BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//SSTIC//sstic.org//FR
BEGIN:VEVENT
SUMMARY:Inscriptions
DTSTART;VALUE=DATE-TIME:20260603T083000
DTEND;VALUE=DATE-TIME:20260603T100000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T083000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Ouverture 2026
DTSTART;VALUE=DATE-TIME:20260603T100000
DTEND;VALUE=DATE-TIME:20260603T110000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T100000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Pause
DTSTART;VALUE=DATE-TIME:20260603T110000
DTEND;VALUE=DATE-TIME:20260603T113000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T110000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Flicker and fall: rooting the Philips Hue Bridge both remotely and
  wirelessly (Anthony Remy\,Baptiste Verstraeten\,Guillaume Chantrel\,Maxim
 e Turlure\,Valentino Ricotta)
DTSTART;VALUE=DATE-TIME:20260603T113000
DTEND;VALUE=DATE-TIME:20260603T120000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T113000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Unblob : évolution d’un outil d’extraction de firmwares (Quen
 tin Kaiser)
DTSTART;VALUE=DATE-TIME:20260603T120000
DTEND;VALUE=DATE-TIME:20260603T121500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T120000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Déjeuner à la Halle Martenot
DTSTART;VALUE=DATE-TIME:20260603T121500
DTEND;VALUE=DATE-TIME:20260603T141500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T121500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:MLA et l'implémentation d'une hybridation cryptographique (Jéré
 my Barallon)
DTSTART;VALUE=DATE-TIME:20260603T141500
DTEND;VALUE=DATE-TIME:20260603T144500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T141500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Migrating Protocols to the Post-Quantum Setting: The Case of Signa
 l’s Double Ratchet (Thomas Prest)
DTSTART;VALUE=DATE-TIME:20260603T144500
DTEND;VALUE=DATE-TIME:20260603T150000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T144500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Migrating Protocols to the Post-Quantum Setting: The Case of Wireg
 uard (Guilhem Niot)
DTSTART;VALUE=DATE-TIME:20260603T150000
DTEND;VALUE=DATE-TIME:20260603T151500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T150000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:mlkemkeyfind : reconstruire des clés depuis des résidus mémoire
  (Andy Russon)
DTSTART;VALUE=DATE-TIME:20260603T151500
DTEND;VALUE=DATE-TIME:20260603T153000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T151500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Pause
DTSTART;VALUE=DATE-TIME:20260603T153000
DTEND;VALUE=DATE-TIME:20260603T160000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T153000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Spatial Frinet : application des index spatiaux aux traces d’ex
 écution (Théo Emeriau)
DTSTART;VALUE=DATE-TIME:20260603T160000
DTEND;VALUE=DATE-TIME:20260603T163000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T160000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Les graphes de provenance à états étendus pour la recherche de 
 scénarios d'attaque dans les systèmes complexes (Eric Lacombe\,Loïc Rob
 ert\,Vincent Nicomette)
DTSTART;VALUE=DATE-TIME:20260603T163000
DTEND;VALUE=DATE-TIME:20260603T170000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T163000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Denial of Service using recursions: not even Rust is going to save
  you (Alexis Challande)
DTSTART;VALUE=DATE-TIME:20260603T170000
DTEND;VALUE=DATE-TIME:20260603T171500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T170000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Bas les masques: Analyse d'une carte SD sécurisée (Nicolas Oberl
 i)
DTSTART;VALUE=DATE-TIME:20260603T171500
DTEND;VALUE=DATE-TIME:20260603T173000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T171500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Fuzzing en boîte noire assisté par trace matérielle avec LibAFL
  et Intel PT (Marco Cavenati\,Romain Malmain)
DTSTART;VALUE=DATE-TIME:20260603T173000
DTEND;VALUE=DATE-TIME:20260603T174500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T173000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Fuzzwizard (Marion Lafon)
DTSTART;VALUE=DATE-TIME:20260603T174500
DTEND;VALUE=DATE-TIME:20260603T180000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T174500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Cocktail à la Halle Martenot
DTSTART;VALUE=DATE-TIME:20260603T190000
DTEND;VALUE=DATE-TIME:20260603T200000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260603T190000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Accueil
DTSTART;VALUE=DATE-TIME:20260604T090000
DTEND;VALUE=DATE-TIME:20260604T093000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T090000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Rétro-ingénierie d’un micrologiciel pour architecture Pi32v2 (
 Damien Cauquil)
DTSTART;VALUE=DATE-TIME:20260604T093000
DTEND;VALUE=DATE-TIME:20260604T100000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T093000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Etude expérimentale de la sécurité du protocole WirelessHART (E
 lies Tali\,Guillaume Auriol\,Kais Sellami\,Pierre Ayoub\,Romain Cayre\,Vin
 cent Nicomette)
DTSTART;VALUE=DATE-TIME:20260604T100000
DTEND;VALUE=DATE-TIME:20260604T103000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T100000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Pause
DTSTART;VALUE=DATE-TIME:20260604T103000
DTEND;VALUE=DATE-TIME:20260604T110000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T103000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:GroupPolicyBackdoor : un outil offensif stable et modulaire pour 
 l’exploitation des GPOs Active Directory (Quentin Roland)
DTSTART;VALUE=DATE-TIME:20260604T110000
