Sites Inria

Version française

New technologies to protect digital data and computer systems

Demonstrations of innovative technologies stemming from Inria, from its academic and industrial partners and from start-ups will be presented on the shoowrom from 12:30 am.

Research

ABC: Automaton Based Online Correlation

Project team Cidre, Inria Rennes - Bretagne Atlantique -

This demonstration illustrates the algorithms used to correlate security alerts.

The purpose of this demonstration is to illustrate the algorithms used to correlate security alerts emitted by Intrusion Detection Systems and sensors, in order to detect multi-step attack scenarios. This prototype has been developed in the context of the FP7 PANOPTESEC European project. The demonstration will focus on the visualisation of the internals of the correlator (i.e., its internal data structures, how this internal state evolve when alerts are received).

Keywords:

More

AmIUnique

Research

AmIUnique and the fight against online tracking with browser fingerprinting

Project team DiverSe, Inria Rennes - Bretagne Atlantique -

Today, the web is evolving at an amazing pace with a richer, more personal and more interactive user experience. Nevertheless, modern browser technologies, which provide the beauty and power of the web, also provide a darker side, a rich ecosystem of exploitable data that can be used to build unique browser fingerprints. With AmIUnique, we aim at discovering the diversity of devices connected to the web through fingerprinting to design smart defenses against unwanted online tracking.

Keywords:

More

Research

Automated Web App Analysis

Team CISPA -

Static analysis for identifyings security flaws in php source code of web apps.

Keywords:

More

Research

Automotive Security & Privacy

CISPA team -

What do modern cars know about their drivers and how secure are they ?

Keywords:

More

Research

Belenios

Project teams PESTO and Caramba, Inria Nancy- Grand Est -

Running secure and verifiable online elections.

In this demo, we will show how to run an election with Belenios, from the setup to the tally. We will explain the security and verifiability properties of the system.

Keywords:

More

CEA

Research

Code verification with BINSEC and FRAMA-C

Teams List and CEATech -

Come see how binary code analysis and source code verification can provide formal security guarantees. These demonstrations are illustrations of the use of the BINSEC and FRAMA-C software analysis platforms to provide a set of formal tools for vulnerability detection, malware analysis, security policy enforcement, and code de-obfuscation. Developped as part of a large-scale, multi-project effort, these platforms will be shown here on real-world cybersecurity samples.

Keywords:

More

Research

Hacking Cisco Phones

CISPA Team -

Wiretapping Cisco telecommunications hardware with fuzzing

Keywords:

More

HACL*

Recherche

HACL*

Team: PROSECCO -

We demonstrate HACL*, a verified cryptographic library written in F* and compiled to C. Verification guarantees that our code is memory safe, functionally correct, and free from integer overflows and certain kinds of side-channel leaks. We rely on Kremlin, a compiler from F* to C with formal correctness guarantees  and on CompCert a verified compiler for C. We demonstrate the usage of our library to build a file transfer application and a reference TLS library.

Keywords:

More

HuMa

Research

HuMa

Intrinsec / Project team Madynes, Inria Nancy - Grand Est -

L’HUmain au cœur de l'analyse de données MAssives pour la sécurité.

We observe an explosion of connected devices through the IoT phenomenon. In the current information system management those devices are frequently ignored for using well known reliable mechanisms. Unfortunately those mechanisms are very rarely designed for massive data and miscellaneous information sources. The aim of the HuMa project is to enable the security experts to take all of those sources into account, for their analysis, by designing new suitable tools according to the new face of the information system.

Keywords:

More

Top