CoaP (15/11/2024)
Dans le cadre de notre séminaire La Cybersécurité sur un plateau (Cybersecurity on a Plate), nous aurons une présentation le vendredi 15/11, à 10h dans le bâtiment IMT/TP/TSP, en salle 4A101.
- Nicolas Bellec (CEA LIST) - A scalable framework for backward bounded static symbolic execution
Abstract: Many programs (e.g. malware) hide their behavior by using obfuscations such as opaque predicates. Automatic methods have been developed to detect such obfuscations. In this presentation, we will focus on static symbolic backward bounded execution, a method that enumerates backward bounded paths from a potential opaque predicate and uses symbolic execution to check whether all enumerated paths have the same predicate value. We will show how this method can be generalized using a lattice-based framework and how to scale up such methods to efficiently analyze whole programs.
- Nicolas Bellec (CEA LIST) - A scalable framework for backward bounded static symbolic execution
Séminaire des étudiants et anciens (C4 - Cybersécurité, Confiance (24/10/2024)
Ce séminaire, destiné aux étudiants de Télécom SudParis en cybersécurité et aux anciens élèves, aura lieu à Palaiseau, dans le bâtiment IMT/TP/TSP, en Amphi 2, à partir de 14h. Il sera suivi, à partir de 19h, d'un cocktail dînatoire à l'Entrepôtes 19, près du bâtiment TP/TSP.
-
Programme
- 13h30 : Café
- 14h00 : Grégory Blanc, Christophe Kiennert, Olivier Levillain - Accueil
- 14h15 : Marie Tcholakian (Banque de France) - IRMA : Détection automatique de mails malveillants
- 14h45 : Grégory Blanc (Télécom SudParis) - Learning-based Network Intrusion Detection: Are We There Yet?
- 15h30 : Ayoub Elaassal (Qonto) - Détruire les idées reçues en matière de Cybersécurité
- 16h00 : Pause
- 16h30 : Clément Safon (Thales) - Sécurité des Systèmes d'Exploitation basés sur GNU/Linux : Etat de l'art des technologies AppArmor et SELinux
- 17h15 : Elouan Gros (Astran) - Implementing Multi-Party Computation for Practical Use
- 18h00: Rump Session
- C. Berthier - Quelques mots concernant les alumni
- A. Gicquel - SOCKSQLmap
- C. Parssegny - Les RFC : mais cé quoi ce poulé ?
- R. Di Valentin - Instant Pub Thales Six
- O. Levillain - Proposition de stage sur la reproduction de vulnérabilités logicielles
- K. Gorna - Vulnerability Detection Model for Blockchains Layers 2 Software Clients
- Q. Michaud et N. Peiffer - Stages Cybersécurité et IA / LLM à Thales cortAIx Labs (Palaiseau)
- 19h environ : Cocktail dînatoire à l'Entrepôtes 19 près du bâtiment TP/TSP
Marie Tcholakian (Banque de France) - IRMA : Détection automatique de mails malveillants
Pour la sécurité de la Banque de France, les utilisateurs de son service mail ont la possibilité de signaler les mais reçus qu’ils trouvent suspects. En aval, ces signalements sont traités manuellement par des employés du SOC, qui les classent selon différentes catégories (hameçonnage, arnaque, spam, légitime, etc.). Ce traitement est souvent considéré comme chronophage et redondant. Nous avons voulu expérimenter l'utilisation de modèle d'apprentissage pour prédire la qualification d'un mail. C'est la naissance d'IRMA. Basée sur le grand modèle de langage (LLM) camemBERT et des données d'apprentissage issues de traitements réels du SOC, elle est capable de prédire la catégorisation de nouveaux mails avec un bon taux de confiance.
Grégory Blanc (Télécom SudParis) - Learning-based Network Intrusion Detection: Are We There Yet?
For more than 40 years, intrusion detection systems (IDS) have been developed to produce monitoring reports of potential threats. Because the threat landscape is highly dynamic, signature-based network-based IDS (NIDS) are struggling to cope with the amount of threat data. Machine learning (ML) methods have not only the potential to address this data explosion but also to shift the paradigm to more behavior- and anomaly-based detection. Surprisingly, the maturity of such solutions is not production-ready while ML thrives in other domains such as computer vision or natural language processing. In this talk, we are reviewing the products of ML-based NIDS academic research and provide analysis to why it has not yet fulfilled its promises.
Ayoub Elaassal (Qonto) - Détruire les idées reçues en matière de Cybersécurité
Pour citer un confrère en sécurité : « La sécurité est un échec. » Les entreprises peuvent dépenser des millions de dollars en outils, en recrutement et en un SOC flambant neuf, et pourtant se font pirater plus vite qu’un tour de Space Mountain. Que se passe-t-il ? Je crois que cette dissonance est le résultat d’un mauvais focus et de mauvaises hypothèses. L’équipe de sécurité ne travaille pas sur les bons sujets à la bonne vitesse. Ils n’ont pas la bonne approche et suivent aveuglément les nombreuses fausses idées qui gangrènent cette industrie. Cette présentation va déconstruire certaines des idées reçues les plus répandues. Biographie : Ayoub El Aassal, de la promotion 2013 de Télécom SudParis (TSP), a commencé sa carrière comme pentester et enquêteur en incidents de cybersécurité, explorant divers environnements techniques, d’AWS aux mainframes. Il a présenté plusieurs vulnérabilités et outils lors de conférences comme DEF CON et Black Hat. Il occupe actuellement le poste de Directeur Cybersécurité à Qonto, une fintech classée au Next 40.