DTEND;VALUE=DATE-TIME:20260604T111500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T110000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Metamorph - Un outil pour répliquer la télémétrie ETW des EDR 
 (Jean-Baptiste Mesnard-Sense)
DTSTART;VALUE=DATE-TIME:20260604T111500
DTEND;VALUE=DATE-TIME:20260604T113000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T111500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Présentation invitée
DTSTART;VALUE=DATE-TIME:20260604T113000
DTEND;VALUE=DATE-TIME:20260604T121500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T113000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Déjeuner à la Halle Martenot
DTSTART;VALUE=DATE-TIME:20260604T121500
DTEND;VALUE=DATE-TIME:20260604T141500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T121500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:CI/CD sous le prisme offensif : exploitation de l'environnement d'
 exécution (Adrien Monteiro\,Lucas Pech)
DTSTART;VALUE=DATE-TIME:20260604T141500
DTEND;VALUE=DATE-TIME:20260604T144500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T141500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Charting your way in: Injection de templates Helm (Paul Barbé)
DTSTART;VALUE=DATE-TIME:20260604T144500
DTEND;VALUE=DATE-TIME:20260604T150000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T144500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Github Kingdom: From Internet to Internal Privileged Access (Antho
 ny Corsiez)
DTSTART;VALUE=DATE-TIME:20260604T150000
DTEND;VALUE=DATE-TIME:20260604T151500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T150000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Un ticket pour les gouverner tous - Autorisation et authentificati
 on sur SAP (Aloïs Colléaux-Le Chêne)
DTSTART;VALUE=DATE-TIME:20260604T151500
DTEND;VALUE=DATE-TIME:20260604T154500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T151500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Pause
DTSTART;VALUE=DATE-TIME:20260604T154500
DTEND;VALUE=DATE-TIME:20260604T161500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T154500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Solution du challenge
DTSTART;VALUE=DATE-TIME:20260604T161500
DTEND;VALUE=DATE-TIME:20260604T170000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T161500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Rumps
DTSTART;VALUE=DATE-TIME:20260604T170000
DTEND;VALUE=DATE-TIME:20260604T190000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T170000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Social Event au Couvent des Jacobins
DTSTART;VALUE=DATE-TIME:20260604T193000
DTEND;VALUE=DATE-TIME:20260604T233000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260604T193000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Accueil
DTSTART;VALUE=DATE-TIME:20260605T090000
DTEND;VALUE=DATE-TIME:20260605T093000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260605T090000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:APT28\, sarA Is watching you! (Charles Meslay\,Robin Kwiatkowski)
DTSTART;VALUE=DATE-TIME:20260605T093000
DTEND;VALUE=DATE-TIME:20260605T100000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260605T093000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Private Key Leaks in the Wild: Insights from Certificate Transpare
 ncy (Gaetan Ferry\,Guillaume Valadon)
DTSTART;VALUE=DATE-TIME:20260605T100000
DTEND;VALUE=DATE-TIME:20260605T103000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260605T100000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Pause
DTSTART;VALUE=DATE-TIME:20260605T103000
DTEND;VALUE=DATE-TIME:20260605T110000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260605T103000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Nouvelles aventures d'IronHusky\, un acteur de menace sinophone pa
 ssionné par les États-Unis (Georgy Kucherin)
DTSTART;VALUE=DATE-TIME:20260605T110000
DTEND;VALUE=DATE-TIME:20260605T111500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260605T110000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Island : Intégration transparente du sandboxing (Mickaël Salaün
 )
DTSTART;VALUE=DATE-TIME:20260605T111500
DTEND;VALUE=DATE-TIME:20260605T113000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260605T111500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Présentation invitée
DTSTART;VALUE=DATE-TIME:20260605T113000
DTEND;VALUE=DATE-TIME:20260605T121500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260605T113000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Déjeuner à la Halle Martenot
DTSTART;VALUE=DATE-TIME:20260605T121500
DTEND;VALUE=DATE-TIME:20260605T141500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260605T121500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Using Active Automata Learning to Find Vulnerabilities in Network 
 Stacks (Aina Toky Rasoamanana\,Olivier Levillain\,Yohan Pipereau)
DTSTART;VALUE=DATE-TIME:20260605T141500
DTEND;VALUE=DATE-TIME:20260605T144500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260605T141500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Shovel : utiliser Suricata pour mieux se défendre en CTF (Ambre I
 ooss)
DTSTART;VALUE=DATE-TIME:20260605T144500
DTEND;VALUE=DATE-TIME:20260605T150000
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260605T144500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Clear NDR Community (Eric Leblond\,Valentin Vivier)
DTSTART;VALUE=DATE-TIME:20260605T150000
DTEND;VALUE=DATE-TIME:20260605T151500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260605T150000@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Cloture 2026
DTSTART;VALUE=DATE-TIME:20260605T151500
DTEND;VALUE=DATE-TIME:20260605T161500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260605T151500@sstic.org
END:VEVENT
BEGIN:VEVENT
SUMMARY:Fin de la conférence
DTSTART;VALUE=DATE-TIME:20260605T161500
DTEND;VALUE=DATE-TIME:20260605T161500
DTSTAMP;VALUE=DATE-TIME:20260418T180202Z
UID:20260605T161500@sstic.org
END:VEVENT
END:VCALENDAR
