{"id":5061,"date":"2026-02-20T11:21:14","date_gmt":"2026-02-20T10:21:14","guid":{"rendered":"https:\/\/irtnanoelec.fr\/?post_type=actualite&#038;p=5061"},"modified":"2026-04-02T11:06:49","modified_gmt":"2026-04-02T09:06:49","slug":"detection-of-abnormal-behaviorin-critical-embedded-systems","status":"publish","type":"actualite","link":"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/","title":{"rendered":"Detection of abnormal behavior in critical embedded systems"},"content":{"rendered":"    <section class=\" section-block push-edito \" id=\"block-block_85fdac085a98ee3c49b9adc916f8e2aa\">\n        <div class=\"container\">\n            <div class=\"flex gap-6 items-center flex-md-column-reverse\">\n                                <div class=\"bg-neutral-0 z-9 flex justify-center flex-column col-sm-12 flex-1\">\n                    <h2 class=\"heading-m neutral-800 mb-4\"><span class=\"block mb-6 h-4 w-64 bg-brand-lightest\"><\/span>D\u00e9tecter les comportements anormaux des syst\u00e8mes embarqu\u00e9s critiques<\/h2><div class=\"description\"><p>Les syst\u00e8mes embarqu\u00e9s au sein d\u2019infrastructures critiques sont des cibles privil\u00e9gi\u00e9es des cyberattaquants. Plus vuln\u00e9rables que les syst\u00e8mes informatiques traditionnels, ils impliquent un risque nettement plus \u00e9lev\u00e9 de pertes \u00e9conomiques, mat\u00e9rielles et humaines. Sont concern\u00e9s les secteurs industriels critiques comme les transports, les dispositifs m\u00e9dicaux connect\u00e9s, l\u2019industrie 4.0, la d\u00e9fense, le spatial ainsi que les villes et r\u00e9seaux intelligents.<\/p>\n<p>Dans le cadre de Nanoelec, le CEA-Leti a d\u00e9velopp\u00e9 une solution eArgos qui renforce la cybers\u00e9curit\u00e9 des syst\u00e8mes embarqu\u00e9s pour des applications dites critiques en analysant leur comportement. Cette solution logicielle collecte des signaux internes de l\u2019objet connect\u00e9 au niveau du mat\u00e9riel (processeur, m\u00e9moire, etc.), du syst\u00e8me d\u2019exploitation, des applicatifs ou des donn\u00e9es m\u00e9tier. Ces donn\u00e9es alimentent ensuite une IA qui d\u00e9tecte tout \u00e9cart par rapport au comportement attendu.<\/p>\n<p>Con\u00e7u pour aider les centres d\u2019op\u00e9rations de s\u00e9curit\u00e9 \u00e0 prendre les d\u00e9cisions n\u00e9cessaires \u00e0 la mise hors de danger de leurs syst\u00e8mes, le logiciel eArgos d\u00e9tecte les comportements anormaux en temps r\u00e9el et alerte le serveur de contr\u00f4le de la menace d\u00e9tect\u00e9e suivant une \u00e9chelle de gravit\u00e9 pr\u00e9alablement d\u00e9finie.<\/p>\n<p>eArgos est dot\u00e9 de plusieurs innovations qui prot\u00e8gent les objets connect\u00e9s des cyberattaques \u2013 notamment des attaques du type zero day exploitant des vuln\u00e9rabilit\u00e9s encore non identifi\u00e9es ou non corrig\u00e9es :<\/p>\n<ul>\n<li>l\u2019extraction de signaux internes au syst\u00e8me pour en surveiller le comportement<\/li>\n<li>la d\u00e9tection en temps r\u00e9el des menaces, connues ou inconnues, \u00e0 l\u2019aide d\u2019algorithmes d\u2019intelligence artificielle d\u00e9ploy\u00e9s soit en local soit sur<br \/>\nun serveur s\u00e9curis\u00e9.<\/li>\n<\/ul>\n<p>Frugale et embarquable, la solution r\u00e9pond aux contraintes des syst\u00e8mes connect\u00e9s. Elle s&#8217;adresse auxfabricants d\u2019appareils critiques et les fournisseurs de solutions de cybers\u00e9curit\u00e9, quelle que soit leur taille,<\/p>\n<p>Le d\u00e9monstrateur eArgos actuel d\u00e9tecte les attaques bas\u00e9es sur les tactiques et techniques de MITRE ATT&amp;CK for ICS sur la r\u00e9plique d\u2019un syst\u00e8me de contr\u00f4le industriel. Un automate industriel peut int\u00e9grer un agent eArgos pour d\u00e9tecter d\u2019\u00e9ventuels actes malveillants et alerter le serveur.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_5057\" aria-describedby=\"caption-attachment-5057\" style=\"width: 892px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5057 size-full\" src=\"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/eArgos-1.jpg\" alt=\"\" width=\"892\" height=\"526\" srcset=\"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/eArgos-1.jpg 892w, https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/eArgos-1-300x177.jpg 300w, https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/eArgos-1-768x453.jpg 768w\" sizes=\"auto, (max-width: 892px) 100vw, 892px\" \/><figcaption id=\"caption-attachment-5057\" class=\"wp-caption-text\">Au centre: automate industriel pilotant un proc\u00e9d\u00e9 physique visualisable sur l\u2019\u00e9cran du bas et supervis\u00e9 par un SCADA (\u00e9cran du haut). Console gauche: lance des attaques ayant un impact sur l\u2019automate et sur le proc\u00e9d\u00e9 physique. Console droite: visualise en temps r\u00e9el le niveau de menace sur l\u2019automate.