[T40] Software multi-tenancy on micro-controllers: enhancing security with TinyPART toolkit – Chrystel Gaber (Orange),  Gilles Grimaud (U Lille), Emmanuel Baccelli  (INRIA)

On Fri, Nov 29th, 2024, 2pm CET, we welcome Chrystel Gaber (Orange),  Gilles Grimaud (U Lille), Emmanuel Baccelli  (INRIA), for another edition of TALK.CYBERcni.fr on “Software multi-tenancy on micro-controllers: enhancing security with TinyPART toolkit”. Share and join!

As containerization arrives for microcontrollers, it brings with it critical new security challenges. This talk will dive into how the TinyPART toolkit, developed through a joint French-German research project, addresses key concerns like memory isolation, secure software updates, and resource access control in multi-tenant environments. Discover how TinyPART’s innovations help overcome the risks of transitioning from monolithic to multi-tenant software paradigms on microcontrollers.

You are cordially invited to join the free live stream on youtube and LinkedIn! Please share the link https://talk.cybercni.fr/40 with your interested friends!

Trailer: https://youtu.be/TCTMaSay_Ng
LinkedIN Event: Not working for the moment/ will be added a soon as working again.
Facebook Event: https://www.facebook.com/events/1584069039186575/
Youtube: https://www.youtube.com/watch?v=RUcR8d55eFU&list=PLdftPKA9mTfaDJxqwexil2mPhUFIA9ITd
Stream redirect (for every edition): https://TALK.cyberCNI.fr/stream

Newsletter with invitations: Subscription on https://TALK.cyberCNI.fr

Help us spreading the news

The best talks are those with an interested diverse audience! Therefore, please use the following media to spread the news in your networks: 

Thank you!

Abstract

As containerization becomes available for microcontrollers, it is necessary for security models to evolve and address threats arising  from the transition from a monolithic software paradigm to a  multi-tenant one. Among the challenges that need to be overcome, this talk will in particular focus on memory isolation, secure software updates and ressource access control by describing the results of TinyPART (https://tinypart.github.io/TinyPART/), a German-French research  project on cybersecurity jointly sponsored by the German Ministry of  Education and Research and the French National Research Agency. In this talk, you will discover how the TinyPART toolkit can help you overcome this challenge by addressing issues related to memory isolation, software updates and resource access control.

Watch the trailer linked above!

Chrystel Gaber

Chrystel Gaber received her PhD in Computing Systems from the University of Caen in 2013. After working as a project coordinator and R&D engineer at Fime, she joined Orange as a researcher and project coordinator. She is involved in several projects related to cyber-physical security, IoT device management, and certification, and serves as the French coordinator for the TinyPART project.

Gilles Grimaud

Gilles Grimaud received an award from the French chapter of ACM SigOPS for his PhD thesis in 2001 and was appointed a full professor at the University of Lille in 2009. His primary research interests include embedded systems, cybersecurity, and formal methods, with notable achievements such as the development of Camille, a secure smart card operating system. He has contributed to numerous funded French and European projects and is currently a member of the TinyPART project.

Emmanuel Baccelli

Emmanuel Baccelli is a researcher at Inria and Freie Universität Berlin, having previously worked at AT&T Labs and Metro Optix Inc. He earned his PhD from École Polytechnique in 2006 and his habilitation from Université Pierre & Marie Curie in 2012. A co-founder of the RIOT open-source community, his main research interests involve the Internet of Things, low-power software, security, and the design and analysis of network protocols and algorithms.

About Orange

Orange is a leading global telecommunications operator, providing a wide  range of services including mobile and fixed-line communications,  internet, and digital solutions. With a strong commitment to innovation  and customer satisfaction, Orange aims to enhance connectivity and  improve the digital experience for individuals and businesses worldwide.

The Cyber CNI Lecture Series is a free monthly event that typically takes place on the last Friday of the month from 2pm to 3h30pm CET.

The Cyber CNI Speaker series aims to raise awareness and understanding of cyber security issues among all audiences. It aims to enable an ongoing dialogue between experts from industry and academia and the general public (citizens, families, small and large businesses, public organizations, etc.). All of us are concerned.

The events are broadcast live on Youtube (https://talk.cybercni.fr/) and LinkedIn, allowing worldwide remote participation – including a tool to participate in the discussion.

You can add the event calendar via ICSwebcalHTML.

How the digital transformation is changing our lives

Our society relies more and more on information and operational technologies. Examples include water, energy, heat and cooling supply, communications, healthcare, production and processing of goods, transportation, national security, banking, research and education, and food production.

What all these areas have in common is that they make intensive use of networked distributed computer systems. These systems can be attacked in many ways. This is no longer just a problem for computer “pros” because computer systems are essential to all of us. The effects of “cyber-attacks” range from power outages to the collapse of the health care or banking sectors.

Program and registration: https://talk.cybercni.fr/

[T39] A case for Internet Transparency – the Responsible Internet – Ralph Holz (Universität Münster)

On Fri, Oct 25th, 2024, 2pm CET, we welcome Ralph Holz from Universität Münster, Germany, for another edition of TALK.CYBERcni.fr on “A case for Internet Transparency – the Responsible Internet”. Share and join!

Despite technological advancements, Internet security issues persist, particularly at the infrastructure level. Ralph Holz will discuss why traditional solutions are often ineffective and propose a game-changing approach: Internet Transparency. By making it possible to identify the operators and reasons behind security failures, we can change the incentives to invest in better security practices. Holz will also introduce “The Responsible Internet,” a multidisciplinary approach combining global measurements, decentralized logging, and economics research to foster a more secure and accountable Internet.

You are cordially invited to join the free live stream on youtube and LinkedIn! Please share the link https://talk.cybercni.fr/39 with your interested friends!

Trailer: https://youtu.be/iyms8BQAo7M
LinkedIN Event: https://www.linkedin.com/events/7255532351269613569 (Seems currently down, so switch to another link below.)
Facebook Event: https://www.facebook.com/events/1311255863375430/
Youtube: https://www.youtube.com/watch?v=A0sYEm5xt_w&list=PLdftPKA9mTfaDJxqwexil2mPhUFIA9ITd
Stream redirect (for every edition): https://TALK.cyberCNI.fr/stream

Newsletter with invitations: Subscription on https://TALK.cyberCNI.fr

Help us spreading the news

The best talks are those with an interested diverse audience! Therefore, please use the following media to spread the news in your networks: 

Thank you!

