Planning
Time |
Event |
|
08:30 - 09:00
|
Welcome desk and coffee (Hall) |
|
09:00 - 09:15
|
Welcome (Forum) - Caroline Fontaine |
|
09:15 - 09:30
|
Introduction (Forum) - Ali Charara (CNRS, INS2I) |
|
09:30 - 10:30
|
Keynote (Forum) |
|
09:30 - 10:30 |
› Three decades of cybersecurity policy: lessons learned - Bart Preneel, ESAT, KU Leuven |
|
10:30 - 11:00
|
Coffee break (Hall) |
|
11:00 - 11:45
|
Plenary talks (Forum) |
|
11:00 - 11:45 |
› Increasing the Integrity of the Open Source Software Supply Chain with Reproducible Builds - Stefano Zacchiroli, Laboratoire Traitement et Communication de lÍnformation |
|
11:45 - 12:30
|
Plenary talks (Forum) |
|
11:45 - 12:30 |
› Embedded systems security: where hardware can take place to detect and mitigate software attacks - Guy Gogniat, Lab-STICC |
|
12:30 - 14:00
|
Lunch (Hall) |
|
14:00 - 15:45
|
Cryptography and Coding (Amphithéâtre) |
|
14:00 - 14:45 |
› Differential analysis of a cipher using Constraint Programming - Marine Minier, Laboratoire Lorrain de Recherche en Informatique et ses Applications |
|
14:45 - 15:15 |
› Qu'est-ce qu'une attaque cryptographique ? - Charles Bouillaguet, LIP6 |
|
15:15 - 15:45 |
› Cryptanalyses de logarithmes discrets - Gabrielle de Micheli, University of California |
|
14:00 - 15:30
|
Privacy and System, Softwares, Networks (Forum) |
|
14:00 - 14:30 |
› Web Tracking: Online Ecosystem and Users' Perspective - Iskander Sanchez-Rola, Norton Research Group |
|
14:30 - 15:00 |
› La gestion des identités numériques : évolution et perspectives - Maryline Laurent, Télécom SudParis |
|
15:00 - 15:30 |
› An Overview Of Modern Windows Malware Analysis -- A Researcher's Perspective - Simone Aonzo, Eurecom [Sophia Antipolis] |
|
15:45 - 16:30
|
Coffee break (Hall) |
|
16:30 - 18:00
|
Cryptography and Coding (Amphithéâtre) |
|
16:30 - 17:00 |
› Défis de la cryptographie embarquée - Guenaël Renault, ANSSI |
|
17:00 - 17:30 |
› Cryptanalysis of GEA (GPRS Encryption Algorithm) - Gaëtan Leurent, INRIA Paris |
|
17:30 - 18:00 |
› (Sequential) Aggregate Signatures Based on Lattices - Katharina Boudgoust, Aarhus University |
|
16:30 - 18:00
|
Privacy and System, Softwares, Networks (Forum) |
|
16:30 - 17:30 |
› Browser fingerprinting: current research and the years ahead - Pierre Laperdrix, CRIStAL |
|
Time |
Event |
|
08:45 - 10:30
|
Security and Multimedia (Amphithéâtre) |
|
08:45 - 09:00 |
› Introduction - William Puech, Laboratoire dÍnformatique de Robotique et de Microélectronique de Montpellier |
|
09:00 - 09:45 |
› Adversarial Machine Learning - Fabio Roli, University of Genova, Director of PRALab, University of Cagliari |
|
09:45 - 10:30 |
› Malicious Facial Image Processing and Counter- Counter-measures: A review - Jean-Luc Dugelay, Eurecom [Sophia Antipolis] |
|
08:45 - 10:30
|
Formal Methods and Hardware Security (Forum) |
|
09:00 - 09:45 |
› Principled foundations for microarchitectural security - Marco Guarnieri, IMDEA |
|
09:45 - 10:30 |
› Code analysis tools for fault injection robustness evaluation - Marie-Laure Potet, VERIMAG |
|
10:30 - 11:00
|
Coffee break (Hall) |
|
11:00 - 12:30
|
Security and Multimedia (Amphithéâtre) |
|
11:00 - 11:30 |
