Thursday, December 4 10:00 - 10:30: REGISTRATION 10:30 - 11:00: CONGRESS OPENING REMARKS : LIMOS (Fraouk Toumani) ALMERYS (Laurent Caredda) Avergne Region (Alain Bussière) 11:15 - 12:15: PANEL: Dematerialization, data property and privacy Laurent Caredda – Président du directoire d’almerys Emmanuel Cudry – Président de Coffreo Bruno Couderc- Administrateur FNTC Laurent Coussonnet – Directeur d’IMAGINE - Sopra Group Chair: Franck RAYNAUD – Président du cluster Auvergne TIC 12:15 - 13:15: KEYNOTE Sébastien Canard (Orange) Advances in cryptology for trust and data services Slides Video Abstract : One of the main technical challenge regarding our daily life is the way to propose to consumers their usual services, while protecting their privacy. Cryptography is certainly one security tool than can answer to several open questions in this context, by the way of advanced tools going beyond traditional features. In this talk, we will first talk about the way to provide both accountability and anonymity for users of mobile services. We will then focus on the way to provide traditional manipulation of data stored on a safe or a cloud storage, while protecting the data by encrypting it. 13:15 - 14:00: LUNCH BREAK 14:00 - 15:00: SESSION 1: Privacy (Chair: Olivier Raynaud)
- Personal information privacy through security patterns and testing, by Loukmen Regainia Slides
- Multi-party Function Evaluation with Perfectly Private Audit Trail, by Edouard Cuvelier and Olivier Pereira Slides
- (Un)Safe Browsing, by Thomas Gerbet, Amrit Kumar and Cédric Lauradoux Slides
- Using Closed Frequent Itemsets for Implicit Authentication in Web Browsing, by Diyé Dia, Olivier Coupelon, Olivier Raynaud, Fabien Labernia and Yannick Loiseau Slides
- How to Design a Blacklist for a Password Meter, by Ludovic Jacquin, Amrit Kumar and Cédric Lauradoux Slides
- Formal Analysis of Electronic Exams, by Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini and Peter Y. A. Ryan Slides
- Hardware/Software Support for Securing Virtualization in Embedded Systems by Franck Bucheron, Arnaud Tisserand and Louis Rilling Slides Version longue
- Design of a platform for security interoperability of multi-source systems, by Khalifa Toumi, Fabien Autrel, Ana Cavalli and Sammy Haddad Slides
- On the Adaptation of Physical-layer Failure Detection Mechanisms to Handle Attacks against SCADA Systems, by Jose M. Rubio-Hernan and Joaquin Garcia-Alfaro Slides
- Beam me up, Scotty: identifying the individual behind a MAC address using Wi-Fi geolocation spoofing, by Célestin Matte and Mathieu Cunche Slides
- Fault enabled viruses against smart cards, by Samiya Hamadouche, Jean-Louis Lanet and Mohamed Mezghiche Slides
- Using static analysis to detect use-after-free on binary code, by Josselin Feist, Laurent Mounier and Marie- Laure Potet Slides
- Lazart: a symbolic approach for evaluating the robustness of secured codes against control flow fault injections, by Marie-Laure Potet, Laurent Mounier, Maxime Puys and Louis Dureuil Slides
- Genericity of a model-based intrusion testing method, by Aymerick Savary, Mathieu Lassale, Lanet Jean-Louis and Marc Frappier Slides
- Exploitation strategy of the MDPC-McEliece decryption failure, by Xavier Bultel Slides
- White-Box Security Notions for Symmetric Encryption Schemes, by Cécile Delerablée, Tancrède Lepoint, Pascal Paillier and Matthieu Rivain Slides
- Generating S-Boxes from semi-fields pseudo-extensions, by Jean-Guillaume Dumas and Jean-Baptiste Orfila Slides
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication, by Olivier Blazy, Eike Kiltz and Jiaxin Pan Slides
- Formal Verification of e-Reputation Protocols, by Ali Kassem, Pascal Lafourcade and Yassine Lakhnech Slides