{"id":25,"date":"2024-06-03T22:59:58","date_gmt":"2024-06-03T20:59:58","guid":{"rendered":"https:\/\/essai-conference.eu\/?page_id=25"},"modified":"2025-11-19T17:18:20","modified_gmt":"2025-11-19T16:18:20","slug":"program","status":"publish","type":"page","link":"https:\/\/essai-conference.eu\/index.php\/program\/","title":{"rendered":"Program"},"content":{"rendered":"\n<div class=\"wp-block-cover aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" class=\"wp-block-cover__image-background wp-image-281\" alt=\"\" src=\"http:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/10\/texture-1024x576.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/10\/texture-1024x576.jpg 1024w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/10\/texture-300x169.jpg 300w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/10\/texture-2000x1125.jpg 2000w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">PROGRAM<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Session #1: Vulnerabilities of AI<\/h2>\n\n\n\n<p>Thursday, November 20st \u2013 9:00-12:00 \u2013 Room La Nef<\/p>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p>09:00 &#8211; 09:30<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><em><a href=\"https:\/\/arxiv.org\/pdf\/2404.17399\" data-type=\"link\" data-id=\"https:\/\/arxiv.org\/pdf\/2404.17399\">Evaluations of Machine Learning Privacy Defenses are Misleading<\/a><\/em> <a href=\"https:\/\/github.com\/ethz-spylab\/misleading-privacy-evals\" data-type=\"link\" data-id=\"https:\/\/github.com\/ethz-spylab\/misleading-privacy-evals\"><img loading=\"lazy\" decoding=\"async\" width=\"35\" height=\"35\" class=\"wp-image-315\" style=\"width: 35px;\" src=\"http:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png\" alt=\"\" srcset=\"https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png 512w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-300x300.png 300w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-150x150.png 150w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a><br><strong>Michael Aerni<\/strong>, Jie Zhang, Florian Tram\u00e8r<br><a href=\"https:\/\/dl.acm.org\/doi\/proceedings\/10.1145\/3658644\" data-type=\"link\" data-id=\"https:\/\/dl.acm.org\/doi\/proceedings\/10.1145\/3658644\">ACM CCS 2024<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p>09:30 &#8211; 10:00<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><em><a href=\"https:\/\/arxiv.org\/pdf\/2402.10001\" data-type=\"link\" data-id=\"https:\/\/arxiv.org\/pdf\/2402.10001\">Privacy Attacks in Decentralized Learning<\/a><\/em> <a href=\"https:\/\/github.com\/AbdellahElmrini\/decAttack\" data-type=\"link\" data-id=\"https:\/\/github.com\/AbdellahElmrini\/decAttack\"><img loading=\"lazy\" decoding=\"async\" width=\"35\" height=\"35\" class=\"wp-image-315\" style=\"width: 35px;\" src=\"http:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png\" alt=\"\" srcset=\"https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png 512w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-300x300.png 300w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-150x150.png 150w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a><br>Abdellah El Mrini, <strong>Edwige Cyffers<\/strong>, Aur\u00e9lien Bellet<br><a href=\"https:\/\/dl.acm.org\/doi\/proceedings\/10.5555\/3692070\" data-type=\"link\" data-id=\"https:\/\/dl.acm.org\/doi\/proceedings\/10.5555\/3692070\">ICML 2024<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p>10:00 &#8211; 10:30<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><a href=\"https:\/\/openaccess.thecvf.com\/content\/ICCV2025\/papers\/Webster_Multi-modal_Identity_Extraction_ICCV_2025_paper.pdf\"><em>Multi-modal Identity Extraction<\/em><\/a><br><strong>Ryan Webster<\/strong>, Teddy Furon<br><a href=\"https:\/\/iccv.thecvf.com\" data-type=\"link\" data-id=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/qu-yiting\">ICCV 2025<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p>10:30 &#8211; 11:00<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><em><a href=\"https:\/\/arxiv.org\/pdf\/2503.06188\" data-type=\"link\" data-id=\"https:\/\/arxiv.org\/pdf\/2503.06188\">Attackers Can Do Better: Over- and Understated Factors of Model Stealing Attacks<\/a><\/em><br><strong>Daryna Oliynyk<\/strong>, Rudolf Mayer, Andreas Rauber<br><a href=\"https:\/\/satml.org\/2025\/program\/\" data-type=\"link\" data-id=\"https:\/\/satml.org\/2025\/program\/\">IEEE SaTML 2025<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p>11:00 &#8211; 11:30<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><em><a href=\"https:\/\/arxiv.org\/pdf\/2402.06957\" data-type=\"link\" data-id=\"https:\/\/arxiv.org\/pdf\/2402.06957\">Architectural Neural Backdoors from First Principles<\/a><\/em> <a href=\"https:\/\/github.com\/Hjel2\/arch-neural-backdoor-first-principles?tab=readme-ov-file\" data-type=\"link\" data-id=\"https:\/\/github.com\/Hjel2\/arch-neural-backdoor-first-principles?tab=readme-ov-file\"><img loading=\"lazy\" decoding=\"async\" width=\"35\" height=\"35\" class=\"wp-image-315\" style=\"width: 35px;\" src=\"http:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png\" alt=\"\" srcset=\"https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png 512w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-300x300.png 300w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-150x150.png 150w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a><br>Harry Langford, <strong>Ilia Shumailov,<\/strong> Yiren Zhao, Robert Mullins, Nicolas Papernot<br><a href=\"https:\/\/sp2025.ieee-security.org\/accepted-papers.html\" data-type=\"link\" data-id=\"https:\/\/sp2025.ieee-security.org\/accepted-papers.html\">IEEE SSP 2025<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p>10:30 &#8211; 11:00<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-text-align-left\">Break<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Session #2: AgenticAI and Security<\/h2>\n\n\n\n<p>Thursday, November 20st &#8211; 13:30-18:00 \u2013 Room La Nef<\/p>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p>13:30 &#8211; 14:00<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><em><a href=\"https:\/\/arxiv.org\/pdf\/2412.18442\" data-type=\"link\" data-id=\"https:\/\/arxiv.org\/pdf\/2412.18442\">SoK: On the Offensive Potential of AI<\/a><\/em> <a href=\"https:\/\/github.com\/hihey54\/sok_oai\/\" data-type=\"link\" data-id=\"https:\/\/github.com\/hihey54\/sok_oai\/\"><img loading=\"lazy\" decoding=\"async\" width=\"35\" height=\"35\" class=\"wp-image-315\" style=\"width: 35px;\" src=\"http:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png\" alt=\"\" srcset=\"https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png 512w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-300x300.png 300w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-150x150.png 150w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a><br><strong>Saskia Laura Schr\u00f6er<\/strong>, Giovanni Apruzzese, Soheil Human, Pavel Laskov, Hyrum S. Anderson, Edward W. N. Bernroider, Aurore Fass, Ben Nassi, Vera Rimmer, Fabio Roli, Samer Salam, Ashley Shen, Ali Sunyaev, Tim Wadhwa-Brown, Isabel Wagner, Gang Wang<br><a href=\"https:\/\/satml.org\/2025\/program\/\" data-type=\"link\" data-id=\"https:\/\/satml.org\/2025\/program\/\">IEEE SaTML 2025<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p>14:00 &#8211; 14:30<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><em><a href=\"https:\/\/mengrj.github.io\/pdfs\/chatafl.pdf\" data-type=\"link\" data-id=\"https:\/\/mengrj.github.io\/pdfs\/chatafl.pdf\">Large Language Model guided Protocol Fuzzing<\/a><\/em> <a href=\"https:\/\/github.com\/ChatAFLndss\/ChatAFL\" data-type=\"link\" data-id=\"https:\/\/github.com\/ChatAFLndss\/ChatAFL\"><img loading=\"lazy\" decoding=\"async\" width=\"35\" height=\"35\" class=\"wp-image-315\" style=\"width: 