Search
Scintillating Nanocomposites Sensors for enhanced N/R detection
In order to respect the nuclear non-proliferation treaty and in a dreadful resurgence of terrorism, the detection and identification of nuclear and radioactive (N/R) material is a crucial issue. This N/R surveillance is achieved through scintillating materials, which convert incident radiation into
Development of assessment methodology of voice identification systems
The BRUEL project concerns with the evaluation/certification of voice authentication systems in the face of adversarial attacks. It is now well known that automatic voice authentication systems are vulnerable not only to speech produced artificially by speech synthesis, but also to other forms of at
Haptic harness for communication with security dogs
Cynotechnicians are involved in the security of places open to the public. Their effectiveness depends largely on the quality of communication between the handler and the dog and on the discretion of this communication based on voice and gestures. The necessary presence of the handler limits the eff
Resilience by Design and Security of Water Networks
Conducted through cyber and/or physical channels, water supply terrorism seeks to compromise the availability and quality of drinking water. This threat has direct consequences on the population and on the resilience of the city. Today, with the digital revolution, the resilience of a water distribu
A Prototype deepfake Assessment Toolbox for forensic Experts
The rise in the manipulation of images and voice represents a potential threat for crimes including disinformation campaigns, security fraud, extortion, online crimes against children, crypto jacking or illicit markets. Deepfake techniques are openly described and widely available; generating deepfa
EMASS: Effective Memory Analysis of Systems Software
Memory corruption in systems software written in memory-unsafe language, like C or assembly, is still today the source of most severe and frequent security vulnerabilities. In addition to memory safety, many security properties apply to values flowing through the memory. The project will provide an
Compressed images and Video interpolation and enhancement for legal evidence
IMPROVED targets studies and tuning of a new generation of tools dedicated to image and video enhancement, for police investigations, while keeping their ability to be used as evidence and respecting individual liberties. The project aims at bridging the gaps encountered by Scientific Police in the
MILP Modelings for Symmetric Cryptography
In symmetric-key cryptography, a popular technique for proving resistance against classical attacks is to model the behaviour of the cipher as a Mixed Integer Linear Programming (MILP) problem and solve it by some MILP solver. This method was applied for the first time by Mouha et al. [MWGP11] and b
Resonant Microstructured luminescent layers
“Counterfeiting costs € 60 billion to 13 sectors of the European economy”. The scourge of the 21st century, counterfeiting spares no sector and induces loss of turnover, but also legal risks if a fake product causes a disaster (e.g. in health). The COULEURS (Resonant microstrUctured Luminous layers)
Effective Detection of Software Backdoors
As software drives an increasing part of human activities, it is continuously under attack for criminal, economic, politic and strategic purposes. Attackers try to sneak into programs in order to steal data, hijack processes and disrupt activities. To do so, they can notably exploit backdoors to
Algorithmic protections against physical attacks
The rise of the internet of things increased the number of devices that use cryptographic primitives to communicate. These devices are vulnerable to physical attacks. The goal of this project is to secure cryptographic implementations from physical attacks. To reach this objective we want to study s
Diagnostic and therapeutic strategies targeting the Neurovascular-unit after Organophosphate exposure
Organophosphorus (OP) compounds are highly toxic chemicals widely used as pesticides, but also as chemical warfare agents (sarin, VX). The incidence of passive, active or accidental poisoning with OP pesticides is associated with nearly 100,000 annual deaths worldwide for nearly 2 million reported c
Attacks and Security Analysis of Digital Rights Management Systems
The world almost fully moved over earlier days of owning video files in their devices. Today, the most prevalent model is subscription-based services, where media can be played as often as the user wishes, but becomes unavailable when a user stops paying for the service. Thus, content providers rely
Generic decoding for various metrics
In a metric space, decoding a point consists in finding the closest point in a given subspace called "code". This problem is hard when the code is loosely structured. Better yet, it is believed to be hard even for a quantum computer. Thus, by using a structured code for which we know how to decode e
Robust and Scalable Prescriptive Analytics for the Resilience of Critical Infrastructure Networks
This project advances the body of knowledge on critical infrastructure network resilience by proposing robust and scalable prescriptive analytics to guide actions and decisions for effective resilience improvement. With this aim, we develop a novel interdisciplinary approach that integrates risk and
Thermochemical Study of Wildfire Propagation
Wildfires are a growing issue, especially during periods of drought in areas with Mediterranean climate where uncontrollable fires are observed such as megafires, too large and strong to be confined, and eruptive fires, too fast and unpredictable to be able to fight. There are several firefighting c
EQUitable prIvacy for Health data-centric services
The health sector is currently challenged by the advent of e-health services and by exceptional circumstances, e.g., the Covid-19 pandemic. These challenges have mainly showed a critical need on the wide collaboration between health actors and the efficient sharing of concrete data. However, the pro