Poster Area

Welcome to the Cyber in Saclay poster area!

You will find below all the student posters. Please note that you can download the entire poster by clicking on the poster picture.

If you have already visited this webpage in the past, we highly recommend refreshing the page in order to get the latest updates.

CERTES Jonathan

Formally verified remote attestation for microprocessors

DANIEL Lesly-Ann

Efficient Relational Symbolic Execution for Spectre with Haunted RelSE

GIROL Guillaume

Getting rid of classes of false positives in symbolic execution

KISSI Salim Yahia

Detection of security vulnerabilities caused by safety bugs

LIU Yi

Linear Programming Bounds on the Kissing Number of Binary Codes

MAO Yuxiao

Using Reconfigurable Hardware for Attacks Detection

MARINHO Dylan

Guaranteeing Timed Opacity using Parametric Timed Model Checking

MENGUY Grégoire

Blackbox deobfuscation in a nutshell

MESSE Nan

Security by Design: An asset-based approach to bridge the gap between architects and security experts

MIRLIAZ Solene

Provable Cost Analysis of Cryptographic Code

MOREAU Solène

A method for proving unlinkability of stateful protocols