![]() |
Mer. 08 | Jeu. 09 |
08:00
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
22:00
23:00
|
13:00 - 14:00 (1h)
Accueil
14:00 - 14:15 (15min)
Mot d'accueil
14:15 - 15:00 (45min)
Keynote 1 -- Cybersecurity in wireless networks at the 6G Era
Valeria Loscri
15:00 - 15:40 (40min)
Sécurité Système
› Attacker Control and Bug Prioritization
- Guilhem Lacombe, Verimag, Université Paris-Saclay, Université Grenoble Alpes
15:00-15:20 (20min)
› TinyML as a Service on Multi-Tenant Microcontrollers
- Bastien BUIL, CEDRIC. Réseaux et Objets Connectés, Orange Labs [Caen]
15:20-15:40 (20min)
15:40 - 16:20 (40min)
Sécurité Réseaux
› Détection d'intrusion fédérée, semi-supervisée et incrémentale pour l'IoMT «État de l'art»
- Ahlem Harhad, MIS, UPJV, Amiens, France
15:40-16:00 (20min)
› Parallelized Derivation Algorithm for Anomaly Detection in Internet of Things Environments
- Abdul Qadir Khan, Laboratoire de Recherche de l'EPITA
16:00-16:20 (20min)
16:20 - 16:30 (10min)
Pause café
16:30 - 17:00 (30min)
PEPR Cybersécurité
17:00 - 18:00 (1h)
Travaux de thèse
› Typebased Security Assurance In Operating Systems
-
17:00-17:20 (20min)
› Tulip: Finding Backdoors with Protocol-Aware Fuzzing
- Alexandre DOYEN, CEA-List
17:20-17:40 (20min)
› Fun with flags: How Compilers Break and Fix Constant-Time Code
- Antoine Geimer, Univ Rennes, Univ Lille, CNRS, Inria
17:40-18:00 (20min)
18:00 - 18:40 (40min)
Artefacts
› Architecture innovante de sécurité basée sur des éléments sécurisés en ligne
- Pascal Urien, Laboratoire Traitement et Communication de lÍnformation
18:00-18:20 (20min)
› SPlorer: A Framework and GUI for Assembly File Analysis
- Jack Royer, Sécurité à l'interface logiciel/matériel
18:20-18:40 (20min)
19:30 - 23:55 (4h25)
Dîner
|
8:00 - 8:30 (30min)
Accueil
8:30 - 9:50 (1h20)
Sécurité Réseaux
› Work In Progress: Bots, Bots Everywhere
- Iliana Fayolle, Univ. Lille, CNRS, Inria
08:30-08:50 (20min)
› State Machine Issues in Network Stacks and Application to SSH
- Olivier LEVILLAIN, Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux
08:50-09:10 (20min)
› Bridging Cybersecurity and Optimization in Future Mobile Network Design
- Sameer Ali, Universitat Oberta de Catalunya [Barcelona]
09:10-09:30 (20min)
› Post-quantum DNSSEC
- Hugo Mayer, Laboratoire de Recherche de l'EPITA
09:30-09:50 (20min)
9:50 - 10:00 (10min)
Pause café
10:00 - 11:40 (1h40)
Sécurité Système
› Augmenting Search-based Program Synthesis with Local Inference Rules to Improve Black-box Deobfuscation
- Vidal Attias, Laboratoire Instrumentation Multi-TEChnique (CEA, LIST), Laboratoire Lorrain de Recherche en Informatique et ses Applications
10:00-10:20 (20min)
› Side Channels and Deep Neural Network Weights: Attacks, Defences and the Future to Come
- Casalino Lorenzo, CentraleSupélec, Inria, Irisa, CNRS
10:20-10:40 (20min)
› Adversarial Agents: LLM-Powered Attacks and Defenses for Android Malware Detectors
- Tianwei Lan, Laboratoire d'Informatique Paris Descartes - Farid NAIT-ABDESSELAM, Laboratoire d'Informatique Paris Descartes
10:40-11:00 (20min)
› GReAT-BeD: Graph Rewriting for Activity Tracking and (Malicious) Behaviour Detection
- Antonin Verdier, Institut de recherche en informatique de Toulouse
11:00-11:20 (20min)
› Improving Code Understanding by Mixing Backward Bounded Symbolic Execution with Lattice-based Property
- Nicolas Bellec, Laboratoire de Génie Logiciel (CEA, LIST)
11:20-11:40 (20min)
11:40 - 12:25 (45min)
Keynote 2 -- Galaxie: An Efficient and Fault Tolerant Virtual Machine Observability Framework
Alain Tchanaa
12:25 - 15:45 (3h20)
Mot de Clôture
12:45 - 14:30 (1h45)
Déjeuner
|