Clément Safon (Thales) - Sécurité des Systèmes d'Exploitation basés sur GNU/Linux : Etat de l'art des technologies AppArmor et SELinux
Sur la base de l'expérience et des compétences techniques acquises lors du stage de fin d’études, cet exposé explore le durcissement des systèmes d’exploitation en étudiant AppArmor et SELinux. Après une introduction aux principes fondamentaux du durcissement des OS sous GNU/Linux, nous mettrons l’accent sur ces deux solutions de sécurité. Nous détaillerons le fonctionnement de ces deux Linux Security Modules (LSM), en abordant leurs concepts clés, leurs applications et divers cas d’usage. Enfin, nous pourrons approfondir certains mécanismes avancés afin d'illustrer des scénarios d’utilisation plus complexes et d’évaluer les forces et limites de ces technologies en environnement opérationnel. Biographie : Clément Safon est diplômé de Télécom SudParis (VAP SSR - promo. 2024) et vient de débuter sa carrière chez Thales où il s'attelle au durcissement de systèmes d’exploitation GNU/Linux dans la continuité de son stage. Ce domaine l'intéresse particulièrement par son approche rigoureuse, ainsi que pour la compréhension fine des mécanismes d’attaque et des stratégies de défense en profondeur que cela requiert.
Elouan Gros (Astran) - Implementing Multi-Party Computation for Practical Use
Secure Multi-Party Computing, or MPC for short, is a field of cryptography concerned with devising means for groups of individuals to jointly evaluate functions over private inputs they wish to keep secret from each other. It is a powerful and versatile tool that may be used to implement arbitrary primitives from AES encryption to privacy-preserving machine learning. Despite its qualities, MPC mostly remains a theoretical tool, seeing very little use in practice. In this talk I present the results of my internship, in which I attempted to prove that MPC is viable for industrial use.
-
LINCS seminar (09/10/2024)
Dans le cadre de notre collaboration avec LINCS, nous aurons l'intervention suivante le mercredi 9 octobre à Palaiseau, Amphi 6, à 14h:
- José Luis Muñoz-Tapia - Zero knowledge proofs in blockchain
Abstract: In this talk, we will explore the fundamental concept of Zero Knowledge Proofs (ZKPs), a cryptographic technique that allows one party to prove knowledge of a specific piece of information to another party without revealing the information itself. We will delve into two core computation models used in ZKPs: the circuit computation model and the machine computation model. These models form the basis of how ZKPs are designed and implemented. Furthermore, we will examine various real-world applications of ZKPs, with particular emphasis on their critical role in enhancing privacy and security in blockchain systems. Attendees will gain a foundational understanding of ZKPs and insight into how they are applied to diverse scenarios in modern cryptographic systems.
Short Bio: José L. Muñoz-Tapia received the M.S. degree in telecommunications engineering and the Ph.D. degree in security engineering, in 1999 and 2003, respectively. He is currently a Researcher with the Information Security Group (ISG) and an Associate Professor with the Department of Network Engineering, Universitat Politècnica de Catalunya (UPC). He is also the Director of the Master Program in Blockchain Technologies, UPC School. He has worked in applied cryptography, network security, and game theory models applied to networks and simulators. His research interest includes distributed ledgers technologies.
[Recording]
CoaP (17/06/2024)
Dans le cadre de notre séminaire La Cybersécurité sur un plateau (Cybersecurity on a Plate), nous aurons deux interventions lundi 17 juin (Palaiseau, salle 3.A213, 10h):
- Arthur Tran Van (Télécom SudParis) - Mealy Verifier: An Automated, Exhaustive, and Explainable Methodology for Analyzing State Machines in Protocol Implementations
Abstract: Many network protocol specifications are long and lack clarity, which paves the way to implementation errors. Such errors have led to vulnerabilities for secure protocols such as SSH and TLS. Active automata learning, a black-box method, is an efficient method to discover discrepancies between a specification and its implementation. It consists in extracting state machines by interacting with a network stack. It can be (and has been) combined with model checking to analyze the obtained state machines. Model checking is designed for exhibiting a single model violation instead of all model violations and thus leads to a limited understanding of implementation errors. As far as we are aware, there is only one specialized exhaustive method, leveraging DFA (Deterministic Finite Automaton) intersection, available for analyzing the outcomes of active automata learning applied to network protocols. We propose an alternative method, to improve the discovery of new bug and vulnerability patterns and enhance the exhaustiveness of model verification processes. In this presentation, we apply our method to two use cases: OPC UA, for which we present a full workflow from state machine inference to state machine analysis, and SSH, where we focus on the analysis of existing state machines.
