› Détection d'intrusion fédérée, semi-supervisée et incrémentale pour l'IoMT «État de l'art» - Ahlem Harhad, MIS, UPJV, Amiens, France
15:40-16:00 (20min)
› Parallelized Derivation Algorithm for Anomaly Detection in Internet of Things Environments - Abdul Qadir Khan, Laboratoire de Recherche de l'EPITA
16:00-16:20 (20min)
› Architecture innovante de sécurité basée sur des éléments sécurisés en ligne - Pascal Urien, Laboratoire Traitement et Communication de lÍnformation
18:00-18:20 (20min)
› SPlorer: A Framework and GUI for Assembly File Analysis - Jack Royer, Sécurité à l'interface logiciel/matériel
18:20-18:40 (20min)
› Work In Progress: Bots, Bots Everywhere - Iliana Fayolle, Univ. Lille, CNRS, Inria
08:30-08:50 (20min)
› State Machine Issues in Network Stacks and Application to SSH - Olivier LEVILLAIN, Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux
08:50-09:10 (20min)
› Bridging Cybersecurity and Optimization in Future Mobile Network Design - Sameer Ali, Universitat Oberta de Catalunya [Barcelona]
09:10-09:30 (20min)
› Post-quantum DNSSEC - Hugo Mayer, Laboratoire de Recherche de l'EPITA
09:30-09:50 (20min)
› Augmenting Search-based Program Synthesis with Local Inference Rules to Improve Black-box Deobfuscation - Vidal Attias, Laboratoire Instrumentation Multi-TEChnique (CEA, LIST), Laboratoire Lorrain de Recherche en Informatique et ses Applications
10:00-10:20 (20min)
› Side Channels and Deep Neural Network Weights: Attacks, Defences and the Future to Come - Casalino Lorenzo, CentraleSupélec, Inria, Irisa, CNRS
10:20-10:40 (20min)
› Adversarial Agents: LLM-Powered Attacks and Defenses for Android Malware Detectors - Tianwei Lan, Laboratoire d'Informatique Paris Descartes - Farid NAIT-ABDESSELAM, Laboratoire d'Informatique Paris Descartes
10:40-11:00 (20min)
› GReAT-BeD: Graph Rewriting for Activity Tracking and (Malicious) Behaviour Detection - Antonin Verdier, Institut de recherche en informatique de Toulouse
11:00-11:20 (20min)
› Improving Code Understanding by Mixing Backward Bounded Symbolic Execution with Lattice-based Property - Nicolas Bellec, Laboratoire de Génie Logiciel (CEA, LIST)
11:20-11:40 (20min)