Lutte Informatique d’Influence (L2I) / Fake News Detection, Generation, Prevention

In an era where information spreads at the speed of light and trust is constantly under siege, the proliferation of fake news poses a profound threat to our society’s fabric. 

The societal impact of our research direction on fake news cannot be overstated. By combating the erosion of trust and amplifying the voice of truth in an increasingly volatile digital landscape, we bolster the resilience of our critical networked infrastructures and uphold the fundamental principles of democracy, informed consent, and social cohesion. 

Together, let us rise to the challenge of defending truth in the digital age, ensuring that our interconnected world remains a bastion of integrity, reliability, and trustworthiness for generations to come.

Source: https://www.reddit.com/r/midjourney/comments/120vhdc/the_pope_drip/

Our research direction on fake news encompasses three pivotal pillars: generation, detection, and prevention.

  • Firstly, we delve into the intricacies of fake news generation, understanding the underlying mechanisms and technologies that enable its creation. By comprehensively analyzing the tactics employed by malicious actors, we aim to anticipate and counteract their efforts, thwarting the dissemination of misinformation before it takes root.
  • Secondly, our focus extends to the development of robust detection methodologies. Leveraging cutting-edge techniques from machine learning, natural language processing, and network analysis, we strive to identify and categorize fake news with unprecedented accuracy and efficiency. By empowering digital platforms and users with the tools to discern truth from falsehood, we fortify our collective defenses against manipulation and deception.
  • Lastly, we are dedicated to proactive prevention strategies aimed at inoculating our information ecosystem against the spread of fake news. Through interdisciplinary collaboration and engagement with stakeholders across academia, industry, and government, we seek to implement robust frameworks and protocols that promote transparency, accountability, and authenticity in online discourse.

News

[display-posts category=”L2I Fake News” image_size=”thumbnail” image_size=”medium” wrapper=”div” wrapper_class=”display-posts-listing grid”]

Publications

Show all

2021

Delcombel, Nicolas; Kabil, Alexandre; Duval, Thierry; Pahl, Marc-Oliver

CyberCopter: a 3D helical visualisation for periodic signals of cyber attacks Workshop

2021.

Abstract | BibTeX | Tags: Cybersecurity, Security, Virtual reality, Visual analytics, Visualization, Visualization application domains

2020

Bourget, Edwin; Cuppens, Frédéric; Cuppens-Boulahia, Nora

PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis Proceedings Article

In: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, pp. 30–41, ACM, New York, NY, USA, 2020, ISBN: 9781450376082.

Abstract | Links | BibTeX | Tags: countermeasures, Cyber-Physical Systems, diagnosis, event model, industrial systems, safety, Security

Mühlbauer, Nikolas; Kirdan, Erkin; Pahl, Marc Oliver; Carle, Georg

Open-Source OPC UA Security and Scalability Journal Article

In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, vol. 2020-Septe, pp. 262–269, 2020, ISSN: 19460759.

Abstract | Links | BibTeX | Tags: OPC UA, open-source, scalability, Security

Navas, Renzo E; Sandaker, Håkon; Cuppens, Frédéric; Cuppens, Nora; Toutain, Laurent; Papadopoulos, Georgios Z

IANVS: A Moving Target Defense Framework for a Resilient Internet of Things Journal Article

In: Proceedings - IEEE Symposium on Computers and Communications, vol. 2020-July, 2020, ISSN: 15301346.

Abstract | Links | BibTeX | Tags: attack, ChaCha20, CoAP, design, framework, hping3, IoT, LoPy4, Moving Target Defense, MTD, port-hopping, reconnaissance, Security, stream-cipher

Piccoli, A; Pahl, M-O; Wüstrich, L

Group Key Management in constrained IoT Settings Proceedings Article

In: Proceedings - IEEE Symposium on Computers and Communications, 2020, ISSN: 15301346.

Abstract | Links | BibTeX | Tags: autonomous management, constrained nodes, group key management, IoT, reliability, Security

2019

Pahl, Marc Oliver; Donini, Lorenzo

Giving IoT services an identity and changeable attributes Journal Article

In: 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019, no. section II, pp. 455–461, 2019, ISBN: 9783903176157.

Abstract | BibTeX | Tags: Autonomous service management, Certificates, IoT, Metadata, Microservices, Security, Unattended nodes, X.509

2018

Kome, Marco Lobe; Cuppens, Frederic; Cuppens-Boulahia, Nora; Frey, Vincent

CoAP Enhancement for a better IoT centric protocol: CoAP 2.0 Journal Article

In: 2018 5th International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018, pp. 139–146, 2018, ISBN: 9781538695852.

Abstract | Links | BibTeX | Tags: CoAP, Discovery, IoT, Publish/Subscribe, Security

Rooney, Vivien M; Foley, Simon N

What You Can Change and What You Can't: Human Experience in Computer Network Defenses Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11252 LNCS, pp. 219–235, 2018, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: CSIRT Human experience, psychology, Security, SOC

Pahl, Marc Oliver; Donini, Lorenzo

Securing IoT microservices with certificates Journal Article

In: IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, pp. 1–5, 2018, ISBN: 9781538634165.

Abstract | Links | BibTeX | Tags: Autonomous certificate management, Certificates, IoT, Microservices, Security, Unattended nodes, X.509

Pahl, Marc Oliver; Aubet, François Xavier; Liebald, Stefan

Graph-based IoT microservice security Journal Article

In: IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018, pp. 1–3, 2018, ISBN: 9781538634165.

Abstract | Links | BibTeX | Tags: Autonomous service management, firewall, IoT, Mi-croservices, Passive monitoring, Security, Unattended nodes

2017

Foley, Simon N

Getting security objectives wrong: A cautionary tale of an industrial control system Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10476 LNCS, pp. 18–29, 2017, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: cyber physical system, firewall, ind, SCADA, Security

Foley, Simon N

Getting security objectives wrong: A cautionary tale of an industrial control system Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10476 LNCS, pp. 18–29, 2017, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: cyber physical system, firewall, ind, SCADA, Security

Kome, Marco Lobe; Graa, Mariem; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Frey, Vincent

DIscovery and registration protocol: For device and person identity management in IoT Journal Article

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10717 LNCS, pp. 243–262, 2017, ISSN: 16113349.

Abstract | Links | BibTeX | Tags: Identity management, IoT, MQTT, OAuth, Security

Tools

People

Alexander Loth
Latest posts by Alexander Loth (see all)
    Marc-Oliver Pahl