3-5 Apr 2024 Saint Pierre d’Oléron (France)

Program

Wednesday, April 3, 2024

Time Event (+)
08:45 - 09:00 Opening words  
09:00 - 10:00 Keynote: Secure Compilation: Formal Foundations and (Some) Applications - Marco Patrignani  
10:00 - 10:30 Coffee break  
10:30 - 12:10 Protocol analysis - Alexandre Debant (session chair) (+)  
10:30 - 10:55 › Formal analysis of WideVine DRM in Tamarin - Joseph Lallemand, Irisa, CNRS, Univ Rennes  
10:55 - 11:20 › A Unified Symbolic Analysis of WireGuard - Dhekra Mahmoud, Laboratoire dÍnformatique, de Modélisation et dÓptimisation des Systèmes  
11:20 - 11:45 › Formal verification of the Lightning Network protocol - Léo Louistisserand, Université de Lorraine, CNRS, Inria, LORIA  
11:45 - 12:10 › Formal verification of the ETSI proposal on a standard QKD protocol - Thomas Prévost, Modèles Discrets pour les Systèmes Complexes, Signal, Images et Systèmes  
12:10 - 14:00 Lunch  
14:00 - 15:15 Program analysis - Julien Signoles (session chair) (+)  
14:00 - 14:25 › Black-box Precondition Inference through Constraint Acquisition - Grégoire Menguy, Direction de Recherche Technologique (CEA)  
14:25 - 14:50 › Precise and efficient memory analysis for low level languages - Julien Simonnet, CEA- Saclay  
14:50 - 15:15 › Extended abstract: Systematic Evaluation of Automated Tools for Side-Channel Vulnerability Detection in Cryptographic Libraries - Antoine Geimer, Univ Rennes, Univ Lille, CNRS, Inria  
15:15 - 15:45 Coffee break  
15:45 - 17:00 Hardware and side-channel - Sébastien Bardin (session chair) (+)  
15:45 - 16:10 › On Kernel Safety and Speculative Execution - Davide Davoli, Université Côte d'Azur, Inria  
16:10 - 16:35 › Proving Hardware Security of CPUs to Analyze Software Resistance against Faults Attacks - Simon Tollec, Université Paris-Saclay, CEA, List  
16:35 - 17:00 › Formalizing Hardware Security Mechanisms Using SMT Solvers - Pierre WILKE, CentraleSupelec  
17:00 - 19:00 Tool session  
19:30 - 21:00 Dinner  

Thursday, April 4, 2024

Time Event (+)
09:00 - 10:00 Keynote: DY Fuzzing: Putting a Dolev-Yao attacker in the fuzzing loop - Steve Kremer  
10:00 - 10:30 Coffee break  
10:30 - 12:10 Formal methods and cryptography - Charlie Jacomme (session chair) (+)  
10:30 - 10:55 › Proving e-voting mixnets in the CCSA model: zero-knowledge proofs and rewinding - Margot Catinaud, Laboratoire Méthodes Formelles  
10:55 - 11:20 › A Probabilistic Logic for Concrete Security - Théo Vignon, Laboratoire Méthodes Formelles  
11:20 - 11:45 › Secrecy by typing in the computational model - Clément Hérouard, Institut de Recherche en Informatique et Systèmes Aléatoires  
11:45 - 12:10 › Verification of security protocols : using SMT solvers in the Squirrel prover - Stanislas Riou, Université de Rennes  
12:10 - 14:00 Lunch  
14:00 - 18:00 Visite chateau d'Oléron  
18:30 - 19:30 Cocktail  
19:30 - 21:00 Banquet  

Friday, April 5, 2024

Time Event (+)
09:00 - 10:00 Keynote: Epistemic Verification of Information-Flow Properties in Programs - Ioana Boureanu  
10:00 - 10:30 Coffee break  
10:30 - 11:20 E-voting - Joseph Lallemand (session chair) (+)  
10:30 - 10:55 › Election Verifiability with ProVerif - Véronique Cortier, CNRS, Loria  
10:55 - 11:20 › ProVerif Proofs over an Internet Voting System using Short Voting Codes - Moser Florian, Inria Nancy - Grand Est  
11:20 - 12:10 Trusted Execution Environment - Guillaume Scerri (session chair) (+)  
11:20 - 11:45 › A UC analysis of Android Protected Confirmation - Maïwenn Racouchot, Inria  
11:45 - 12:10 › Practical Replay Attack on Intel's RA-TLS: A Formal Proof of Insecurity - Muhammad Usama Sardar, TU Dresden  
12:10 - 12:30 Business meeting  
12:30 - 14:00 Lunch  
14:00 - 15:15 Symbolic execution - Grégoire Menguy (session chair) (+)  
14:00 - 14:25 › Boosting the BINSEC symbolic execution engine: A France CyberSecurity Challenge journey - Frédéric Recoules, CEA LIST  
14:25 - 14:50 › Attacker Control and Bug Prioritization - Guilhem Lacombe, CEA LIST, Université Paris-Saclay  
14:50 - 15:15 › Inference of Robust Reachability Constraints - Yanis Sellami, Laboratoire Sûreté des Logiciels  
15:15 - 15:45 Coffee break  
15:45 - 16:35 Protocol analysis - Bruno Blanchet (session chair) (+)  
15:45 - 16:10 › Towards nonce-misuse resistant protocols - Tristan Claverie, ANSSI, Institut National des Sciences Appliquées - Rennes, SYSTÈMES LARGE ÉCHELLE  
16:10 - 16:35 › Simulation multi-agent d'attaques sur protocoles distribués - Erwan Mahe, CEA-LIST  
16:35 - 17:35 Rump sessions  
19:30 - 21:00 Dinner  
Online user: 2 Privacy
Loading...