Abstract

Despite some progress over the last 20 years, Internet security problems just keep cropping up. At the infrastructure level in particular – from hardware to critical services – it is sobering to realize that the incentives to invest in modern technologies too often clash with business or organisational considerations. Instead of continuing to rely on technologies that tend to be poorly received by the market, we provide arguments why it is more expedient to take a more indirect approach by introducing and fostering so-called “Internet Transparency”. This idea is based on earlier empirical evidence: if it is possible to determine by which operator, and why, a problem was caused, the incentives to invest in security and less flawed processes change across the board. We will therefore start by presenting a few results from previous work to motivate why we should now focus on Internet Transparency, before moving on to a possible approach for implementing this, which is largely based on global measurements and decentralised logging, flanked by economics and governance research and efforts. We have nicknamed this multidisciplinary approach the Responsible Internet, and the remainder of the talk will introduce our approach and ongoing efforts.

Watch the trailer linked above!

Ralph Holz

Ralph is Full Professor for Networks and Network Security at the University of Münster in Germany and co-appointed at the University of Twente in the Netherlands. His research interest is the empirical analysis of computer security, especially on the Internet. His prior positions include roles at NICTA (National ICT Australia), the University of Sydney, and the University of Twente. Ralph holds a PhD from the Technical University of Munich. He is currently the PI of a 2m EUR project on the Responsible Internet that aims to bring about better controllability, accountability, and transparency for the security of Internet communication (https://responsible-internet.org). Ralph has contributed to Internet standardization and his work has received several awards.

About Universität Münster

The University of Münster is one of Germany’s largest and most prestigious universities, with well over 40,000 students in 15 departments. Ralph is a full professor in the Department of Computer Science, where he does empirical research in network security.

Talk.cybercni.fr

The Cyber CNI Lecture Series is a free monthly event that typically takes place on the last Friday of the month from 2pm to 3h30pm CET.

The Cyber CNI Speaker series aims to raise awareness and understanding of cyber security issues among all audiences. It aims to enable an ongoing dialogue between experts from industry and academia and the general public (citizens, families, small and large businesses, public organizations, etc.). All of us are concerned.

The events are broadcast live on Youtube (https://talk.cybercni.fr/) and LinkedIn, allowing worldwide remote participation – including a tool to participate in the discussion.

You can add the event calendar via ICSwebcalHTML.

How the digital transformation is changing our lives

Our society relies more and more on information and operational technologies. Examples include water, energy, heat and cooling supply, communications, healthcare, production and processing of goods, transportation, national security, banking, research and education, and food production.

What all these areas have in common is that they make intensive use of networked distributed computer systems. These systems can be attacked in many ways. This is no longer just a problem for computer “pros” because computer systems are essential to all of us. The effects of “cyber-attacks” range from power outages to the collapse of the health care or banking sectors.

Program and registration: https://talk.cybercni.fr/

[T38] Security Aspects in the Evolved IoT-Edge-Cloud Continuum Paradigm – Valeria Loscri

On Fri, Sep 27th, 2024, 2pm CET, we welcome Valeria Loscri from INRIA Lille, France for another edition of TALK.CYBERcni.fr on “Security Aspects in the Evolved IoT-Edge-Cloud Continuum Paradigm”. Share and join!

As our connected world expands with advanced services and applications, the IoT-Edge-Cloud Continuum has emerged as a key paradigm, seamlessly integrating IoT devices, edge computing, and cloud services. But with this evolution comes new security challenges, exposing vulnerabilities across heterogeneous devices. Valeria will dive into the security landscape of this paradigm, highlighting how IoT-device vulnerabilities can escalate into powerful attacks on higher layers of the continuum.

You are cordially invited to join the free live stream on youtube and LinkedIn! Please share the link https://talk.cybercni.fr/38 with your interested friends!

Trailer: https://youtu.be/6iE1WWSIGZ8?list=PLdftPKA9mTfaDJxqwexil2mPhUFIA9ITd
LinkedIN Event: https://www.linkedin.com/events/7245358136469983232
Facebook Event: https://www.facebook.com/events/1052373216497306/
Youtube: https://www.youtube.com/watch?v=3LYfZHsTZ4Y&list=PLdftPKA9mTfaDJxqwexil2mPhUFIA9ITd&index=1
Stream redirect (for every edition): https://TALK.cyberCNI.fr/stream

Newsletter with invitations: Subscription on https://TALK.cyberCNI.fr

Help us spreading the news

The best talks are those with an interested diverse audience! Therefore, please use the following media to spread the news in your networks: 

Thank you!

Abstract

Living in our perpetually connected world presents us with an abundance of novel advanced services and automated applications. In order to meet the increasing demand of advanced services and applications, significant activity has been dedicated in the recent years to build the IoT-Edge-Cloud Continuum paradigm. 

This paradigm shift comes with a change in the security landscape, enabling new and more powerful attacks relying on vulnerabilities of heterogeneous devices, where not all the devices cannot be with same level of security. 

It is paramount to analyze this new security landscape and estimate the potential impact of attacks at IoT-devices on the upper layers. 

Watch the trailer linked above!

Valeria Loscri

Valeria Loscri is researcher director in the FUN Team at Inria Lille (France), that she joined in 2013. From Dec. 2006 to Sept. 2013, she was Research Fellow in the TITAN Lab of the University of Calabria, Italy. She received her MSc and PhD degrees in Computer Science in 2003 and 2007, respectively, from the University of Calabria and her HDR (Habilitation à diriger des recherches) in 2018 from Université de Lille (France). Her research interests focus on emerging technologies for new communication paradigms such as Visible Light Communication (VLC), mmWave, cooperation and coexistence of wireless heterogeneous devices and cyber security in wireless networks. She is involved in the activity of several European Projects (Horizon Europe MLSysOps, H2020 CyberSANE, FP7 EU project VITAL, etc.).
She has been nominated to the 2021 Women Stars in Computer Networking and Communications Communications by the IEEE Communication Society. She is in the editorial board of IEEE COMST, Transactions on Information Forensics and Security, Elsevier ComNet, ComCom. She is serving as TPC members in several primary international conferences, such as IEEE ESORICS, IEEE CNS, IEEE INFOCOM, IEEE PerCom.
She is Action Chair and scientific Holder of BEiNG-WISE COST Action (since 2023). Since 2019, she is Scientific International Delegate for Inria Lille

About INRIA

Inria is the French national institute for research in digital science and technology, and since January 2024 has been responsible for the Agence de programmes dans le numérique (Digital Programs Agency), designed to strengthen the collective dynamics of higher education and research. Its DNA is based on world-class research, technological innovation and entrepreneurial risk. Within 220 project teams, most of which are shared with major research universities, more than 3,800 scientists are exploring new avenues, often in interdisciplinary collaboration with industrial partners, to meet ambitious challenges. As a technology institute, Inria supports a wide range of innovation paths: from open source software publishing to the creation of technology startups (Deeptech).

