

{"id":68,"date":"2018-12-20T14:12:40","date_gmt":"2018-12-20T13:12:40","guid":{"rendered":"https:\/\/project.inria.fr\/grsrd2019\/?page_id=68"},"modified":"2019-03-25T23:18:01","modified_gmt":"2019-03-25T22:18:01","slug":"program","status":"publish","type":"page","link":"https:\/\/project.inria.fr\/grsrd2019\/program\/","title":{"rendered":"Program"},"content":{"rendered":"<p>9:00 &#8211; 9:30 Registration and Coffee<\/p>\n<p>9:30 &#8211; 9:40 Welcome<\/p>\n<p>9:40 &#8211; 11:00 Session 1 (Network and Web Security, chair: Lucca Hirschi):<\/p>\n<ul>\n<li>Laurent Evrard, J\u00e9r\u00f4me Fran\u00e7ois and Jean-No\u00ebl Colin. Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis<\/li>\n<li>Nicolas Schnepf, Remi Badonnel, Albdekader Lahmadi and Stephan Merz. Orchestration and verification of security functions for smart environments<\/li>\n<li>Jacomme Charlie and Steve Kremer. An extensive formal analysis of multi-factor authentication protocols<\/li>\n<li>Sebastian Roth and Ben Stock. Content Security Policy &#8211; A Shapeshifter\u2019s Tale<\/li>\n<\/ul>\n<p>11:00 &#8211; 11:20 Coffee break<\/p>\n<p>11:20 &#8211; 13:00 Session 2 (Software Security, chair: Jannik Dreier):<\/p>\n<ul>\n<li>David Pfaff and Michael Backes. Fool me twice: data-only attacks on source code malware classifers<\/li>\n<li>Kathrin Grosse, Thomas A. Trost, Marius Mosbach, Michael Backes and Dietrich Klakow. Adversarial Initialization \u2013 when your network performs the way I want \u2013<\/li>\n<li>Aurore Fass, Michael Backes and Ben Stock. HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs<\/li>\n<li>Sylvain Cecchetto. BOA: a Control Flow Graph builder (by Basic blOck Analysis) based on system state prediction<\/li>\n<li>Ziya A. Genc, Gabriele Lenzini and Peter Y. A. Ryan. Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware<\/li>\n<\/ul>\n<p>13:00 &#8211; 14:00 Lunch break<\/p>\n<p>14:00 &#8211; 15:20 Session 3 (Protocol Security &amp; Formal Methods, chair: Peter Roenne):<\/p>\n<ul>\n<li>Vincent Cheval, Steve Kremer and Itsaka Rakotonirina. Exploiting Symmetries when Proving Equivalence Properties for Security Protocols<\/li>\n<li>Ross Horne, Sjouke Mauw and Zach Smith. Yes, There is an Attack on Strong Unlinkability for the ICAO 9303 Basic Access Control Standard<\/li>\n<li>Joseph Lallemand and V\u00e9ronique Cortier. Voting: You Can&#8217;t Have Privacy without Individual Verifiability<\/li>\n<li>Sergiu Bursuc and Steve Kremer. Models for blockchain-based protocols<\/li>\n<\/ul>\n<p>15:20 &#8211; 15:40 Coffee break<\/p>\n<p>15:40 &#8211; 16:40 Session 4 (Cryptography, chair: Peter Y. A. Ryan):<\/p>\n<ul>\n<li>Hans van Ditmarsch, David Fernandez Duque, Vaishnavi Sundararajan, S.P. Suresh. Who holds the best card? Secure communication of optimal secret bits<\/li>\n<li>Christian Majenz, Christian Schaffner and Jeroen van Wier. Non-Malleability for Quantum Public-Key Encryption<\/li>\n<li>Jose Becerra and Dimiter Ostrev. Tightly Secure PAK(E)<\/li>\n<\/ul>\n<p>16:45 &#8211; 17:30 Invited Talk by David Naccache (ENS Paris): Missing Species in the Digital Signatures Zoo?<\/p>\n<p>17:30 Closing<\/p>\n","protected":false},"excerpt":{"rendered":"<p>9:00 &#8211; 9:30 Registration and Coffee 9:30 &#8211; 9:40 Welcome 9:40 &#8211; 11:00 Session 1 (Network and Web Security, chair: Lucca Hirschi): Laurent Evrard, J\u00e9r\u00f4me Fran\u00e7ois and Jean-No\u00ebl Colin. Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis Nicolas Schnepf, Remi Badonnel, Albdekader Lahmadi and Stephan Merz. Orchestration and\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/project.inria.fr\/grsrd2019\/program\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":1514,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-68","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/project.inria.fr\/grsrd2019\/wp-json\/wp\/v2\/pages\/68","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/project.inria.fr\/grsrd2019\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/project.inria.fr\/grsrd2019\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/grsrd2019\/wp-json\/wp\/v2\/users\/1514"}],"replies":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/grsrd2019\/wp-json\/wp\/v2\/comments?post=68"}],"version-history":[{"count":9,"href":"https:\/\/project.inria.fr\/grsrd2019\/wp-json\/wp\/v2\/pages\/68\/revisions"}],"predecessor-version":[{"id":110,"href":"https:\/\/project.inria.fr\/grsrd2019\/wp-json\/wp\/v2\/pages\/68\/revisions\/110"}],"wp:attachment":[{"href":"https:\/\/project.inria.fr\/grsrd2019\/wp-json\/wp\/v2\/media?parent=68"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}