› Generation and Detection of Deepfakes - Antitza Dantcheva, INRIA |
|
11:30 - 12:00 |
› Improving Deepfake Detection by Mixing Top Solutions of the DFDC - Anis Trabelsi, EURECOM |
|
12:00 - 12:30 |
› Hierarchical Learning and Dummy Triplet Loss for Efficient Deepfake Detection - Nicolas Beuve, Institut d\'Électronique et des Technologies du numéRique |
|
11:00 - 12:30
|
Formal Methods and Hardware Security (Forum) |
|
11:00 - 11:45 |
› Armed cats: formal concurrency modelling at Arm - Jade Alglave, ARM |
|
11:45 - 12:30 |
› High-Level Synthesis for Hardware Implementation of Cryptography: Experience Feedback - Arnaud Tisserand, Lab-STICC |
|
12:30 - 14:00
|
Lunch (Hall) |
|
14:00 - 14:45
|
Plenary talks (Forum) |
|
14:00 - 14:45 |
› Détection des altérations d'images photographiques et des images générées : deux approches spécifiques - Grégoire Mercier, ExomaKina |
|
14:45 - 15:30
|
Plenary talks (Forum) |
|
14:45 - 15:30 |
› Signatures électroniques : le défi postquantique - Mehdi Tibouchi, NTT |
|
15:30 - 16:15
|
Coffee break (Hall) |
|
16:15 - 17:00
|
PhD Award (Forum) |
|
16:15 - 17:00 |
› Quantum Algorithms for Cryptanalysis and Quantum-safe Symmetric Cryptography - André Schrottenloher, cwi |
|
17:00 - 18:30
|
general discussions about GDR (Forum) |
|
19:30 - 21:00
|
What to do with a PhD degree? (Amphithéâtre) |
|
Time |
Event |
|
09:00 - 09:45
|
Plenary talks (Forum) |
|
09:00 - 09:45 |
› Computer-Aided Formal Security Analysis of the Web Platform - Matteo Maffei, TU Wien Informatics |
|
09:45 - 10:30
|
Plenary talks (Forum) |
|
09:45 - 10:30 |
› Trusted Execution Environments meet Personal Data Management Systems - Iulian Sandu-Popa, DAVID |
|
10:30 - 11:00
|
Coffee break (Hall) |
|
11:00 - 11:30
|
REDOCS (Forum) |
|
11:00 - 11:05 |
› Présentation de REDOCS - Pascal Lafourcade, Laboratoire d'Informatique, de Modélisation et d'optimisation des Systèmes |
|
11:05 - 11:30 |
› Risques des objets connectés sur la vie privée : l'analyse de doctorants en sécurité à REDOCS - Anaïs Barthoulot, Laboratoire dínformatique de l'École Polytechnique (LIX) |
|
11:30 - 12:00
|
Cyber Campus presentation (Forum) - Yann Bonnet |
|
12:00 - 14:00
|
Lunch (Hall) |
|
14:00 - 15:30
|
Partners Club of the GDR (open to anybody) (Amphithéâtre) |
|
14:00 - 14:05 |
› Introduction - Olivier Bettan, Thales |
|
14:05 - 14:15 |
› Présentation de REDOCS - Pascal Lafourcade - LIMOS, Clermont Université |
|
14:15 - 14:45 |
› Retour d'expérience sur REDOCS 2022 - Sébastien Canard - Orange |
|
14:45 - 14:55 |
› Attentes et rôle du club des partenaires du GDR - Nicolas Porquet - CNRS |
|
14:55 - 15:30 |
› Table ronde "Gestion de crise" - Gilles Dusserre, Telecom Sud-Paris - Olivier Bettan, Thales - X X, ANSSI - Fabian Osmond, Cybi |
|
15:30 - 16:00
|
Coffee break (Hall) |
|
16:00 - 18:00
|
Partners Club of the GDR (open to anybody) (Forum) |
|
16:00 - 18:00 |
› Stands outils et logiciels des laboratoires - - plusieurs outils, plateformes et logiciels développés dans les laboratoires, . - Frédéric Recoules, outil Binsec - Grégoire Menguy, outil Xyntia - Charlie Jacomme, outil Squirrel - Alice Minetto, outil Cyber Detect - Sylvain Cecchetto, outil Cyber Detect - Fabian Osmond, outil Cybi |
|
|