Talk.cybercni.fr

The Cyber CNI Lecture Series is a free monthly event that typically takes place on the last Friday of the month from 2pm to 3h30pm CET.

The Cyber CNI Speaker series aims to raise awareness and understanding of cyber security issues among all audiences. It aims to enable an ongoing dialogue between experts from industry and academia and the general public (citizens, families, small and large businesses, public organizations, etc.). All of us are concerned.

The events are broadcast live on Youtube (https://talk.cybercni.fr/) and LinkedIn, allowing worldwide remote participation – including a tool to participate in the discussion.

You can add the event calendar via ICSwebcalHTML.

How the digital transformation is changing our lives

Our society relies more and more on information and operational technologies. Examples include water, energy, heat and cooling supply, communications, healthcare, production and processing of goods, transportation, national security, banking, research and education, and food production.

What all these areas have in common is that they make intensive use of networked distributed computer systems. These systems can be attacked in many ways. This is no longer just a problem for computer “pros” because computer systems are essential to all of us. The effects of “cyber-attacks” range from power outages to the collapse of the health care or banking sectors.

Program and registration: https://talk.cybercni.fr/

[T37] Cryptocurrency Innovations: EcoMobiCoin for Green Behavior & LCoin for Local Economies – Pascal Lafourcade

On Fri, Aug 30th, 2024, 1pm CET, we welcome Pascal Lafourcade from Université Clermont Auvergne, France for another edition of TALK.CYBERcni.fr on “Cryptocurrency Innovations: EcoMobiCoin for Green Behavior & LCoin for Local Economies”. Share and join!

In this presentation, Pascal will revisit Bitcoin and blockchain principles, highlighting the limitations of Bitcoin and the energy-intensive proof-of-work mechanism. He will introduce the innovative concept of proof-of-behavior, which powers EcoMobiCoin, a cryptocurrency that rewards environmentally-friendly mobility. Additionally, Pascal will explore the development of local currencies aimed at promoting local exchange, introducing the notion of geographic demurrage.

You are cordially invited to join the free live stream on youtube and LinkedIn! Please share the link https://talk.cybercni.fr/36 with your interested friends!

Trailer: https://www.youtube.com/watch?v=6QrBZK7-bCc&list=PLdftPKA9mTfaDJxqwexil2mPhUFIA9ITd
LinkedIN Event: https://www.linkedin.com/events/7224308778404380673
Facebook Event: https://www.facebook.com/events/1455444385122198/
Youtube: https://www.youtube.com/watch?v=hV4CyyRsuxU&list=PLdftPKA9mTfaDJxqwexil2mPhUFIA9ITd&index=1
Stream redirect (for every edition): https://TALK.cyberCNI.fr/stream

Newsletter with invitations: Subscription on https://TALK.cyberCNI.fr

Help us spreading the news

The best talks are those with an interested diverse audience! Therefore, please use the following media to spread the news in your networks: 

Thank you!

Abstract

In this presentation, I will recall Bitcoin and blockchain principles. Then I will show the limitations of Bitcoin and proof-of-work. I will introduce the notion of proof-of-behavior to replace energy-intensive proof-of-work. This has enabled us to propose EcoMobiCoin, a crypto-currency that rewards environmentally-friendly mobility. Next, I will look at how to build a local currencies to promote local exchange. For this I will introduce the notion of geographic demurrage.

Watch the trailer linked above!

Pascal Lafourcade

Pascal Lafourcade obtained his Phd laboratory LSV at ENS Cachan on verification of cryptographic protocols in presence of algebraic properties. Then spent one year at the ETH Zurich in David Basin group, working on WSN. After he was during seven years Maitre de conference at Verimag developing automatic technic for verifying cryptographic primitives, security protocols. Now he holds an industrial chair at Clermont Ferrand at Laboratory LIMOS.

Pascal Lafourcade is an associate professor at the University d’Auvergne (Clermont-Ferrand) France. He is a member of the Networks and Protocols Team of the LIMOS Laboratory. He received his Ph.D. in 2006 from the ENS Cachan (Cachan, France). He has carried out broad research in security and verification of cryptographic protocols.

About the Université Clermont Auvergne,  LIMOS

The Université Clermont Auvergne is committed to the success of its students, and to a new approach to research that supports innovation and creativity, in order to contribute fully to the development of the region’s economic and scientific strengths.

At the Université Clermont Auvergne, 6 institutes group together training and research components.

The Laboratory of Informatics, Modelling and Optimization of the Systems (LIMOS) is a Mixed Unit of Research (UMR 6158) in computing, and more generally in Sciences and Technologies of information and the Communication ( STIC).

Talk.cybercni.fr

The Cyber CNI Lecture Series is a free monthly event that typically takes place on the last Friday of the month from 2pm to 3h30pm CET.

The Cyber CNI Speaker series aims to raise awareness and understanding of cyber security issues among all audiences. It aims to enable an ongoing dialogue between experts from industry and academia and the general public (citizens, families, small and large businesses, public organizations, etc.). All of us are concerned.

The events are broadcast live on Youtube (https://talk.cybercni.fr/) and LinkedIn, allowing worldwide remote participation – including a tool to participate in the discussion.

You can add the event calendar via ICSwebcalHTML.

How the digital transformation is changing our lives

Our society relies more and more on information and operational technologies. Examples include water, energy, heat and cooling supply, communications, healthcare, production and processing of goods, transportation, national security, banking, research and education, and food production.

What all these areas have in common is that they make intensive use of networked distributed computer systems. These systems can be attacked in many ways. This is no longer just a problem for computer “pros” because computer systems are essential to all of us. The effects of “cyber-attacks” range from power outages to the collapse of the health care or banking sectors.

