RÉSUMÉ: La programmation orientée retour (ROP) est une technique par laquelle un attaquant peut introduire un comportement arbitraire dans un programme vulnérable. ROP est actuellement l'un des moyens les plus efficaces pour contourner les dispositifs de protection modernes. Ce type d'attaque a connu un essor phénoménal au cours des cinq dernières années. Les techniques utilisées pour se protéger contre ce type d'exploit génèrent un taux de faux négatif élevé car elles sont facilement contournables. De plus, elles ont tendance à ajouter une surcharge importante sur le programme qu'elles protègent. Dans la première partie de ce travail, nous avons étudié ces solutions proposées ou utilisées pour détecter ou atténuer les attaques ROP. Dans la...
Wireless Sensor Networks (WSNs) are composed of a large number of low-cost, low power, and multifunc...
Fault injection is a well known method to test the robustness and security vulnerabilities of system...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
RÉSUMÉ: ABSTRACT Maintenance is the last phase of software life cycle and plays an important role in...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
Today, production systems are facing their 4th revolution. This revolution is digital with increasin...
Le travail de cette thèse s'est concentré sur la création d'une solution de cybersécurité capable de...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
RÉSUMÉ: L'internet des objets (Internet of Things, IoT) est un secteur d'activité en plein développe...
Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weakness...
RÉSUMÉ: Les protocoles sécurité RFID sont des sous-ensembles des protocoles cryptographiques mais av...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
Wireless Sensor Networks (WSNs) are composed of a large number of low-cost, low power, and multifunc...
Fault injection is a well known method to test the robustness and security vulnerabilities of system...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
RÉSUMÉ: ABSTRACT Maintenance is the last phase of software life cycle and plays an important role in...
Malware analysis is a growing research field due to the criticity and variety of assets targeted as ...
Today, production systems are facing their 4th revolution. This revolution is digital with increasin...
Le travail de cette thèse s'est concentré sur la création d'une solution de cybersécurité capable de...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
The main subject of this manuscript is the Side Channel Attacks. These attacks investigate the varia...
RÉSUMÉ: L'internet des objets (Internet of Things, IoT) est un secteur d'activité en plein développe...
Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weakness...
RÉSUMÉ: Les protocoles sécurité RFID sont des sous-ensembles des protocoles cryptographiques mais av...
Since the advent of side channel attacks, at the end of the 90's, classical cryptanalysis is no long...
Along with new cryptanalysis techniques, the security of block ciphers is always evolving. When desi...
Wireless Sensor Networks (WSNs) are composed of a large number of low-cost, low power, and multifunc...
Fault injection is a well known method to test the robustness and security vulnerabilities of system...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...