The work will be presented in July at the ARES conference
- Shurok Khozam (Télécom SudParis) - DDoS Mitigation while Preserving QoS: A Deep Reinforcement Learning-Based Approach
Abstract: The deployment of 5G networks has significantly improved connectivity, providing remarkable speed and capacity. These networks rely on Software-Defined Networking (SDN) to enhance control and flexibility. However, this advancement poses critical challenges including expanded attack surface due to network virtualization and the risk of unauthorized access to critical infrastructure. Since traditional cybersecurity methods are inadequate in addressing the dynamic nature of modern cyber attacks, employing artificial intelligence (AI), and deep reinforcement learning (DRL) in particular, was investigated to enhance 5G networks security. This interest arises from the ability of these techniques to dynamically respond and adapt their defense strategies according to encountered situations and real-time threats. Our proposed mitigation system uses a DRL framework, enabling an intelligent agent to dynamically adjust its defense strategies against a range of DDoS attacks, exploiting ICMP, TCP SYN, and UDP, within an SDN environment designed to mirror real-life user behaviors. This approach aims to maintain the network’s performance while concurrently mitigating the impact of the real-time attacks, by providing adaptive and automated countermeasures according to the network’s situation.
- Arthur Tran Van (Télécom SudParis) - Mealy Verifier: An Automated, Exhaustive, and Explainable Methodology for Analyzing State Machines in Protocol Implementations
ICS-CoE (10/04/2024)
Dans le cadre de notre collaboration avec le ICS-CoE (Mission to France 2024), nous aurons deux interventions mercredi 10 avril à Palaiseau, Amphi 7, à 13h30:
- Jose Maria DE FUENTES - Advanced persistent threats: The cyber side of geopolitics
Abstract: Advanced Persistent Threats (APTs) are on the rise. They are a typical tool for nation-state sponsored cyberattacks. This talk provides a background to understand this phenomenon. In particular, a historical overview is provided first. Afterwards, the core of the talk focuses on describing the (publicly known) capabilities of the main current APT groups.
Short Bio: Jose Maria de Fuentes is Associate Professor with the Computer Security Lab, Universidad Carlos III de Madrid (UC3M) of Spain. His research interests are related to cybersecurity and data protection. He has published +50 articles in journals and conferences, having been involved in several national and European projects. He is serving as Vice-convenor of the Spanish National Standardisation Committee UNE CTN320 on cybersecurity and data protection. He is member of the Editorial Board of the Journal of Network and Computer Applications and Wireless Networks.
- Lorena GONZALEZ-MANZANO - Poisoning attacks: vulnerabilities use case
Abstract: The use of artificial intelligence (AI) is a worldwide spread practice and it is used in multiple services and applications. However, poisoning attacks are not really considered when using IA, and being aware of them is the first step towards protection. In this regard, this talk introduces a use case of poisoning attacks in the vulnerability detection field. A novel vulnerability detector, called VulCoT, is presented, together with their analysis under three different poisoning attacks.
Short Bio: Lorena González Manzano is Associate Professor at the Carlos III University of Madrid (UC3M), in the Department of Computer Science within the Computer Security Lab Group (COSEC). Her career focuses on cybersecurity, having published more than 40 papers in international journals and conferences. She is member of the Editorial Board of the journals Future Generations and Computer Systems and Journal of Communications and Networks. Moreover, she has been involved in multiple R+D+i national and European projects, leading a pair of them.
CoaP (21/03/2024)
Dans le cadre de notre séminaire « La Cybersécurité sur un plateau » (Cybersecurity on a Plate), nous aurons deux interventions le jeudi 21 mars prochain (à Palaiseau, salle 3.A213, à 10h):
- Yanis Sellami - Fault Injection Vulnerability Characterization by Inference of Robust Reachability Constraints
Abstract: While automated code analysis techniques have succeeded in finding and reporting potential vulnerabilities in binary programs, they tend to report many false positives, which cannot be reliably exploited. This is typical in evaluations of fault injection attacks vulnerabilities as faults can create unexpected program behaviors dependent on complex initial states. As the precise setup of the initial states is hard to achieve, such faults lead code analysis techniques to report vulnerabilities that exist in theory but are infeasible in practice. Vulnerability characterization techniques are thus needed to distinguish such reports from those that come from serious vulnerabilities. Recently, Girol et al. have introduced the concept of robust reachability, a property of program inputs applied to code analysis frameworks to report only vulnerabilities that can be reproduced reliably. This is done by distinguishing inputs that are under the control of the attacker from those that are not, and by reporting only vulnerabilities that do not depend on the value of the uncontrolled inputs. Yet, this remains insufficient for distinguishing severe vulnerabilities from benign ones as robust reachability will be unable to report cases that, e.g., are easy to trigger but may not succeed in a few corner cases. To address this issue, we propose a method that leverages an abduction procedure to generate a robust reachability constraint, that is, a logical constraint on the uncontrolled inputs under which we have the guarantee that the vulnerability will be triggered. We demonstrate the vulnerability characterization capabilities of an implementation of this procedure on a fault injection attack case-study taken from FISSC. We show that our method refines robust reachability and leads to a much better characterization of the reported vulnerabilities. The methods additionally leads to the generation of high-level feedback that is easier to understand and reuse for further analysis.
