Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
634 résultats
-
-
Séminaire
-
SoSysec
Squirrel: a new approach to computer-assisted proofs of protocols in the computational model.
Orateur : David Baelde (ENS Cachan)
Formal methods have brought several approaches for proving that security protocols ensure the expected security and privacy properties. Most of the resulting tools analyze protocols in symbolic models, aka. Dolev-Yao-style models. Security in the symbolic model does not imply security in the cryptographer’s standard model, the computational model, where attackers are arbitrary (PPTIME) Turing[…] -
-
-
Séminaire
-
SoSysec
Port Contention Goes Portable: Port Contention Side Channels in Web Browsers
Orateur : Thomas Rokicki (Univ Rennes, CNRS, IRISA)
Microarchitectural side-channel attacks can derive secrets from the execution of vulnerable programs. Their implementation in web browsers represents a considerable extension of their attack surface, as a user simply browsing a malicious website, or even a malicious third-party advertisement in a benign cross-origin isolated website, can be a victim.In this talk, we present the first CPU port[…] -
-
-
Séminaire
-
SoSysec
The PINED-RQ Family: Differentially Private Indexes for Range Query Processing in Clouds
Orateur : Tristan Allard (IRISA, Université de Rennes 1)
Performing non- aggregate range queries on cloud stored data, while achieving both privacy and efficiency is a challenging problem. With the PINED-RQ family of techniques, we propose constructing a differentially private index to an outsourced encrypted dataset. Efficiency is enabled by using a cleartext index structure to perform range queries. Security relies on both differential privacy (of the[…] -
-
-
Séminaire
-
SoSysec
Where ML Security Is Broken and How to Fix It
Orateur : Maura Pintor (PRA Lab, University of Cagliari)
To understand the sensitivity under attacks and to develop defense mechanisms, machine-learning model designers craft worst-case adversarial perturbations with gradient-descent optimization algorithms against the model under evaluation. However, many of the proposed defenses have been shown to provide a false sense of robustness due to failures of the attacks, rather than actual improvements in[…] -
-
-
Séminaire
-
SoSysec
Security and privacy in personal data management systems
Orateur : Nicolas Anciaux (INRIA)
Personal Data Management Systems (called PDMS) provide individuals with a hardware and/or software solution to manage their data under control. From a data management and security/privacy perspective, the issues involved are complex and differ significantly from the traditional database setting. The emergence of trusted execution environments (such as Intel SGX) could be a game changer. This[…] -
-
-
Séminaire
-
SoSysec
Contemporary Issues in Digital Forensics
Orateur : Ben Martini (University of South Australia)
The discipline of digital forensics, or as it was then known ‘forensic computing’, began with a focus on retrieving admissible evidence from computer systems (typically personal computers). However, with the increased pervasiveness of connected digital technologies in the last 20 years, a wide variety of new and complex sources of digital evidence have emerged. This has presented a range of[…] -