Wednesday, June 22, 2022

Time Event (+)
08:30 - 09:00 Welcome desk and coffee (Hall)  
09:00 - 09:15 Welcome (Forum) - Caroline Fontaine  
09:15 - 09:30 Introduction (Forum) - Ali Charara (CNRS, INS2I)  
09:30 - 10:30 Keynote (Forum) (+)  
09:30 - 10:30 › Three decades of cybersecurity policy: lessons learned - Bart Preneel, ESAT, KU Leuven  
10:30 - 11:00 Coffee break (Hall)  
11:00 - 11:45 Plenary talks (Forum) (+)  
11:00 - 11:45 › Increasing the Integrity of the Open Source Software Supply Chain with Reproducible Builds - Stefano Zacchiroli, Laboratoire Traitement et Communication de lÍnformation  
11:45 - 12:30 Plenary talks (Forum) (+)  
11:45 - 12:30 › Embedded systems security: where hardware can take place to detect and mitigate software attacks - Guy Gogniat, Lab-STICC  
12:30 - 14:00 Lunch (Hall)  
14:00 - 15:45 Cryptography and Coding (Amphithéâtre) (+)  
14:00 - 14:45 › Differential analysis of a cipher using Constraint Programming - Marine Minier, Laboratoire Lorrain de Recherche en Informatique et ses Applications  
14:45 - 15:15 › Qu'est-ce qu'une attaque cryptographique ? - Charles Bouillaguet, LIP6  
15:15 - 15:45 › Cryptanalyses de logarithmes discrets - Gabrielle de Micheli, University of California  
14:00 - 15:30 Privacy and System, Softwares, Networks (Forum) (+)  
14:00 - 14:30 › Web Tracking: Online Ecosystem and Users' Perspective - Iskander Sanchez-Rola, Norton Research Group  
14:30 - 15:00 › La gestion des identités numériques : évolution et perspectives - Maryline Laurent, Télécom SudParis  
15:00 - 15:30 › An Overview Of Modern Windows Malware Analysis -- A Researcher's Perspective - Simone Aonzo, Eurecom [Sophia Antipolis]  
15:45 - 16:30 Coffee break (Hall)  
16:30 - 18:00 Cryptography and Coding (Amphithéâtre) (+)  
16:30 - 17:00 › Défis de la cryptographie embarquée - Guenaël Renault, ANSSI  
17:00 - 17:30 › Cryptanalysis of GEA (GPRS Encryption Algorithm) - Gaëtan Leurent, INRIA Paris  
17:30 - 18:00 › (Sequential) Aggregate Signatures Based on Lattices - Katharina Boudgoust, Aarhus University  
16:30 - 18:00 Privacy and System, Softwares, Networks (Forum) (+)  
16:30 - 17:30 › Browser fingerprinting: current research and the years ahead - Pierre Laperdrix, CRIStAL  

