Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
656 résultats
-
-
Séminaire
-
SoSysec
Présentation des fondamentaux du management du risque et d’EBIOS Risk Manager
Orateur : Vincent Loriot (ANSSI)
Résumé :a. Présentation ANSSIb. Tendances de la menace cyber et démarche pour s’en protégerc. Fondamentaux de la méthode EBIOS Risk ManagerLa présentation théorique sera complétée avec un atelier pratique couvrant les sujets suivants :a. Les besoins et enjeux de sécuritéb. Les couples Source de Risque / Objectif Viséc. La cartographie de menace de l’écosystème -
-
-
Séminaire
-
SoSysec
Privacy in The 5G-AKA Authentication Protocol
Orateur : Adrien Koutsos (LSV)
The 5G mobile communications standards are being finalized, and drafts are now available. This standard describes the 5G-AKA authentication and key exchange protocol. The previous version of AKA (3G and 4G) are well-known for their lack of privacy against an active adversary (e.g. a user can be massively tracked using IMSI-catcher). This new version of AKA tries to offer more privacy, notably[…] -
-
-
Séminaire
-
SoSysec
A theory of assertions for Dolev-Yao models
Orateur : Vaishnavi Sundararajan (Chennai Mathematical Institute, India)
We undertake an abstract study of certification in security protocols, concentrating on the logical properties and derivability of certificates. Specifically, we extend the Dolev-Yao model with a new class of objects called ‘assertions’, along with an associated algebra for deriving new assertions from old ones. We obtain complexity results for the derivability problem and active intruder problem[…] -
-
-
Séminaire
-
SoSysec
Formal security proofs in a post-quantum world
Orateur : Charlie Jacomme (CISPA)
In the recent years, formals methods for security and their associated tools have been used successfully both to find novel and complex attacks on many protocols [A] and to help in their standardization process. They however face a new challenge with the increasing probability of quantum computers coming into the real-world: we need to be able to provide guarantees against quantum attackers.In[…] -
-
-
Séminaire
-
SoSysec
Learning-Based Network Intrusion Detection: an Imbalanced, Constantly Evolving and Timely Problem
Orateur : Maxime Pelcat (INSA Rennes)
Network intrusion detection systems (NIDS) observe network traffic and aim to pinpoint intrusions, i.e. effective threats on the integrity, availability or confidentiality of services and data provided by this network. There are two types of NIDS:1) signature-based intrusion detection systems that identify known intrusions by referring to an existing knowledge base, and2) anomaly-based intrusion[…] -
-
-
Séminaire
-
SoSysec
Does Facebook use sensitive data for advertising?
Orateur : José González Cabañas (Universidad Carlos III de Madrid, Spain)
Large online platforms use personal data, for example, your interests, to allow advertisers to reach you based on the things you like. But did you know some of these interests they use are associated with sensitive information directly linked to your social profile? In this talk, I will talk about the definition of sensitive data in terms of the General Data Protection Regulation in Europe (GDPR).[…] -