Face identification systems are growing rapidly and invade the consumer market with security products in smartphones, computers and banking. However, these systems are easily fooled by presenting a picture of the person having legitimate access to the system. This thesis is part of the BIOFENCE project which aim to develop a certification of biometric systems in order for industrials to promote their innovations in terms of protection. Our goal is to develop new anti-spoofing countermeasures for 2D face biometric systems and to evaluate the certification methodology on protected systems. First, a general state of the art in face spoofing attack forgery and in anti-spoofing protection measures is presented. Then texture-based countermeasures...
The method use to respect security requirements in civil aviation consists in multiplying measuring ...
Nitric oxide (NO*) and peroxynitrite (ONOO−) are involved in several pathologies, including cancer, ...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Estrogens are neurosteroids, especially Estradiol (17β-E2) which is considered to be the most biolog...
In the context of the CERN Large Hadron Collider (LHC), a large number of control systems have been ...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
Managing the vast quantities of data generated in the context of information system security becomes...
Epidemiological data demonstrate an inverse correlation between HDL-cholesterol (HDL-C) levels and c...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Version définitive de la thèse (dépôt Université)Intrusion detection aims to automate the detection ...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
Today, production systems are facing their 4th revolution. This revolution is digital with increasin...
In an increasingly open world, the flows of people are brought to explode in the coming years. Facil...
The method use to respect security requirements in civil aviation consists in multiplying measuring ...
Nitric oxide (NO*) and peroxynitrite (ONOO−) are involved in several pathologies, including cancer, ...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
In this thesis, we are interested in the security of pseudorandom number generators and of implement...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Estrogens are neurosteroids, especially Estradiol (17β-E2) which is considered to be the most biolog...
In the context of the CERN Large Hadron Collider (LHC), a large number of control systems have been ...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
Managing the vast quantities of data generated in the context of information system security becomes...
Epidemiological data demonstrate an inverse correlation between HDL-cholesterol (HDL-C) levels and c...
Critical and private information are exchanged on public environment. To protect it from dishonest ...
Version définitive de la thèse (dépôt Université)Intrusion detection aims to automate the detection ...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
Today, production systems are facing their 4th revolution. This revolution is digital with increasin...
In an increasingly open world, the flows of people are brought to explode in the coming years. Facil...
The method use to respect security requirements in civil aviation consists in multiplying measuring ...
Nitric oxide (NO*) and peroxynitrite (ONOO−) are involved in several pathologies, including cancer, ...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...