Monniaux, David Boulmé, Sylvain Gourdin, Léo Bérard, Alexandre Fasse, Justus Nardino, Nicolas Goutagny, Pierre Six, Cyril Bonneau, Benjamin
# Chamois CompCertChamois CompCert is a fork of CompCert, the formally verified C compiler.For an up-to-date presentation, see [our OOPSLA'23 paper](https://hal.science/hal-04102940). ## OverviewThe CompCert C verified compiler is a compiler for a large subset of theC programming language that generates code for the PowerPC, ARM, x86 andRISC-V proc...
Braiteh, Farah-Emma Bassi, Francesca Khatoun, Rida
Over the past few years, we have witnessed notable advancements in connected vehicle technologies, illustrating significant progress in their interactions with drivers, as well as with various other networks and devices. One remarkable advancement is the Cooperative Adaptive Cruise Control (CACC) and the specialized service known as the platoon sys...
Mosbah, Mohamed Sèdes, Florence Tawbi, Nadia Ahmed, Toufik Boulahia-Cuppens, Nora Garcia‐alfaro, Joaquin
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11–13, 2023.The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following...
Sol, Jérôme Prod’homme, Hugo Le Magoarou, Luc del Hougne, Philipp
Metasurface-programmable radio environments are considered a key ingredient of next-generation wireless networks. Yet, identifying a metasurface configuration that yields a desired wireless functionality in an unknown complex environment was so far only achieved with closed-loop iterative feedback schemes. Here, we introduce open-loop wave control ...
Poncet, Thomas
Encryption is an important part of computer security and privacy. Encryption software such as email encryption software and technologies, or simply file encryption, are now largely available. However, their adoption by the public remains low. Even from a company perspective, end-users still have difficulties using proper and often encryption softwa...
Ångström, Hanna
This thesis discusses security improvements for an off-premise web application, focusing on ethical hacking and penetration testing. The evaluation revealed the need to address security concerns such as outdated TLS versions, HTTP security headers, and encryption practices. The project emphasized the importance of automated testing tools and recomm...
Jogården, Tobias
The security and reliability of operating system kernels are critical. Trusting software to operate a car, a train, or an aeroplane requires high confidence in fault tolerance and resilience to attacks. The Simple Secure Separation Kernel (S3K) is one such effort currently being developed at KTH. S3K is a microkernel and uses capability-based secur...
Mosbah, Mohamed Sèdes, Florence Tawbi, Nadia Ahmed, Toufik Boulahia-Cuppens, Nora Garcia-Alfaro, Joaquin Garcia‐alfaro, Joaquin
International audience
de benedictis, marco jacquin, ludovic pedone, ignazio atzeni, andrea lioy, antonio
Security and trust are particularly relevant in modern softwarised infrastructures, such as cloud environments, as applications are deployed on platforms owned by third parties, are publicly accessible on the Internet and can share the hardware with other tenants. Traditionally, operating systems and applications have leveraged hardware tamper-proo...
Heiding, Fredrik
This doctoral thesis addresses the rapidly evolving landscape of computer security threats posed by advancements in artificial intelligence (AI), particularly large language models (LLMs). We demonstrate how AI can automate and enhance cyberattacks to identify the most pressing dangers and present feasible mitigation strategies. The study is divide...