Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Home

Welcome to the Digital Security Research Unit (DSRU), located at the Higher School of Communication of Tunis (Sup'Com), Tunis, Tunisia.
  • Partnership
    • University of Bordeaux - (France)
    • INRIA Lorraine - (France)
    • University of LAVAL - (Canada)
    • ENST Bretagne Rennes - (France)
    • Supelec Rennes - (France)
    • University of Nice Sophia Antipolis - (France)
    • University of Tsukuba - (Japan)
  • Research interests
    • Automated Reasoning
    • Algebraic specifications
    • Rewriting
    • Network Security
    • Cryptography
    • Validation of cryptographic protocols

Security Equipment Adviser

An innovative cross platform software for managing, auditing and correcting network security equipments. This software also allows :

  • The detection and correction of syntactical anomalies on security equipments configuration.
  • The checking and the correction of security equipments configuration (firewall, IDS, etc) with respect to security policies.
  • A Safe deployment of security policies in real time (without outage of services).


Our software present three variants depending on target users:



  • Integrated : installed on customers personnel computer (For small businesses).
  • Standalone : installed on a dedicated server (include many features and offer a higher performance that the integrated version) 
  • Web based version : for trial purposes.

Secure Zone

A tool which helps Windows administrators to monitor, to log security related activities on the client system and stop any kind of malicious activity detected. This Windows based tool monitors the activities of logon, of files I/O, devices, memory, etc. This tool has a graphical user interface, which allows system administrator to set up security policies and to view log files.

Features:

  • This software is a Windows based tool to handle "normal" and malicious system actions.
  • Administrator can setup a system to allow a user to use his/ her IKEY to logon to Microsoft® Windows® operating systems.
  • The GUI will allow administrator to setup security policies to control actions that he/she is interested in.
  • Administrator can select one, multiple or all actions to handle.
  • Administrator can save the logs in files, and view them later.



Hidden Cryptographic System

This system allows two persons to talk in real time with a higher level of security. Every message is encrypted and then hidden in a stream of data of harmless appearance. This system uses a new technique which combines the full power of cryptography and steganography.
We have also developed several protocols which allow guaranteeing confidentiality, authenticity and integrity. These protocols have all been formally verified.










File Protector

An easy-to-use file encryption software for personal and professional security. It allows protecting the privacy of sensitive files, folders, or messages, by encrypting them with our new patented algorithms and using any external memory device (such as flash drives) for authentication in a very new innovative cheaper way (instead of using expensive smartcards like I-keys or I-buttons).