Search
Static Analysis for Security Properties
An emerging structure in our information processing-based society is the notion of trusted complex systems interacting via heterogeneous networks with an open, mostly untrusted world. This view characterises a wide variety of systems ranging from the information system of a company to the connected
innovAtive Laser imAging technologies with extended Range for Maritime Surveillance
Even if the proposed technologies could be adapted to other domains, the ALARMS project addresses the growing need in surveillance of maritime borders by controlling and managing almost instantaneously and accurately all trade shipping, by monitoring the illicit trafficking, the terrorism operations
An Operational Automatic Framework for Identity Document Fraud Detection and Profiling
The core idea of IDFRAud project is to provide an automatic verification system for identity documents in order to replace existing manual verification processes. The different components of ID analysis and verification in IDFRAud are driven by a set of control rules. In order to guarantee an interp
Fraud and Economic Lies: Information and Strategies
Most recent progress has been made in the economic literature on dishonesty in three directions: the understanding of the importance of moral norms in individual decision-making, the conflicting role of opportunities provided by asymmetries of information and social preferences, and the crucial effe
REsilient and FLEXible Infrastructure for Open Networking
The operators’ networks have significantly evolved over the last few years. Derived from the cloud computing paradigm, new network virtualization technologies are emerging. These technologies bring agility in the management of infrastructures and services while rationalizing expenditures. They also
Verifying Automatically the Correct Use and Implementation of COntainer LIBraries
The growing need for automated services in our fast-going society demands for increasingly complex software artifacts. To tackle this complexity, most programming languages offer Application Programming Interfaces (API) allowing software developers to use abstract data structures (sets, maps, st
Neuromorphic Architecture for Nuclear Threat Identification for SecuriTy Applications
This 42 months collaborative public-private partnership project aims to develop a low-cost, unified nuclear threat detection platform, capable of real-time neutron-gamma discrimination and real-time radionuclide identification with plastic scintillators usage. An original signal processing strategy
ALTER-TRACK
Alter-Track aims at designing a global solution for real-time vehicule tracking based on technologies that are not based on satellites like GPS/Galilleo (positioning) or GPRS (transmission of the positioning information). This approach paves the way to a fully autonomous positioning system, always a
Authenticated Ciphers and Resistance against Side-Channel Attacks
Symmetric cryptosystems are widely used because they are the only ones that can achieve some major functionalities such as high-speed or low-cost encryption, fast message authentication, and efficient hashing. Today, symmetric algorithms are used in mobile phones, in credit cards, in WLAN connection
Smart pOwer Grid for Energy Efficient small cell Networks
Europe targets to develop a low-carbon economy through the 2020 roadmap. However, forecast on Information and communications technology (ICT) industry states a continuous increase in global CO2 emissions pushed by the exponential increase in data traffic that characterizes wireless networks. Hence,
The use of technologies of phone and Internet interception by police and intelligence services and their private contractors: France in its European environment
This project deals with international interceptions of communications. Their sweeping development reconfigures the logics of surveillance, interrogates their usual discourses of justification, redefines the limits of democracies and questions States’ sovereignty. Such diverse stakes calls for a tran
Reconfigurable transmitarrays for beam steering and beam forming at millimetre waves
TRANSMIL is a fundamental research project aiming at making major innovations in modeling, design and demonstration of electronically-reconfigurable transmitarrays (TAs) with beam-steering and beam-forming capabilities at millimeter-wave frequencies (Ka band). It fits in the thematic frame “Société
Speech And Language technologies for Security Applications
The goal of the SALSA project (Speech And Language technologies for Security Applications) is to develop a set of speech and language processing tools specifically designed to assist analysts in processing and exploiting audio data for security purposes, such as judicial, law enforcement and intell
Novel Automatic Solver for Program Analysis
Modern societies crucially rely on digital infrastructures, and it is becoming clear that high-quality software can be obtained only with the help of proper software verification tools. Today most major verification approaches rely on automatic external solvers. These solvers, however, do not fi
Security properties, process equivalences and automated verification
The rise of the Internet and the ubiquity of electronic devices have changed our way of life. Many previously face-to-face and paper transactions nowadays have digital counterparts: home banking, electronic commerce, e-voting, etc. This digitalization of the world comes with tremendous risks for our
