EN FR
EN FR


Section: Dissemination

Animation of the scientific community

  • Hubert Comon-Lundh is director of the Parisian Master of Research in Computer Science (MPRI).

Program committee chairs:

  • 5th Workshop on Analysis of Security APIs ASA-5, Paris, June (Graham Steel).

Participation to program committes of conferences:

  • 20th European Symposium on Programming ESOP'11 (affiliated with ETAPS 2011), Saarbrücken, Germany, March-April 2011 (Jean Goubault-Larrecq)

  • Theory of Security and Applications Workshop TOSCA'11 (affiliated with ETAPS 2011), Saarbrücken, Germany, Germany, March-April 2011 (Graham Steel)

  • Workshop on Formal Methods and Cryptography CryptoForma'11, Limerick, Ireland, June 2011 (Graham Steel)

  • 24th IEEE Computer Security Foundations Symposium CSF'11, Domaine de l'Abbaye des Vaux de Cernay, France, June 2011 (Steve Kremer, general chair; Stéphanie Delaune)

  • 9th Annual Conference on Privacy, Security and Trust PST'11, Montréal, Québec, July 2011 (Steve Kremer)

  • 23rd International Conference on Automated Deduction, Wroclaw, Poland, July-August 2011 (Stéphanie Delaune)

  • 2nd International Conference on Runtime Verification RV'11, Berkeley, California, USA, September 2011 (Jean Goubault-Larrecq)

  • 9th International Workshop on Security Issues in Concurrency SecCo'11, Aachen, Germany, September 2011 (Stéphanie Delaune)

  • 8th International Workshop on Formal Aspects of Security and Trust FAST'11, Leuven, Belgium, September 2011 (Steve Kremer)

  • 18th ACM Conference on Computer and Communications Security CCS'11, Chicago, USA, October 2011 (Stéphanie Delaune)

  • 31st Conference on Foundations of Software Technology and Theoretical Computer Science FST&TCS'11, Mumbai, India, December 2011 (Stéphanie Delaune)

  • 27th Symposium On Applied Computing SAC'12 (security track), Riva del Garda (Trento), Italy March, 2012 (Graham Steel)

  • 16th International Conference on Foundations of Software Science and Computation Structures FoSSaCS'13, Rome, Italy, March 2013 (Jean Goubault-Larrecq).

Organization of conferences:

Steering committees of conferences:

  • Computer Security Foundations Conference CSF (Graham Steel, since 2010)

  • Conference on Principles of Security and Trust POST (Steve Kremer, since 2011)

  • IEEE Computer Security Foundations Symposium CSF (Steve Kremer, since 2010)

  • Workshop on Security and Rewriting Techniques SecReT (Steve Kremer, since 2010).

Selection committees: Chaire X/CNRS (Stéphanie Delaune); LaBRI, Bordeaux (Jean Goubault-Larrecq); Paris XIII (Hubert Comon-Lundh), Marseilles (Hubert Comon-Lundh), ENS Cachan (Hubert Comon-Lundh, president).

Evaluation committees:

  • French Delegation for Armaments (DGA), security of information systems, January (Jean Goubault-Larrecq)

  • AERES evaluation, LIF, Marseilles, January (Hubert Comon-Lundh)

Scientific boards:

  • CNRS INSII (Oct. 2010-Oct 2014, Hubert Comon-Lundh).

PhD defenses:

  • Mário S. Alvim, Formal Approaches to Information Hiding, École Polytechnique, October 12 (Stéphanie Delaune, member of the jury)

  • Mathilde Arnaud, Formal Verification of Secured Routing Protocols, ENS Cachan, December 13 (Stéphanie Delaune, PhD advisor; Jean Goubault-Larrecq, official PhD advisor)

  • Romain Bardou, Verification of Pointer Programs Using Regions and Permissions, Université Paris-Sud, October 14 (Jean Goubault-Larrecq, president of the jury)

  • Charles Bouillaguet, Etudes d’hypothèses algorithmiques et attaques de primitives cryptographiques, ENS Paris, September 2011 (Hubert Comon-Lundh, member of the jury)

  • A. Baskar, Decidability Results For Extended Dolev-Yao Theories, CMI, Chennai, India (Steve Kremer, reviewer)

  • Ştefan Ciobâcă, Automated Verification of Security Protocols with Applications to Electronic Voting, ENS Cachan, December 09 (Steve Kremer, PhD advisor; Jean Goubault-Larrecq, official PhD advisor)

  • Cezara Drăgoi, Automated Verification of Heap-Manipulating Programs on Infinite Data, University Paris 7, December 08 (Jean Goubault-Larrecq, rapporteur)

  • Nicolas Perrin, Footstep Planning for Humanoid Robots: Discrete and Continuous Approaches, Toulouse, October (Hubert Comon-Lundh, member of the jury)

  • Paul Poncet, Infinite-Dimensional Idempotent Analysis, The Role of Continuous Posets, Ecole Polytechnique, November 14 (Jean Goubault-Larrecq, member of the jury)

HDR defenses:

  • Yannick Chevalier, Logical Approach to Security in Distributed Systems, Toulouse, February (Hubert Comon-Lundh, rapporteur)

  • Stéphanie Delaune, Verification of security protocols: from confidentiality to privacy, ENS Cachan, March (Hubert Comon-Lundh, member of the jury)

  • Steve Kremer, Modelling and analyzing security protocols in cryptographic process calculi, ENS Cachan, March (Hubert Comon-Lundh, member of the jury)

  • Graham Steel, Formal Analysis of Security APIs, ENS Cachan, March (Hubert Comon-Lundh, member of the jury).

