gdr-secu-jn2025 : Journées Nationales 2025 du GDR Sécurité Informatique
23-25 juin 2025 Caen (France)
FR
EN
Connexion
Mot de passe oublié ?
Créer un compte
Navigation
Accueil
Programme
Code de Conduite
Speed mentoring
Inscription
Sponsors
Plan d'accès
Organisation
Social event
SUPPORT
@ Contact
Programme
Semaine
Lun. 23
Mar. 24
Mer. 25
Liste
Lun. 23
Mar. 24
Mer. 25
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
Déjeuner
11:30 - 12:45 (1h15)
Déjeuner
Hall
Accueil
12:45 - 13:00 (15min)
Accueil
Amphi 49
Keynote - Sandrine Blazy
13:00 - 14:00 (1h)
Keynote - Sandrine Blazy
Amphi 49
›
Verified compilation: towards zero-defect software
- Sandrine Blazy, Univ Rennes, Inria, CNRS, IRISA
13:00-14:00 (1h)
Prix de thèse
14:00 - 14:45 (45min)
Prix de thèse
›
Symmetric cryptanalysis: from primitives to modes
- Rachelle Heim Boissier, Université catholique de Louvain
14:00-14:45 (45min)
Pause café
14:45 - 15:15 (30min)
Pause café
Hall
Plénière - José Lopes Esteves
15:15 - 16:00 (45min)
Plénière - José Lopes Esteves
›
Electromagnetic interaction: threats for cybersecurity
- José Lopes Esteves, Wireless Security Lab, French Network and Information Security Agency
15:15-16:00 (45min)
Plénière - Stéphanie Delaune
16:00 - 16:45 (45min)
Plénière - Stéphanie Delaune
Amphi 49
›
Formal verification of security protocols: the Squirrel prover
- Stéphanie Delaune, Institut de Recherche en Informatique et Systèmes Aléatoires
16:00-16:45 (45min)
Mini pause
16:45 - 17:00 (15min)
Mini pause
Hall
Assemblée générale
17:00 - 18:30 (1h30)
Assemblée générale
Amphi 49
Keynote - Claudia Diaz
9:00 - 10:00 (1h)
Keynote - Claudia Diaz
Amphi 49
›
The Nym Network: Design and Challenges
- Claudia Diaz, COSIC, KU Leuven
09:00-10:00 (1h)
Pause café - speed mentoring
10:00 - 10:45 (45min)
Pause café - speed mentoring
Plénière - Nicolas Anciaux
10:45 - 11:30 (45min)
Plénière - Nicolas Anciaux
Amphi 49
›
LLMs and Privacy: from risk assessment to privacy enhancing tools
- Nicolas Anciaux, Concevoir des technologies d'amélioration de la vie privée explicables et efficaces
10:45-11:30 (45min)
Plénière - partenaire industriel
11:30 - 12:15 (45min)
Plénière - partenaire industriel
Amphi 49
Déjeuner - stands partenaires
12:15 - 13:40 (1h25)
Déjeuner - stands partenaires
Hall
REDOCS
13:40 - 14:10 (30min)
REDOCS
Amphi 49
›
Automating Attack Data Labeling with Generated Rules and Anomaly Detection
- Rémi Bouchayer, Institut Polytechnique de Paris
13:40-14:10 (30min)
GT C2
GT SSLR-SSM
14:15 - 15:45 (1h30)
GT C2
Amphi 44
›
The relevance and challenges of random probing security for post-quantum algorithms. Application to Raccoon signature scheme.
