Lun. 26 | Mar. 27 | Mer. 28 | |
08:00
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
|
8:30 - 9:00 (30min)
Accueil café
Hall
9:00 - 9:30 (30min)
Accueil
Forum
9:30 - 10:30 (1h)
Keynote - Julia Lawall
Forum
› Coccinelle: Empowering developers to make large-scale changes to their software
- Julia Lawall, Inria
09:30-10:30 (1h)
10:30 - 11:00 (30min)
Pause café
Hall
11:00 - 11:45 (45min)
Plénière - Shweta Shinde
Forum
› It's TEEtime: Bringing User Sovereignty to Smartphones
- Shweta Shinde, ETH Zurich
11:00-11:45 (45min)
11:45 - 13:15 (1h30)
Déjeuner
Hall
13:15 - 14:45 (1h30)
GT C2-SDM
Forum
› Data protection and privacy in a quantum world
- Sébastien Canard, Télécom Paris
13:15-14:00 (45min)
› Parameter Optimization & Larger Precision for (T)FHE
- Ilaria Chillotti, Zama - Damien Ligier, Zama
14:00-14:45 (45min)
13:15 - 14:45 (1h30)
GT PVP
Auditorium
› Third-party computations on trustworthy personal data management systems
- Nicolas Anciaux, INRIA - Petrus
13:15-14:00 (45min)
› Biométrie et respect de la vie privée : une réconciliation (im)possible ?
- Estelle Cherrier-Pawlowski, Ensicaen, Laboratoire GREYC, équipe SAFE
14:00-14:45 (45min)
14:45 - 15:15 (30min)
Pause café
Hall
15:15 - 16:45 (1h30)
GT C2-SDM
Forum
› Partage d'images JPEG secrètes
- Pauline Puteaux, CNRS, CRIStAL, Lille
15:15-15:45 (30min)
› Draco 3D object crypto-compression
- Bianca Jansen van Rensburg, LIRMM, Université de Montpellier, CNRS, France
15:45-16:05 (20min)
› Can printable unclonable codes be copied? Evaluating the performance of attacks and highlighting the role of the detector
- Iuliia Tkachenko, LIRIS, Lyon
16:05-16:25 (20min)
› Engagements flous non linéaires basés sur les codes de Kerdock
- Patrick LACHARME, ENSICAEN, Greyc, Caen
16:25-16:45 (20min)
15:15 - 16:45 (1h30)
GT PVP
Auditorium
› Quelques avancées en analyses de données multidimensionnelles respectueuses de la vie privée
- Jean-francois Couchot, Université de Franche-Comté, FEMTO-ST
15:15-16:00 (45min)
› Beyond infectious diseases, SPOT for privacy preserving traceability
- Nesrine Kaaniche, Telecom SudParis, SAMOVAR
16:00-16:45 (45min)
16:45 - 17:00 (15min)
Pause
Hall
17:00 - 18:00 (1h)
Présentation du PEPR Cybersécurité
Forum
18:00 - 19:00 (1h)
Cocktail
Hall
|
9:00 - 9:45 (45min)
Plénière - Andreas Uhl
Forum
› Impact of Deep Learning on Facial Data Security
- Andreas Uhl, University of Salzburg
09:00-09:45 (45min)
9:45 - 10:30 (45min)
Plénière - Oana Goga
Forum
› Making online political advertising safer
- Oana Goga, CNRS
09:45-10:30 (45min)
10:30 - 11:00 (30min)
Pause café
Hall
11:00 - 12:00 (1h)
Keynote - Shafi Goldwasser
Forum
› Constructing and deConstructing Trust in ML: A new Role for Cryptography Today
- Shafi Goldwasser, Massachusetts Institute of Technology, Weizmann Institute of Science
11:00-12:00 (1h)
12:00 - 12:45 (45min)
Forum Outils
Hall
12:45 - 14:00 (1h15)
Déjeuner
Hall
14:00 - 14:45 (45min)
