BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//SSTIC//sstic.org//FR
BEGIN:VEVENT
SUMMARY:Inscriptions
DTSTART;VALUE=DATE-TIME:20250604T083000
DTEND;VALUE=DATE-TIME:20250604T100000
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T083000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Ouverture 2025 : Sovereign Tech Agency: Investing in the Infrastru
 cture of the 21st Century (Tara Tarakiyee)
DTSTART;VALUE=DATE-TIME:20250604T100000
DTEND;VALUE=DATE-TIME:20250604T110000
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T100000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Pause
DTSTART;VALUE=DATE-TIME:20250604T110000
DTEND;VALUE=DATE-TIME:20250604T113000
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T110000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Kube\, Scale Me One More Time ! Exploiting Autoscalers for Kuberne
 tes Cluster Compromise (Alexandre Hervé\,Paul Viossat)
DTSTART;VALUE=DATE-TIME:20250604T113000
DTEND;VALUE=DATE-TIME:20250604T120000
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T113000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Argo CD Secrets (Nicolas Iooss)
DTSTART;VALUE=DATE-TIME:20250604T120000
DTEND;VALUE=DATE-TIME:20250604T121500
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T120000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Déjeuner à la Halle Martenot
DTSTART;VALUE=DATE-TIME:20250604T121500
DTEND;VALUE=DATE-TIME:20250604T141500
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T121500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Tous les chemins mènent à DROP : une évaluation de la sécurit
 é d’un mécanisme de routage du Bluetooth Mesh (Elies Tali\,Guillaume A
 uriol\,Romain Cayre\,Vincent Nicomette)
DTSTART;VALUE=DATE-TIME:20250604T141500
DTEND;VALUE=DATE-TIME:20250604T144500
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T141500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:We Have A Deal: we provide the lego bricks\, you build cool wirele
 ss attacks (Damien Cauquil\,Romain Cayre)
DTSTART;VALUE=DATE-TIME:20250604T144500
DTEND;VALUE=DATE-TIME:20250604T151500
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T144500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Récupération de la clé des firmwares radio du stm32wb55 (Thomas
  Cougnard)
DTSTART;VALUE=DATE-TIME:20250604T151500
DTEND;VALUE=DATE-TIME:20250604T154500
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T151500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Pause
DTSTART;VALUE=DATE-TIME:20250604T154500
DTEND;VALUE=DATE-TIME:20250604T161500
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T154500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:afl-cov-fast: code-coverage for AFL++ fuzzing campaigns (Jean-Roma
 in Garnier)
DTSTART;VALUE=DATE-TIME:20250604T161500
DTEND;VALUE=DATE-TIME:20250604T163000
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T161500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Pyrrha & Friends: Diving into Firmware Cartography (Eloïse Brocas
 \,Robin David)
DTSTART;VALUE=DATE-TIME:20250604T163000
DTEND;VALUE=DATE-TIME:20250604T164500
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T163000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:300 secondes chrono : prise de contrôle d’un infodivertissement
  automobile à distance (Guillaume Bouffard\,Philippe Trebuchet)
DTSTART;VALUE=DATE-TIME:20250604T164500
DTEND;VALUE=DATE-TIME:20250604T171500
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T164500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Identification d'images de micrologiciels (Ambre Iooss)
DTSTART;VALUE=DATE-TIME:20250604T171500
DTEND;VALUE=DATE-TIME:20250604T174500
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T171500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Cocktail à la Halle Martenot
DTSTART;VALUE=DATE-TIME:20250604T190000
DTEND;VALUE=DATE-TIME:20250604T200000
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250604T190000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Accueil
DTSTART;VALUE=DATE-TIME:20250605T090000
DTEND;VALUE=DATE-TIME:20250605T093000
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250605T090000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Eurydice : guichet de diodes opensource par l'ANSSI (Grégoire Mol
 veau)
DTSTART;VALUE=DATE-TIME:20250605T093000
DTEND;VALUE=DATE-TIME:20250605T094500
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250605T093000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Wirego - Un framework de développement de plugins Wireshark (Beno
 it Girard)
DTSTART;VALUE=DATE-TIME:20250605T094500
DTEND;VALUE=DATE-TIME:20250605T100000
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250605T094500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:apkpatcher : Fast analysis and modification to Android application
 s without root access or emulation. (Benoît Forgette)
DTSTART;VALUE=DATE-TIME:20250605T100000
DTEND;VALUE=DATE-TIME:20250605T101500
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250605T100000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Analysez des logiciels malveillants plus rapidement avec hrtng (Ge
 orgy Kucherin)
DTSTART;VALUE=DATE-TIME:20250605T101500
DTEND;VALUE=DATE-TIME:20250605T103000
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250605T101500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Pause
DTSTART;VALUE=DATE-TIME:20250605T103000
DTEND;VALUE=DATE-TIME:20250605T110000
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250605T103000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Analyzing the Windows kernel shadow stack mitigation (Alexandre Au
 lnette\,Rémi Jullian)
DTSTART;VALUE=DATE-TIME:20250605T110000
DTEND;VALUE=DATE-TIME:20250605T113000