Invited talks:

  • Attacking and Fixing PKCS#11 Security Tokens, SICSA security workshop, University of Edinburgh, UK, May 24 (Graham Steel).

  • Attacking and Fixing PKCS#11 Security Tokens, Symposium sur la sécurité des technologies de l'information et des communications (SSTIC 2012), Rennes, France, June 9 (Graham Steel).

  • A Few Pearls in the Theory of Quasi-Metric Spaces, 5th Intl. Conf. Topology, Algebra, and Categories in Logic (TACL'11), Marseilles, France, July 30 (Jean Goubault-Larrecq).

  • Attacking and Fixing PKCS#11 Security Tokens, Santa's Crypto Workshop (SantaCrypt), Prague, Czech republic, December 1, (Graham Steel)

  • Cryptographic Devices: Formal Specification and Verification, Workshop on Formal Methods And Tools for Security (FMATS), Cambridge, UK, December 7 (Graham Steel)

Invitation to seminars:

  • Attacking and Fixing PKCS#11 Security Tokens, Formal Methods and Security Seminar, IRISA Rennes, France, January 7 (Graham Steel)

  • Attacking and Fixing PKCS#11 Security Tokens, Security Seminar, INRIA-Microsoft Joint Research Centre, Paris, France, January 11 (Graham Steel)

  • Formal Analysis of Security Protocols: The Case of Electronic Voting, Formal Methods seminar, Nancy, France, January 25 (Steve Kremer)

  • Model Checking Concurrent Programs with Nondeterminism and Randomization  [58] , LIAFA Seminar, University Paris Diderot, Paris, February 14 (Rohit Chadha)

  • Attacking and Fixing PKCS#11 Security Tokens, Security group seminar, IMDEA, Madrid, Spain, February 22 (Graham Steel)

  • On the Expressiveness and Complexity of Randomization in Finite State Monitors  [57] , University of Technology, Sydney, Australia, April 12 (Rohit Chadha)

  • On the Expressiveness and Complexity of Randomization in Finite State Monitors  [57] , LaBRI seminar, Bordeaux, France, May 18 (Rohit Chadha)

  • Continuous Random Variables [38] , PPS, University Paris Diderot, May 26 (Jean Goubault-Larrecq)

  • ORCHIDS, and Bad Weeds, Formal Methods and Security seminar, IRISA, Rennes, May 27 (Jean Goubault-Larrecq)

  • ORCHIDS, and Bad Weeds, CEA LIST, Saclay, June 09 (Jean Goubault-Larrecq)

  • Formal Analysis of Protocols Based on TPM State Registers [37] , Verimag, Grenoble, France, June 23 (Stéphanie Delaune)

  • Trace Equivalence Decision: Negative Tests and Non-determinism [31] , Dagstuhl seminar on Security and Rewriting, Dagstuhl, Germany, August 17 (Stéphanie Delaune)

  • Transforming Password Protocols to Compose [32] , Dagstuhl seminar on Security and Rewriting, Dagstuhl, Germany, August 15-17 (Steve Kremer)

  • A Procedure for Verifying Equivalence-Based Properties of Cryptographic Protocols, Dagstuhl seminar on Security and Rewriting, Dagstuhl, Germany, August 15-17 (Steve Kremer)

  • Formal Analysis of Security APIs, Security lab seminar, Nokia Research Centre, Beijing, August 24 (Graham Steel)

  • Trace Equivalence Decision: Negative Tests and Non-determinism [31] , seminar of the LIENS, ENS, Paris, France, October 12 (Vincent Cheval)

  • Transforming Password Protocols to Compose [32] , University of Luxembourg, October 18 (Steve Kremer)

  • Where is my Vote? - Formal Analysis of Electronic Voting Protocols, Formal Methods and Security seminar, IRISA, Rennes, November 18 (Steve Kremer)

  • Trace Equivalence Decision: Negative Tests and Non-determinism [31] , Formal Methods seminar, Nancy, France, November 15 (Vincent Cheval)

  • Analysing Security Protocols Using Process Algebra, PPS, University Paris Diderot, November 17 (Stéphanie Delaune)

  • Automated Verification of Cryptographic Protocols [48] , IIT Kanpur, India, December 06 (Rohit Chadha).

Popularization talks:

  • Big Brother Won't Watch Us, séminaire Unithé ou Café?, Parc Orsay Université, November 4 (Stéphanie Delaune)

  • Les protocoles cryptographiques: comment sécuriser nos communications ?, atelier, Journées Nationales de l'APMEP, Grenoble, France, October 23 (Stéphanie Delaune)

Visits:

  • Rohit Chadha visited the Department of Computer Science, University of illinois, Urbana-Champaign from January 17 to January 23.

  • Rohit Chadha was a visiting fellow at the University of Technology, Sydney from 28 March 2011 to 16 April.