Program and registration: https://talk.cybercni.fr/

[T36] Dynamic Cybersecurity Risk Management with Responsible AI Practice  for Enhancing Security and Resilience of Digital Infrastructure – Shareeful Islam

On Fri, July 26th, 2024, 2h00pm CET, we welcome Shareeful Islam from Anglia Ruskin University, UK for another edition of TALK.CYBERcni.fr on “Dynamic Cybersecurity Risk Management with Responsible AI Practice  for Enhancing Security and Resilience of Digital Infrastructure – Shareeful Islam”. Share and join!
We are excited to welcome Dr. Shareeful Islam from Anglia Ruskin University for a compelling talk on “Dynamic Cybersecurity Risk Management with Responsible AI Practice for Enhancing Security and Resilience of Digital Infrastructure.” In this session, Dr. Islam will address the growing sophistication of cyberattacks and the critical need for dynamic cybersecurity risk management. Learn how hybrid AI-enabled models, combining linear regression and deep learning, can help manage risks more effectively and ensure the development of trustworthy AI systems.

You are cordially invited to join the free live stream on youtube and LinkedIn! Please share the link https://talk.cybercni.fr/36 with your interested friends!

Trailer: https://youtu.be/lcDndbVe8ds
LinkedIN Event: https://www.linkedin.com/events/7221126855918063619
Facebook Event: https://www.facebook.com/events/366087109924061/
Youtube: https://www.youtube.com/watch?v=3ZSARwpfwgA&list=PLdftPKA9mTfaDJxqwexil2mPhUFIA9ITd
Stream redirect (for every edition): https://TALK.cyberCNI.fr/stream

Newsletter with invitations: Subscription on https://TALK.cyberCNI.fr

Help us spreading the news

The best talks are those with an interested diverse audience! Therefore, please use the following media to spread the news in your networks: 

Thank you!

Abstract

The sophistication of cyberattacks has significantly increased, making it almost certain that organizations can be victims of cyberattacks at any time. Managing cybersecurity risk is critical for any organization so that informed decisions can be made to tackle risks before they materialize. However, performing effective risk management is always challenging due to the constant changes in organizational infrastructure and security posture, including the adoption of new applications and the reconfiguration or updating of existing assets and their dependencies, as well as the potential exploitation of vulnerabilities. Despite the wider adoption of AI enabled solution in  cybersecurity , but lack of focus on the analysing  dynamic parameters using AI models  and their integration into cybersecurity  risk management. Additionally, AI-enable cybersecurity solution needs to assure the Responsible AI practice for trustworthy AI system development and use 

This talk presents dynamic Cyber Security Risk Management (d-CSRM)) to tackle this challenge by integrating for assessing and managing the risk. It considers hybrid AI-enabled model that combines both linear regression and deep learning,  with responsible AI practice to assess the risk.

Watch the trailer linked above!

Shareeful Islam

Dr. Shareeful Islam is an Associate Professor  in Cybersecurity at the Faculty of Science and Engineering, Anglia Ruskin University(ARU). He is currently visiting professor LUT School of Engineering Sciences, Lappeenranta, Finland and  previously worked as a visiting professor at the National Institute of Informatics (NII), Japan, and a visiting researcher at SBA Research, Austria. He has over 22 years of experience in teaching , administration, and research. He published more than 90 papers and secured ca 1.5 M £ funding mostly from the national and EU funding agency with experienced with lead and manage project. He has  successfully supervised to timely completion 11 PhDs and MPhils and currently leading Horizon project for ARU. He has published more than 90  papers in different top ranked journals and conferences. His research interest includes cybersecurity risk management, Responsible AI, AI-enabled cyber security, and regulatory compliance.

About the Anglia Ruskin University (ARU)

named one of the top 40 universities in the UK and top 350 institutions in the world, in the Times Higher Education (THE) World University Rankings in 2023.  ARU teaching and research focuses on Chelmsford, Cambridge, Peterborough and rated Gold in the Teaching Excellence Framework   The school of computing and information science  boasts state-of-the-art research facilities, equipped with the latest technology and resources necessary for conducting advanced research in cybersecurity. CIS includes a number of online specialized labs including threat and forensic analysis, penetration testing, and evidence visualization.  CIS is a dynamic hub for academic excellence and innovation in the field of computer science, information technology, and cybersecurity.  Faculty members of CIS are distinguished experts in cybersecurity, artificial intelligence, and network defence.

Talk.cybercni.fr

The Cyber CNI Lecture Series is a free monthly event that typically takes place on the last Friday of the month from 2pm to 3h30pm CET.

The Cyber CNI Speaker series aims to raise awareness and understanding of cyber security issues among all audiences. It aims to enable an ongoing dialogue between experts from industry and academia and the general public (citizens, families, small and large businesses, public organizations, etc.). All of us are concerned.

The events are broadcast live on Youtube (https://talk.cybercni.fr/) and LinkedIn, allowing worldwide remote participation – including a tool to participate in the discussion.

You can add the event calendar via ICSwebcalHTML.

How the digital transformation is changing our lives

Our society relies more and more on information and operational technologies. Examples include water, energy, heat and cooling supply, communications, healthcare, production and processing of goods, transportation, national security, banking, research and education, and food production.

What all these areas have in common is that they make intensive use of networked distributed computer systems. These systems can be attacked in many ways. This is no longer just a problem for computer “pros” because computer systems are essential to all of us. The effects of “cyber-attacks” range from power outages to the collapse of the health care or banking sectors.

Program and registration: https://talk.cybercni.fr/

[T35] Formally verifying security properties of cyber-physical systems – Mikael Asplund

On Fri, June 28th, 2024, 2h00pm CET, we welcome Mikael Asplund from Linköping University for another edition of TALK.CYBERcni.fr on “Formally verifying security properties of cyber-physical systems”. Share and join!

Join Mikael Asplund from Linköping University as he delves into the critical need for rigorous and verifiable development methods in our increasingly connected world. In his talk on “Formally Verifying Security Properties of Cyber-Physical Systems,” Asplund will explore how formal methods can be leveraged to ensure the security of networked systems at multiple abstraction levels. Discover the challenges and breakthroughs in translating high-level security requirements into low-level implementations, and learn why keeping up with the sophistication of cyber threats is more crucial than ever. After the talk, engage directly with Asplund in a lively 45-minute discussion. Bring your questions and ideas to this interactive session and be part of the conversation shaping the future of cyber-physical security!

