Les systèmes industriels sont à l'origine de la production de bien en transformant et en utilisant des matières premières. Ces systèmes répondent à nos besoins quotidiens comme en énergie électrique fournie par les centrales électriques, ou encore en nourriture fournie par l'industrie agroalimentaire. Un système industriel, quel qu'il soit, interagit toujours avec un procédé physique qu'il doit contrôler pour produire le bien attendu (nourriture, énergie, etc.). Ce contrôle se fait...
Digital ticketing systems typically offer ticket purchase, refund, validation, and, optionally, anonymity of users. However, it would be interesting for users to transfer their tickets, as is currently done with physical tickets. In this work, we propose Applause, a ticketing system allowing the purchase, refund, validation, and transfer of tickets based on trusted authority, while guaranteeing the anonymity of users, as long as the used payment method provides anonymity. To study its...
Early solutions take over path establishment to provide Quality of Service (QoS). A network that can support QoS is able to provide different levels of services depending on the application requirements. Some applications require real-time delivery of packets and need the assurance that packets will arrive on time. Other applications require packets to arrive correctly. The evolution of path establishment goes from technologies such as Frame Relay to more recent solutions such as...
With Industry 4.0, industrial systems and IoT are converging as industries become more distributed and connected. IoT has expanded beyond smart home devices, reaching critical sectors like healthcare and transportation, facing cyber attacks and malware threats in an era of connected complexity. In this presentation, we will discuss several vulnerabilities and countermeasures at different scales. We will first study host-based intrusion detection systems in the context of embedded IoT. We...
In this talk, we present a unified formal model of the WireGuard protocol in the symbolic model. Using the automatic cryptographic protocol verifiers SAPIC+, PROVERIF and TAMARIN, we conduct a thorough security assessment of the protocol with regard to an adversary that can read or set static, ephemeral or pre-shared keys, read or set ecdh pre-computations and control key distribution. We consider a complete protocol execution, including cookie messages used for resistance against denial...