Search
Alerte Detection Drone: Identification & Tracking by fusION
The ADDITION project is a 36-month project in collaborative research in PRCE partnership with 7 partners (3 SMEs: Exavision, Syrlinks, ISSM; 1 EPIC: ONERA (coordinator); 1 laboratory: ICP and two end-users CEA/DSSN and the DGGN). It meets the requirement of Counter-UAS and surveillance applications
ARCHI-SEC: Micro-Architectural Security
The objectives are as follows: * Highlight the architectural vulnerabilities of processors at model level and anticipate attacks that take advantage of it. We limit our study to Systems based on ARM and RISC-V processors. For software, we use either a custom operating system type «BareMetal« or Lin
Secure Software using Whitebox Technology
Cryptographic algorithms are increasingly deployed in various applications embedded on connected devices, such as smartphones and tablets. In this environment, the capabilities of the adversary can be greatly enhanced, and we should consider an adversary who can access the binary code, modify its
How data make us see and expect war: the impact of research practices in quantitative conflict analysis on perceptions of political violence by NGOs, political institutions, and the media
What is the impact of the ‘agency of data’ – defined as the social practices of data collection and analysis in quantitative conflict studies – on practitioners’ perceptions and interpretations of armed conflict? DATAWAR is the first collaborative project to address this research question using a ho
Secure and Functional Encrypted Databases
Encrypted databases are an attractive goal: they enable users to outsource data to the cloud with desirable functionalities, such as the ability to search over the data, while retaining precise guarantees regarding the confidentiality of their data with respect to the host server. However, most exis
MRAM/CMOS Hybridization to Secure Cryptographic Algorithms
So far connected objects have been designed and deployed with strong cost and power consumption constraints, postponing security to secondary requirements. Recent successful attacks have proved that the security of IoT will become a major and crucial issue and technical solutions, like Light Weight
Processing Encrypted Streams for Traffic Oversight
While GDPR (General Data Protection Regulation) imposes some privacy constraints, growing threats against servers require traffic analysis to detect malicious behaviors. This analysis includes identification of illegitimate connections to mitigate denial of service attacks, content filtering to limi
Pseudo-catalytic bioscavengers of organophosphorous neurotoxic agents
Nowadays, Organophosphate nerve agents (OPNA) poisoning remains a serious terrorist threat. Their toxicity results from the irreversible inhibition of acetylcholinesterase (AChE), an enzyme which regulates cholinergic transmission in the central (CNS) and peripheral nervous systems. The current trea
Mobile Compton Cameras for Critical Infrastructure Surveillance
The objective of RED-7D project is to design a multi-task mobile Compton camera loaded on a rover aimed at reconstructing 7D scenes (3D visible environment augmented with 3D nuclear source localization in space and 1D in energy). Such augmented facility could be considered in deploying solutions for
FP-Locker: Hardening web authentication with browser fingerprinting
Device fingerprinting is a technique better known for its use to track and re-identify devices. It leaves no traces on users' devices. Browser fingerprinting, a specific type of device fingerprinting, exploits modern web configurations, technologies, protocols and APIs to uniquely identify devices.
Microarchitectural Attacks On Ubiquitous Systems
Hardware is often considered as an abstract layer that behaves correctly, executing instructions and giving an output. However, side effects due to software implementation and its execution on actual hardware can cause information leakage from side channels, resulting in critical vulnerabilities imp
A risky market? The emergence of predictive maintenance of military systems in France
From a theoretical point of view, the study of digital data markets presents particularly important scientific challenges. Considering that the organization of market spaces always refers to a process of definition and implementation of rules by the State (Weber, 1971; Fligstein, 1990; Fligstein, 19
Interactions of PRoximal bOdies in rarefied Flows
The objective of the IPROF project is to characterize the aerodynamic interactions of proximal bodies evolving in supersonic and hypersonic rarefied flows. When a body is fragmented at high altitude during its re-entry into the Earth’s atmosphere, trajectories of fragments can be strongly influenced
a Generic Approach to Secure network Protocols
In today's connected world, we heavily rely on network protocols to communicate with one another. To ensure the confidentiality and integrity of the exchanged data, we need to assess and improve the security of these protocols and their implementation. This observation obviously concerns so-called s