You are cordially invited to join the free live stream on youtube and LinkedIn! Please share the link https://talk.cybercni.fr/35 with your interested friends!

Trailer: https://youtu.be/oYeVh4vIZYQ
LinkedIN Event: https://www.linkedin.com/events/7206936139524362240/comments/
Facebook Event: https://www.facebook.com/events/7898805550141847/
Youtube: https://www.youtube.com/watch?v=RAiCFhJWH4M&list=PLdftPKA9mTfaDJxqwexil2mPhUFIA9ITd
Stream redirect (for every edition): https://TALK.cyberCNI.fr/stream

Newsletter with invitations: Subscription on https://TALK.cyberCNI.fr

Help us spreading the news

The best talks are those with an interested diverse audience! Therefore, please use the following media to spread the news in your networks: 

Thank you!

Abstract

Cyber-physical systems are often  safety-critical and require a rigorous  development process to reduce  the risk of hazards to an acceptable  level. Traditionally, this meant  isolated components with predictable  run-time behaviour, combined with  redundancy to achieve fault tolerance.  Today, we consider it normal to  have internet-connected cars,  management of critical infrastructure  running in the cloud, and  air-traffic control that operate remotely  with digital screens instead  of windows for the operators. At the same  time, the cyber threats have  grown drastically in frequency and  sophistication putting many of these  connected cyber-physical systems  at risk. Unfortunately, we have not  kept up with the development of  rigorous and verifiable development  methods to match the increased  connectivity and complexity of our  critical systems. In this talk I  will discuss opportunities and  challenges of using formal methods to  verify security properties in  cyber-physical systems. The focus will be  on networked cyber-physical  systems considering three different  abstraction levels, entity  coordination, cryptographic protocol design,  and implementation of  communication protocols. I will discuss how  high-level requirements can  be refined and translated to low-level  properties, show some examples of  what we can show, and where we are  still struggling to find suitable  abstractions and models.

Watch the trailer linked above!

Mikael Asplund

Professor Mikael Asplund is a Senior Associate  Professor in Computer Science at Linköping University (LiU). He received  his M.Sc. degree in computer science and engineering and the  Ph.D.degree in computer science from LiU, in 2005 and 2011,  respectively. From 2011 to 2012, he was a Research Fellow with Trinity  College Dublin. He currently leads five research projects on  cybersecurity and is responsible for two Master programs at LiU. His  research is focused on methods for rigorous security of cyber-physical  systems.

About the Linköping University

We all want to create a better world. At Linköping University, LiU, we use boundary-breaking research and innovative education to get there. To solve the challenges of the day, we are in continuous and close contact with industry and society. International rankings show that LiU is among the world’s top universities. Our students are sought after in the labour market, and we are one of the most attractive employers in Sweden. We believe that all this stems from our courage to think freely and innovate in contexts large and small.

LiU continues to give generations of curious individuals the opportunity to grow and contribute to a better world. We do this with the power of 37,600 students and 4,300 co-workers.

Talk.cybercni.fr

The Cyber CNI Lecture Series is a free monthly event that typically takes place on the last Friday of the month from 2pm to 3h30pm CET.

The Cyber CNI Speaker series aims to raise awareness and understanding of cyber security issues among all audiences. It aims to enable an ongoing dialogue between experts from industry and academia and the general public (citizens, families, small and large businesses, public organizations, etc.). All of us are concerned.

The events are broadcast live on Youtube (https://talk.cybercni.fr/) and LinkedIn, allowing worldwide remote participation – including a tool to participate in the discussion.

You can add the event calendar via ICSwebcalHTML.

How the digital transformation is changing our lives

Our society relies more and more on information and operational technologies. Examples include water, energy, heat and cooling supply, communications, healthcare, production and processing of goods, transportation, national security, banking, research and education, and food production.

What all these areas have in common is that they make intensive use of networked distributed computer systems. These systems can be attacked in many ways. This is no longer just a problem for computer “pros” because computer systems are essential to all of us. The effects of “cyber-attacks” range from power outages to the collapse of the health care or banking sectors.

Program and registration: https://talk.cybercni.fr/

[Talk34] Global challenges and holistic legal approaches in cyber resilience – Dennis-Kenji Kipker

On Fri, May 17th, 2024, 2h30pm CET, we welcome Dennis-Kenji Kipker from the cyberintelligence.institute and the HS Bremen on “Global challenges and holistic legal approaches in cyber resilience”.

You are cordially invited to join the free live stream on youtube and LinkedIn! Please share the link https://talk.cybercni.fr/34 with your interested friends!

Trailer: https://youtu.be/KG2R-SwrLCI
LinkedIN Event: https://www.linkedin.com/events/talk34-globalchallengesandholis7178872538247102466/theater/
Facebook Event: https://www.facebook.com/events/748133823748288/
Youtube: https://youtube.com/live/bDShFbU5U0U
Stream redirect (for every edition): https://TALK.cyberCNI.fr/stream

Newsletter with invitations: Subscription on https://TALK.cyberCNI.fr

Help us spreading the news

The best talks are those with an interested diverse audience! Therefore, please use the following media to spread the news in your networks: 

Thank you!

Abstract

Since 2020, the cyber threat situation has changed enormously – new global political factors, changed national policies, but also new attack vectors have contributed to this. How is the European Union responding to these challenges and can the political and regulatory measures taken and planned be sufficient to deal with the escalating threat situation in the digital space?

Watch the trailer linked above!

Dennis-Kenji Kipker

Prof. Dr. Dennis-Kenji Kipker is Scientific Director of the cyberintelligence.institute in Frankfurt am Main and visiting professor at the private Riga Graduate School of Law in Latvia, which was founded by the Soros Foundation. Here he conducts research on topics at the interface of law and technology in cyber security, corporate strategy and digital resilience in the context of global crises, with a particular focus on Chinese and US IT law. Kipker is an advisor to the German Federal Government and the European Commission and a member of the Advisory Board of the private cybersecurity company NordVPN. He is also a reviewer for the Bavarian Academy of Sciences and Humanities and the Alexander von Humboldt Foundation. Dennis Kipker works voluntarily for the World Justice Project in the USA.

