Filtrer par type de contenu

Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.

Supprimer tous les filtres

634 résultats

    • Séminaire

    • SoSysec

    Safety-Security Convergence of Industrial Control Systems

    • 13 décembre 2024 (11:00 - 12:00)

    • Inria Center of the University of Rennes - Room Aurigny

    Orateur : Maxime Puys - Université Clermont Auvergne - IUT de Clermont-Ferrand

    Industrial Control Systems (ICS) are designed to provide a service, such as power generation or water treatment, while protecting people, assets, and the environment against hazards. However, ICS now integrate Information Technology (IT) and are interconnected with the outside world such as the Internet, thereby exposing their infrastructures to cyberattacks. Cyberattacks have thus become new[…]
    • SoSysec

    • Détection d'intrusion

    • Soutenance thèse

    • Canaux auxiliaires

    Optimizing data leakage exploitation in the context of screaming-channel attack

    • 27 septembre 2024 (10:00 - 12:00)

    • CentraleSupélec, Rennes campus, avenue de la boulaie, 35510 Cesson-Sévigné - Room : salle téléTD « UBL »

    PhD Defense : Jérémy GUILLAUME Abstract: This thesis studies the challenges of implementing a screaming-channel attack: an attack exploiting the electromagnetic leakage and mixed-signal nature (analog and digital parts on the same silicon die) of a victim system to extract its secret data at a distance of several meters. In particular, Jeremy Guillaume explored various methods enabling an attacker[…]
    • Séminaire

    • Cryptographie

    Soutenance de thèse : Les attaques physiques sur les chiffrements intègres légers

    • 30 septembre 2024 (14:30 - 16:00)

    • IMT Atlantique, Campus Rennes – Petit Amphithéâtre (s’enregistrer à l’accueil en arrivant pour obtenir un badge visiteur)

    Orateur : Modou Sarry - IMT Atlantique

    Les dispositifs interconnectés tels que les réseaux de capteurs, la santé, les systèmes de contrôle distribués, l’internet des objets et les systèmes cyber-physiques sont de plus en plus répandus. Cette transition vers de petits appareils engendre de nouvelles préoccupations en matière de sécurité et de vie privée, car de nombreux algorithmes cryptographiques classiques ne répondent pas toujours[…]
    • Séminaire

    • SemSecuElec

    (On) The Impact of the Micro-architecture on the Masking Countermeasure against Side-Channel Attacks

    • 18 octobre 2024 (11:00 - 12:00)

    • Inria Center of the University of Rennes - - Métivier room

    Orateur : Lorenzo Casalino - CentraleSupélec, IRISA, Inria (SUSHI team)

    The masking countermeasure constitutes a provably secure approach against side-channel attacks. Nonetheless, in the software context, the micro-architecture underlying a given CPU potentially induces information leakages undermining the masking's proven security.In this seminar, I will present the research work developed during my Ph.D. at CEA-List in Grenoble. This work addresses, along two axes,[…]
    • SemSecuElec

    • Canaux auxiliaires

    • Vulnérabilités micro-architecturales

    • Séminaire

    • Cryptographie

    Adapting Identity-based Encryption with Wildcards to Access Control

    • 04 octobre 2024 (13:45 - 14:45)

    • Salle Guernesey à l'ISTIC

    Orateur : Anaïs Barthoulot - Université de Montpellier

    Nowadays, connected objects play an important role in our daily lives, providing services related to our cities, cars, homes, and health. For this purpose, they often need to be accessible by external entities, such as a garage owner (for a connected car), a postman (for a connected home), or a doctor (for a connected health device). However, it is crucial for the owner of such objects to retain[…]
    • Séminaire

    • Cryptographie

    Elliptic curves for SNARK and proof systems

    • 20 septembre 2024 (13:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Aurore Guillevic - INRIA Rennes

    This talk is based on joint works with Diego Aranha, Youssef El Housni, and Simon Masson. Elliptic curves make possible in practice very interesting mechanisms of proofs. The security relies on the difficulty of the discrete log problem and variants. Succinct non-interactive arguments of knowledge (SNARK) are a very fruitful topic, so that given a sequence of instructions that can be quite[…]