Granularity of the management levels in crisis context
Reports on crisis management show the two following main observations: Observation 1: The main weakness of crisis management is definitely not due to some lack in abilities and experience of actors involved in crisis management but to the difficulty to perform an agile coordination of these stakeho
Protection Against New kinD Of Reverse Engineering
Disastrous societal, social and economical consequences could show up if confidential data stored in secure circuits (NFC circuits, smart meters, banking cards…) become easily accessible by badly intentioned people. Several techniques, based on the observation, the perturbation or the inspection of
DeplOyment and seCurisaTion of new functiOnalities in virtualized networking enviRonment
Network operators are looking very carefully for potential opportunities and possible revenues before deploying new network equipment. This equipment is often designed for a specific usage, proprietary, and running on a specific hardware; making it very expensive to integrate (e.g. sizing, implement
Formal requirements modeling for critical systems: Method and Toolkit
The Formose project is an industrial research project that aims to provide a formally-grounded, model-based requirements engineering method for critical complex systems, supported by an open-source environment. Formose is a 48 months project proposed by a consortium made up of 2 academic partners (L
Analyses of JavaScript Applications: Certification and Security
We all depend on web applications. We shop, bank, socialize, work, collaborate, or communicate thanks to them. In all these cases, we entrust our personal data to them. These applications have become pervasive because they are both powerful and very easy to use; they have thus had a tremendous impac
Bandlimited Channels and Sampling: Information Theoretic Tradeoffs
In information theory, channel capacities have mostly been investigated for discrete time systems. Part of the reason for this is Shannon’s adage which says that “any continuous time channel can be converted, without information loss, into a discrete-time channel.” However, this reduction implicitly
Random Matrix Theory for Large Dimensional Graphs
RMT4GRAPH aims at developing an original framework for the theoretical analysis of large dimensional random graphs. This analysis allows in turn for the performance study as well as the improvement of a wide scope of signal processing and machine learning methods currently met within the big data pa
Proof systems for data queries
Semi-structured data, in particular in the form of XML documents, is now the established paradigm for storing and retrieving data over the Internet. XPath is a querying language, which allows to select elements in XML documents. Its use is pervasive in Web-oriented languages like XSLT or XQuer
Devising Intermediate representations and Semantics of COncurrency for Verified CompilERs
Pervasive in modern software and hardware systems, shared-memory concurrency has often been ignored in safety-critical system designs. This is mainly due to the complexity of its semantics, that takes root in the aggressiveness of the optimizations that compilers and hardware perform on the code. DI
Encryption for Big Data
We live in an era of “Big Data”, wherein a deluge of data is being generated, collected, and stored all around us. Without taking measures to protect these data, we risk living under digital surveillance in an Orwellian future. Unfortunately, traditional encryption systems lack the expressiveness ne
Parametric Analysis of Concurrent Systems
Model-checking and formal modelling are now techniques with a certain academic recognition, but their applicability in practice remain somewhat inferior to expectations. This is in part due to two main problems: rather rigid modelling of the systems impairing abstraction and scalability, and insuffi
Detection of faked AIS messages
Maritime environment is experiencing a growing activity, which has led to the use of new services for localization of vessels such as the Automatic Identification System (AIS), which allows real-time surveillance of maritime traffic and provides aids to navigation. Recent works have shown that falsi
Advanced Waveforms, MAC Design and Dynamic Radio Resource Allocation for Device-to-Device in 5G Wireless Networks
ACCENT5 project proposes innovative technological approaches for a smooth integration of D2D communication in future (5G) wireless networks. The proposed solutions allow increased data throughputs and dynamic resource allocation in D2D communications in a relaxed and completely omitted synchronizati
Semantic Hash for Advanced Document Electronic Signature
The SHADES project is an interdisciplinary project dealing with the security of documents involving organizations and researchers both from computer science and law domains. The objective of this project is to provide a new tool for authenticating the entirety of the content of a document through an
Intelligent and communicating real time diagnostics against compartments fires
When there are fire compartments, the decision-making of emergency response are mainly based on human decisions, the result of experience and voluntarism, without a full understanding of its evolution over time. In the fight against the fires, knowledge of their dynamics and their hazards and the ab