Filtrer par type de contenu

Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.

Supprimer tous les filtres

722 résultats

    • Séminaire

    • SoSysec

    Intrusion Detection Systems over an Encrypted Traffic: Problem and Solutions

    • 06 décembre 2019

    • Inria Center of the University of Rennes - - Room TBD

    Orateur : Sébastien Canard (Orange)

    Privacy and data confidentiality are today at the heart of many discussions. But such data protection should not be done at the detriment of other security aspects. In the context of network traffic, intrusion detection system becomes in particular totally blind when the traffic is encrypted, making clients again vulnerable to known threats and attacks. Reconciling security and privacy is then one[…]
    • Séminaire

    • SemSecuElec

    HardBlare, a hardware/software co-design approach for Information Flow Control

    • 22 juin 2018

    • Centrale-Supelec - Salles Petri/Turing

    Orateur : Guillaume Hiet – Pascal Cotret

    One way to increase the security level of computer systems is to rely on both software and hardware mechanisms. In this context, the HardBlare project proposes a software hardware co-design methodology to ensure that security properties are preserved all along the execution of the system but also during file storage. The HardBlare project is a multidisciplinary project between CentraleSupélec IETR[…]
    • Séminaire

    • SemSecuElec

    SideLine and the advent of software-induced hardware attacks

    • 19 mars 2021

    • Mines Saint-Etienne – Thales - Web-Conférence

    Orateur : Joseph Gravellier

    In this talk, we will discuss software-induced hardware attacks and their impact for IoT, cloud and mobile security. More specifically, I will introduce SideLine, a new power side-channel attack vector that can be triggered remotely to infer cryptographic secrets. SideLine is based on the intentional misuse of delay-lines components embedded in SoCs that use external memory. I will explain how we[…]
    • Séminaire

    • SemSecuElec

    True Random Number Generators enabled hardware security

    • 29 mars 2019

    • Hardware Security and Cryptographic Processor Lab, Institute of Microelectronics, Tsinghua University, China - Métivier

    Orateur : Bohan Yang

    True randomness is all about unpredictability, which can neither be qualified nor quantified by examining statistics of a sequence of digits. Unpredictability is a property of random phenomena, which is measured in bits of information entropy. Application of randomness spans from art to numerical computing and system security. Random numbers enable various cryptographic algorithms, protocols and[…]
    • Séminaire

    • SemSecuElec

    Post-Quantum Cryptography Hardware: Monolithic Implementations vs. Hardware-Software Co-Design

    • 23 avril 2021

    • PQShield – United Kingdom - Web-Conférence

    Orateur : Markku-Juhani Saarinen

    At PQShield, we’ve developed dedicated coprocessor(s) for lattice schemes, hash-based signatures, and code-based cryptography. These cryptographic modules are commercial rather than academic and designed to meet customer specifications such as a specific performance profile or Common Criteria and FIPS security certification requirements.Hardware implementations of legacy RSA and Elliptic Curve[…]
    • Séminaire

    • SemSecuElec

    Security challenges and opportunities in emerging device technologies: a case study on flexible electronics

    • 06 mai 2022

    • IETR - University of Rennes - Campus de BEAULIEU - Bâtiment 11D, salle numéro 18

    Orateur : Nele Mentens - KU Leuven, Belgium

    While traditional chips in bulk silicon technology are widely used for reliable and highly ef?cient systems, there are applications that call for devices in other technologies. On the one hand, novel device technologies need to be re-evaluated with respect to potential threats and attacks, and how these can be faced with existing and novel security solutions and methods. On the other hand,[…]