Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
634 résultats
-
-
Séminaire
-
Cryptographie
Soutenances de stages de M2
Orateur : Gael Claudel et Baptiste Germon - IRISA
-
-
-
Conférence
-
Détection d'intrusion
Détection en cybersécurité
Organisation d’un séminaire d'une journée réunissant les équipes dans le périmètre de Creach Labs menant à bien des projets de recherche sur la détection en cybersécurité. -
-
-
Séminaire
-
SemSecuElec
TrustSoC : a heterogeneous secure-by-design SoC architecture
Orateur : Raphaële Milan - Université Jean Monnet Saint-Etienne, CNRS, Laboratoire Hubert Curien UMR 5516
Since the 1970s, the complexity of systems on a chip has grown significantly. In order to improve system performance, manufacturers are integrating an increasing number of heterogeneous components on a single silicon chip. The incorporation of these components renders SoCs highly versatile yet significantly complex. Their multipurpose nature makes them suitable for use in a variety of domains,[…]-
SemSecuElec
-
-
-
Séminaire
-
SemSecuElec
FeFET based Logic-in-Memory design, methodologies, tools and open challenges
Orateur : Cédric Marchand - University of Lyon - Lyon Institute of Nanotechnology (UMR CNRS 5270)
Data-centric applications such as artificial intelligence and the Internet of Things (IoT) impose increasingly stringent demands on the performance, the security and the energy efficiency of modern computing architectures. Traditional approaches are often unable to keep pace with these requirements making necessary to explore innovative paradigms such as in-memory computing. This paradigm is[…]-
SemSecuElec
-
-
-
Séminaire
-
SemSecuElec
Code Encryption for Confidentiality and Execution Integrity down to Control Signals
Orateur : Théophile Gousselot - Mines Saint-Etienne, CEA, Leti, Centre CMP, F - 13541 Gardanne France
Embedded devices face software and physical fault injections to either extract or tamper with code in memory. The code execution and code intellectual property are threatened. Some existing countermeasures provide Control Flow Integrity (CFI) extended with the confidentiality and integrity of the instructions by chaining all of them through a cryptographic encryption primitive. While tampering[…]-
SemSecuElec
-
Injection de fautes
-
Vulnérabilités micro-architecturales
-
Contremesures matérielles
-
-
-
Séminaire
-
SoSysec
The Battle Against Bots: Current Threats and New Directions to Counter Automated Attacks
Orateur : Elisa Chiapponi - Amadeus IT Group
In today's digital landscape, the battle between industry and automated bots is an ever-evolving challenge. Attackers are leveraging advanced techniques such as residential proxies, CAPTCHA farms, and AI-enhanced fingerprint rotations to evade detection and execute functional abuse attacks, including web scraping, denial of inventory, and SMS pumping. This talk will explore ongoing efforts[…]-
SoSysec
-
Détection d'intrusion
-