Contents
Academic literature on the topic 'Attaque statistique'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attaque statistique.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Attaque statistique"
Martin Bayon, D., and G. Gomez Zurita Lopez. "Retentissement des attaques au système de caregiving parental sur la gravité des troubles en pédopsychiatrie." European Psychiatry 30, S2 (November 2015): S130—S131. http://dx.doi.org/10.1016/j.eurpsy.2015.09.255.
Full textWeir, David R. "Les Crises Économiques et les Origines de la Révolution Française." Annales. Histoire, Sciences Sociales 46, no. 4 (August 1991): 917–47. http://dx.doi.org/10.3406/ahess.1991.278986.
Full textBOCQUIER, F., N. DEBUS, A. LURETTE, C. MATON, G. VIUDES, C. H. MOULIN, and M. JOUVEN. "Elevage de précision en systèmes d’élevage peu intensifiés." INRAE Productions Animales 27, no. 2 (June 2, 2014): 101–12. http://dx.doi.org/10.20870/productions-animales.2014.27.2.3058.
Full textMorana, Hilda C. P. "Subtypes of Antisocial Personality Disorder and the Implications for Forensic Research: Issues in Personality Disorders Assessment." Rorschachiana 23, no. 1 (January 1999): 90–117. http://dx.doi.org/10.1027/1192-5604.23.1.90.
Full textAruwayo, A., S. S. Adeola, and U. Ibrahim. "Assessment of the challenges of nomadic farming activities in Daura agricultural zone of Katsina State, Nigeria." Nigerian Journal of Animal Production 48, no. 2 (March 2, 2021): 200–209. http://dx.doi.org/10.51791/njap.v48i2.2930.
Full textWeiner, Irving B. "Speaking Rorschach: Our Method Stands Tall." Rorschachiana 22, no. 1 (January 1997): 1–12. http://dx.doi.org/10.1027/1192-5604.22.1.1.
Full textDissertations / Theses on the topic "Attaque statistique"
Linge, Yanis. "Etudes cryptographiques et statistiques de signaux compromettants." Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENM037/document.
Full textThe main subject of this manuscript is the Side Channel Attacks. These attacks investigate the variation of device emanations to retrieve a secret key. These emanations can be the power consumption, the electromagnetic radiation, etc. Most of the time, those attacks use statistical methods to examine the relationship between the emanations and some leakage models supposed by the attacker. Three main axis are developed here. First, we have implemented many side channel attacks on GPGPU using the API OpenCL. These implementations are more effective than the classical ones, so an attacker can exploit more data. Then, in order to provide a new side channel attack, we have suggested the use of a new dependency measurement proposed by Reshef et al., the MIC. The MIC is more advantageous than the mutual information, because its computation does not depend of a kernel choice nor a windows size. So, its use in side channel analysis is simple, even if the time complexity is large. Finally, we have introduced a new attack based on the join distribution of the input and the output of a cryptographic sub-function. If the distribution depends on the key used in the function, we can retrieve the secret key. This attack can be efficient even in presence of some countermeasures because it does not required the knowledge of both plain text or cipher text
Blondeau, Céline. "La cryptanalyse différentielle et ses généralisations." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2011. http://tel.archives-ouvertes.fr/tel-00649842.
Full textRémond, Fabienne. "Mise au point de méthodes d'échantillonnage pour estimer les attaques des fruits du caféier par le scolyte (Hypothenemus hampei Ferr. )." Montpellier 2, 1996. http://www.theses.fr/1996MON20185.
Full textLe, Thanh-Ha. "Analyses et mesures avancées du rayonnement électromagnétique d'un circuit intégré." Grenoble INPG, 2007. http://www.theses.fr/2007INPG0097.
Full textAnalyze two methods: DifferentiaI Power Analysis (DP A) and the Correlation Power Analysis (CP A). The attacks DPA and CPA are based on a power consumption mode!. However, because of the complexity of the circuit, the fact of having a rigorous model is not realistic. We proposed a new method, Partitioning Power Analysis (PP A), which makes it possible to improve the performance of an attack without a precis consumption mode!. Side channel attacks depend closely on the quality of measured signaIs. The performance of an attack can be definitely reduced if the noise level is too high or if the signaIs are not weIl aligned. We proposed solutions based on signal processing techniques to reduce the noise and the effects generated by the signal misalignment. These solutions make it possible to improve the attack effectiveness
Cherisey, Eloi de. "Towards a better formalisation of the side-channel threat." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT016/document.
