Programme
Heures |
événement |
(+)
|
07:45 - 08:45
|
Petit déjeuner |
|
08:45 - 09:00
|
Bienvenue - Sébastien Bardin et Jannik Dreier |
|
09:00 - 10:00
|
Keynote: Semantic preservation of constant-time policies during compilation - Sandrine Blazy |
|
10:00 - 10:30
|
Pause café |
|
10:30 - 11:30
|
GT MFS - Protocol Verification 1 - Chair: Joseph Lallemand |
(+)
|
10:30 - 10:50 |
› Systematic, automated discovery of security protocol attacks that exploit weaknesses in common hash functions - Charlie Jacomme, CISPA |
|
10:50 - 11:10 |
› A comprehensive security analysis of the Belenios protocol and more - Alexandre Debant, Inria Nancy - Grand Est |
|
11:10 - 11:30 |
› Formal analysis of LAKE-EDHOC - Maïwenn Racouchot, Racouchot - Elise Klein, Klein |
|
11:30 - 11:50
|
Pause |
|
11:50 - 12:30
|
GT MFS - Cryptographic Implementations - Chair: Caroline Fontaine |
(+)
|
11:50 - 12:10 |
› Formal Verification Challenges on High-Speed Cryptographic Implementations - Miguel Quaresma, MPI-SP - Tiago Oliveira, MPI-SP |
|
12:10 - 12:30 |
› A CompCert Backend with Symbolic Encryption - Paolo Torrini - INRIA |
|
12:30 - 14:00
|
Déjeuner |
|
14:00 - 15:00
|
Keynote: Symbolic execution by compiling symbolic handling into binaries with SymCC and SymQEMU - Aurélien Francillon |
|
15:00 - 15:30
|
Pause café |
|
15:30 - 16:30
|
GT MFS - Static Analysis 1 - Chair: Michael Marcozzi |
(+)
|
15:30 - 15:50 |
› Improving Static Analysis Precision by Minimal Program Refinement - Charles Babu M, Univ. Paris-Saclay, CEA, List, Saclay, France |
|
15:50 - 16:10 |
› Assessing bug replicability for more security-minded bug finding - Guillaume Girol, Laboratoire Sûreté des Logiciels |
|
16:10 - 16:30 |
› Efficient Symbolic Algorithms for Software Verification Against Fault Attacks - Soline Ducousso, Univ. Paris-Saclay, CEA, List, Saclay, France |
|
16:30 - 17:00
|
Pause |
|
17:00 - 18:00
|
GT MFS - Program Verification 1 - Chair: Julien Signoles |
(+)
|
17:00 - 17:20 |
› Verifying Low-Level, Concurrent Programs with Steel - Aymeric Fromherz, Inria |
|
17:20 - 17:40 |
› Model Checking of Vulnerabilities in SmartContracts: A Solidity-to-CPN Approach Extended Abstract |
|
17:40 - 18:00 |
› Verifying Redundant-Check Based Countermeasures: A Case Study - Thibault Martin, CEA LIST - Nikolai Kosmatov, Thales Research and Technology - Virgile Prevosto, CEA LIST |
|
20:00 - 23:00
|
Banquet |
|
Heures |
événement |
(+)
|
07:45 - 09:30
|
Petit déjeuner |
|
09:30 - 15:00
|
Social Event: Découverte du massif de l'Esterel avec guides (bus + ballade). Pique-nique sur la plage à midi. - Social Event: Découverte du massif de l'Esterel avec guides (bus + ballade). Pique-nique sur la plage à midi. |
|
16:00 - 17:00
|
GT MFS - Static Analysis 2 - Chair: Nikolai Kosmatov |
(+)
|
16:00 - 16:20 |
› Analyse de contre-mesures dans le cadre d'attaques multiples - Etienne Boespflug, VERIMAG |
|
16:20 - 16:40 |
› Stack smashing analysis by abstract interpretation of binary code - Julien Forget, Analyse symbolique et conception orientée composants pour des systèmes embarqués temps-réel modulaires |
|
16:40 - 17:00 |
› Sound Static Analysis of Regular Expressions for Vulnerabilities to Denial of Service Attacks - Francesco Parolini, Sorbonne University |
|
17:00 - 17:30
|
Pause café |
|
17:30 - 18:10
|
GT MFS - Network Security - Chair: Marie-Laure Potet |
(+)
|
17:30 - 17:50 |
› Learning and Knowledge for Anomaly Detection - Yannick Chevalier, IRIT |
|
17:50 - 18:10 |
› Formal analysis of security issues in dynamic virtual networks - Pierre Le Scornet, Université de Rennes 1 |
|
18:45 - 19:45
|
Session Outils |
|
20:00 - 22:00
|
Dîner |
|
Heures |
événement |
(+)
|
07:45 - 09:00
|
Petit déjeuner |
|
09:00 - 10:00
|
Keynote: The security protocol verifier ProVerif and its major recent improvements - Bruno Blanchet |
|
10:00 - 10:30
|
Pause café |
|
10:30 - 11:30
|
GT MFS - Constant Time - Chair: Adrien Koutsos |
(+)
|
10:30 - 10:50 |
› Type-Directed Program Transformation for Constant-Time Enforcement - Gautier Raimondi, CELTIQUE |
|
10:50 - 11:10 |
› Structured Leakage and Applications to Cryptographic Constant-Time and Cost - Swarn Priya - Université Côte d'Azur, Inria Sophia Antipolis |
|
11:10 - 11:30 |
› End-to-end enforcement of fine-grained "cryptographic" constant-time policies - Basavesh Ammanaghatta Shivakumar - MPI-SP |
|
11:30 - 11:50
|
Pause |
|
11:50 - 12:30
|
GT MFS - Protocol Verification 2 - Chair: Yannick Chevalier |
(+)
|
11:50 - 12:10 |
› Vérification des mécanismes de sécurité des navigateurs Web - Benjamin Farinier, Sec&Priv, TU Wien |
|
12:10 - 12:30 |
› Equational Proofs for Distributed Cryptographic Protocols - Kristina Sojakova, Inria Paris |
|
12:30 - 14:00
|
Déjeuner |
|
15:30 - 16:00
|
Business Meeting |
|
16:00 - 16:30
|
Pause café |
|
16:30 - 17:30
|
GT MFS - Computational Verification - Chair: Steve Kremer |
(+)
|
16:30 - 16:50 |
› Mechanized Proofs of Adversarial Complexity and Application to Universal Composability - Adrien Koutsos, Programming securely with cryptography |
|
16:50 - 17:10 |
› A Formalization of the Proof of Correctness of a Number-Theoretic Transform in the Context of the Hakyber Cryptographic Primitive - Antoine Séré, Institut Polytechnique de Paris |
|
17:10 - 17:30 |
› CV2EC: Getting the Best of Two Worlds - Benjamin Grégoire, Inria Sophia Antipolis, Université Côte d'Azur |
|
17:30 - 18:00
|
Pause |
|
18:00 - 18:40
|
GT MFS - Program Verification 2 - Chair: Laurent Mounier |
(+)
|
18:00 - 18:20 |
› A General Framework for Supervisory Control of Opacity - Nour Souid, LIPN |
|
18:20 - 18:40 |
› Support for Detecting Integer Overflow Vulnerability - Salim Yahia Kissi, Kissi |
|
19:00 - 20:00
|
Rump Session |
|
20:00 - 22:00
|
Dîner |
|
|