Publications associées (8)

mu RAI: Securing Embedded Systems with Return Address Integrity

Mathias Josef Payer

Embedded systems are deployed in security critical environments and have become a prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly vulnerable due to a combination of limited resources and low level programming whic ...
INTERNET SOC2020

Viral Transfer and Inactivation through Zooplankton Trophic Interactions

Tamar Kohn, Virginie Bachmann, Xavier Fernandez Cassi, Margot Ninon Lauren Olive

Waterborne viruses are responsible for numerous diseases and are abundant in aquatic systems. Understanding the fate of viruses in natural systems has important implications for human health. This research quantifies the uptake of bacteriophage T4 and the ...
2020

On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-Spoofing

Sébastien Marcel, André Anjos, Amir Mohammadi

While face recognition systems got a significant boost in terms of recognition performance in recent years, they are known to be vulnerable to presentation attacks. Up to date, most of the research in the field of face anti-spoofing or presentation attack ...
2018

On the use of client identity information for face anti-spoofing

André Anjos, Ivana Chingovska

With biometrics playing the role of a password which can not be replaced if stolen, the necessity of establishing counter- measures to biometric spoofing attacks has been recognized. Regardless of the biometric mode, the typical approach of anti-spoofing s ...
2015

Anti-Spoofing: Face Databases

Sébastien Marcel, André Anjos, Ivana Chingovska

Datasets for the evaluation of face verification system vulnerabilities to spoofing attacks and for the evaluation of face spoofing countermeasures. ...
Springer US2014

Hypergraph Clustering for Better Network Traffic Inspection

Boi Faltings, Li Pu

Networked computing environments are subject to configuration errors, unauthorized users, undesired activities and attacks by malicious software. These can be detected by monitoring network traffic, but network administrators are overwhelmed by the amount ...
2011

The Cloud Will Change Everything

James Richard Larus

Cloud computing is fast on its way to becoming a meaningless, oversold marketing slogan. In the midst of this hype, it is easy to overlook the fundamental change that is occurring. Computation, which used to be confined to the machine beside your desk, is ...
2011

Malicious Users in Unstructured Networks

Georgios Theodorakopoulos

Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow the network protocol or not. While providing scalability benefits, this degrade ...
2007

Graph Chatbot

Chattez avec Graph Search

Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.

AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.