Title |
Speakers |
Summary |
Topic Types |
(Keynote) Protecting Data on Smartphones & Tablets using Trusted Computing |
Stefan Saroiu
|
Smartphone and tablets have treasures of personal and highly sensitive data, such as our e-mails, ... |
|
BtleJuice: the Bluetooth Smart Man In The Middle Framework |
Damien Cauquil
|
A lot of Bluetooth Low Energy capable devices are spread since the last few years, ... |
|
Arybo : Manipulation, Canonicalization and Identification of Mixed Boolean-Arithmetic Symbolic Expressions |
Adrien Guinet
,
Ninon Eyrolles
,
Marion Videau
|
This article presents arybo , a tool that gives a bit-level symbolic representation of expressions ... |
|
Is Docker secure? |
Manideep Konakandla
|
The concept of containerization was in Linux from ages in the form of jails, zones, ... |
|
Improving dm-crypt performance for XTS-AES mode through extended requests: first results |
Vincent Roca
,
Levent Demir
,
Mathieu Thierry
|
Using dedicated hardware is common to accelerate crypto- graphic operations: complex operations are managed by ... |
|
Live session |
Doktor Vax
|
N/A |
|
M\'etamorphose.univ-nantes.fr |
Rémi Lehn
|
N/A |
|
Gorille : Another approach to binary code analysis |
Jean-yves Marion
|
N/A |
|
Scapy in 15 minutes |
Guillaume Valadon
|
N/A |
|