Plénière - Frank Piessens
Forum
› Mitigating interrupt-driven attacks against enclaved execution
- Frank Piessens, KULeuven
14:00-14:45 (45min)
14:45 - 15:15 (30min)
Plénière
Forum
› Génération d'exploits utilisant des techniques de preuve formelle
- Guillaume Cluzel, TrustInSoft
14:45-15:15 (30min)
15:15 - 15:45 (30min)
Pause café
Hall
15:45 - 16:30 (45min)
Prix de thèse
Forum
16:30 - 18:00 (1h30)
Assemblée Générale
Forum
|
9:00 - 9:45 (45min)
Plénière - Duong Hieu Phan
Forum
› How to protect privacy with cryptographic methods
- Duong Hieu Phan, Télécom Paris
09:00-09:45 (45min)
9:45 - 10:30 (45min)
Plénière - Clémentine Maurice
Forum
› Micro-architectural attacks: from CPU to browser
- Clémentine Maurice, CNRS, CRIStAL, Lille
09:45-10:30 (45min)
10:30 - 11:00 (30min)
Pause café
Hall
11:00 - 11:45 (45min)
Plénière
Forum
› Missions de l'ANSSI
- Geoffroy Hermann, ANSSI
11:00-11:15 (15min)
› CRY.ME : un challenge de cryptographie sur une messagerie sécurisée
- Abdul Rahman TALEB, CryptoExperts - Thibauld FENEUIL, CryptoExperts
11:15-11:45 (30min)
11:45 - 12:15 (30min)
REDOCS
Forum
› Présentation de REDOCS
- Pascal Lafourcade, Laboratoire d'Informatique, de Modélisation et d'optimisation des Systèmes
11:45-11:50 (05min)
› MalAware: the beginning of a behavioral malware detection
- Dylan Marinho, Université de Lorraine, CNRS, Inria, LORIA, Nancy
11:50-12:15 (25min)
12:15 - 14:00 (1h45)
Déjeuner
Hall
14:00 - 15:30 (1h30)
GT MFS-SSLR
Forum
› Secure Distance Estimation - Proximity to Positioning
- Mridula Singh, CISPA
14:00-14:45 (45min)
› Security Testing of Stateful Systems
- Erik Poll, Radboud University
14:45-15:30 (45min)
14:00 - 15:30 (1h30)
GT SSM
Auditorium
› Problématiques modernes de la génération d'aléa véritable: étude approfondie d'un TRNG basé sur les PLLs
- Florent Bernard, Laboratoire Hubert Curien, Saint-Étienne - Nathalie Bochard, Laboratoire Hubert Curien, Saint-Étienne
14:00-14:45 (45min)
› Random numbers for Security Applications in Industrial Context
- Ugo Mureddu, ST Microelectronics, Rousset, France - Patrick Haddad, ST Microelectronics, Rousset, France
14:45-15:30 (45min)
15:30 - 16:00 (30min)
Pause café
Hall
16:00 - 17:30 (1h30)
GT MFS-SSLR
Forum
› An overview of the Jasmin language for High-Assurance & High-Speed Cryptography
- Benjamin Grégoire, Inria
16:00-16:45 (45min)
› DY Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing
- Lucca Hirschi, Inria
16:45-17:30 (45min)
16:00 - 17:30 (1h30)
GT SSM
Auditorium
› Génération de nombres aléatoires à base de dispositifs spintroniques et memristifs
- Ioana Vatajelu, TIMA, CNRS, UGA Grenoble, France
16:00-16:30 (30min)
› Chaotic MEMS-based TRNG
- Martial Defoort, TIMA, CNRS, Grenoble, France
16:30-17:00 (30min)
› Effets des différents bruits sur la variance d'Allan du jitter dans des RO: Expérimentation et émulation
- Licinius Benea, Direction de Recherche Technologique (CEA)
17:00-17:30 (30min)
|