Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
709 résultats
-
-
Séminaire
-
SoSysec
Privacy in The 5G-AKA Authentication Protocol
Orateur : Adrien Koutsos (LSV)
The 5G mobile communications standards are being finalized, and drafts are now available. This standard describes the 5G-AKA authentication and key exchange protocol. The previous version of AKA (3G and 4G) are well-known for their lack of privacy against an active adversary (e.g. a user can be massively tracked using IMSI-catcher). This new version of AKA tries to offer more privacy, notably[…] -
-
-
Séminaire
-
SoSysec
A theory of assertions for Dolev-Yao models
Orateur : Vaishnavi Sundararajan (Chennai Mathematical Institute, India)
We undertake an abstract study of certification in security protocols, concentrating on the logical properties and derivability of certificates. Specifically, we extend the Dolev-Yao model with a new class of objects called ‘assertions’, along with an associated algebra for deriving new assertions from old ones. We obtain complexity results for the derivability problem and active intruder problem[…] -
-
-
Séminaire
-
SoSysec
Formal security proofs in a post-quantum world
Orateur : Charlie Jacomme (CISPA)
In the recent years, formals methods for security and their associated tools have been used successfully both to find novel and complex attacks on many protocols [A] and to help in their standardization process. They however face a new challenge with the increasing probability of quantum computers coming into the real-world: we need to be able to provide guarantees against quantum attackers.In[…] -
-
-
Séminaire
-
SoSysec
Learning-Based Network Intrusion Detection: an Imbalanced, Constantly Evolving and Timely Problem
Orateur : Maxime Pelcat (INSA Rennes)
Network intrusion detection systems (NIDS) observe network traffic and aim to pinpoint intrusions, i.e. effective threats on the integrity, availability or confidentiality of services and data provided by this network. There are two types of NIDS:1) signature-based intrusion detection systems that identify known intrusions by referring to an existing knowledge base, and2) anomaly-based intrusion[…] -
-
-
Séminaire
-
SoSysec
Does Facebook use sensitive data for advertising?
Orateur : José González Cabañas (Universidad Carlos III de Madrid, Spain)
Large online platforms use personal data, for example, your interests, to allow advertisers to reach you based on the things you like. But did you know some of these interests they use are associated with sensitive information directly linked to your social profile? In this talk, I will talk about the definition of sensitive data in terms of the General Data Protection Regulation in Europe (GDPR).[…] -
-
-
Séminaire
-
SoSysec
Built on sand: on the security of Collaborative Machine Learning
Orateur : Dario Pasquini (EPFL)
This talk is about inaccurate assumptions, unrealistic trust models, and flawed methodologies affecting current collaborative machine learning techniques. In the presentation, we cover different security issues concerning both emerging approaches and well-established solutions in privacy-preserving collaborative machine learning. We start by discussing the inherent insecurity of Split Learning and[…] -