Related publications (8)

On the Theory and Practice of Modern Secure Messaging

Daniel Patrick Collins

Billions of people now have conversations daily over the Internet. A large portion of this communication takes place via secure messaging protocols that offer "end-to-end encryption'" guarantees and resilience to compromise like the widely-used Double Ratc ...
EPFL2024

Midas: Systematic Kernel TOCTTOU Protection

Mathias Josef Payer, Atri Bhattacharyya, Uros Tesic

Double-fetch bugs are a plague across all major operating system kernels. They occur when data is fetched twice across the user/kernel trust boundary while allowing concurrent modification. Such bugs enable an attacker to illegally access memory, cause den ...
2022

BIAS: Bluetooth Impersonation AttackS

Daniele Antonioli

Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of devices. The Bluetooth standard includes a legacy authentication procedure and a secure authentication procedure, allowing devices to authenticate to each other usi ...
IEEE COMPUTER SOC2020

A Politics of Intellectual Property: The French Revolution and the Creation of a Patent System

Jérôme Baudry

Our understanding of the rise of intellectual property has been highly influenced by the tools and concepts of economic history and the lens of the Industrial Revolution. Looking at the case of France, this article examines the cultural and ideological ori ...
2020

A Politics of Intellectual Property Creating a Patent System in Revolutionary France

Jérôme Baudry

Economic interpretations, in particular the lens of the Industrial Revolution, have strongly influenced our understanding of the rise of intellectual property. This article examines the political origins of the 1791 patent law in France, which is usually s ...
JOHNS HOPKINS UNIV PRESS2020

Privacy-Enhancing Technologies for Mobile Applications and Services

Thi Van Anh Pham

Over a third of the world€™'s population owns a smartphone. As generic computing devices that support a large and heterogeneous collection of mobile applications (apps), smartphones provide a plethora of functionalities and services to billions of users. B ...
EPFL2019

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.