35px;\" src=\"http:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png\" alt=\"\" srcset=\"https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png 512w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-300x300.png 300w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-150x150.png 150w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a><br><strong>Ruijie Meng<\/strong>, Martin Mirchev, Marcel B\u00f6hme, Abhik Roychoudhury<br><a href=\"https:\/\/www.ndss-symposium.org\/ndss2024\/accepted-papers\/\" data-type=\"link\" data-id=\"https:\/\/www.ndss-symposium.org\/ndss2024\/accepted-papers\/\">NDSS 2024<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p>14:30 &#8211; 15:00<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><em><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-388-paper.pdf\" data-type=\"link\" data-id=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-388-paper.pdf\">YuraScanner: Leveraging LLMs for Task-driven Web App Scanning<\/a><\/em> <a href=\"https:\/\/github.com\/pixelindigo\/yurascanner\/tree\/ndss25\" data-type=\"link\" data-id=\"https:\/\/github.com\/pixelindigo\/yurascanner\/tree\/ndss25\"><img loading=\"lazy\" decoding=\"async\" width=\"35\" height=\"35\" class=\"wp-image-315\" style=\"width: 35px;\" src=\"http:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png\" alt=\"\" srcset=\"https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png 512w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-300x300.png 300w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-150x150.png 150w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a><br><strong>Aleksei Stafeev<\/strong>, Tim Recktenwald, Gianluca De Stefano, Soheil Khodayari, Giancarlo Pellegrino<br><a href=\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/\" data-type=\"link\" data-id=\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/\">NDSS 2025<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p>15:00 &#8211; 15:30<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>Robotic Security: Defending against Stealthy Intrusion with Cybersecurity AI          <img loading=\"lazy\" decoding=\"async\" width=\"35\" height=\"35\" class=\"wp-image-315\" style=\"width: 35px;\" src=\"http:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png\" alt=\"\" srcset=\"https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png 512w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-300x300.png 300w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-150x150.png 150w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><a href=\"https:\/\/github.com\/GreyDGL\/PentestGPT\">PentestGPT<\/a> \/ <a href=\"https:\/\/github.com\/aliasrobotics\/CAI\">CAI<\/a><br><em><a href=\"https:\/\/arxiv.org\/pdf\/2308.06782\" data-type=\"link\" data-id=\"https:\/\/arxiv.org\/pdf\/2308.06782\">Pentest GPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing<\/a><\/em><br>Gelei Deng, Yi Liu, V\u00edctor Mayoral-Vilches, Peng Liu, Yuekang Li, Yuan Xu, Tianwei Zhang, Yang Liu, Martin Pinzger, <strong>Stefan Rass<\/strong><br><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity24\/technical-sessions\" data-type=\"link\" data-id=\"https:\/\/www.usenix.org\/conference\/usenixsecurity24\/technical-sessions\">Usenix Security 2024<\/a><br><em><a href=\"https:\/\/epub.jku.at\/obvulioa\/download\/pdf\/8741687?originalFilename=true\" data-type=\"link\" data-id=\"https:\/\/epub.jku.at\/obvulioa\/download\/pdf\/8741687?originalFilename=true\">Game-theoretic APT defense: An experimental study on robotics<\/a><\/em><br><strong>Stefan Rass<\/strong>, Sandra K\u00f6nig, Jasmin Wachter, V\u00edctor Mayoral-Vilches,<br>Emmanouil Panaousis<br><a href=\"https:\/\/www.sciencedirect.com\/journal\/computers-and-security\/vol\/132\/suppl\/C\" data-type=\"link\" data-id=\"https:\/\/www.sciencedirect.com\/journal\/computers-and-security\/vol\/132\/suppl\/C\">Journal of Computers &amp; security<\/a>, 2023<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p>15:30 &#8211; 