{"id":56,"date":"2015-06-16T13:44:07","date_gmt":"2015-06-16T11:44:07","guid":{"rendered":"http:\/\/members.loria.fr\/thierrygartiser\/?page_id=56"},"modified":"2025-11-23T10:13:42","modified_gmt":"2025-11-23T08:13:42","slug":"accueil","status":"publish","type":"page","link":"https:\/\/members.loria.fr\/SKremer\/","title":{"rendered":"Steve Kremer&#8217;s homepage"},"content":{"rendered":"<h1>News<\/h1>\n<ul>\n<li><a href=\"https:\/\/www.usenix.org\/conferences\/best-papers?taxonomy_vocabulary_1_tid=2023&amp;title_1=Sec\">Distinguished paper award<\/a> for our paper <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/cheval\"><em><br \/>\nHash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses<\/em><\/a> at <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity23\">Usenix Security&#8217;23<\/a>.<\/li>\n<li><a href=\"https:\/\/charlie.jacomme.fr\/\">Charlie Jacomme<\/a> received the <a href=\"https:\/\/gdr-securite.irisa.fr\/prix-de-these\/\">GDR S\u00e9curit\u00e9 PhD award<\/a> and was a runner-up (&#8220;accessit&#8221;) for the <a href=\"https:\/\/www.societe-informatique-de-france.fr\/2022\/01\/recherche-prix-de-these-gilles-kahn-laureats-2021\/\">Gilles Kahn award<\/a>.<\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/SP2018\/awards.html\">Distinguished paper award<\/a> for our paper <a href=\"https:\/\/members.loria.fr\/SKremer\/files\/Publications\/b2hd-CKR-sp18.html\"><em>DEEPSEC: Deciding Equivalence Properties in Security Protocols &#8211; Theory and Practice<\/em><\/a> at <a href=\"https:\/\/www.ieee-security.org\/TC\/SP2018\/\">S&amp;P&#8217;18<\/a>.<\/li>\n<li><a href=\"http:\/\/www.computingreviews.com\/recommend\/bestof\/notableitems.cfm?bestYear=2016&amp;more=yes\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-286\" src=\"http:\/\/members.loria.fr\/SKremer\/wp-content\/blogs.dir\/88\/files\/sites\/88\/2015\/06\/CRBadgeNotableArticle.jpg\" alt=\"\" width=\"90\" height=\"90\" srcset=\"https:\/\/members.loria.fr\/SKremer\/wp-content\/blogs.dir\/88\/files\/sites\/88\/2015\/06\/CRBadgeNotableArticle.jpg 144w, https:\/\/members.loria.fr\/SKremer\/wp-content\/blogs.dir\/88\/files\/sites\/88\/2015\/06\/CRBadgeNotableArticle-60x60.jpg 60w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a>Our paper <a href=\"https:\/\/members.loria.fr\/SKremer\/files\/Publications\/b2hd-CCCK16.html\"><em>Automated verification of equivalence properties of cryptographic protocol<\/em><\/a> is listed in <a href=\"http:\/\/www.computingreviews.com\">ACM Computing Reviews<\/a>&#8216; <a class=\"title\" href=\"http:\/\/www.computingreviews.com\/recommend\/bestof\/notableitems.cfm?bestYear=2016\">21st Annual Best of Computing list of notable books and articles<\/a> for 2016.<\/li>\n<li><a href=\"https:\/\/members.loria.fr\/SKremer\/files\/slides-csf16.pdf\">Invited talk<\/a> at <a href=\"http:\/\/csf2016.tecnico.ulisboa.pt\/\">CSF&#8217;16<\/a><\/li>\n<li>Recipient of an ERC Consolidator Grant: <a href=\"http:\/\/members.loria.fr\/skremer\/files\/spooc\/index.html\">SPOOC<\/a> (2015 -2020)<\/li>\n<li>Co-chair (with Jun Pang) of the <a href=\"http:\/\/grsrd16.inria.fr\">Grande Region Security and Reliability Day 2016<\/a> (GRSRD&#8217;16)<\/li>\n<li>Co-chair (with Tomasz Truderung) of the <a href=\"http:\/\/infsec.uni-trier.de\/grsrd2015\">Grande Region Security and Reliability Day 2015<\/a> (GRSRD&#8217;15)<\/li>\n<li><a href=\"http:\/\/www.sti.uniurb.it\/events\/fosad14\/\">14th International School on Foundations of Security Analysis and Design<\/a> (FOSAD&#8217;14)\n<div class=\"description\">Bertinoro, Italy, 1-6 September 2014<\/div>\n<\/li>\n<li>Co-chair (with Mart\u00edn Abadi) of the <a href=\"http:\/\/www.loria.fr\/%7Eskremer\/POST14\/\"> 3rd Conference on Principles of Security and Trust<\/a> (POST&#8217;14)<\/li>\n<li>Co-chair of