About the cyberintelligence.institute

The new cyberintelligence.institute – Shaping our digital future together: A new type of research institute for digital resilience and sustainable decision-making. Combining scientific excellence, social responsibility and entrepreneurial spirit to face the global challenges of the 21st century.

Talk.cybercni.fr

The Cyber CNI Lecture Series is a free monthly event that typically takes place on the last Friday of the month from 2pm to 3h30pm CET.

The Cyber CNI Speaker series aims to raise awareness and understanding of cyber security issues among all audiences. It aims to enable an ongoing dialogue between experts from industry and academia and the general public (citizens, families, small and large businesses, public organizations, etc.). All of us are concerned.

The events are broadcast live on Youtube (https://talk.cybercni.fr/) and LinkedIn, allowing worldwide remote participation – including a tool to participate in the discussion.

You can add the event calendar via ICSwebcalHTML.

How the digital transformation is changing our lives

Our society relies more and more on information and operational technologies. Examples include water, energy, heat and cooling supply, communications, healthcare, production and processing of goods, transportation, national security, banking, research and education, and food production.

What all these areas have in common is that they make intensive use of networked distributed computer systems. These systems can be attacked in many ways. This is no longer just a problem for computer “pros” because computer systems are essential to all of us. The effects of “cyber-attacks” range from power outages to the collapse of the health care or banking sectors.

Program and registration: https://talk.cybercni.fr/

[TALK33] 13.12.2023 Revisiting Wireless Security  – Muriel Medard (MIT)

On Fri, Dec 13th, 2023, 2pm CET, we welcome Muriel Medard from the Massachusetts Institute of Technology (MIT) on “Revisiting Wireless Security”.

You are cordially invited to join the free live stream on youtube and LinkedIn! Please share the link https://talk.cybercni.fr/33 with your interested friends!

Trailer: https://youtu.be/Nx1lpDqvJOE
LinkedIN Event: https://www.linkedin.com/events/7140092207578980352
Facebook Event: https://www.facebook.com/events/267005139706853/
Youtube: https://www.youtube.com/watch?v=crqWKLsbUVk&list=PLdftPKA9mTfaDJxqwexil2mPhUFIA9ITd&
Stream redirect (for every edition): https://TALK.cyberCNI.fr/stream

Newsletter with invitations: Subscription on https://TALK.cyberCNI.fr

Help us spreading the news

The best talks are those with an interested diverse audience! Therefore, please use the following media to spread the news in your networks: 

Thank you!

Abstract

Wireless security has progressed from an area of specialized interest to a matter of discussion in the mainstream press. The attention the issue receives is in great part due to the increased societal reliance on wireless connectivity, be it by the advent of 5G, or by the heavy use of WiFi for remote work in the last couple of years. On the technical side, the confluence of multiple factors has made the topic increasingly complex. First, the heterogeneity of manufacturers and technologies, ranging from traditional mobile systems to WiFi and satellite, render a centrally orchestrated security solution impractical. Second, the introduction of new technologies, particularly at very high frequencies, present new settings in terms of propagation and associate vulnerabilities. Third, traditional wiretap approaches are not robust to recent security analysis based on guessing attacks. Fourth, the erosion of traditional cryptographic schemes, such as RSA, by quantum computing, coupled with the rise of the possibility of such quantum computation, imply that reliance on traditional data hiding is increasingly fraught. Finally, the widespread use of federated learning entails that a highly connected, omnipresent wireless ecosystem also presents new and complex risks in terms of privacy.

In this talk, we argue that the many of the above developments can, when exploited well, be seen not as vulnerabilities but as techniques to enhance security. Heterogeneous settings permit, through network coding, light-weight, in terms of computational and rate overhead, post-quantum secure operation of networks without central coordination. Leveraging these post-quantum schemes, transmissions at high frequencies can be fashioned to obtain absolute security, which does not rely on statistical notions of signal to noise ratios as in conventional wiretap schemes. Guessing random additive noise decoding (GRAND™) provides the ability to incorporate encryption into error-correcting coding directly. Privacy management even in distributed, uncertain settings, can be enhanced by combining machine learning techniques with coding.

Watch the trailer linked above!

Muriel Medard

Muriel Médard is the NEC Professor of Software Science and Engineering in the Electrical Engineering and Computer Science (EECS) Department at MIT, where she leads the Network Coding and Reliable Communications Group in the Research Laboratory for Electronics at MIT and Chief Scientist for Steinwurf, which she has co-founded. She obtained three Bachelors degrees, as well as her M.S. and Sc.D, all from MIT.  Muriel has supervised over 40 master students, over 20 doctoral students and over 25 postdoctoral fellows. Muriel currently serves as the Editor-in-Chief of the IEEE Transactions on Information Theory and served previously as Editor in Chief of the IEEE Journal on Selected Areas in Communications. Muriel was elected president of the IEEE Information Theory Society in 2012, and serves on its board of governors, having previously served for eleven years. She has over sixty US and international patents awarded, the vast majority of which have been licensed or acquired.

About the Massachusetts Institute of Technology (MIT)

The Massachusetts Institute of Technology is a private research university in Cambridge, Massachusetts. Established in 1861, MIT has played a significant role in the development of many areas of modern technology and science.In particular, the Department of Electrical Engineering and Computer Science is the largest department at MIT, annually preparing hundreds of graduate and undergraduate students for career leadership in fields such as academia, research, and the high-technology industry. Part of both the Schwarzman College of Computing and the School of Engineering, MIT EECS consistently tops the U.S. News & World Report and other college rankings and is widely recognized for its world-class faculty, who provide outstanding education and conduct innovative and award-winning research.

Talk.cybercni.fr

The Cyber CNI Lecture Series is a free monthly event that typically takes place on the last Wednesday of the month from 2pm to 3h30pm CET.

The standard event consists of a 45-minute expert presentation followed by a 45-minute discussion. The special fireside talks emphasize more the discussion and only have a short impulse presentation at the beginning.

The Cyber CNI Speaker series aims to raise awareness and understanding of cyber security issues among all audiences. It aims to enable an ongoing dialogue between experts from industry and academia and the general public (citizens, families, small and large businesses, public organizations, etc.). All of us are concerned.

The events are broadcast live on Youtube (https://talk.cybercni.fr/) and LinkedIn, allowing worldwide remote participation – including a tool to participate in the discussion.

You can add the event calendar via ICSwebcalHTML.

