Filtrer par type de contenu

Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.

Supprimer tous les filtres

723 résultats

    • Séminaire

    • SoSysec

    Built on sand: on the security of Collaborative Machine Learning

    • 25 mars 2022

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Dario Pasquini (EPFL)

    This talk is about inaccurate assumptions, unrealistic trust models, and flawed methodologies affecting current collaborative machine learning techniques. In the presentation, we cover different security issues concerning both emerging approaches and well-established solutions in privacy-preserving collaborative machine learning. We start by discussing the inherent insecurity of Split Learning and[…]
    • Séminaire

    • SoSysec

    Intriguing Properties of Adversarial ML Attacks in the Problem Space

    • 19 juin 2020

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Fabio Pierazzi (King’s College London)

    Recent research efforts on adversarial ML have investigated problem-space attacks, focusing on the generation of real evasive objects in domains where, unlike images, there is no clear inverse mapping to the feature space (e.g., software). However, the design, comparison, and real-world implications of problem-space attacks remain underexplored. In this talk, I will present two major contributions[…]
    • Séminaire

    • SemSecuElec

    Laser-Based Attacks Against FPGA Bitstream Encryption

    • 07 juin 2019

    • Technische Universität Berlin - Salles Petri/Turing

    Orateur : Heiko Lohrke

    Field programmable gate arrays (FPGAs) use encryption to protect the configuration data or “bitstream” containing the design to be run on the device. This encryption aims at protecting the intellectual property and other secrets contained in the bitstream and preventing e.g. cloning or tampering with an FPGA implementation.This talk will demonstrate how attackers can use failure analysis equipment[…]
    • Séminaire

    • SemSecuElec

    Security of Hardware/Software Interfaces : Research Chair of the Cybersecurity Research Cluster

    • 22 juin 2018

    • Centrale-Supelec - Salles Petri/Turing

    Orateur : Guillaume Hiet

    We proposed to host a thematic semester on attacks based on the interaction between software and hardware. The goal would be to host one workshop, one summer school for young researchers, as well as multiple seminars and longer stays for researchers, spanning September 2019 to March or April 2020. This thematic semester will be funded by the DGA in the context of the Cybersecurity Research Cluster[…]
    • Séminaire

    • SemSecuElec

    Calibration Done Right: Noiseless Flush+Flush Attacks

    • 19 mars 2021

    • DGA-IRISA - Web-Conférence

    Orateur : Guillaume Didier

    Caches leak information through timing measurements and so-called side-channel attacks. Several primitives exist with different requirements and trade-offs. Flush+Flush is a stealthy and fast cache attack primitive that uses the timing of the clflush instruction depending on the presence of a line in the cache. However, the CPU interconnect plays a bigger role than thought in these timings, and[…]
    • Séminaire

    • SemSecuElec

    TRAITOR : a multi clock-glitch attack platform reproducing EMI effects at low-cost

    • 05 avril 2019

    • INRIA - Salles Pétri/Turing

    Orateur : Ludovic Claudepierre

    Electromagnetic injection (EMI) is a common and non-invasive technique used to perform fault attacks. In that case, an electromagnetic wave is radiated by an antenna in the close vicinity of the targeted microcontroller (STM32 in our case).The clock signal is generated thanks to a Phase-Locked-Loop (PLL). The PLL is highly sensitive to EMI and then induces severe disruption on the clock signal[…]