the <a href=\"http:\/\/www.dmi.unict.it\/%7Egiamp\/sac\/cfp2014.php\">Computer Security track at the 29th ACM Symposium on Applied Computing<\/a> (SEC@SAC&#8217;14)<\/li>\n<li><a href=\"http:\/\/www.iospress.nl\/loadtop\/load.php?isbn=9781607507130\">Formal Models and Techniques for Analyzing Security Protocols<\/a><br \/>\n<b>Volume<\/b> 5 Cryptology and Information Security Series<br \/>\n<b>Edited by<\/b>: V. Cortier and S. Kremer<br \/>\nMarch 2011, 312 pp., hardcover<\/li>\n<\/ul>\n<h1><a href=\"http:\/\/members.loria.fr\/SKremer\/files\/Publications\/index.html\">Publications<\/a><\/h1>\n<h1>Recent Projects<\/h1>\n<ul>\n<li>PEPR Cybersecurity Security Verification Protocol <a href=\"https:\/\/pepr-cyber-svp.cnrs.fr\/\">SVP<\/a> (2022-2028) <\/li>\n<li>ANR Research and teaching chair in AI <a href=\"http:\/\/members.loria.fr\/skremer\/files\/asap\/index.html\">ASAP<\/a> (PI, 2020-2025)<\/li>\n<li>ERC Consolidator grant <a href=\"http:\/\/members.loria.fr\/skremer\/files\/spooc\/index.html\">SPOOC<\/a> (PI, 2015-2020)<\/li>\n<li><a href=\"http:\/\/anr-sequoia.gforge.inria.fr\/\">ANR <abbr title=\" Security properties, process equivalences and automated verification\">Sequoia<\/abbr><\/a> (PI, 2014-2019)<\/li>\n<\/ul>\n<h1>Activities<\/h1>\n<h3>Gender Equality and Equal Opportunities<\/h3>\n<ul>\n<li><a href=\"https:\/\/parite.inria.fr\/en\/\">Committee on Gender Equality and Equal Opportunities<\/a><\/li>\n<li><a href=\"https:\/\/www.informatics-europe.org\/activities\/women-in-icst-research-and-education.html\">WIRE<\/a><\/li>\n<li><a href=\"https:\/\/www.cost.eu\/actions\/CA19122\/#tabs|Name:overview\">COST European Network For Gender Balance in Informatics<\/a><\/li>\n<\/ul>\n<h3>Steering committees:<\/h3>\n<ul>\n<li><a href=\"http:\/\/www.ieee-security.org\/CSFWweb\/\">IEEE Computer Security Foundations Symposium<\/a> (CSF) 2010-2018<\/li>\n<li><a href=\"http:\/\/www.etaps.org\">Conference on Principles of Security and Trust<\/a> (POST) 2012-2016<\/li>\n<li><a href=\"http:\/\/www.etaps.org\/\">European Joint Conferences on Theory and Practice of Software <\/a> (ETAPS) 2012-2014<\/li>\n<\/ul>\n<h3>Recent program committees:<\/h3>\n<div class=\"pc\">\n<ul>\n<li><a href=\"https:\/\/sp2026.ieee-security.org\/\"><abbr title=\"47th IEEE Symposium on Security and Privacy\">S&amp;P&#8217;26<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\"><abbr title=\"33rd USENIX Security Symposium\">Usenix Security&#8217;25<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/csf2024.ieee-security.org\/\"><abbr title=\"37th IEEE Computer Security Foundations Symposium\">CSF&#8217;24<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity24\"><abbr title=\"33rd USENIX Security Symposium\">Usenix Security&#8217;24<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/petsymposium.org\/cfp24.php\"><abbr title=\"24th Privacy Enhancing Technologies Symposium\">PETS&#8217;24<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.sigsac.org\/ccs\/CCS2023\/\"><abbr title=\"ACM Conference on Computer and Communications Security\">CCS&#8217;23<\/abbr><\/a> (track chair)<\/li>\n<li><a href=\"https:\/\/petsymposium.org\/cfp23.php\"><abbr title=\"23rd Privacy Enhancing Technologies Symposium\">PETS&#8217;23<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity23\"><abbr title=\"32nd USENIX Security Symposium\">Usenix Security&#8217;23<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/esorics2022.compute.dtu.dk\/\"><abbr title=\"27th European Symposium on Research in Computer Security\">ESORICS&#8217;22<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/e-vote-id.org\/\"><abbr title=\"7th International Joint Conference on Electronic Voting \">E-Vote-ID&#8217;22<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/movep2022.cs.aau.dk\/\"><abbr title=\"Summer