Posts

The macro-threats of microarchitectures

,
Processor vulnerabilities are no longer limited to the microarchitecural flaws identified in recent years. They now extend to different contexts and directly affect our digital uses. Faced with these increasingly widespread threats, research in security is mobilizing and multiplying approaches to better understand and address them. Maria Mushtaq, researcher at Télécom Paris and organizer of the MICSEC Winter School, sheds light on these developments and the challenges of a field in full transformation.

Patrice Abry, winner of the 2024 IMT-Académie des Sciences Grand Prize

, ,
Complex systems specialist Patrice Abry played a key role in identifying the fractal nature of Internet traffic as early as 1998. The success of his work, carried out in collaboration with Daryl Veitch, sparked the launch of a series of research projects integrating theoretical advances and applications, particularly in cybersecurity, that have continued over two decades. We review a career that saw techniques evolve with the times, but in which fundamental constants remain.

Side Channel Attacks: How to exploit vulnerabilities of processors?

,
Side channel attacks exploit confidential information obtained from microarchitecture of general purpose computers, in other terms microprocessors. Maria Mushtaq, researcher in cybersecurity at Telecom Paris, explains how these attacks work and give suggestions to improve computer security.
Tatouage des données de santé, health data

Encrypting and watermarking health data to protect it

,
As medicine and genetics make increasing use of data science and AI, the question of how to protect this sensitive information is becoming increasingly important to all those involved in health. A team from the LaTIM laboratory is working on these issues, with solutions such as encryption and watermarking. It has just been accredited by Inserm.
cybersécurité, attaques informatiques, attacks

Governments, banks, and hospitals: all victims of cyber-attacks

,
Hervé Debar, Télécom SudParis – Institut Mines-Télécom Cyber-attacks are not a new phenomenon. The first computer worm distributed via the Internet, known as the “Morris worm” after its creator, infected 10% of the 60,000…
zero-click attacks

Zero-click attacks: spying in the smartphone era

, ,
Zero-click attacks exploit security breaches in smartphones in order to hack into a target's device without the target having to do anything. They are now a threat to everyone, from governments to medium-sized companies. “Zero-click…

IMPETUS: towards improved urban safety and security

, ,
How can traffic and public transport be managed more effectively in a city, while controlling pollution, ensuring the safety of users and at the same time, taking into account ethical issues related to the use of data and mechanisms to ensure…