lundi 23 juin 2025
Heures | événement | (+) |
11:30 - 12:45 | Déjeuner (Hall) | |
12:45 - 13:00 | Accueil (Amphi 49) | |
13:00 - 14:00 | Keynote - Sandrine Blazy (Amphi 49) | (+) |
13:00 - 14:00 | › Verified compilation: towards zero-defect software - Sandrine Blazy, Univ Rennes, Inria, CNRS, IRISA | |
14:00 - 14:45 | Prix de thèse | (+) |
14:00 - 14:45 | › Symmetric cryptanalysis: from primitives to modes - Rachelle Heim Boissier, Université catholique de Louvain | |
14:45 - 15:15 | Pause café (Hall) | |
15:15 - 16:00 | Plénière - José Lopes Esteves | (+) |
15:15 - 16:00 | › Electromagnetic interaction: threats for cybersecurity - José Lopes Esteves, Wireless Security Lab, French Network and Information Security Agency | |
16:00 - 16:45 | Plénière - Stéphanie Delaune (Amphi 49) | (+) |
16:00 - 16:45 | › Formal verification of security protocols: the Squirrel prover - Stéphanie Delaune, Institut de Recherche en Informatique et Systèmes Aléatoires | |
16:45 - 17:00 | Mini pause (Hall) | |
17:00 - 18:30 | Assemblée générale (Amphi 49) |
mardi 24 juin 2025
Heures | événement | (+) |
09:00 - 10:00 | Keynote - Claudia Diaz (Amphi 49) | (+) |
09:00 - 10:00 | › The Nym Network: Design and Challenges - Claudia Diaz, COSIC, KU Leuven | |
10:00 - 10:45 | Pause café - speed mentoring | |
10:45 - 11:30 | Plénière - Nicolas Anciaux (Amphi 49) | (+) |
10:45 - 11:30 | › LLMs and Privacy: from risk assessment to privacy enhancing tools - Nicolas Anciaux, Concevoir des technologies d'amélioration de la vie privée explicables et efficaces | |
11:30 - 12:15 | Plénière - partenaire industriel (Amphi 49) | |
12:15 - 13:40 | Déjeuner - stands partenaires (Hall) | |
13:40 - 14:10 | REDOCS (Amphi 49) | (+) |
13:40 - 14:10 | › Automating Attack Data Labeling with Generated Rules and Anomaly Detection - Rémi Bouchayer, Institut Polytechnique de Paris | |
14:15 - 15:45 | GT C2 (Amphi 44) | (+) |
14:15 - 15:00 | › The relevance and challenges of random probing security for post-quantum algorithms. Application to Raccoon signature scheme. - Mélissa Rossi, CryptoExperts | |
15:00 - 15:20 | › New efficiently decodable rank metric codes - Rakhi Pratihar, INRIA & LIX | |
15:25 - 15:45 | › Cryptography from Lossy Reductions: Towards OWFs from ETH, and Beyond - Pouria Fallahpour, LIP6 | |
14:15 - 15:45 | GT SSLR-SSM (Amphi 49) | (+) |
14:15 - 15:00 | › Compromising Electromagnetic Emanations: Side-Channel Leakages in (Connected) Embedded Devices - Pierre Ayoub, Trustworthy systems: foundations and practices | |
15:00 - 15:45 | › On the modelling of processor micro-architecture for masked software verification - Karine Heydemann, Thales | |
15:45 - 16:15 | Pause café (Hall) | |
16:15 - 17:45 | GT C2 (Amphi 44) | (+) |
16:15 - 17:00 | › Threshold Cryptography based on class groups of imaginary quadratic fields - Guilhem Castagnos, Université de Bordeaux | |
17:00 - 17:20 | › Randomness Delegation and its Connections with Secure Computation - Mahshid Riahinia, Ecole Normale Supérieure | |