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250605T110000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:L’outillage réseau Windows : une affaire d’implémentation (G
 abriel Potter)
DTSTART;VALUE=DATE-TIME:20250605T113000
DTEND;VALUE=DATE-TIME:20250605T120000
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250605T113000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Déjeuner à la Halle Martenot
DTSTART;VALUE=DATE-TIME:20250605T120000
DTEND;VALUE=DATE-TIME:20250605T141500
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250605T120000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Mofos\, framework de manipulation de machines virtuelles (Florian 
 Guilbert)
DTSTART;VALUE=DATE-TIME:20250605T141500
DTEND;VALUE=DATE-TIME:20250605T143000
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250605T141500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Les politiques d'accès conditionnel Azure : un monde aux mille me
 rveilles (Matthieu Barjole\,Paul Barbé)
DTSTART;VALUE=DATE-TIME:20250605T143000
DTEND;VALUE=DATE-TIME:20250605T144500
DTSTAMP;VALUE=DATE-TIME:20260418T175950Z
UID:20250605T143000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Retour d’expérience sur la montée en compétence d’un cabine
 t d’audit en cryptographie post-quantique (Alexandre Brenner\,Antoine Gi
 cquel)
DTSTART;VALUE=DATE-TIME:20250605T144500
DTEND;VALUE=DATE-TIME:20250605T151500
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250605T144500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Pause
DTSTART;VALUE=DATE-TIME:20250605T151500
DTEND;VALUE=DATE-TIME:20250605T154500
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250605T151500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Solution du challenge
DTSTART;VALUE=DATE-TIME:20250605T154500
DTEND;VALUE=DATE-TIME:20250605T164500
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250605T154500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Pause
DTSTART;VALUE=DATE-TIME:20250605T164500
DTEND;VALUE=DATE-TIME:20250605T170000
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250605T164500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Rumps
DTSTART;VALUE=DATE-TIME:20250605T170000
DTEND;VALUE=DATE-TIME:20250605T190000
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250605T170000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Social Event à la Halle de la Courrouze
DTSTART;VALUE=DATE-TIME:20250605T200000
DTEND;VALUE=DATE-TIME:20250606T000000
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250605T200000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Accueil
DTSTART;VALUE=DATE-TIME:20250606T090000
DTEND;VALUE=DATE-TIME:20250606T093000
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250606T090000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:QUIC : de la RFC au monde sauvage (Chloé Huet - Le Rumeur)
DTSTART;VALUE=DATE-TIME:20250606T100000
DTEND;VALUE=DATE-TIME:20250606T101500
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250606T100000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:soxy: a suite of services over Citrix\, VMware Horizon and native 
 Windows RDP (Arnaud Fontaine\,Jean-Romain Garnier\,Nicolas Devillers)
DTSTART;VALUE=DATE-TIME:20250606T101500
DTEND;VALUE=DATE-TIME:20250606T103000
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250606T101500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:bbs et proxychains-udp : deux outils proxy pour le pentest (Hugo C
 lout)
DTSTART;VALUE=DATE-TIME:20250606T103000
DTEND;VALUE=DATE-TIME:20250606T104500
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250606T103000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Pause
DTSTART;VALUE=DATE-TIME:20250606T104500
DTEND;VALUE=DATE-TIME:20250606T111500
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250606T104500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:SCCMSecrets.py: exploiting SCCM policies distribution for credenti
 als harvesting (Quentin Roland)
DTSTART;VALUE=DATE-TIME:20250606T111500
DTEND;VALUE=DATE-TIME:20250606T113000
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250606T111500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:“Ça fait quoi si j'appuie là ?” : Retour d'expérience de te
 sts d'intrusion sur systèmes industriels (Claire Vacherot)
DTSTART;VALUE=DATE-TIME:20250606T113000
DTEND;VALUE=DATE-TIME:20250606T120000
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250606T113000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Déjeuner à la Halle Martenot
DTSTART;VALUE=DATE-TIME:20250606T120000
DTEND;VALUE=DATE-TIME:20250606T141500
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250606T120000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Investigation aux frontières du système : cas d’un reset facto
 ry aléatoire (Mikaël Smaha\,Pierre-Michel Ricordel)
DTSTART;VALUE=DATE-TIME:20250606T141500
DTEND;VALUE=DATE-TIME:20250606T144500
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250606T141500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:From Black Box to Clear Insights: Explainable AI in Malware Detect
 ion with MalConv2 (Adrien Laigle\,Anthony Chesneau\,Marie Salmon)
DTSTART;VALUE=DATE-TIME:20250606T144500
DTEND;VALUE=DATE-TIME:20250606T151500
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250606T144500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Cloture 2025 (Johanna Brousse)
DTSTART;VALUE=DATE-TIME:20250606T151500
DTEND;VALUE=DATE-TIME:20250606T161500
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250606T151500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Fin de la conférence
DTSTART;VALUE=DATE-TIME:20250606T161500
DTEND;VALUE=DATE-TIME:20250606T161500
DTSTAMP;VALUE=DATE-TIME:20260418T175951Z
UID:20250606T161500@sstic.org
END:VEVENT
END:VCALENDAR
