Sites Inria

Version française

New technologies to protect digital data and computer systems

Demonstrations of innovative technologies stemming from Inria, from its academic and industrial partners and from start-ups will be presented on the shoowrom from 12:30 am.

Laboratoire de Haute Sécurité

Research

High Security Laboratory

The High-Security Laboratory (LHS) is designed to host decisive research work in order to make networks, Internet exchanges and associated telecommunications equipments safer. The LHS provides the technological and regulatory framework needed for scientific advances that accompany developments in our technological society. Open to industrial partners, the laboratory also represents a favourable opportunity for the reliability tests that are needed before various technological products or solutions can be put on the market.

Keywords:

More

Research

High Security Laboratory Rennes : a low cost side channel attack

A low cost attack bench recording electromagnetic emissions to extract some secret.

The increased use of embedded systems such as smart cards and IOT requires the protection of personal user data. The security of cryptographic algorithms can be considered in two contexts. On the one hand, these algorithms can be proven secure mathematically. On the other hand, physical attacks can weaken the implementation of an algorithm yet proven secure. Side Channel Attacks are based on observations of the circuit behaviour during the computation. They exploit the fact that some physical values (e.g. power consumption) depend on intermediary values of the computation. This is the so-called leakage of information of the circuit. The presented attack bench measures and analyses the electromagnetic emission. This bench is very low cost and therefore more threatening. It points to the fact that if a device is not secure against side channel analysis, embedded cryptography on the device is vulnerable.

Keywords:

More

Research

High Security Laboratory Rennes : Ransomware Attacks and Countermeasures

Threat mitigation in a controlled environment.

We get a "trivial" ransomware running in a virtual machine with standards documents (word, excel, pdf, ...). Demonstrations objectives will be to recover the originals documents using the dictionary method (AES-ECB) and get the AES key. The AES key is extracted through the integration of a provider (CryptoAPI) in the system. Then we will prove with OpenSSL the key validity by retrieving a document.

Keywords:

More

madynes-visuelanalytics

Research

Security analytics: geo-labeled Android logs and bypassing HTTPS filtering

Project team : Madynes, Inria Nancy - Grand Est -

Mobile phones are a new attack vector in Internet. The MADYNES research group develops method to characterize mobile application behaviors. The demonstration will present our platform to collect and analyze geo-labelled network traffic. Since encrypting communication becomes highly popular, usual filtering techniques are inefficient. Our demonstration will thus also show how HTTPS filtering techniques can be easily bypassed and recent works to filter HTTPS services without decrypting user data.

Keywords:

More

MUTE

Research

MUTE

Project team : Coast, Inria Nancy - Grand Est -

A real-time collaborative peer-to-peer editor.

Existing collaborative systems generally rely on a service provider that stores and has control over user data which is a threat for privacy. MUTE is an online real-time collaborative editor that overcomes this limitation by using a peer-to-peer architecture relying on WebRTC. Several users may edit in real-time a shared document and their modifications are immediately sent to the other users without transiting through a central server. Data synchronisation is achieved by using the LogootSplit algorithm developed by team Coast.

Keywords:

More

logo OCalmPro

Startup

OCalmPro

OCamlPro has developed its blockchain, solving many Bitcoin limitations.

OCamlPro has developed its own blockchain, in collaboration with a US partner.  The new blockchain, developed in OCaml, solves many limitations of Bitcoin blockchain, unfortunately still often proposed, and provides much higher guarantees in terms of security and safety.

Keywords:

More

Simorfo

Startup

SIMORFO

Cybersecurity innovative solutions, malware analysis and detection

Simorfo develops innovative cybersecurity solutions including malware analysis and detection software. They are based in part on a new technology, morphological analysis, that is the product of several years of research at LORIA and its platform HSL (High Security Lab). The goal is to bring innovative and complementary tools to existing cybersecurity tools.

Keywords:

More

Research

Taint Tracking for Andoid

CISPA team -

How to expose data spies on Android devices.

Keywords:

More

Research

Global DDoS Threat Landscape

CISPA team -

A global scale sensor network allows us to identify and map Distributed Denial of Services (DDoS) attacks.

Keywords:

More

Research

Usable Security

CISPA team -

Tools for mobile app developers to build secure apps.

Keywords:

More

Top