Thursday, June 23, 2022

Time Event (+)
08:45 - 10:30 Security and Multimedia (Amphithéâtre) (+)  
08:45 - 09:00 › Introduction - William Puech, Laboratoire dÍnformatique de Robotique et de Microélectronique de Montpellier  
09:00 - 09:45 › Adversarial Machine Learning - Fabio Roli, University of Genova, Director of PRALab, University of Cagliari  
09:45 - 10:30 › Malicious Facial Image Processing and Counter- Counter-measures: A review - Jean-Luc Dugelay, Eurecom [Sophia Antipolis]  
08:45 - 10:30 Formal Methods and Hardware Security (Forum) (+)  
09:00 - 09:45 › Principled foundations for microarchitectural security - Marco Guarnieri, IMDEA  
09:45 - 10:30 › Code analysis tools for fault injection robustness evaluation - Marie-Laure Potet, VERIMAG  
10:30 - 11:00 Coffee break (Hall)  
11:00 - 12:30 Security and Multimedia (Amphithéâtre) (+)  
11:00 - 11:30 › Generation and Detection of Deepfakes - Antitza Dantcheva, INRIA  
11:30 - 12:00 › Improving Deepfake Detection by Mixing Top Solutions of the DFDC - Anis Trabelsi, EURECOM  
12:00 - 12:30 › Hierarchical Learning and Dummy Triplet Loss for Efficient Deepfake Detection - Nicolas Beuve, Institut d\'Électronique et des Technologies du numéRique  
11:00 - 12:30 Formal Methods and Hardware Security (Forum) (+)  
11:00 - 11:45 › Armed cats: formal concurrency modelling at Arm - Jade Alglave, ARM  
11:45 - 12:30 › High-Level Synthesis for Hardware Implementation of Cryptography: Experience Feedback - Arnaud Tisserand, Lab-STICC  
12:30 - 14:00 Lunch (Hall)  
14:00 - 14:45 Plenary talks (Forum) (+)  
14:00 - 14:45 › Détection des altérations d'images photographiques et des images générées : deux approches spécifiques - Grégoire Mercier, ExomaKina  
14:45 - 15:30 Plenary talks (Forum) (+)  
14:45 - 15:30 › Signatures électroniques : le défi postquantique - Mehdi Tibouchi, NTT  
15:30 - 16:15 Coffee break (Hall)  
16:15 - 17:00 PhD Award (Forum) (+)  
16:15 - 17:00 › Quantum Algorithms for Cryptanalysis and Quantum-safe Symmetric Cryptography - André Schrottenloher, cwi  
17:00 - 18:30 general discussions about GDR (Forum)  
19:30 - 21:00 What to do with a PhD degree? (Amphithéâtre)  

Friday, June 24, 2022

Time Event (+)
09:00 - 09:45 Plenary talks (Forum) (+)  
09:00 - 09:45 › Computer-Aided Formal Security Analysis of the Web Platform - Matteo Maffei, TU Wien Informatics  
09:45 - 10:30 Plenary talks (Forum) (+)  
09:45 - 10:30 › Trusted Execution Environments meet Personal Data Management Systems - Iulian Sandu-Popa, DAVID  
10:30 - 11:00 Coffee break (Hall)  
11:00 - 11:30 REDOCS (Forum) (+)  
11:00 - 11:05 › Présentation de REDOCS - Pascal Lafourcade, Laboratoire d'Informatique, de Modélisation et d'optimisation des Systèmes  
11:05 - 11:30 › Risques des objets connectés sur la vie privée : l'analyse de doctorants en sécurité à REDOCS - Anaïs Barthoulot, Laboratoire dínformatique de l'École Polytechnique (LIX)  
11:30 - 12:00 Cyber Campus presentation (Forum) - Yann Bonnet  
12:00 - 14:00 Lunch (Hall)  
14:00 - 15:30 Partners Club of the GDR (open to anybody) (Amphithéâtre) (+)  
14:00 - 14:05 › Introduction - Olivier Bettan, Thales  
14:05 - 14:15 › Présentation de REDOCS - Pascal Lafourcade - LIMOS, Clermont Université  
14:15 - 14:45 › Retour d'expérience sur REDOCS 2022 - Sébastien Canard - Orange  
14:45 - 14:55 › Attentes et rôle du club des partenaires du GDR - Nicolas Porquet - CNRS  
14:55 - 15:30 › Table ronde "Gestion de crise" - Gilles Dusserre, Telecom Sud-Paris - Olivier Bettan, Thales - X X, ANSSI - Fabian Osmond, Cybi  
15:30 - 16:00 Coffee break (Hall)  
16:00 - 18:00 Partners Club of the GDR (open to anybody) (Forum) (+)  
16:00 - 18:00 › Stands outils et logiciels des laboratoires - - plusieurs outils, plateformes et logiciels développés dans les laboratoires, . - Frédéric Recoules, outil Binsec - Grégoire Menguy, outil Xyntia - Charlie Jacomme, outil Squirrel - Alice Minetto, outil Cyber Detect - Sylvain Cecchetto, outil Cyber Detect - Fabian Osmond, outil Cybi