Posts

The macro-threats of microarchitectures
Digital, In the NewsProcessor vulnerabilities are no longer limited to the microarchitecural flaws identified in recent years. They now extend to different contexts and directly affect our digital uses. Faced with these increasingly widespread threats, research in security is mobilizing and multiplying approaches to better understand and address them. Maria Mushtaq, researcher at Télécom Paris and organizer of the MICSEC Winter School, sheds light on these developments and the challenges of a field in full transformation.

Cryptography: what are the random numbers for?
Digital, In the News
Hervé Debar, Télécom SudParis – Institut Mines-Télécom and Olivier Levillain, Télécom SudParis – Institut Mines-Télécom
The original purpose of cryptography is to allow two parties (traditionally referred to as Alice and…

Zero-click attacks: spying in the smartphone era
Digital, In the News, Uncategorized
Zero-click attacks exploit security breaches in smartphones in order to hack into a target's device without the target having to do anything. They are now a threat to everyone, from governments to medium-sized companies.
“Zero-click…

Hacked in mid-flight: detecting attacks on UAVs
Digital, In the News
A UAV (or drone) in flight can fall victim to different types of attacks. At Télécom SudParis, Alexandre Vervisch-Picois is working on a method for detecting attacks that spoof drones concerning their position. This research could be used…

When organizations respond to cyberattacks
Digital, In the News, IndustryCyberattacks are a growing reality that organizations have to face up to. In the framework of the German-French Academy for the Industry of the Future, researchers at IMT and Technische Universität München (TUM) show that there are solutions…

Cyberdefense seeks to regain control
Digital, In the NewsBetween attackers and defenders, who is in the lead? In cybersecurity, the attackers have long been viewed as the default winners. Yet infrastructures are becoming better and better at protecting themselves. Although much remains to be done,…

Hardware attacks, a lingering threat for connected objects
Digital, In the NewsViruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly…

Can we trust blockchains?
Digital, In the NewsMaryline Laurent, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay
[divider style="normal" top="20" bottom="20"]
[dropcap]B[/dropcap]lockchains were initially presented as a very innovative technology with great…