16:00<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>Break<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p>16:00 &#8211; 16:30<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><em><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3696407\">FlowChronicle: Synthetic Network Flow Generation through Pattern Set Mining<\/a><\/em> <a href=\"https:\/\/github.com\/Fos-R\/FlowChronicle\" data-type=\"link\" data-id=\"https:\/\/github.com\/Fos-R\/FlowChronicle\"><img loading=\"lazy\" decoding=\"async\" width=\"35\" height=\"35\" class=\"wp-image-315\" style=\"width: 35px;\" src=\"http:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png\" alt=\"\" srcset=\"https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg.png 512w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-300x300.png 300w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/pngegg-150x150.png 150w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a><br>Joscha C\u00fcppers, Adrien Schoen, Gregory Blanc,<strong> Pierre-Fran\u00e7ois Gimenez<\/strong><br><a href=\"https:\/\/conferences.sigcomm.org\/co-next\/2024\/#!\/home\">CoNEXT 2024<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p>16:30 &#8211; 17:00<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><a href=\"https:\/\/www.blackhat.com\/eu-24\/briefings\/schedule\/\" data-type=\"link\" data-id=\"https:\/\/www.blackhat.com\/eu-24\/briefings\/schedule\/\"><em>SpAIware &amp; More Revisited: Advanced Prompt Injection Exploits in LLM Apps and Coding Agents<\/em><\/a><br><strong>Johann Rehberger<\/strong>  <a href=\"https:\/\/www.youtube.com\/@embracethered\" data-type=\"link\" data-id=\"https:\/\/www.youtube.com\/@embracethered\"><img loading=\"lazy\" decoding=\"async\" width=\"30\" height=\"30\" class=\"wp-image-319\" style=\"width: 30px;\" src=\"http:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/embracethered.jpg\" alt=\"\" srcset=\"https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/embracethered.jpg 900w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/embracethered-300x300.jpg 300w, https:\/\/essai-conference.eu\/wp-content\/uploads\/2025\/11\/embracethered-150x150.jpg 150w\" sizes=\"auto, (max-width: 30px) 100vw, 30px\" \/><\/a> <br><a href=\"https:\/\/www.blackhat.com\/eu-24\/briefings\/schedule\/\" data-type=\"link\" data-id=\"https:\/\/www.blackhat.com\/eu-24\/briefings\/schedule\/\">Black Hat Europe 2024<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Session #1: Vulnerabilities of AI Thursday, November 20st \u2013 9:00-12:00 \u2013 Room La Nef 09:00 &#8211; 09:30 Evaluations of Machine Learning Privacy Defenses are Misleading Michael Aerni, Jie Zhang, Florian Tram\u00e8rACM CCS 2024 09:30 &#8211; 10:00 Privacy Attacks in Decentralized Learning Abdellah El Mrini, Edwige Cyffers, Aur\u00e9lien BelletICML 2024 10:00 &#8211; 10:30 Multi-modal Identity ExtractionRyan &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/essai-conference.eu\/index.php\/program\/\" class=\"more-link\">Lire la suite de<span class=\"screen-reader-text\">\u00ab\u00a0Program\u00a0\u00bb<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-25","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/essai-conference.eu\/index.php\/wp-json\/wp\/v2\/pages\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/essai-conference.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/essai-conference.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/essai-conference.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/essai-conference.eu\/index.php\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":64,"href":"https:\/\/essai-conference.eu\/index.php\/wp-json\/wp\/v2\/pages\/25\/revisions"}],"predecessor-version":[{"id":341,"href":"https:\/\/essai-conference.eu\/index.php\/wp-json\/wp\/v2\/pages\/25\/revisions\/341"}],"wp:attachment":[{"href":"https:\/\/essai-conference.eu\/index.php\/wp-json\/wp\/v2\/media?parent=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}