Full textIn the field of the security of the embeded systems, it is necessary to know and understandthe possible physical attacks that could break the security of cryptographic components. Sincethe current algorithms such as Advanced Encryption Standard (AES) are very resilient agaisntdifferential and linear cryptanalysis, other methods are used to recover the secrets of thesecomponents. Indeed, the secret key used to encrypt data leaks during the computation of thealgorithm, and it is possible to measure this leakage and exploit it. This technique to recoverthe secret key is called side-channel analysis.The main target of this Ph. D. manuscript is to increase and consolidate the knowledge onthe side-channel threat. To do so, we apply some information theoretic results to side-channelanalysis. The main objective is show how a side-channel leaking model can be seen as acommunication channel.We first show that the security of a chip is dependant to the signal-to-noise ratio (SNR) ofthe leakage. This result is very usefull since it is a genereic result independant from the attack.When a designer builds a chip, he might not be able to know in advance how his embededsystem will be attacked, maybe several years later. The tools that we provide in this manuscriptwill help designers to estimated the level of fiability of their chips
Gitzinger, Louison. "Surviving the massive proliferation of mobile malware." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S058.
Full textNowadays, many of us are surrounded by smart devices that seamlessly operate interactively and autonomously together with multiple services to make our lives more comfortable. These smart devices are part of larger ecosystems, in which various companies collaborate to ease the distribution of applications between developers and users. However malicious attackers take advantage of them illegitimately to infect users' smart devices with malicious applications. Despite all the efforts made to defend these ecosystems, the rate of devices infected with malware is still increasing in 2020. In this thesis, we explore three research axes with the aim of globally improving malware detection in the Android ecosystem. We demonstrate that the accuracy of machine learning-based detection systems can be improved by automating their evaluation and by reusing the concept of AutoML to fine-tune learning algorithms parameters. We propose an approach to automatically create malware variants from combinations of complex evasion techniques to diversify experimental malware datasets in order to challenge existing detection systems. Finally, we propose methods to globally increase the quality of experimental datasets used to train and test detection systems
Korkikian, Roman. "Side-channel and fault analysis in the presence of countermeasures : tools, theory, and practice." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE052/document.
Full textThe goal of the thesis is to develop and improve methods for defeating protected cryptosystems. A new signal decompositionalgorithm, called Hilbert Huang Transform, was adapted to increase the efficiency of side-channel attacks. This technique attempts to overcome hiding countermeasures, such as operation shuffling or the adding of noise to the power consumption. The second contribution of this work is the application of specific Hamming weight distributions of block cipher algorithms, including AES, DES, and LED. These distributions are distinct for each subkey value, thus they serve as intrinsic templates. Hamming weight data can be revealed by side-channel and fault attacks without plaintext and ciphertext. Therefore these distributions can be applied against implementations where plaintext and ciphertext are inaccessible. This thesis shows that some countermeasures serve for attacks. Certain infective RSA countermeasures should protect against single fault injection. However, additional computations facilitate key discovery. Finally, several lightweight countermeasures are proposed. The proposed countermeasures are based on the antagonist masking, which is an operation occurring when targeting data processing, to intelligently mask the overall power consumption
Rmayti, Mohammad. "Misbehaviors detection schemes in mobile ad hoc networks." Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0029/document.
Full textWith the evolution of user requirements, many network technologies have been developed. Among these technologies, we find mobile ad hoc networks (MANETs) that were designed to ensure communication in situations where the deployment of a network infrastructure is expensive or inappropriate. In this type of networks, routing is an important function where each mobile entity acts as a router and actively participates in routing services. However, routing protocols are not designed with security in mind and often are very vulnerable to node misbehavior. A malicious node included in a route between communicating nodes may severely disrupt the routing services and block the network traffic. In this thesis, we propose a solution for detecting malicious nodes in MANETs through a behavior-based analysis and using Bayesian filters and Markov chains. The core idea of our solution is to evaluate the behavior of a node based on its interaction with its neighbors using a completely decentralized scheme. Moreover, a stochastic model is used to predict the nature of behavior of a node and verify its reliability prior to selecting a path. Our solution has been validated through extensive simulations using the NS-2 simulator. The results show that the proposed solution ensures an accurate detection of malicious nodes and improve the quality of routing services in MANETs