Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
633 résultats
-
-
Séminaire
-
SemSecuElec
One Fault Can Go A Long Way
Orateur : Shivam Bhasin
*Abstract:* Fault attacks are considered among critical threat to embedded cryptography. This talk will be divided into in two parts. The first part of the talk will explore application of faults on advanced security primitives. We present persistent fault analysis introduced at CHES 2017 and its capability to bypass state of the art fault countermeasures as well as higher-order masking with one[…] -
-
-
Séminaire
-
SemSecuElec
Security of Hardware/Software Interfaces : Research Chair of the Cybersecurity Research Cluster
Orateur : Guillaume Hiet
We proposed to host a thematic semester on attacks based on the interaction between software and hardware. The goal would be to host one workshop, one summer school for young researchers, as well as multiple seminars and longer stays for researchers, spanning September 2019 to March or April 2020. This thematic semester will be funded by the DGA in the context of the Cybersecurity Research Cluster[…] -
-
-
Séminaire
-
SemSecuElec
Lattice-based NIST candidates: abstractions and ninja tricks
Orateur : Thomas Prest
I will present the remaining lattice-based candidates for standardization by NIST (2 signature schemes, 5 encryption schemes). At a high level, these can all be interpreted as straightforward instantiations of decades-old paradigms. But when we look under the hood, all of them make design choices which impact their security, efficiency and portability in distinct manners; we will discuss these.[…] -
-
-
Séminaire
-
SemSecuElec
TRAITOR : a multi clock-glitch attack platform reproducing EMI effects at low-cost
Orateur : Ludovic Claudepierre
Electromagnetic injection (EMI) is a common and non-invasive technique used to perform fault attacks. In that case, an electromagnetic wave is radiated by an antenna in the close vicinity of the targeted microcontroller (STM32 in our case).The clock signal is generated thanks to a Phase-Locked-Loop (PLL). The PLL is highly sensitive to EMI and then induces severe disruption on the clock signal[…] -
-
-
Séminaire
-
SemSecuElec
When Electromagnetic Signals Reveal Obfuscated Malware: Deep and Machine Learning Use cases
Orateur : Duy-Phuc Pham et Damien Marion
The Internet of Things (IoT) is constituted of devices that are expo-nentially growing in number and in complexity. They use plentiful customized firmware and hardware, ignoring potential security issues, which make them a perfect victim for cybercriminals, especially malware authors.We will describe a new usage of side channel information to identify threats that are targeting the device. Using[…] -
-
-
Séminaire
-
SemSecuElec
Security challenges and opportunities in emerging device technologies: a case study on flexible electronics
Orateur : Nele Mentens - KU Leuven, Belgium
While traditional chips in bulk silicon technology are widely used for reliable and highly ef?cient systems, there are applications that call for devices in other technologies. On the one hand, novel device technologies need to be re-evaluated with respect to potential threats and attacks, and how these can be faced with existing and novel security solutions and methods. On the other hand,[…] -