<\/figcaption><\/figure>\n<figure id=\"attachment_5055\" aria-describedby=\"caption-attachment-5055\" style=\"width: 1000px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5055 size-full\" src=\"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/TechFest2026.jpg\" alt=\"\" width=\"1000\" height=\"451\" srcset=\"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/TechFest2026.jpg 1000w, https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/TechFest2026-300x135.jpg 300w, https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/TechFest2026-768x346.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption id=\"caption-attachment-5055\" class=\"wp-caption-text\">Pr\u00e9sentation de eArgos au Tech&amp;Fest 2026 (Grenoble, f\u00e9vrier 2026) (c) CEA<\/figcaption><\/figure>\n<\/div>                <\/div>\n                \n                   \n            <\/div>\n        <\/div>\n    <\/section>\n    <div class=\"spacer hide-md h-20\"><\/div>\n    <div class=\"spacer hide show-md h-20\"><\/div>\n    <section class=\" section-block push-edito \" id=\"block-block_550b31750fdd3b5024b851b4b9420c1d\">\n        <div class=\"container\">\n            <div class=\"flex gap-6 items-center flex-md-column-reverse\">\n                                <div class=\"bg-neutral-0 z-9 flex justify-center flex-column col-sm-12 flex-1\">\n                    <h2 class=\"heading-m neutral-800 mb-4\"><span class=\"block mb-6 h-4 w-64 bg-brand-lightest\"><\/span>Open Science<\/h2><div class=\"description\"><p>HENDRICS n&#8217;est pas un guitariste mais un banc d\u2019essai HIL (hardware In the Loop) d\u00e9velopp\u00e9 par le CEA-Leti dans le cadre de Nanoelec, pour tester, \u00e9valuer et am\u00e9liorer des solutions de d\u00e9tection, r\u00e9ponse et r\u00e9cup\u00e9ration face aux cyberattaques.<\/p>\n<\/div>                        <div class=\"links-wrap mt-6 gap-4 flex flex-wrap\">\n                            <a href=\"https:\/\/github.com\/CEA-Leti\/HENDRICS\" class=\"bg-brand-default button text-white\" target=\"_blank\" rel=\"noopener\">Hendrics<\/a>                        <\/div>\n                                    <\/div>\n                \n                   \n            <\/div>\n        <\/div>\n    <\/section>\n    <div class=\"spacer hide-md h-20\"><\/div>\n    <div class=\"spacer hide show-md h-20\"><\/div>\n    <section class=\" section-block push-edito \" id=\"block-block_f8edcb5404723ede4769c22501fc53a6\">\n        <div class=\"container\">\n            <div class=\"flex gap-6 items-center flex-md-column-reverse\">\n                                <div class=\"bg-neutral-0 z-9 flex justify-center flex-column col-sm-12 flex-1\">\n                    <h2 class=\"heading-m neutral-800 mb-4\"><span class=\"block mb-6 h-4 w-64 bg-brand-lightest\"><\/span>Bibliographie<\/h2><div class=\"description\"><ul>\n<li>Breux, V., Thevenon, P.-H. (2025). Hardware Performance Counters for Anomaly Detection in Embedded Devices. HS3 workshop co-located at the ESORICS 2025 conference<\/li>\n<li>Arnoud, L. et al. (2025). HENDRICS: A Hardware-in-the-Loop Testbed for Enhanced Intrusion Detection, Response and Recovery of Industrial Control Systems. ANUBIS workshop co-located at the ESORICS 2025 conference.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>                <\/div>\n                \n                   \n            <\/div>\n        <\/div>\n    <\/section>\n","protected":false},"featured_media":5058,"template":"","meta":{"_acf_changed":true,"inline_featured_image":false},"categories":[21],"class_list":["post-5061","actualite","type-actualite","status-publish","has-post-thumbnail","hentry","category-confiance-numerique-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Detection of abnormal behavior in critical embedded systems - IRT Nanoelec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Detection of abnormal behavior in critical embedded systems - IRT Nanoelec\" \/>\n<meta property=\"og:url\" content=\"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"IRT Nanoelec\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-02T09:06:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/eArgos-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"892\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/\",\"url\":\"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/\",\"name\":\"Detection of abnormal behavior in critical embedded systems - IRT Nanoelec\",\"isPartOf\":{\"@id\":\"https:\/\/irtnanoelec.fr\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/eArgos-1.jpg\",\"datePublished\":\"2026-02-20T10:21:14+00:00\",\"dateModified\":\"2026-04-02T09:06:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/#primaryimage\",\"url\":\"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/eArgos-1.jpg\",\"contentUrl\":\"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/eArgos-1.jpg\",\"width\":892,\"height\":526},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/irtnanoelec.