Posts

Side Channel Attacks: How to exploit vulnerabilities of processors?
Digital, In the News
Side channel attacks exploit confidential information obtained from microarchitecture of general purpose computers, in other terms microprocessors. Maria Mushtaq, researcher in cybersecurity at Telecom Paris, explains how these attacks work…

Cryptography: what are the random numbers for?
Digital, In the News
Hervé Debar, Télécom SudParis – Institut Mines-Télécom and Olivier Levillain, Télécom SudParis – Institut Mines-Télécom
The original purpose of cryptography is to allow two parties (traditionally referred to as Alice and…

Zero-click attacks: spying in the smartphone era
Digital, In the News, Uncategorized
Zero-click attacks exploit security breaches in smartphones in order to hack into a target's device without the target having to do anything. They are now a threat to everyone, from governments to medium-sized companies.
“Zero-click…

Hacked in mid-flight: detecting attacks on UAVs
Digital, In the News
A UAV (or drone) in flight can fall victim to different types of attacks. At Télécom SudParis, Alexandre Vervisch-Picois is working on a method for detecting attacks that spoof drones concerning their position. This research could be used…

When organizations respond to cyberattacks
Digital, In the News, IndustryCyberattacks are a growing reality that organizations have to face up to. In the framework of the German-French Academy for the Industry of the Future, researchers at IMT and Technische Universität München (TUM) show that there are solutions…

Cyberdefense seeks to regain control
Digital, In the NewsBetween attackers and defenders, who is in the lead? In cybersecurity, the attackers have long been viewed as the default winners. Yet infrastructures are becoming better and better at protecting themselves. Although much remains to be done,…

Hardware attacks, a lingering threat for connected objects
Digital, In the NewsViruses, malware, spyware and other digital pathologies are not the only way computer systems’ vulnerabilities are exploited. Hardware attacks are not as well-known as these software attacks, but they are just as dangerous. They involve directly…

Can we trust blockchains?
Digital, In the NewsMaryline Laurent, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay
[divider style="normal" top="20" bottom="20"]
[dropcap]B[/dropcap]lockchains were initially presented as a very innovative technology with great…