[Slides]
- Lorena González-Manzano - Vulnerability detection under poisoning attacks
Abstract: The complexity of current systems encourages the emergence of vulnerabilities. Detectors are developed in this regard, most of them using Artificial Intelligence (AI) techniques. However, AI is not without its problems, especially those attacks affecting the training set. In this talk a novel vulnerability detector, called VulCoT, is presented, together with their analysis under three different poisoning attacks.
- Yanis Sellami - Fault Injection Vulnerability Characterization by Inference of Robust Reachability Constraints
CoaP (30/01/2024)
Dans le cadre de notre séminaire « La Cybersécurité sur un plateau » (Cybersecurity on a Plate), nous aurons deux interventions le mardi 30 janvier prochain (à Palaiseau, salle 3.A213, à 10h):
- Sara Tucci - Blockchain Consensus Protocols, from Bitcoin to Ethereum 2.0
Abstract: Bitcoin introduced a fully decentralized, peer-to-peer consensus protocol that enables secure transaction validation in an open network, marking a departure from previous Byzantine Fault Tolerant (BFT) protocols primarily designed for closed networks. An innovative combination of cryptographic and incentive mechanisms ensures the protocol’s robustness over the years. However, it’s important to acknowledge the considerable energy consumption of Bitcoin’s Proof-of-Work mechanism, which remains a significant concern. To address these energy concerns, there have been efforts to transition to more environmentally friendly solutions, such as Proof-of-Stake BFT protocols, like Ethereum 2.0. While these newer proposals hold promise in terms of energy efficiency, they come with complexities and ongoing issues in security and incentive design. In this talk I will present the main features and differences of Proof-Stake-BFT proposals with respect to Bitcoin, to appreciate their maturity and outline open issues and ongoing research challenges.
- Adam Oumar ABDEL-RAHMAN - A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs
Abstract: In the realm of cybersecurity, logging system and application activity is a crucial technique to detect and understand cyberattacks by identifying Indicators of Compromise (IoCs). Since these logs can take vast amounts of disk space, it can be tempting to delegate their storage to an external service provider. This requires to encrypt the data, so the service provider does not have access to possibly sensitive information. However, this usually makes it impossible to search for relevant information in the encrypted log. To address this predicament, this paper delves into the realm of modern cryptographic tools to reconcile the dual objectives of protecting log data from prying eyes while enabling controlled processing. We propose a comprehensive framework that contextualizes log data and presents several mechanisms to solve the outsourcing problem, allowing searchable encryption, and we apply our approach to DNS logs. Our contributions include the introduction of two novel schemes, namely symmetric and asymmetric, which facilitate efficient and secure retrieval of intrusion detection-related information from encrypted outsourced storage. Furthermore, we conduct extensive experiments on a test bed to evaluate and compare the effectiveness of the different solutions, providing valuable insights into the practical implementation of our proposed infrastructure for monitoring.
[Slides]
- Sara Tucci - Blockchain Consensus Protocols, from Bitcoin to Ethereum 2.0
Victor Dyseryn (21/11/2023)
Mardi 21 novembre, nous recevrons à Évry Victor Dyseryn qui nous présentera ses travaux sur la cryptographie post-quantique. Le séminaire aura lieu en salle E304.
Title: Balancing security and efficiency in post-quantum cryptography
Abstract: The post-quantum transition has already begun; how is it possible to switch seamlessly to quantum resistant cryptography? Intuitively, post-quantum algorithms must resist to a much powerful attacker and this should lead to a drastic increase in communication costs and computing time. We will present how the efficiency of post-quantum cryptography has gradually improved over time at the cost of somewhat weaker security guarantees. We will then explore ways to strenghen those guarantees while keeping the overhead at a minimum.
Short Bio: Victor Dyseryn is a PhD student in post-quantum cryptography in the XLIM laboratory at the University of Limoges, France. His research focuses on encryption and signature primitives based on error-correcting codes. He obtained his master's degree in 2020 from Ecole Polytechnique and Mines ParisTech.
Séminaire CoaP (09 novembre, 2023)
Dans le cadre de notre séminaire « La Cybersécurité sur un plateau » (Cybersecurity on a Plate), nous aurons deux interventions le jeudi 09 novembre prochain:
- Vincent Thouvenot - Privacy attacks against a ResNet50 used for plane classification
Abstract: We will explain two challenges proposed as part of the CIAD conference: a membership inference attack task and a more original forgetting attack task. We'll explain the first approaches that we used and more importantly, why they failed and the main lessons that we learned from the challenge. [Planches présentées]
- Matthieu Lemerre - Pas de Crash, Pas d'Exploit: Verification Automatique de Noyaux Embarqués
Résumé : Le noyau est le composant le plus critique en termes de sûreté et de sécurité de nombreux systèmes informatiques, car un bogue dans celuici peut entraîner un crash ou un exploit système entier. Il est donc souhaitable de garantir qu'un noyau est exempt de ces bogues en utilisant des méthodes formelles, mais le coût élevé et l'expertise requise pour ce faire empêchent une utilisation à large échelle. Nous avons proposé une méthode qui peut vérifier automatiquement à la fois l'absence d'erreurs à l'exécution (c'est-à-dire des crashs) et l'absence d'élévation de privilèges (c'est-à-dire des exploits) dans les noyaux embarqués à partir de leurs exécutables binaires.