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Detection of abnormal behavior in critical embedded systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/irtnanoelec.fr\/en\/#website\",\"url\":\"https:\/\/irtnanoelec.fr\/en\/\",\"name\":\"IRT Nanoelec\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/irtnanoelec.fr\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/irtnanoelec.fr\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/irtnanoelec.fr\/en\/#organization\",\"name\":\"IRT Nanoelec\",\"url\":\"https:\/\/irtnanoelec.fr\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/irtnanoelec.fr\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2025\/07\/irt-nanoelec.svg\",\"contentUrl\":\"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2025\/07\/irt-nanoelec.svg\",\"width\":181,\"height\":89,\"caption\":\"IRT Nanoelec\"},\"image\":{\"@id\":\"https:\/\/irtnanoelec.fr\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Detection of abnormal behavior in critical embedded systems - IRT Nanoelec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/","og_locale":"en_US","og_type":"article","og_title":"Detection of abnormal behavior in critical embedded systems - IRT Nanoelec","og_url":"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/","og_site_name":"IRT Nanoelec","article_modified_time":"2026-04-02T09:06:49+00:00","og_image":[{"width":892,"height":526,"url":"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/eArgos-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/","url":"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/","name":"Detection of abnormal behavior in critical embedded systems - IRT Nanoelec","isPartOf":{"@id":"https:\/\/irtnanoelec.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/#primaryimage"},"image":{"@id":"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/eArgos-1.jpg","datePublished":"2026-02-20T10:21:14+00:00","dateModified":"2026-04-02T09:06:49+00:00","breadcrumb":{"@id":"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/#primaryimage","url":"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/eArgos-1.jpg","contentUrl":"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2026\/02\/eArgos-1.jpg","width":892,"height":526},{"@type":"BreadcrumbList","@id":"https:\/\/irtnanoelec.fr\/en\/actualite\/detection-of-abnormal-behaviorin-critical-embedded-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/irtnanoelec.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Detection of abnormal behavior in critical embedded systems"}]},{"@type":"WebSite","@id":"https:\/\/irtnanoelec.fr\/en\/#website","url":"https:\/\/irtnanoelec.fr\/en\/","name":"IRT Nanoelec","description":"","publisher":{"@id":"https:\/\/irtnanoelec.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/irtnanoelec.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/irtnanoelec.fr\/en\/#organization","name":"IRT Nanoelec","url":"https:\/\/irtnanoelec.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/irtnanoelec.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2025\/07\/irt-nanoelec.svg","contentUrl":"https:\/\/irtnanoelec.fr\/wp-content\/uploads\/2025\/07\/irt-nanoelec.svg","width":181,"height":89,"caption":"IRT Nanoelec"},"image":{"@id":"https:\/\/irtnanoelec.fr\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/irtnanoelec.fr\/en\/wp-json\/wp\/v2\/actualite\/5061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/irtnanoelec.fr\/en\/wp-json\/wp\/v2\/actualite"}],"about":[{"href":"https:\/\/irtnanoelec.fr\/en\/wp-json\/wp\/v2\/types\/actualite"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/irtnanoelec.fr\/en\/wp-json\/wp\/v2\/media\/5058"}],"wp:attachment":[{"href":"https:\/\/irtnanoelec.fr\/en\/wp-json\/wp\/v2\/media?parent=5061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/irtnanoelec.fr\/en\/wp-json\/wp\/v2\/categories?post=5061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}