Planning
Time |
Event |
|
09:15 - 09:30
|
Welcome (JL Lions 2) |
|
09:30 - 09:45
|
Welcome - SVP in a nutshell (JL Lions 2) - Stephanie Delaune |
|
09:45 - 10:15
|
Indistinguishability Beyond Diff-Equivalence in ProVerif (JL Lions 2) - Vincent Cheval |
|
10:15 - 10:45
|
Enhencing tamarin-prover automation (JL Lions 2) - Maiwenn Racouchot |
|
10:45 - 11:00
|
Coffee break (JL Lions 2) |
|
11:00 - 11:30
|
Formally verifying Kyber (JL Lions 2) - Vincent Laporte |
|
11:45 - 13:30
|
Lunch (restaurant le repaire) |
|
13:30 - 14:00
|
Precise bounds for the computationally complete symbolic attacker, the key to verifying an unbounded number of sessions ? (JL Lions 2) - Guillaume Scerri |
|
14:00 - 14:30
|
A systematic study of Bluetooth key agreements with Tamarin (JL Lions 2) - Tristan Claverie |
|
14:30 - 15:00
|
Sound Verification of Security Protocols: From Design to Interoperable Implementations (JL Lions 2) - Joseph Lallemand |
|
15:00 - 15:30
|
Coffee break (JL Lions 2) |
|
15:30 - 16:00
|
cybersecurity (JL Lions 2) - Benjamin Gregoire |
|
16:00 - 16:30
|
StarMalloc: A Modern, Security-Oriented Verified Memory Allocator (JL Lions 2) - Aymeric Fromherz |
|
16:30 - 17:15
|
overall operation of the project - Administrative update on the activity report |
|
|