17:25 - 17:45 | › Private Heavy-Hitters through Multi-Dealer Secret Sharing - Gabrielle Becke, Exact Computing | |
16:15 - 17:45 | GT SSLR-SSM (Amphi 49) | (+) |
16:15 - 17:00 | › Partitionnement dynamique à grain fin contre des attaques par canaux auxiliaires exploitant les mémoires caches - Vianney Lapôtre, Laboratoire Lab-STICC | |
17:00 - 17:45 | › Secure compilation—with the compiler, not against: first experiments on 'Tracing LLVM' - Sébastien Michelland, Laboratoire de Conception et d'Intégration des Systèmes | |
19:00 - 21:00 | Cocktail dînatoire au château de Caen - Le Mancel - Restaurant du Château de Caen |
mercredi 25 juin 2025
Heures | événement | (+) |
09:00 - 09:45 | Plénière - Marta Gomez-Barrero (Amphi 49) | (+) |
09:00 - 09:45 | › Impersonation Attacks on Biometric Recognition Systems - Marta Gomez-Barrero, Universität der Bundeswehr München [Neubiberg] | |
09:45 - 10:30 | Plénière - Emmanuela Orsini (Amphi 49) | (+) |
09:45 - 10:30 | › A Story of ZK Proofs: How Efficient ZK-Proofs Enable Signatures and New Applications - Emmanuela Orsini, Bocconi University [Milan, Italy] | |
10:30 - 11:00 | Pause café (Hall) | |
11:00 - 11:45 | Plénière - Leyla Bilge (Amphi 49) | (+) |
11:00 - 11:45 | › Demystifying Modern Scams; Breaking the Stigma and Building Resilience - Leyla Bilge, Gen | |
11:45 - 12:15 | Rump Session (Amphi 49) | |
12:15 - 13:15 | Déjeuner (Hall) | |
13:15 - 14:00 | Plénière - Ksenia Ermoshina (Amphi 49) | (+) |
13:15 - 14:00 | › A federated sovereignty: how European Union adopts decentralized secure messaging - Ksenia Ermoshina, Centre Internet et Société | |
14:00 - 15:30 | GT SDM (Amphi 44) | (+) |
14:00 - 14:45 | › Evolving Digital Forensic Sciences - Lena Klasén, Department of National Operations, Swedish Police Authority, Sweden and Information Coding, Department of Electrical Engineering, Linköping University | |
14:45 - 15:30 | › Obscuration réversible de chiffres dans des images - Valentin Noyé, LIRMM | |
14:00 - 15:30 | GT PVP-MFS (Amphi 49) | (+) |
14:00 - 14:45 | › Régulation et technologies : exemples d'actions et de questionnements à la CNIL - Thibaud Antignac, Commission nationale de l'informatique des libertés | |
14:45 - 15:30 | › Recent Advances in Metric Privacy - Catuscia Palamidessi, Inria Saclay - Ile de France, Ecole Polytechnique | |
15:30 - 16:00 | Pause café (Hall) | |
16:00 - 17:30 | GT SDM (Amphi 44) | (+) |
16:00 - 16:30 | › PAD datasets: Constraints and hidden factors in their conception - Peter Marsh, Equipe SAFE - Laboratoire GREYC - UMR6072 | |
16:30 - 17:00 | › Désapprentissage pour la Mitigation d'Attaques en Apprentissage et le Droit à l'Oubli sans Réentraînement Coûteux - Achraf Kerzazi, Orange Innovation | |
17:00 - 17:30 | › Leveraging Image Quality for Face PAD: IQA-Aware PAD - Hamza Bouzid, Equipe SAFE - Laboratoire GREYC - UMR6072 | |
16:00 - 17:30 | GT PVP-MFS (Amphi 49) | (+) |
16:00 - 16:45 | › Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol - Alexandre Debant, Inria | |
16:45 - 17:30 | › Formal Modeling with Account Access Graphs - Saša Radomirović, Heriot-Watt University |