Cette méthode a permis de découvrir un système de type permettant de vérifier l'absence de corruption mémoire dans du code C, que nous évoquerons brièvement. [Planches présentées]
- Vincent Thouvenot - Privacy attacks against a ResNet50 used for plane classification
Séminaire des étudiants et anciens le 19 octobre 2023
Ce séminaire, destiné aux étudiants de Télécom SudParis en cybersécurité et aux anciens élèves, aura lieu à Palaiseau, dans le bâtiment IMT/TP/TSP, à partir de 15h. Il sera suivi, à partir de 18h30, d'un cocktail dînatoire à l'Entrepôtes 19, près du bâtiment TP/TSP.
Si vous souhaitez présenter une rump (une intervention courte de moins de 5 minutes, pendant la session dédiée en fin d'après-midi), vous pouvez nous envoyer un mail avec le titre de votre rump jusqu'au 19 octobre 15h.-
Programme
- 14h : Café
- 15h : Grégory Blanc, Christophe Kiennert, Olivier Levillain - Accueil
- 15h15 : Clément Parssegny (ANSSI) - Utilisation de l'apprentissage automatique pour la détection de canaux de Command and Control
- 15h45 : Mathieu Touloucanon (CEA) - Analyse et perçage de packers d'exécutables
- 16h30 : Pause
- 17h : François Boutigny (Nokia) - Microservice behavior analysis for telco networks: overview and perspectives
- 17h45 : Baptiste Polvé (SnowPack) - Au delà des techniques d'anonymisation, enjeux du déploiement des proxies
- 18h30 : Rump Session
- 19h (environ): Cocktail dînatoire à l'Entrepôtes 19 près du bâtiment TP/TSP.
-
Rump Session
- Christel Berthier - Quelques mots sur les Alumni TSP
- Rémi Di Valentin - Présentation d'offres de stages chez Thales
- Clément Parssegny - Reproduction automatisée d'environnements contrôlés vulérables à une faille logicielle
- Yann Cantais - Sécurisation par contrôle d'accès réseau (NAC)
- Quentin Michaud - Sécurité de l'exécution de workloads distribués et portables sur des appareils distants et contraints situés au far edge
- Olivier Levillain - De l'anticipation dans la préparation d'un événement
-
LINCS seminar (18/10/2023)
Dans le cadre de notre collaboration avec LINCS, nous aurons l'intervention suivante le mercredi 18 octobre à Palaiseau, salle 4A113, à 14h:
- Daniel Diaz-Lopez - Application of Chaos Engineering Techniques to Protect Cloud-based IoT Ecosystems
Abstract: System security represents a big challenge for many organizations, and it must be specifically handled when a system is intended to be deployed in a cloud environment. Cloud environments provide multiple security services that run over a Shared Responsibility Model that requires the participation of the cloud provider and the customer. Thus, this talk presents an architecture based on Artificial Intelligence to support the finding of system threats and errors in an early stage and on Security Chaos Engineering methodology to reliably test the existence of such errors. This proposed architecture may help orientate better system designs and contribute to building holistic security. A particular use case is described to show how the proposal can be applied to protect Cloud-based IoT Ecosystems.
Short Bio: Daniel Díaz-López holds a Ph.D. in Computer Science from the University of Murcia (Spain), is visiting professor at New York University (NYU) and assistant professor at the University of Rosario. He has been professor for more than 7 years, teaching different cybersecurity courses: Ethical Hacking, Security in the Software Development Life Cycle, Forensic Analysis and Incident Management, Threat Intelligence, Security in Enterprise Architecture, Artificial Intelligence for Cybersecurity, among others. Daniel is a cybersecurity researcher with different publications in journals and conferences around techniques for cyber threat intelligence, privacy-preserving mechanisms, secure software development lifecycle, techniques in ethical hacking, and security for the Internet of Things (IoT).
[Recording]
- Daniel Diaz-Lopez - Application of Chaos Engineering Techniques to Protect Cloud-based IoT Ecosystems
LINCS seminar (04/10/2023)
Dans le cadre de notre collaboration avec LINCS, nous aurons l'intervention suivante le mercredi 4 octobre à Palaiseau, salle 4A101, à 14h:
- Iain Burge - Toward Quantum Explainable AI: A Quantum Algorithm for Shapley Value Estimation
Abstract: In the classical context, the cooperative game theory concept of the Shapley value has been adapted for post hoc explanations of Machine Learning models. This approach does not easily translate to eXplainable Quantum Machine Learning. Finding Shapley values can be highly computationally complex. In this joint work with Prof. Michel Barbeau (Carleton University) and Prof. Joaquin Garcia- Alfaro (Télécom SudParis), we propose a quantum algorithm which can extract Shapley values within some confidence interval. Our results perform in polynomial time. We demonstrate the validity of our approach under specific examples of cooperative voting games.
Short Bio: Iain Burge is a research assistant at Carleton University working in the emerging field of quantum explainable AI. He has an undergraduate degree in cognitive science with a concentration in computation and minor in mathematics.
