G. Merzdovnik, M. Huber, D. Buhov, N. Nikiforakis, S. Neuner et al., Block me if you can: A large-scale study of tracker-blocking tools, 2017 IEEE European Symposium on Security and Privacy, pp.319-333, 2017.

S. Haber, W. Scott, and . Stornetta, How to time-stamp a digital document, Journal of Cryptology, vol.3, issue.2, pp.99-111, 1991.

M. Ali, J. Nelson, R. Shea, and M. J. Freedman, Blockstack: A global naming and storage system secured by blockchains, 2016 USENIX Annual Technical Conference (USENIX ATC 16), pp.181-194, 2016.

, Robotics and connected autonomous vehicles

, At Inria most research around cybersecurity and robotics focuses on connected autonomous vehicles (CAV's). Connected cars are communicating with each other and also with external objects. Due to legacy issues, architectures do not isolate critical parts from non-critical ones. This makes CAV's vulnerable to both internal and external threats. Internal threats are generally due to sooware bugs or unsecured channels. External ones are due to remote attacks exploiting communication channels, We can partition robotics into four major application areas: self-operating robots (e.g., factory robots, robots to assist the elderly), remotely operated robots (e.g., surgical robots, drones)

, Direction Générale de l'Armement

, Agence Nationale de la Sécurité des Systèmes d'Information

, Laboratoire d'Innovation Numérique de la CNIL

, Commission Nationale de l'Informatique et des Libertés

A. Gdr, Groupement De Recherche) is a structure lead by CNRS to animate the French scientic academic research community in a particular area

, Forum International de la Cybersecurité