International audienceWith the proliferation of connected objects, the fine identification and the technical characterization of digital devices are one challenge for the monitoring and security of information systems. Connected objects are of different types, and each has different characteristics, whether it is the embedded operating system, their sensors or their firmware version. Connected objects are difficult to identify by non-expert. The activity of a microcontroller generates a set of physical phenomena that can be quantified, observed and exploited. The acoustic emissions resulting from this activity are quantifiable and have been proven to be a formidable means of discrimination and qualification of electronic equipments. In this...
The traceability of components on a supply-chain from a production facility to deployment and mainte...
Voice user interfaces can offer intuitive interaction with our devices, but the usability and audio ...
The widespread use of smart devices gives rise to both security and privacy concerns. Fingerprinting...
International audienceWith the proliferation of connected objects, the fine identification and the t...
In this thesis, I have investigated the problem of identification and authentication of electronic d...
Tangible Acoustic Interfaces (TAIs) are interaction devices that are able to localize the interactio...
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new securi...
The widespread use of smart devices gives rise to both security and privacy concerns. Fingerprinting...
We introduce amethod to efficiently determine a Bluetooth device’s properties as needed for a variet...
Many events of interest to the security commnnity produce acoustic emissions that are, in principle,...
Forensic techniques can be used to identify the source of a digital data. This is also known as fore...
The popularity of mobile device has made people’s lives more con-venient, but threatened people’s pr...
TCP/IP fingerprinting is the active or passive collection of information usually extracted from a re...
The Internet of Things (IoT) is everywhere around us. Smart communicating objects are offering the d...
Abstract:- In this paper, a very efficient novel methodology for the automatic recognition of musica...
The traceability of components on a supply-chain from a production facility to deployment and mainte...
Voice user interfaces can offer intuitive interaction with our devices, but the usability and audio ...
The widespread use of smart devices gives rise to both security and privacy concerns. Fingerprinting...
International audienceWith the proliferation of connected objects, the fine identification and the t...
In this thesis, I have investigated the problem of identification and authentication of electronic d...
Tangible Acoustic Interfaces (TAIs) are interaction devices that are able to localize the interactio...
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new securi...
The widespread use of smart devices gives rise to both security and privacy concerns. Fingerprinting...
We introduce amethod to efficiently determine a Bluetooth device’s properties as needed for a variet...
Many events of interest to the security commnnity produce acoustic emissions that are, in principle,...
Forensic techniques can be used to identify the source of a digital data. This is also known as fore...
The popularity of mobile device has made people’s lives more con-venient, but threatened people’s pr...
TCP/IP fingerprinting is the active or passive collection of information usually extracted from a re...
The Internet of Things (IoT) is everywhere around us. Smart communicating objects are offering the d...
Abstract:- In this paper, a very efficient novel methodology for the automatic recognition of musica...
The traceability of components on a supply-chain from a production facility to deployment and mainte...
Voice user interfaces can offer intuitive interaction with our devices, but the usability and audio ...
The widespread use of smart devices gives rise to both security and privacy concerns. Fingerprinting...