‹ Friday, April 5, 2024 | |
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
|
›9:00 (1h)
9:00 - 10:00 (1h)
Keynote: Epistemic Verification of Information-Flow Properties in Programs
Ioana Boureanu
›10:00 (30min)
10:00 - 10:30 (30min)
Coffee break
›10:30 (50min)
10:30 - 11:20 (50min)
E-voting
Joseph Lallemand (session chair)
› Election Verifiability with ProVerif
- Véronique Cortier, CNRS, Loria
10:30-10:55 (25min)
› ProVerif Proofs over an Internet Voting System using Short Voting Codes
- Moser Florian, Inria Nancy - Grand Est
10:55-11:20 (25min)
›11:20 (50min)
11:20 - 12:10 (50min)
Trusted Execution Environment
Guillaume Scerri (session chair)
› A UC analysis of Android Protected Confirmation
- Maïwenn Racouchot, Inria
11:20-11:45 (25min)
› Practical Replay Attack on Intel's RA-TLS: A Formal Proof of Insecurity
- Muhammad Usama Sardar, TU Dresden
11:45-12:10 (25min)
›12:10 (20min)
12:10 - 12:30 (20min)
Business meeting
›12:30 (1h30)
12:30 - 14:00 (1h30)
Lunch
›14:00 (1h15)
14:00 - 15:15 (1h15)
Symbolic execution
Grégoire Menguy (session chair)
› Boosting the BINSEC symbolic execution engine: A France CyberSecurity Challenge journey
- Frédéric Recoules, CEA LIST
14:00-14:25 (25min)
› Attacker Control and Bug Prioritization
- Guilhem Lacombe, CEA LIST, Université Paris-Saclay
14:25-14:50 (25min)
› Inference of Robust Reachability Constraints
- Yanis Sellami, Laboratoire Sûreté des Logiciels
14:50-15:15 (25min)
›15:15 (30min)
15:15 - 15:45 (30min)
Coffee break
›15:45 (50min)
15:45 - 16:35 (50min)
Protocol analysis
Bruno Blanchet (session chair)
› Towards nonce-misuse resistant protocols
- Tristan Claverie, ANSSI, Institut National des Sciences Appliquées - Rennes, SYSTÈMES LARGE ÉCHELLE
15:45-16:10 (25min)
› Simulation multi-agent d'attaques sur protocoles distribués
- Erwan Mahe, CEA-LIST
16:10-16:35 (25min)
›16:35 (1h)
16:35 - 17:35 (1h)
Rump sessions
›19:30 (1h30)
19:30 - 21:00 (1h30)
Dinner
|
Session | Speech | Logistics | Break | Tour |