In cybersecurity, newly-introduced software vulnerabilities must be detected immediately. The generic incremental analysis techniques recently integrated into Frama-C can verify code quickly after local modifications.
Read more
In fields like defense, industry, healthcare, and finance, data privacy is a major challenge. One promising avenue is using fullyhomomorphic encryption (FHE) to compute on encrypted data. However, to implement this approach, many hurdles must be overcome—ones that CEA-List has been working on for years.
Read more
With the development of quantum computers—and their threat to modern cryptography—post-quantum cryptography is gradually making inroads into the industrial ecosystem. HQC (Hamming Quasi-Cyclic) is one of the post-quantum encryption algorithms recently standardized by NIST.
Read more
Fuzzing, symbolic execution and abstract interpretation, amongst other techniques, enable us to uncover bugs in our programmes at an unprecedented rate. But this raises the question: what should we do with all these bugs?
Read more