Posts

Side Channel Attacks: How to exploit vulnerabilities of processors?

,
Side channel attacks exploit confidential information obtained from microarchitecture of general purpose computers, in other terms microprocessors. Maria Mushtaq, researcher in cybersecurity at Telecom Paris, explains how these attacks work…
cryptographie, nombres aléatoires, random numbers

Cryptography: what are the random numbers for?

,
Hervé Debar, Télécom SudParis – Institut Mines-Télécom and Olivier Levillain, Télécom SudParis – Institut Mines-Télécom The original purpose of cryptography is to allow two parties (traditionally referred to as Alice and…
zero-click attacks

Zero-click attacks: spying in the smartphone era

, ,
Zero-click attacks exploit security breaches in smartphones in order to hack into a target's device without the target having to do anything. They are now a threat to everyone, from governments to medium-sized companies. “Zero-click…
Hack drone attaque UAVs

Hacked in mid-flight: detecting attacks on UAVs

,
A UAV (or drone) in flight can fall victim to different types of attacks. At Télécom SudParis, Alexandre Vervisch-Picois is working on a method for detecting attacks that spoof drones concerning their position. This research could be used…

When organizations respond to cyberattacks

, ,
Cyberattacks are a growing reality that organizations have to face up to. In the framework of the German-French Academy for the Industry of the Future, researchers at IMT and Technische Universität München (TUM) show that there are solutions…
cyberdefense

Cyberdefense seeks to regain control

,
Between attackers and defenders, who is in the lead? In cybersecurity, the attackers have long been viewed as the default winners. Yet infrastructures are becoming better and better at protecting themselves. Although much remains to be done,…
hardware attacks

Hardware attacks, a lingering threat for connected objects

,
Viruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly…
blockchains

Can we trust blockchains?

,
Maryline Laurent, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style="normal" top="20" bottom="20"] [dropcap]B[/dropcap]lockchains were initially presented as a very innovative technology with great…