[Recording]
- Iain Burge - Toward Quantum Explainable AI: A Quantum Algorithm for Shapley Value Estimation
CoaP Seminar (19/09/2023)
Dans le cadre de notre séminaire « La Cybersécurité sur un plateau » (Cybersecurity on a Plate), nous recevrons le 19 septembre deux intervenants :
- Quentin Michaud - WebAssembly & Security.
- Frédéric Recoules - What's up in BINSEC? 2022-23 Edition
Le séminaire CoaP aura lieu à 10h dans le bâtiment IMT/TP/TSP, en salle 3.A213.
Quentin Michaud - WebAssembly & Security
WebAssembly (Wasm for short) is a new format of low-level bytecode coming from the Web. It allows to run code sandboxed by default, on a stack-based light virtual machine. It is claiming to bring a lot of dreams to reality : from being the successor of today's containers (by being faster, lighter and more secure), to proposing a single binary format which can be compiled from any programming language and run on any target, without depending on the OS or processor architecture. The promises of Wasm go even beyond technology and address cybersecurity with strong claims regarding the security and protection of Wasm applications. However, articles and publications showing old a new cybersecurity weaknesses inside Wasm may put these claims in doubt. This presentation will give an overview of the Wasm ecosystem, explain the inner workings of Wasm and evaluate the likeliness of its promises as of today and in the future. The promise of Wasm being the successor of containers will be reviewed in more details, both at the container level and at the container orchestrator (Kubernetes) level. The presentation will then propose an assessment of the Wasm claims concerning cybersecurity and take a deeper look at if Wasm can really present itself as an improvement of today binaries' and containers' security.
Bio: Quentin is a last year cybersecurity student at Télécom SudParis and an intern at Thales European research lab ThereSIS, where he is studying bleeding-edge innovations in the cloud ecosystem and their potential uses for cybersecurity. He likes to improve his cybersecurity skills by creating and doing CTFs regularly, and he is consuming and contributing to several open-source projects.
Frédéric Recoules - What's up in BINSEC? 2022-23 Edition
Software security analyses must often be performed at the executable code level, either because the source code is not available (e.g.: analysis of third-party components, malware or legacy code), or because very low-level attacker models are being considered (hardware or micro-architectural attacks), or because the code must be analyzed after compilation in order to prevent potential compilation bugs or to verify that protections have been properly implemented. Unfortunately, these low-level security analyses are difficult to establish and there are few specialists, hence the need to provide them with the best possible tools via dedicated automated tools.
BINSEC is a formal binary code analysis platform developed at CEA, with a particular focus on security analysis (vulnerabilities, reverse) and the degree of guarantees provided. BINSEC offers original symbolic reasoning engines and multi-architecture support. Recent results have been obtained, for example, in automatic analysis of cryptographic primitives (resistance to covert channel attacks and micro-architectural attacks) or deobfuscation of advanced malware. However, this kind of analysis still suffers from scaling and usability problems.
In this talk, we aim to give an overview of the latest improvements of BINSEC. These advances will be motivated and illustrated through the resolution of various security cases, including recent examples of challenges from the Cyber France Challenge 2022. In particular, we will address problems such as the optimization of a symbolic reasoning engine at the binary level or the symbolic management of self-modifying code. We will also review recent efforts to make the platform more usable (new architectures, simplified initialization, etc.).
Bio: Frédéric Recoules graduated from INSA and Université Toulouse Paul-Sabatier in 2016, then received a PhD in Computer Science from Université Grenoble-Alpes in 2021. His area of expertises spans formal methods, low-level programming, decompilation and reverse engineering. He notably obtained an ICSE distinguished paper award and a 2nd best GDR GPL PhD award (thematic: software engineering, formal methods and programming languages) for his work on formal verification of inline assembly code. He is currently Research Engineer at CEA where he is the main developer and maintainer of the binary-level program analysis platform BINSEC. His research addresses scalability issues in symbolic analysis at binary level, vulnerability analysis and reverse engineering for security.
CoaP Seminar (30/05/2023)
Dans le cadre de notre séminaire « La Cybersécurité sur un plateau » (Cybersecurity on a Plate), nous aurons deux interventions le 30 mai :
- Michaël Marcozzi (CEA) - Fine-Grained Coverage-Based Fuzzing.
- Houda Jmila (TSP) - Analyzing the Vulnerability of Machine Learning-Based IDS to Adversarial Attacks in Cybersecurity
Le séminaire CoaP aura lieu à 10h dans le bâtiment IMT/TP/TSP, en salle 3.A213.
