Search
Security and privacy in 5G mobile networks – MobiS5
For 20 years, 3rd and 4th generation mobile networks have allowed users to receive service anywhere, at any time. The dawning and visionary 5th generation mobile network (5G) aims to create a highly-decentralised architecture, including a massive Internet of Things (mIoT) and a non-federated core ne
Color images multiplexing by laser structuring of plasmonic materials for security and personalization of ID cards – MIXUP
In a context where government agencies develop enhanced security policies and technologies to track and protect the correct identity of every person, the MIXUP proposal aims at developing a breaking approach in the field of physical authentication of ID documents such as passports, ID cards, driving
Privacy Protection and ePrivacy Compliance for Web Users – PrivaWEB
PrivaWEB aims at developing new methods for detection of advanced Web tracking technologies and new tools to integrate in existing Web applications that seamlessly protect privacy of users. In this project, we will integrate three key components into Web applications: privacy, compliance and usabili
Multi-Objective Optimised Synthesis to Improve Cybersecurity – MOOSIC
Untrusted companies can insert a HT at different steps of the design process: into IP blocks, during delegated tasks or fabrication (cf. Fig. 1). Furthermore, probe-based intrusive attacks on altered SoCs can facilitate monitoring and control of internal nodes. HTs inserted by a foundry have receive
Cooperation in Conflict Zones – COOPCONFLICT
Our proposal consists of three sub-projects. Each sub-project aims to provide quantitative evidence on how economic interventions and organizational changes can promote effective cooperation in conflict zones. Each sub-project will highlight a different set of actors in the conflict. In a first sub-
Automated Hardware Malware Analysis – AHMA
Our objectives are to extend the usage of side-channel information to provide further insights into the hardware behavior when malware is executed. Our approach is to (1) find and measure suitable additional side-channel sources on IoT devices, in combination with an analysis framework consisting o
Resilience of Interconnected Infrastructures and Systems – RESIIST
The RESIIST project focuses on the issues of assessing the resilience of critical infrastructures. The idea is to use massive data to continuously assess the resilience of critical infrastructures. Data from various sources are interpreted to obtain relevant indicators reflecting several dimensions.
Analysis of Local Population Initiatives and Integration in Crisis Management – INPLIC
Faced with a disaster, populations and victims are also the first links of rescue and solidarity. Uniting around local officials, helping neighbors, or local and spontaneous contribution to support emergency services are increasingly highlighted at each new major event. Faced with a chaotic context
Mobile assistance system for intervention in RN environment – SPADASSIN-RN
Malicious acts or accidents in the radiological field prompt us to think about the development of a new comprehensive and integrated Radiologic & Nuclear (RN) crisis management system. The SPADASSIN-RN project (Mobile Assistance System for intervention in RN environment) proposes the development of
Declarative language for Symmetric Cryptography – DeCrypt
This project aims to propose a declarative language dedicated to cryptanalytic problems in symmetric key cryptography using constraint programming (CP) to simplify the representation of attacks, to improve existing attacks and to build new cryptographic primitives that withstand these attacks. W
Control the integrity of execution: a step further CFI – COFFI
The growing complexity of embedded system comes with a strong corollary: security level has to similarly increase since new and powerful attacks take advantage of any flaws, ignoring no longer pertinent frontiers such as software and hardware. Physical attacks are particularly effective threats to s
Unitary Authentication in the THz and Radiofrequencies domains – AUSTRALE
Counterfeiting and more generally identity theft, is a phenomenon that affects all the industrial sectors, from luxury to mass distribution and whose losses are colossal for economy, employment, brand image: in France a cost of 7.3 €billion (0.3% of the Gross Domestic Product) and of 25 000 jobs (ab
Butyrylcholinesterase-based fluorescent and/or colorimetric detection of organophosphorus nerve agents – DetectOP_BChE
Organophosphorus nerve agents (OP) are highly toxic for human and are used as pesticides, but unfortunately also as chemical warfare agents . Considering the serious threat that they represent to the worldwide security and health, much efforts have been devoted to the development of sensitive and se
DEvelopment of an adVanced analytIcal pLatform for trackIng New pSychoactIve Drugs – DEVIL_INSID
The increasing occurrence, on the European market, of new uncontrolled drugs called New Psychoactive Substances (NPS) is an important threat for public health since they are popular in festive events where several consumers died following overdose. In this framework, it is essential to detect all th
The sea at the crossroad: the legal repercussions of the superposition of legal regimes on the effectivity of the police at sea – MERCRO
The proposal arose from the European maritime current events. The sea indeed became for Europe a major security issue. A large number of legal studies concentrated on the migratory phenomena, the rise of the criminality at sea or the environmental challenges. However, these studies remain for the ma
Ethnography of guerrillas and riots : subjective training, emotions and sensitive experience of immediate violence – EGR
This research project is a response to the observation that we still do not know how violence is experienced in its immediacy. The social experience of political violence denotes repertoires of heterogeneous actions: actors who form political action groups seeking to inflict material, psychological,
Optically Based Instantaneous microWAve iMagery – OBIWAM
OBIWAM is a collaborative research-enterprise (PRCE) project composed by three industrial partners and two academic ones, which is voluntarily focused on applications. It aims to design and experimentally demonstrate a real-time-high-resolution microwave imagery system for security applications (bo
Behaviour of Economic Agents, Utility and Security (in times of) Terror – BEcAUSeTerror
The number of terror incidents have been multiplied by 3 in recent years compared to the first decade of years 2000s which raised some interest to study the economic impact of terrorism. A growing body of the literature documents a negative impact of terrorism on financial markets, international tra
Cryptography in a Quantum World – CryptiQ
People are getting more and more concerned about long-term privacy and confidentiality of personal digitalized data exchanged over the Internet. Furthermore, there has recently been a substantial amount of research on quantum computers, which offer considerably greater computational power than t