BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//LORIA - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:LORIA
X-ORIGINAL-URL:https://www.loria.fr
X-WR-CALDESC:Évènements pour LORIA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20180325T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20181028T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20190331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20191027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20200329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20201025T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20191128T133000
DTEND;TZID=Europe/Paris:20191128T143000
DTSTAMP:20260404T180830
CREATED:20191114T091929Z
LAST-MODIFIED:20191114T091955Z
UID:8605-1574947800-1574951400@www.loria.fr
SUMMARY:Séminaire SSL par Ralf Sasse
DESCRIPTION:Le prochain exposé du séminaire SSL aura lieu jeudi 28 novembre à 13h30\, salle A008. L’orateur sera Ralf Sasse\, de l’ETH Zurich. \n  \nTitle: Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures (joint work with Dennis Jackson\, Cas Cremers\, Katriel Cohn-Gordon) \n  \nAbstract: \nThe standard definition of security for digital signatures — existential unforgeability — does not ensure certain properties that protocol designers might expect. For example\, in many modern signature schemes\, one signature may verify against multiple distinct public keys. It is left to protocol designers to ensure that the absence of these properties does not lead to attacks. \nModern automated protocol analysis tools are able to provably exclude large classes of attacks on complex real-world protocols such as TLS 1.3 and 5G. However\, their abstraction of signatures (implicitly) assumes much more than existential unforgeability\, thereby missing several classes of practical attacks. \nWe give a hierarchy of new formal models for signature schemes that captures these subtleties\, and thereby allows us to analyse (often unexpected) behaviours of real-world protocols that were previously out of reach of symbolic analysis. We implement our models in the Tamarin Prover\, yielding the first way to perform these analyses automatically\, and validate them on several case studies. In the process\, we find new attacks on\nDRKey and SOAP’s WS-Security\, both protocols which were previously proven secure in traditional symbolic models. \n  \nLa suite du programme sera prochainement annoncée\, et sera également disponible en ligne au fur et à mesure sur seminaire-securite.loria.fr. \n 
URL:https://www.loria.fr/event/seminaire-ssl-par-ralf-sasse/
LOCATION:A008
CATEGORIES:Séminaire
END:VEVENT
END:VCALENDAR