Sebastian Poeplau, on Symbolic execution. Symbolic execution has become a popular technique for software testing and vulnerability detection, in particular, because it allows to generate test cases for difficult to reach program paths. However, a major impediment to practical symbolic execution is speed, especially when compared to near[…] -
Intriguing Properties of Adversarial ML Attacks in the Problem Space
Orateur : Fabio Pierazzi (King’s College London)
Recent research efforts on adversarial ML have investigated problem-space attacks, focusing on the generation of real evasive objects in domains where, unlike images, there is no clear inverse mapping to the feature space (e.g., software). However, the design, comparison, and real-world implications of problem-space attacks remain underexplored. In this talk, I will present two major contributions[…] -
Intrusion Detection Systems over an Encrypted Traffic: Problem and Solutions
Orateur : Sébastien Canard (Orange)
Privacy and data confidentiality are today at the heart of many discussions. But such data protection should not be done at the detriment of other security aspects. In the context of network traffic, intrusion detection system becomes in particular totally blind when the traffic is encrypted, making clients again vulnerable to known threats and attacks. Reconciling security and privacy is then one[…]