Equational theories with user defined AC function symbols in Tamarin, Elise Klein (Université de Lorraine), Jannik Dreier (Université de Lorraine), Steve Kremer (Inria Université de Lorraine)
Non-deduction proofs in Squirrel and the security of Signal, Clément Hérouard (Univ. Rennes, CNRS, IRISA), Charlie Jacomme (Université de Lorraine, CNRS, Inria, LORIA), Adrien Koutsos (INRIA Paris), Joseph Lallemand (Univ. Rennes, CNRS, IRISA)
Formal verification of security properties of 5G slices : an elementary use case, Ahmed Bouabdallah (IMT Atlantique)
A Scalable Framework for Backward Bounded Static Symbolic Execution, Nicolas Bellec (CEA-LIST), Grégoire Menguy (CEA-LIST), Frederic Recoules (CEA-LIST), Sébastien Bardin (CEA-LIST)
Design and Usage of a Modular Implementation for Relational Analyses in Binsec: Constant Time and Secret Erasure, Yanis Sellami (CEA, List), Frédéric Recoules (CEA, List), Sébastien Bardin (CEA, List)
Automated Discovery of Subtle Attacks on Protocols using Mix-Nets, Jannik Dreier (Université de Lorraine),Pascal Lafourcade (Université Clermont-Auvergne), Dhekra Mahmoud (Université Clermont-Auvergne)
New Formalisation & Attack-finding for Session Unlinkability, Ioana Cristina Boureanu (Surrey Centre for Cyber Security, University of Surrey), Fortunat Rajaona (Surrey Centre for Cyber Security, University of Surrey)
Differential DY fuzzing : Adding differential fuzzing to the Puffin fuzzer, Tom Gouville (Inria Nancy)