Trust & Security

Today, digital life is an integral part of our routines. But without security, this new component becomes a threat to our personal data, the normal operation of businesses, and the confidentiality of communications.

Labo bcom - confiance et securite
© Fred Pieau
The Trust & Security lab designs tools suited to the new challenges of cybersecurity: Preventing and detecting data leaks, isolating machines and virtualized networks, authenticating people and terminals.

Its work is guided by legal skills to anticipate changes to local, national, and international law frameworks so that it can offer suitable solutions. Ultimately, the laboratory’s goal is to offer transparent but tangible security, so that the Internet can become a trusted space.

Gaetan le Guelvoult - bcom
© Fred Pieau

Gaëtan Le Guelvouit

Trust & Security lab Manager

With our expertise in data protection, we can secure sensitive assets no matter where they are or what paths they take.
products & services
Terminal authentication - teaser produit - bcom b<>com Serenity

Multi-factor authentication using device fingerprinting

Tag_camera b<>com Tag

*Tag* protects images that protect you

Ultra marker - teaser fiche produit - bcom b<>com Ultra Marker

Video forensic watermarking

scientific publications


FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms

Browser fingerprinting consists into collecting attributes from a web browser. Hundreds of attributes have been discovered through the years. Each one of them provides a way to distinguish browsers, but also comes with a usability cost (e.g., additional collection time). In this work, we propose FPSelect, an attribute selection framework allowing verifiers to tune their browser fingerprinting…

read the publication


Formalization of a security access control model for the 5G system

The race for implementing communication services over 5G has already begun. For this, network coverage is needed and resource sharing is a way to achieve it. Therefore, each provider enforces its own security requirements. Under this scenario, it is necessary to consider security access mechanisms and policy rules, to regulate how interconnections are made between the shared network functions and…

read the publication


Algorithmes de placement de VNFs dans des contextes mono-et multi-propriétaire

Le concept de Network Functions Virtualisation (NFV) offre aux opérateurs réseau la possibilité de fournir des services évolutifs et moins onéreux, libérés des contraintes propres aux composants matériels. Dans les réseaux 5G, les fonctions ne doivent pas seulement être déployées dans de vastes datacenters centraux, mais également dans les réseaux edge. Nous proposons un algorithme permettant de…

read the publication


Optimisation du coût de déploiement de services réseau virtualisés dans le cloud

Les opérateurs de clouds publics offrent aux particuliers et aux entreprises la possibilité de louer des ressources in-formatiques pour répondreà leurs besoins sans investir dans leur propre matériel. Le concept de Network Functions Virtualisation (NFV) favorise la migration des opérateurs réseau de dispositifs matériels dédiés coûteux et peuévolutifs vers des fonctions réseau logicielles…

read the publication