Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
724 résultats
-
-
Séminaire
-
SoSysec
Ransomware Detection Using Markov Chain Models Over File Headers
Orateur : David Lubicz (DGA-MI)
In this paper, a new approach for the detection of ransomware based on the runtime analysis of their behaviour is presented. The main idea is to get samples by using a mini-filter to intercept write requests, then decide if a sample corresponds to a benign or a malicious write request. To do so, in a learning phase, statistical models of structured file headers are built using Markov chains. Then[…] -
-
-
Séminaire
-
SoSysec
Reasoning over leaks of information for Access Control of Databases
Orateur : Pierre Bourhis (CNRS, CRISTAL)
Controlling the access of data in Database management systems is a classical problem and it has been solved through different mechanisms. One of the most common mechanism implemented in most Database management systems is the mechanism of views, i.e defining the accessible data of a user as the result of a query. This mechanism is also used in principle in other systems such as in social networks.[…] -
-
-
Séminaire
-
SoSysec
Les cyberopérations: entre technique et droit international. Attribution, preuve et responsabilité.
Orateur : Anne-Thida Norodom (Professeur de droit public, Université de Paris)
L’objet de cette intervention est de montrer à quel point le juridique est dépendant du technique lorsqu’il s’agit de réguler les cyberopérations. L’approche choisie sera celle du droit international public, c’est-à-dire du droit applicable entre Etats. Alors qu’il existe un consensus au niveau international sur l’applicabilité du droit international dans le domaine numérique, les négociations en[…] -
-
-
Séminaire
-
SemSecuElec
Unique CAD-compatible SCA-security mechanisms, externally amplified coupling (EAC) attacks and (some) connection
Orateur : Itamar Levi
In this seminar I will first discuss unique computer aided design (CAD) compatible SCA security mechanisms. I will present an approach which can significantly increase the physical security-level of a design, be implemented with conventional design-tools and which does not require any special technological-support. The method consists with a correct by-design utilization of power-management[…] -
-
-
Séminaire
-
SemSecuElec
TRAITOR : a multi clock-glitch attack platform reproducing EMI effects at low-cost
Orateur : Ludovic Claudepierre
Electromagnetic injection (EMI) is a common and non-invasive technique used to perform fault attacks. In that case, an electromagnetic wave is radiated by an antenna in the close vicinity of the targeted microcontroller (STM32 in our case).The clock signal is generated thanks to a Phase-Locked-Loop (PLL). The PLL is highly sensitive to EMI and then induces severe disruption on the clock signal[…] -
-
-
Séminaire
-
SemSecuElec
Challenges related to random number generation for cryptographic applications
Orateur : Elie Noumon Allini
The main purpose of cryptography is to ensure secure communication. In order to achieve this goal, cryptographic schemes make an intensive use of random numbers. Given that the security of these schemes highly depends on these numbers, it is important to produce high-quality random numbers. Knowing that most cryptographic modules are nowadays implemented in logic devices, we investigated True[…] -