school on modelling and verification of parallel processes\">MOVEP&#8217;22<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/www.ieee-security.org\/TC\/EuroSP2022\/index.html\"><abbr title=\"7th IEEE European Symposium on Security and Privacy\">Euro S&amp;P&#8217;22<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/petsymposium.org\/cfp22.php\"><abbr title=\"22nd Privacy Enhancing Technologies Symposium\">PETS&#8217;22<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/indocrypt2021.lnmiit.ac.in\/\"><abbr title=\"22nd International Conference on Cryptology in India\">Indocrypt&#8217;21<\/abbr><\/a><\/li>\n<li><a href=\"https:\/\/esorics2021.athene-center.de\/\"><abbr title=\"26th European Symposium on Research in Computer Security\">ESORICS&#8217;21<\/abbr><\/a><\/li>\n<\/ul>\n<p style=\"text-align: right\"><a href=\"https:\/\/members.loria.fr\/SKremer\/committees\/\">&gt;&gt;&gt;more<\/a><\/p>\n<\/div>\n<h1>Tools<\/h1>\n<ul>\n<li><a href=\"https:\/\/deepsec-prover.github.io\/\">DEEPSEC<\/a> : DEciding Equivalence Properties in SECurity protocols<\/li>\n<li>SAPIC: Automated verification of stateful security protocols (now integrated in <a href=\"https:\/\/tamarin-prover.github.io\/\">Tamarin<\/a>)<\/li>\n<li><a href=\"https:\/\/github.com\/akiss\/akiss\">AKISS<\/a> (Active Knowledge In Security protocolS): verifying equivalence properties<\/li>\n<\/ul>\n<h1>Teaching<\/h1>\n<ul>\n<li>Th\u00e9orie de la S\u00e9curit\u00e9 (2012- )<\/li>\n<li><a href=\"https:\/\/mpri.master.univ-paris7.fr\/doku.php?id=cours:c-2-30\">Cryptographic protocols: formal and computational proofs<\/a> at the <a href=\"http:\/\/mpri.master.univ-paris7.fr\/\">MPRI<\/a> (2007-2011)\n<ul>\n<li><a href=\"https:\/\/members.loria.fr\/SKremer\/files\/poly-mpri-2-30-draft.pdf\">Lecture Notes (draft)<\/a><\/li>\n<\/ul>\n<\/li>\n<li>&#8220;M\u00e9thodes de v\u00e9rification de s\u00e9curit\u00e9&#8221; at the <a href=\"http:\/\/www.univ-paris12.fr\/lacl\/LMD\/master.html\">Master S\u00e9curit\u00e9 des Syst\u00e8mes Informatiques<\/a> (2007&#8211;2011)\n<ul>\n<li><a href=\"http:\/\/www.lsv.ens-cachan.fr\/%7Ekremer\/Cours\/MEVS\/slides-1.pdf\">Slides-1<\/a>, <a href=\"http:\/\/www.lsv.ens-cachan.fr\/%7Ekremer\/Cours\/MEVS\/exercices-1.pdf\">Exercises-1<\/a>.<\/li>\n<li><a href=\"http:\/\/www.lsv.ens-cachan.fr\/%7Ekremer\/Cours\/MEVS\/slides-2.pdf\">Slides-2<\/a>, <a href=\"http:\/\/www.lsv.ens-cachan.fr\/%7Ekremer\/Cours\/MEVS\/exercices-2.pdf\">Exercises-2<\/a>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h1>Misc<\/h1>\n<ul>\n<li><a href=\"https:\/\/members.loria.fr\/SKremer\/files\/gpg-steve.asc\">My pgp key<\/a><\/li>\n<li>My CV <a href=\"https:\/\/members.loria.fr\/SKremer\/files\/resume.pdf\">[.pdf]<\/a><\/li>\n<li>My <a href=\"http:\/\/www.oakland.edu\/enp\/\">Erd\u00f6s number<\/a> is 3<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>News Distinguished paper award for our paper Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses at Usenix Security&#8217;23. Charlie Jacomme received the GDR S\u00e9curit\u00e9 PhD award and was a runner-up (&#8220;accessit&#8221;) for the Gilles Kahn award. Distinguished paper award for our paper DEEPSEC: Deciding Equivalence Properties in Security Protocols &#8211; [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-56","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/pages\/56","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/comments?post=56"}],"version-history":[{"count":91,"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/pages\/56\/revisions"}],"predecessor-version":[{"id":487,"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/pages\/56\/revisions\/487"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/SKremer\/wp-json\/wp\/v2\/media?parent=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}