Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
693 résultats
-
-
Séminaire
-
SoSysec
What you never wanted to know about vulnerability databases
Orateur : Henrik Plate - Endor Labs
Vulnerability databases play a crucial role in modern software security, serving as the backbone for Application Security (AppSec) and Software Composition Analysis (SCA) tools. However, the accuracy and reliability of these databases vary significantly, often leading to misinformed security decisions. This talk explores the challenges associated with vulnerability databases, including incomplete[…]-
Risk Assessment
-
SoSysec
-
Vulnerability management
-
-
-
Séminaire
-
Cryptographie
Predicting Module-Lattice Reduction
Orateur : Paola de Perthuis - CWI
Is module-lattice reduction better than unstructured lattice reduction? This question was highlighted as `Q8' in the Kyber NIST standardization submission (Avanzi et al., 2021), as potentially affecting the concrete security of Kyber and other module-lattice-based schemes. Foundational works on module-lattice reduction (Lee, Pellet-Mary, Stehlé, and Wallet, ASIACRYPT 2019; Mukherjee and Stephens[…]-
Cryptography
-
-
-
Séminaire
-
SemSecuElec
Passage à l’échelle des campagnes de simulations d’injections de fautes
Orateur : Ambre Iooss - Synacktiv
Les injections de fautes constituent un vecteur d’attaque intéressant pour passer outre certaines protections lors de l’étude d’un système embarqué. Par exemple, corrompre le flot d’exécution d’un chargeur de démarrage peut permettre de passer outre une vérification de signature, et peut rendre possible l’exécution de code non signé. Dans le cas d’une exécution comportant un grand nombre d[…]-
SemSecuElec
-
Fault injection
-
-
-
Séminaire
-
Cryptographie
Structured-Seed Local Pseudorandom Generators and their Applications
Orateur : Nikolas Melissaris - IRIF
We introduce structured‑seed local pseudorandom generators (SSL-PRGs), pseudorandom generators whose seed is drawn from an efficiently sampleable, structured distribution rather than uniformly. This seemingly modest relaxation turns out to capture many known applications of local PRGs, yet it can be realized from a broader family of hardness assumptions. Our main technical contribution is a[…]-
Cryptography
-
-
-
Conférence
-
Canaux auxiliaires
-
Fuzzing
-
Protocoles
-
Politiques de sécurité
-
Gestion des vulnérabilités
-
Systèmes embarqués
Conférence sur la sécurité couche physique protocolaire
-
-
-
À venir
-
Conférence
BITFLIP 2025 : CyBer, reliability and Tolerance of FauLts in electronic components
Following the success of the first edition of the “BITFLIP by DGA” conference (CyBer, reliability and Tolerance of FauLts in electronic components) in 2023, CREACH LABS in partnership with the DGA Information Superiority is organizing the second edition of BITFLIP during the European Cyber Week 2025. -