How the digital transformation is changing our lives

The COVID-19 pandemic has shown all of us the benefits of information technology. It allows us to work at a distance, to live at a distance, and most importantly, to keep in touch at a distance – with younger and older people, those closest to us, and even make new contacts.

Our society relies more and more on information and operational technologies. Examples include water, energy, heat and cooling supply, communications, healthcare, production and processing of goods, transportation, national security, banking, research and education, and food production.

What all these areas have in common is that they make intensive use of networked distributed computer systems. These systems can be attacked in many ways. This is no longer just a problem for computer “pros” because computer systems are essential to all of us. The effects of “cyber-attacks” range from power outages to the collapse of the health care or banking sectors.

Program and registration: https://talk.cybercni.fr/

[TALK31] Enabling Machine-to-Machine Crypto Economy – Kemal Akkaya (FIU, USA)

On Fri, May 12th, 2023, 3pm CET, Kemal Akkaya (Florida International University, USA), will talk about “Enabling Machine-to-Machine Crypto Economy“. You are cordially invited to come or join the free live stream on youtube and LinkedIn! Please share the link https://talk.cybercni.fr/31 with your interested friends!

Trailer: https://youtu.be/qeWtIY3X2A4
LinkedIN Event: https://www.linkedin.com/events/7061340540599971840
Facebook Event: https://www.facebook.com/events/769049331352499/
Youtube: https://www.youtube.com/watch?v=ZwkWFueBBAU?list=PLdftPKA9mTfaDJxqwexil2mPhUFIA9ITd
Stream redirect (for every edition): https://TALK.cyberCNI.fr/stream

Newsletter with invitations: Subscription on https://TALK.cyberCNI.fr

Help us spreading the news

The best talks are those with an interested diverse audience! Therefore, please use the following media to spread the news in your networks: 

Thank you!

Abstract

Internet of Things (IoT) devices from tiny sensors to autonomous cars are becoming an indispensable part of life. To create an effective IoT ecosystem, it is critical to enable paid data and service sharing among IoT devices which will require the ability to make a machine-to-machine (M2M) payment to a service provider for services such as parking, vehicle charging, sensor data sale, internet sharing, vending machine among others. Since this ecosystem will be dependent on financial micro-transactions among IoT devices, a reliable payment system without human intervention is desirable for a seamless experience. As IoT evolves over time, cryptocurrencies, in particular Bitcoin, can play a critical role by serving as digital money in creating such an M2M economy. The successful integration of IoT and Bitcoin technologies will foster this M2M economy by introducing novel applications such as automated payment among sensing devices, and programmable financial transactions for consumer electronics. Nevertheless, this brings many new challenges to be tackled as it is imperative to have cost and space-efficient real-time cryptocurrency solutions for resource constrained IoT devices. In this talk, we will first discuss the elements of M2M crypto economy and then present some solutions that can enable making Bitcoin transactions from IoT devices through Bitcoin Lightning Network (LN) and how LN solutions can be helpful in making offline transactions among IoT devices. 

Watch the trailer here.

Kemal Akkaya

Dr. Kemal Akkaya is a full professor in the Department of Electrical and Computer Engineering with a joint courtesy appointment in the School of Computer and Information Sciences at Florida International University (FIU). He received his PhD in Computer Science from University of Maryland Baltimore County in 2005 and joined the department of Computer Science at Southern Illinois University (SIU) as an assistant professor. Dr. Akkaya was an associate professor at SIU from 2011 to 2014.  Dr. Akkaya leads the Advanced Wireless and Security Lab (ADWISE) in the ECE Dept. His current research interests include security and privacy, internet-of-things, and cyber-physical systems.  He is the EiC of Springer Computer Science journal, area editor of Elsevier Ad Hoc Network and Computer Networks Journal and serves on the editorial board of IEEE Communication Surveys and Tutorials. Dr. Akkaya was the General Chair of IEEE LCN 2018 and TPC Chair for IEEE ICC Smart Grid Communications.  Dr. Akkaya was listed among the top 2% scientists in the world according to a Stanford University study in 2019. He also received FIU Faculty Senate Excellence in Research Award and FIU College of Engineering and Computing Research Award both in 2020. Dr. Akkaya is a Fellow of IEEE.

About Florida International University (FIU)

FIU is Miami’s public research university. Offering bachelor’s, master’s, and doctoral degrees, both on campus and fully online, FIU is worlds ahead in its service to the academic and local community. Designated as a top-tier research institution, FIU emphasizes research as a major component in the university’s mission. For over four decades, FIU has positioned itself as one of South Florida’s anchor institutions by solving some of the greatest challenges of our time. It is dedicated to enriching the lives of the local and global community. With a student body of more than 56,000, FIU is among the top 10 largest universities in the US and has collectively graduated more than 275,000 alumni, 165,000 of whom live and work in South Florida.

Talk.cybercni.fr

The Cyber CNI Lecture Series is a free monthly event that typically takes place on the last Wednesday of the month from 2pm to 3h30pm CET.

The event consists of a 45-minute expert presentation followed by a 45-minute discussion.

The Cyber CNI Speaker series aims to raise awareness and understanding of cyber security issues among all audiences. It aims to enable an ongoing dialogue between experts from industry and academia and the general public (citizens, families, small and large businesses, public organizations, etc.). All of us are concerned.

The events are broadcast live on Youtube (https://talk.cybercni.fr/) and LinkedIn, allowing worldwide remote participation – including a tool to participate in the discussion.

You can add the event calendar via ICSwebcalHTML.

How the digital transformation is changing our lives

The COVID-19 pandemic has shown all of us the benefits of information technology. It allows us to work at a distance, to live at a distance, and most importantly, to keep in touch at a distance – with younger and older people, those closest to us, and even make new contacts.

Our society relies more and more on information and operational technologies. Examples include water, energy, heat and cooling supply, communications, healthcare, production and processing of goods, transportation, national security, banking, research and education, and food production.

What all these areas have in common is that they make intensive use of networked distributed computer systems. These systems can be attacked in many ways. This is no longer just a problem for computer “pros” because computer systems are essential to all of us. The effects of “cyber-attacks” range from power outages to the collapse of the health care or banking sectors.