Michaël Marcozzi (CEA) - Fine-Grained Coverage-Based Fuzzing
Fuzzing is a popular software testing method that discovers vulnerabilities by massively feeding target applications with automatically generated inputs. Many state-of-art fuzzers use branch coverage as a feedback metric to guide the fuzzing process. The fuzzer retains inputs for further mutation only if branch coverage is increased. However, branch coverage only provides a shallow sampling of program behaviours and hence may discard interesting inputs to mutate. This work aims at taking advantage of the large body of research over defining finer-grained code coverage metrics (such as control-flow, data-flow or mutation coverage) and at evaluating how fuzzing performance is impacted when using these metrics to select interesting inputs for mutation. We propose to make branch coverage-based fuzzers support most fine-grained coverage metrics out of the box (i.e., without changing fuzzer internals). We achieve this by making the test objectives defined by these metrics (such as conditions to activate or mutants to kill) explicit as new branches in the target program. Fuzzing such a modified target is then equivalent to fuzzing the original target, but the fuzzer will also retain inputs covering the additional metrics objectives for mutation. In addition, all the fuzzer mechanisms to penetrate hard-to-cover branches will help covering the additional metrics objectives. We use this approach to evaluate the impact of supporting two fine-grained coverage metrics (multiple condition coverage and weak mutation) over the performance of two state-of-the-art fuzzers (AFL++ and QSYM) with the standard LAVA-M and MAGMA benchmarks. This evaluation suggests that our mechanism for runtime fuzzer guidance, where the fuzzed code is instrumented with additional branches, is effective and could be leveraged to encode guidance from human users or static analysers. Our results also show that the impact of fine-grained metrics over fuzzing performance is hard to predict before fuzzing, and most of the time either neutral or negative. As a consequence, we do not recommend using them to guide fuzzers, except maybe in some possibly favourable circumstances yet to investigate, like for limited parts of the code or to complement classical fuzzing campaigns.
Houda Jmila (TSP) - Analyzing the Vulnerability of Machine Learning-Based IDS to Adversarial Attacks in Cybersecurity
The detection of intrusions is an important aspect of cybersecurity, as it seeks to safeguard computer systems and networks from malicious attacks. While machine learning (ML) techniques have been effective in this field, they face challenges such as the emergence of adversarial attacks that can deceive classifiers. Preventing cybercriminals from exploiting these vulnerabilities is crucial in preventing damage to data and systems. This presentation analyses the vulnerability of both deep learning and shallow classifiers, which are still widely used due to their maturity and ease of implementation, to adversarial attacks in ML-based IDS. Additionally, we explore whether adversarial attacks borrowed from computer vision pose a significant threat to IDS and to what extent realistic adversarial attacks can be generated using these methods.
CoaP Seminar (18/04/2023)
Dans le cadre de notre séminaire « La Cybersécurité sur un plateau » (Cybersecurity on a Plate), nous recevrons le 14 avril deux intervenants :
- Pierre-Elisée Flory - Comparing Private Set Intersection Various Implementations for Fraud Detection.
- Nathanaël Denis - Integrating Usage Control into Distributed Ledger Technology for Internet of Things Privacy
Le séminaire CoaP aura lieu à 10h dans le bâtiment IMT/TP/TSP, en salle 3.A213.
Pierre-Elisée Flory - Comparing Private Set Intersection Various Implementations for Fraud Detection
Banks have to commit answering their customers' privacy concerns while complying to regulation. Sharing information on customer among a Banking consortium is an efficient way to identify fraud at an early stage but requires efficient biometrics matching algorithms to compare two id cards / biometrics template in pictures. Consortium stakeholders may also be competitors and thus need to protect their customer database. Within the Privacy Enhancing Technologies, we have assessed and compared different Secure Multi-Party Computation and in particular Private Set Intersection schemes to mitigate those risks and design a new protocol to allow privacy preserving biometrics templates matching.
Nathanaël Denis - Integrating Usage Control into Distributed Ledger Technology for Internet of Things Privacy
The Internet of Things brings new ways to collect privacy-sensitive data from billions of devices. Well-tailored distributed ledger technologies (DLTs) can provide high transaction processing capacities to IoT devices in a decentralized fashion. However, privacy aspects are often neglected or unsatisfying, with a focus mainly on performance and security. In this paper, we introduce decentralized usage control mechanisms to empower IoT devices to control the data they generate. Usage control defines obligations i.e., actions to be fulfilled to be granted access, and conditions on the system in addition to data dissemination control. The originality of this paper is to consider the usage control system as a component of distributed ledger networks, instead of an external tool. With this integration, both technologies work in synergy, benefiting their privacy, security and performance. We evaluated the performance improvements of integration using the IOTA technology, particularly suitable due to the participation of small devices in the consensus. The results of the tests on a private network show an approximate 90% decrease of the time needed for the UCS to push a transaction and make its access decision in the integrated setting, regardless of the number of nodes in the network.
This contribution is currently under review for publication in a journal.
-
Pantaleone Nespoli (4/04/2023)
Le séminaire aura lieu à 16h, dans le bâtiment IMT/TP/TSP, en salle 3.A213.
Pushing cybersecurity trainings to the limit: The SCORPION Cyber Range
Abstract: During this talk, we will introduce SCORPION, a fully functional and virtualized Cyber Range to train cybersecurity competencies, which can manage the authoring and automated deployment of scenarios in a simple way thanks to a modular and extensible architecture. SCORPION includes several elements to improve student motivation, such as a gamification system with medals, points, or rankings, among other elements, which is used to improve the commitment and motivation of students with cybersecurity challenges. Such a gamification system includes an adaptive learning module that is able to adapt the cyber-exercise based on the performance of the users. Moreover, SCORPION leverages a learning analytics that collects and processes telemetric and biometric user data, including heart rate through a smartwatch, which are available through a dashboard for instructors, so that they can use them to monitor the learning of their students. Then, a case study has been developed where SCORPION obtained 82.10\% in usability and 4.57 out of 5 in usefulness from the viewpoint of a student and an instructor.
