Cybersecurity

Today, the number of cyberattacks continues to grow. With malware, identity theft, and other falsified content proliferating on ever more numerous and interconnected devices, the damage to people and industries are devastating. Since the creation of b<>com, cybersecurity has been one of the pillars of its innovation strategy via a cross-functional approach covering all its dimensions.

Labo bcom - confiance et securite
© Fred Pieau
b<>com experts design tools adapted to the new challenges of cybersecurity: prevention and detection of data leaks, authentication of people and terminals, and network infrastructures protection.

b<>com researchers and engineers develop technologies that improve the protection of people and their data. By enhancing authentication processes, the risk of online identity theft is minimized, and that of data leakage.

 

Our digital watermarking technologies authenticate video content, ensuring its integrity and traceability. An accurate detector for screening content and guaranteeing that no deepfakes have been applied.

 

Network infrastructures are providing manufacturers with an ever-increasing number of efficient applications. Protecting networks is, therefore, a crucial issue. This is why b<>com researchers have made network security a top priority, essential to guarantee the sovereignty and control of our industries.

Gaetan le Guelvoult - bcom
© Fred Pieau

Gaëtan Le Guelvouit

Trust & Security lab Manager

We develop sovereign technologies, i.e., controlled, robust, and independent cybersecurity solutions, tailored to the specific needs of our partners. We put our expertise at the service of digital confidence and resilience in an innovative environment.
products & services
Terminal authentication - teaser produit - bcom b<>com Serenity

Multi-factor authentication using device fingerprinting

Ultra marker - teaser fiche produit - bcom b<>com Ultra Marker

Video forensic watermarking

scientific publications

10.13.2020

FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms

Browser fingerprinting consists into collecting attributes from a web browser. Hundreds of attributes have been discovered through the years. Each one of them provides a way to distinguish browsers, but also comes with a usability cost (e.g., additional collection time). In this work, we propose FPSelect, an attribute selection framework allowing verifiers to tune their browser fingerprinting…

read the publication

10.19.2020

Formalization of a security access control model for the 5G system

The race for implementing communication services over 5G has already begun. For this, network coverage is needed and resource sharing is a way to achieve it. Therefore, each provider enforces its own security requirements. Under this scenario, it is necessary to consider security access mechanisms and policy rules, to regulate how interconnections are made between the shared network functions and…

read the publication

06.18.2020

Optimisation du coût de déploiement de services réseau virtualisés dans le cloud

Les opérateurs de clouds publics offrent aux particuliers et aux entreprises la possibilité de louer des ressources in-formatiques pour répondreà leurs besoins sans investir dans leur propre matériel. Le concept de Network Functions Virtualisation (NFV) favorise la migration des opérateurs réseau de dispositifs matériels dédiés coûteux et peuévolutifs vers des fonctions réseau logicielles…

read the publication

06.18.2020

Algorithmes de placement de VNFs dans des contextes mono-et multi-propriétaire

Le concept de Network Functions Virtualisation (NFV) offre aux opérateurs réseau la possibilité de fournir des services évolutifs et moins onéreux, libérés des contraintes propres aux composants matériels. Dans les réseaux 5G, les fonctions ne doivent pas seulement être déployées dans de vastes datacenters centraux, mais également dans les réseaux edge. Nous proposons un algorithme permettant de…

read the publication

contact

* champs obligatoires