{"id":29,"date":"2018-03-26T15:06:10","date_gmt":"2018-03-26T15:06:10","guid":{"rendered":"http:\/\/wp-systeme.lip6.fr\/jaif\/?page_id=29"},"modified":"2018-06-02T08:39:37","modified_gmt":"2018-06-02T08:39:37","slug":"programme","status":"publish","type":"page","link":"https:\/\/wp-systeme.lip6.fr\/jaif\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"<ul>\n<li><strong>9h30 &#8211; 10h<\/strong>\u00a0: accueil des participants autour d&rsquo;un caf\u00e9<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>10h &#8211; 10h15 <\/strong>\u00a0: <a href=\"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-content\/uploads\/sites\/8\/2018\/05\/JIF-LIP6_v2.pdf\"> mot des organisateurs <\/a><\/li>\n<li><strong>10h15 &#8211; 10h45<\/strong> :\u00a0<strong><strong>Guillaume Bouffard et David El Baze\u00a0<\/strong><\/strong>(ANSSI) :\u00a0<em>SoC, why should we care about Fault Injection Attacks ?<\/em>   <a href=\"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-content\/uploads\/sites\/8\/2018\/05\/GB-DE-29-05-18-JAIF.pdf\"> slides<\/a><\/li>\n<li><strong>10h45 &#8211; 11h15 :\u00a0<\/strong><strong>Alexandre Menu<\/strong>\u00a0 (Mines Saint-Etienne,\u00a0CEA-Tech) : <em>Fault instruction\u00a0skip injection into microcontrollers<\/em>   <a href=\"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-content\/uploads\/sites\/8\/2018\/05\/AM-jaif_290618_v1.pdf\"> slides <\/a><\/li>\n<li><strong>11h15 &#8211; 11h45 :\u00a0Karine Heydemann<\/strong> (LIP6 &#8211; Sorbonne Universit\u00e9) : <em>S\u00e9curisation logicielle contre les attaques en fautes<\/em> <a href=\"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-content\/uploads\/sites\/8\/2018\/05\/KH-29-05-2018-JAIF.pdf\"> slides <\/a><\/li>\n<li><strong>11h45 &#8211; 12h15 :\u00a0<\/strong><strong>Marie-Laure Potet<\/strong>\u00a0(Univ. Grenoble Alpes\/VERIMAG) <strong>et Lionel Morel<\/strong> (CEA\/DACLE): <em>Outils et benchmark pour l&rsquo;\u00e9valuation<br \/>\n<\/em>  <a href=\"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-content\/uploads\/sites\/8\/2018\/05\/benchMLP.pdf\"> slides partie bench <\/a> et <a href=\"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-content\/uploads\/sites\/8\/2018\/05\/bootloaderLM.pdf\"> slides partie bootloader <\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>12h30 &#8211; 14h :<\/strong> d\u00e9jeuner &#8211; discussion<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>14h &#8211; 14h30 : Sylvain Guilley<\/strong> (Telecom-Paristech \/ Secure-IC):<em>Accurate fault detection and classification based on embedded machine learning algorithms : Smart Monitor<\/em>   <a href=\"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-content\/uploads\/sites\/8\/2018\/06\/SIC_JAIF_20180529.pdf\"> slides <\/a><\/li>\n<li><strong>14h30 &#8211; 15h : Laurent Maingault<\/strong> (CEA-LETI) : <em>Nanofocused X-Ray Beam To Reprogram Secure Circuits<\/em> (papier prim\u00e9 \u00e0 CHES 2017)  <a href=\"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-content\/uploads\/sites\/8\/2018\/05\/X-rays-LM-jaif.pdf\">slides<\/a> <\/li>\n<li><strong>15h &#8211; 15h30 : Fabien Majeric<\/strong> (Gemalto) : \u00a0<em>EM injections on cryptographic implementations on SoC<br \/>\n<\/em> <a href=\"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-content\/uploads\/sites\/8\/2018\/05\/FM-JT-FIA29.05.2018.pdf\"> slides <\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>15h30 &#8211; 15h45 : Pause<br \/>\n<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>15h45 &#8211; 16h15 : S\u00e9bastien Carr\u00e9<\/strong> (Secure-IC et TELECOM-ParisTech) \u00a0 <em>Defeating OpenSSL CRT-RSA protections with fault attacks<\/em>   <a href=\"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-content\/uploads\/sites\/8\/2018\/05\/slidesSC-jaif.pdf\">slides<\/a><\/li>\n<li><strong>16h15 &#8211; 16h45 : Nisrine Jafri<\/strong> (TAMIS &#8211; IRISA) :<em>Bridging Hardware-Based and Software-Based Fault Injection Attacks<\/em>   <a href=\"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-content\/uploads\/sites\/8\/2018\/05\/Pr\u00e9sentationNJ-29-05.pdf\"> slides <\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>9h30 &#8211; 10h\u00a0: accueil des participants autour d&rsquo;un caf\u00e9 &nbsp; 10h &#8211; 10h15 \u00a0: mot des organisateurs 10h15 &#8211; 10h45 :\u00a0Guillaume Bouffard et David El Baze\u00a0(ANSSI) :\u00a0SoC, why should we care about Fault Injection Attacks ? slides 10h45 &#8211; 11h15 :\u00a0Alexandre Menu\u00a0 (Mines Saint-Etienne,\u00a0CEA-Tech) : Fault instruction\u00a0skip injection into microcontrollers slides 11h15 &#8211; 11h45 :\u00a0Karine &hellip; <a href=\"https:\/\/wp-systeme.lip6.fr\/jaif\/programme\/\" class=\"more-link\">Continuer la lecture de <span class=\"screen-reader-text\">Programme<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-29","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-json\/wp\/v2\/pages\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":39,"href":"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-json\/wp\/v2\/pages\/29\/revisions"}],"predecessor-version":[{"id":154,"href":"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-json\/wp\/v2\/pages\/29\/revisions\/154"}],"wp:attachment":[{"href":"https:\/\/wp-systeme.lip6.fr\/jaif\/wp-json\/wp\/v2\/media?parent=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}