Bio: Pantaleone Nespoli is a postdoctoral researcher working together with the Department of Information and Communication Engineering at the University of Murcia, Spain, and the SCN team of the SAMOVAR laboratory, at Institut Polytechnique de Paris, thanks to a Margarita Salas award. He received the PhD cum laudefrom the University of Murcia, Spain, and the M.Sc. degree cum laude in Computer Engineering from the University of Naples "Federico II", Italy. His PhD thesis received the Best PhD thesis award granted by the University of Murcia. Additionally, he led the Bot Buster team to the European and Mediterranean Regional Award (1,444 submissions) and received the Finalist Honorable Mention in the Ericsson Innovation Award 2018. His Master thesis was awarded the #2 prize for cybersecurity Master thesis from the Clusit(Associazione Italiana per la Sicurezza Informatica) in Italy. During his academic training, he completed two research internships, the first (one full year) at NEC Labs, Heidelberg, Germany, and the second (three months) at the Department of Information & Communication System Engineering, University of the Aegean, Greece. His research is mainly focused on cybersecurity and cyber defense, with a particular interest in the detection and response to intrusions and disinformation in social networks. Moreover, his actual research line is focusing on training professionals using Cyber Range platforms. Generally, he applies knowledge in infrastructure, technologies, data analytics, and machine learning to solve problems in cybersecurity and dual scenarios and train personnel against cybercrime.
Katarzyna Wasielewska (6 février 2023)
Le séminaire aura lieu à 10h à Evry, Amphi C06.
Network Dataset Quality Assessment with Permutation Testing
Abstract:ML models can only be as good as the datasets they are trained on. The problem of the lack of high-quality network datasets has been mentioned many times in papers. The quality of datasets is difficult to assess, but also to define. What does it mean that a dataset is of high quality? Generally, a dataset is said to be of high quality if it meets the requirements for its intended use. In the convention of this ambiguity, I would like to introduce the PerQoDA methodology, which evaluates the dataset in terms of the relationship between observations and labels in a classification problem. This is just one aspect of the problem of assessing the quality of datasets, but it highlights its problematic nature and complexity.
Bio: Katarzyna Wasielewska received the M.Sc. degree in computer science at the Faculty of Mathematics and Computer Science, Nicolaus Copernicus University (NCU), Torun, Poland, and the Ph.D. degree in telecommunications at the Faculty of Telecommunications, Information Technology and Electrical Engineering, UTP University of Science and Technology, Bydgoszcz, Poland. She has been awarded the Marie Sklodowska-Curie Actions Individual Fellowships (MSCA) program. She is currently a Postdoctoral Researcher at the Department of Signal Theory, Networking and Communications and researcher in the Information and Communication Technologies Research Centre (CITIC) at the University of Granada, Spain. Her research interests include cybersecurity, network security, machine learning, multivariate data analysis, and dataset quality problem. She has ten years of experience as an ISP Network Administrator.
Séminaire CoaP (19 janvier, 2023)
Dans le cadre de notre séminaire « La Cybersécurité sur un plateau » (Cybersecurity on a Plate), nous aurons deux interventions le 19 janvier. Le séminaire CoaP aura lieu à 14h dans le bâtiment IMT/TP/TSP, en salle 3.A213.
Romain Ferrari, Louis Cailliot, Julie Sauzedde, Pierre-Elisée Flory - NVIDIA DOCA hackathon
The NVIDIA DOCA hackathon took place on March 21, during NVIDIA 2022 GTC.
The Thales team chose to build a solution upon the DPI acceleration to enable Yara rules, which are used for inspection of files downloaded from the network to identify malware and potential threats. To implement this, Team Thales used a Yara Parser to transform public Yara rules into DPI rules in a Suricata community-based format supported by the DOCA DPI lib. This solution leveraged DOCA DPI functionality to scan the files on the fly as the packets flow through the device.
Soline Ducousso - Adversarial Reachability for Program-level Security Analysis
Many program analysis tools and techniques have been developed to assess program vulnerability. Yet, they are based on the standard concept of reachability and represent an attacker able to craft smart legitimate input, while in practice attackers can be much more powerful, using for instance micro-architectural exploits or fault injection methods. We introduce adversarial reachability , a framework allowing to reason about such advanced attackers and check whether a system is vulnerable or immune to a particular attacker. As equipping the attacker with new capacities significantly increases the state space of the program under analysis, we present a new symbolic exploration algorithm, namely adversarial symbolic execution, injecting faults in a forkless manner to prevent path explosion, together with optimizations dedicated to reduce the number of injections to consider while keeping the same attacker power. Experiments on representative benchmarks from fault injection show that our method significantly reduces the number of adversarial paths to explore, allowing to scale up to 10 faults where prior work timeout for 3 faults. In addition, we analyze the well-tested WooKey's bootloader, and demonstrate the ability of our analysis to find attacks and evaluate countermeasures in real-life security scenarios.
This is joint work with Sébastien Bardin and Marie-Laure Potet.
[Séminaires SCN en 2022]