Program and registration: https://talk.cybercni.fr/

[TALK30] Trusted Graph for explainable detection of cyberattacks – Pierre PARREND (EPITA / iCube, Unistra)

On Wed, April 19th, 2023, 2pm CET, Pierre PARREND (Laboratoire de Recherche de l’EPITA / Laboratoire ICube – Unistra), will talk about “Trusted Graph for explainable detection of cyberattacks“. You are cordially invited to come or join the free live stream on youtube and LinkedIn! Please share the link https://talk.cybercni.fr/30 with your interested friends!

Trailer: https://youtu.be/eiRdUH8yMHk
LinkedIN Event: https://www.linkedin.com/events/7052340159396139008/
Facebook Event: https://www.facebook.com/events/1698222957276297/
Youtube: https://www.youtube.com/watch?v=Ud1SieWVq10?list=PLdftPKA9mTfaDJxqwexil2mPhUFIA9ITd
Stream redirect (for every edition): https://TALK.cyberCNI.fr/stream

Newsletter with invitations: Subscription on https://TALK.cyberCNI.fr

Help us spreading the news

The best talks are those with an interested diverse audience! Therefore, please use the following media to spread the news in your networks: 

Thank you!

Abstract

Machine Learning (ML) is now a key asset in security operations for the classification of malware or malicious web sites through combinations of network, system or software properties, anomaly detection by identification of deviating behaviours. Challenges for efficient and scalable use remain wide open, as the issue of training future professionals in a domain that requires high level of proficiency both in system and network technologies and in machine learning models and theory. Nonetheless, the technologies are sufficiently mature to be pervasive in security devices like supervision (Splunk), EDR/XDR (Thetris, DarkTrace) or SOAR (), as well as in security teams focusing in SOC or forensics.

However, while ML is a powerful tool for analyzing dominant behaviours and deviations thereof, it falls short in detecting weak signals, complex attacks like APTs, and more generally taking the relationships between messages, machines or network into account. Specific models have emerged to address these issues, which need to radically switch the analysis approach: the individual packets are no longer significant, their sequence is. Individual machines are not working stand alone, their interactions build the capability – and the threats – to the network. Security analysis therefore needs to leave the now common Euclidian, multi-dimensional ML models to face the complex interactions of machines and communications, nodes and their binding vertices, that is to say: the non-Euclidian domain of graph analytics.

In this talk, we present how the combination of attack graphs, graph theoretical metrics and graph learning enhance the well-mastered ML models for detection of attacks and address two critical phases for attack detection and mitigation: supervision and forensics. The graphs can take several forms: interaction graphs, considering IP or IP+Mac addresses as node definition, or scenario graphs, focusing on short-range time-windows to isolate related sessions. We illustrate their versatile capability through a wide range of cyberattacks from broadscale ransomware, scanning or denial of service attacks, to targeted attacks like spoofing, up to complex advanced persistence threat (APT) multi-step attacks.

The non-aggregative characteristics of graph models supports extended properties for explainability of attacks throughout the analytics lifecycle: data, model, output and interface. These approaches are evaluated both for information system network traces and for cyberphysical systems in industrial and medical environments.

Watch the trailer here.

Pierre PARREND

Pierre Parrend is HDR Professor at EPITA and head of Security & Systems team ar LRE – Laboratoire de Recherche de l’EPITA. As a member of the ICube laboratory of the University of Strasbourg, he leads a joint project between the CSTB team (Complex Systems and Translational Bio-Informatics) of ICube and the EPITA Research Laboratory (LRE) on the use of graphs for explainable detection of cyberattacks. He is particularly interested in attack detection in medical and industrial sensor systems, in particular in the context of the ANR Correau project – Resilience through the design and security of water networks – of which ICube is a partner, and of the ANR THIA-ArtIC on connected medical objects. Pierre is also responsible for the Security & System Team, and deputy director, of the LRE. In this context, he coordinates the contribution of EPITA’s regional sites in Strasbourg, Rennes, Lyon and Toulouse to the school’s partner research laboratories. Pierre was responsible for the BICS (Biostatistics, Informatics, and Complex Systems) research platform at the ICube laboratory, and responsible for the teaching department in computer science and mathematics at ECAM Strasbourg-Europe between 2012 and 2021. He is graduated with a Habilitation to Direct Research from the University of Strasbourg (2017) and a PhD in Computer Science from INSA Lyon (2008).

About Laboratoire de Recherche de l’EPITA / Laboratoire ICube – Unistra

EPITA is a private engineering school located in France, specialized in computer science and information technology. It was founded in 1984. EPITA offers a five-year program leading to the “Ingénieur EPITA” degree recognized by the Commission des Titres d’Ingénieurs. The school provides a curriculum focused on Computer Science and Computer Engineering

that covers various fields such as computer programming, artificial intelligence, cybersecurity, software engineering, and more. 

The LRE, Laboratoire de Recherche de l’EPITA, is the research lab of EPITA. It entails five teams: Security and Systems, Artificial Intelligence, Image, Automata, and Digital Methods for Humanities, as well as three transversal axes: robotics, software performance, and machine learning applications.

Talk.cybercni.fr

The Cyber CNI Lecture Series is a free monthly event that typically takes place on the last Wednesday of the month from 2pm to 3h30pm CET.

The event consists of a 45-minute expert presentation followed by a 45-minute discussion.

The Cyber CNI Speaker series aims to raise awareness and understanding of cyber security issues among all audiences. It aims to enable an ongoing dialogue between experts from industry and academia and the general public (citizens, families, small and large businesses, public organizations, etc.). All of us are concerned.

The events are broadcast live on Youtube (https://talk.cybercni.fr/) and LinkedIn, allowing worldwide remote participation – including a tool to participate in the discussion.

You can add the event calendar via ICSwebcalHTML.

How the digital transformation is changing our lives

The COVID-19 pandemic has shown all of us the benefits of information technology. It allows us to work at a distance, to live at a distance, and most importantly, to keep in touch at a distance – with younger and older people, those closest to us, and even make new contacts.

Our society relies more and more on information and operational technologies. Examples include water, energy, heat and cooling supply, communications, healthcare, production and processing of goods, transportation, national security, banking, research and education, and food production.

What all these areas have in common is that they make intensive use of networked distributed computer systems. These systems can be attacked in many ways. This is no longer just a problem for computer “pros” because computer systems are essential to all of us. The effects of “cyber-attacks” range from power outages to the collapse of the health care or banking sectors.

Program and registration: https://talk.cybercni.fr/