Précédents séminaires

19/03/2024  •  Transferable, Auditable and Anonymous Ticketing Protocol
Dhekra MAHMOUD, Doctorante

Digital ticketing systems typically offer ticket purchase, refund, validation, and, optionally, anonymity of users. However, it would be interesting for users to transfer their tickets, as is currently done with physical tickets. In this work, we propose Applause, a ticketing system allowing the purchase, refund, validation, and transfer of tickets based on trusted authority, while guaranteeing the anonymity of users, as long as the used payment method provides anonymity. To study its...

20/02/2024  •  History of Path Establishment Technologies
Dorine CHAGNON, Doctorante

Early solutions take over path establishment to provide Quality of Service (QoS). A network that can support QoS is able to provide different levels of services depending on the application requirements. Some applications require real-time delivery of packets and need the assurance that packets will arrive on time. Other applications require packets to arrive correctly. The evolution of path establishment goes from technologies such as Frame Relay to more recent solutions such as...

Dorine CHAGNON
16/01/2024  •  Cybersecurity of Critical Devices: Network Security and Host Intrusion Detection
Maxime PUYS, Maître de conférences

With Industry 4.0, industrial systems and IoT are converging as industries become more distributed and connected. IoT has expanded beyond smart home devices, reaching critical sectors like healthcare and transportation, facing cyber attacks and malware threats in an era of connected complexity. In this presentation, we will discuss several vulnerabilities and countermeasures at different scales. We will first study host-based intrusion detection systems in the context of embedded IoT. We...

Maxime PUYS
11/12/2023  •  A Unified Symbolic Analysis of WireGuard
Dhekra MAHMOUD, Doctorante

In this talk, we present a unified formal model of the WireGuard protocol in the symbolic model. Using the automatic cryptographic protocol verifiers SAPIC+, PROVERIF and TAMARIN, we conduct a thorough security assessment of the protocol with regard to an adversary that can read or set static, ephemeral or pre-shared keys, read or set ecdh pre-computations and control key distribution. We consider a complete protocol execution, including cookie messages used for resistance against denial...

14/11/2023  •  Etude, spécification et implémentation d’un chiffrement homomorphe ad-hoc basé sur RLWE
Lola-Baie MALLORDY, Stagiaire

Cloud storage is used to store huge amounts of data, both for companies and private users. Multi-cloud emerged to prevent data from system failure by storing simultaneously several copies of the data among multiple clouds. Yet, this solution is costly in memory, and often does not guarantee confidentiality nor integrity of the data. Moreover, handling communication with each server can be a daunting task for private users. Using secret sharing, we propose an approach involving multiple...

«
Page 2 / 7
»