Side Channel Attacks: How to exploit vulnerabilities of processors?

, ,
Side channel attacks exploit confidential information obtained from microarchitecture of general purpose computers, in other terms microprocessors. Maria Mushtaq, researcher in cybersecurity at Telecom Paris, explains how these attacks work…
Tatouage des données de santé, health data

Encrypting and watermarking health data to protect it

, , ,
As medicine and genetics make increasing use of data science and AI, the question of how to protect this sensitive information is becoming increasingly important to all those involved in health. A team from the LaTIM laboratory is working on…

IMPETUS: towards improved urban safety and security

, , ,
How can traffic and public transport be managed more effectively in a city, while controlling pollution, ensuring the safety of users and at the same time, taking into account ethical issues related to the use of data and mechanisms to ensure…