Slides and presentations
Accepted Presentations
- David Baelde, Adrien Koutsos, Joseph Lallemand.
A Higher-Order Indistinguishability Logic for Cryptographic Reasoning.
- Tristan Claverie.
A systematic study of Bluetooth key agreements with Tamarin.
- Vincent Cheval.
Unrestricting restrictions in ProVerif.
- Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens.
Provably Secure Speculation for the Constant-Time Policy.
- Vincent Diemunsch.
Formal analysis of security for the protocol OPC-UA v1.05.
- Soline Ducousso, Sébastien Bardin, Marie-Laure Potet.
Adversarial Reachability for Program-level Security Analysis.
- Éric Alata, Pierre-François Gimenez.
A theory of injection-based vulnerabilities in formal grammars.
- Alexandre Gonzalvez, Fabien Dagnat, Caroline Fontaine.
Quantization for opaque predicate location.
- Jean-Loup Hatchikian-Houdot, Guillaume Hiet, Pierre Wilke, Frédéric Besson.
Constant Time Security at a Low Cost for Embedded Systems Through Hardware/Software Cooperation.
- Leo Louistisserand.
Conception et vérification d’un protocole de vote par correspondance.
- Jannik Dreier, Pascal Lafourcade, Dhekra Mahmoud.
Attacking and Fixing Protocols using Exponentiation Mix-Net Automatically with Refined Models.
- Diego Oliveira, Marc Frappier.
Extending ASTD with real time.
- Jannik Dreier, Steve Kremer, Maïwenn Racouchot.
Enhancing Automation in Tamarin.
- Fortunat Rajaona, Ioana Boureanu.
Expressing and Verifying Privacy with Epistemic Logic.
- Pedro Moreno-Sanchez, Itsaka Rakotonirina, Clara Schneidewind.
Security Going Live: on the Verification of Real-Time Components of Security Protocols.
- Antonin Reitz, Aymeric Fromherz.
StarMalloc: A Modern, Security-Oriented Verified Memory Allocator.
- Muhammad Usama Sardar, Thomas Fossati, Simon Frost.
SoK: Attestation in Confidential Computing.
- Justine Sauvage, David Baelde, Adrien Koutsos.
Systematic translation of Cryptographic Axioms by Bi-deduction.
- Simon Tollec, Mihail Asavoae, Mathieu Jan, Damien Couroussé, Karine Heydemann.
Analysis of Fault Effects on Formal RISC-V Microarchitecture Models.
- Thomas Vigouroux, Cristian Ene, David Monniaux, Laurent Mounier, Marie-Laure Potet.
Max#SAT and adaptive attacker synthesis.
- Matthieu Baty, Guillaume Hiet, Pierre Wilke.
Formalising Hardware Security Mechanisms.
Some of the 5-min Talks
|