- Mélissa Rossi, CryptoExperts
14:15-15:00 (45min)
›
New efficiently decodable rank metric codes
- Rakhi Pratihar, INRIA & LIX
15:00-15:20 (20min)
›
Cryptography from Lossy Reductions: Towards OWFs from ETH, and Beyond
- Pouria Fallahpour, LIP6
15:25-15:45 (20min)
14:15 - 15:45 (1h30)
GT SSLR-SSM
Amphi 49
›
Compromising Electromagnetic Emanations: Side-Channel Leakages in (Connected) Embedded Devices
- Pierre Ayoub, Trustworthy systems: foundations and practices
14:15-15:00 (45min)
›
On the modelling of processor micro-architecture for masked software verification
- Karine Heydemann, Thales
15:00-15:45 (45min)
Pause café
15:45 - 16:15 (30min)
Pause café
Hall
GT C2
GT SSLR-SSM
16:15 - 17:45 (1h30)
GT C2
Amphi 44
›
Threshold Cryptography based on class groups of imaginary quadratic fields
- Guilhem Castagnos, Université de Bordeaux
16:15-17:00 (45min)
›
Randomness Delegation and its Connections with Secure Computation
- Mahshid Riahinia, Ecole Normale Supérieure
17:00-17:20 (20min)
›
Private Heavy-Hitters through Multi-Dealer Secret Sharing
- Gabrielle Becke, Exact Computing
17:25-17:45 (20min)
16:15 - 17:45 (1h30)
GT SSLR-SSM
Amphi 49
›
Partitionnement dynamique à grain fin contre des attaques par canaux auxiliaires exploitant les mémoires caches
- Vianney Lapôtre, Laboratoire Lab-STICC
16:15-17:00 (45min)
›
Secure compilation—with the compiler, not against: first experiments on 'Tracing LLVM'
- Sébastien Michelland, Laboratoire de Conception et d'Intégration des Systèmes
17:00-17:45 (45min)
Cocktail dînatoire au château de Caen
19:00 - 21:00 (2h)
Cocktail dînatoire au château de Caen
Le Mancel - Restaurant du Château de Caen
Plénière - Marta Gomez-Barrero
9:00 - 9:45 (45min)
Plénière - Marta Gomez-Barrero
Amphi 49
›
Impersonation Attacks on Biometric Recognition Systems
- Marta Gomez-Barrero, Universität der Bundeswehr München [Neubiberg]
09:00-09:45 (45min)
Plénière - Emmanuela Orsini
9:45 - 10:30 (45min)
Plénière - Emmanuela Orsini
Amphi 49
›
A Story of ZK Proofs: How Efficient ZK-Proofs Enable Signatures and New Applications
- Emmanuela Orsini, Bocconi University [Milan, Italy]
09:45-10:30 (45min)
Pause café
10:30 - 11:00 (30min)
Pause café
Hall
Plénière - Leyla Bilge
11:00 - 11:45 (45min)
Plénière - Leyla Bilge
Amphi 49
›
Demystifying Modern Scams; Breaking the Stigma and Building Resilience
- Leyla Bilge, Gen
11:00-11:45 (45min)
Rump Session
11:45 - 12:15 (30min)
Rump Session
Amphi 49
Déjeuner
12:15 - 13:15 (1h)
Déjeuner
Hall
Plénière - Ksenia Ermoshina
13:15 - 14:00 (45min)
Plénière - Ksenia Ermoshina
Amphi 49
›
A federated sovereignty: how European Union adopts decentralized secure messaging
- Ksenia Ermoshina, Centre Internet et Société
13:15-14:00 (45min)
GT SDM
GT PVP-MFS
14:00 - 15:30 (1h30)
GT SDM
Amphi 44
›
Evolving Digital Forensic Sciences
- Lena Klasén, Department of National Operations, Swedish Police Authority, Sweden and Information Coding, Department of Electrical Engineering, Linköping University
14:00-14:45 (45min)
›
Obscuration réversible de chiffres dans des images
- Valentin Noyé, LIRMM
14:45-15:30 (45min)
14:00 - 15:30 (1h30)
GT PVP-MFS
Amphi 49
›
Régulation et technologies : exemples d'actions et de questionnements à la CNIL
- Thibaud Antignac, Commission nationale de l'informatique des libertés
14:00-14:45 (45min)
›
Recent Advances in Metric Privacy
- Catuscia Palamidessi, Inria Saclay - Ile de France, Ecole Polytechnique
14:45-15:30 (45min)
Pause café
15:30 - 16:00 (30min)
Pause café
Hall
GT SDM
GT PVP-MFS
16:00 - 17:30 (1h30)
GT SDM
Amphi 44
›
PAD datasets: Constraints and hidden factors in their conception
- Peter Marsh, Equipe SAFE - Laboratoire GREYC - UMR6072
16:00-16:30 (30min)
›
Désapprentissage pour la Mitigation d'Attaques en Apprentissage et le Droit à l'Oubli sans Réentraînement Coûteux
- Achraf Kerzazi, Orange Innovation
16:30-17:00 (30min)
›
Leveraging Image Quality for Face PAD: IQA-Aware PAD
- Hamza Bouzid, Equipe SAFE - Laboratoire GREYC - UMR6072
17:00-17:30 (30min)
16:00 - 17:30 (1h30)
GT PVP-MFS
Amphi 49
›
Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol
- Alexandre Debant, Inria
16:00-16:45 (45min)
›
Formal Modeling with Account Access Graphs
- Saša Radomirović, Heriot-Watt University
16:45-17:30 (45min)
Vie privée
|
Accessibilité
Chargement...