[Om-announce] FPS 2023 - Call for Participation

Paria Shirani pshirani at uottawa.ca
Sat Dec 2 21:07:47 CET 2023


*****************************************************************************
Call for Participation in 16th International Symposium on Foundations & Practice
of Security (FPS 2023)
                                                December 11-13 2023
                                     https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fps-2023.com%2F&data=05%7C01%7C%7C9f76a214c0aa4170401708dbf37288b6%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638371445475594889%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BNRyyXYWfOwW1utynfX77nFwIfj0%2BT1aSH97GYF%2FN7w%3D&reserved=0


***************************************************************************
Register now at : https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fps-2023.com%2Findex.php%2Fregistration%2F&data=05%7C01%7C%7C9f76a214c0aa4170401708dbf37288b6%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638371445475594889%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=sR6GppVXfeBCT2y8kymeApATm7N%2Bjf0%2F5JtY8UoYfbc%3D&reserved=0
***************************************************************************

Welcome to the 16th International Symposium on Foundations &  Practice of
Security (FPS 2023).

The 16th symposium will be hosted by the  Bordeaux Institute  of Technologies
(Bordeaux INP),  in  Bordeaux,  France, on December  11-13  2023.  We invite
researchers and practitioners from all countries working in security, privacy,
trustworthy data systems, and related areas to participate in the event.

The aim of FPS is to discuss and exchange theoretical and practical ideas that
address security issues in interconnected systems. It aims to provide scientific
presentations and establish links and promote scientific collaboration, joint
research programs, and student exchanges between institutions involved in this
important and fast-moving research field.



***************************************************************************
PROGRAM HIGHLIGHTS
***************************************************************************


KEYNOTES
---------------------

Keynote 1: Laurent Oudot, Nomadic Honeypots: How to Create Actionable Cyber Threat Intelligence?
Keynote 2: StÈphanie Delaune, Formal verification of security protocols: the Squirrel prover
Keynote 3: Esma AÔmeur, Privacy and Cybersecurity Issues in the Era of Fake news and Generative Artificial Intelligence


SESSIONS
---------------------

1-IA and cyber security
P1           76           Jo„o Vitorino, Miguel Silva, Eva Maia and Isabel PraÁa:     An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection
                P2           42           Sadaf Md Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen and Youki Kadobayashi: Securing Smart Vehicles through Federated Learning
                P3           18           Daniel Fentham, David Parker and Mark Ryan:     Using Reed-Muller Codes for Classification with Rejection and Recovery
                P4           51           Victor Aurora, Christopher Neal, Alexandre Proulx, Nora Boulahia-Cuppens and FrÈdÈric Cuppens:             Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection
2-Security Analysis
                P5           6              Mohamed Mekkouri and Christine Hennebert:    Practices for Assessing the Security Level of Solidity Smart Contracts
                P6           25           Ruturaj Kiran Vaidya†and†Prasad Kulkarni:            Effectiveness of Binary-Level CFI Techniques
                P7           79           Maxwel Bar-On, Bruhadeshwar Bezawada,†Indrakshi Ray†and†Indrajit Ray:           A Small World ñPrivacy Preserving IoT Device-type Fingerprinting with Small Datasets
                P8           55           Pierre-Victor Besson, ValÈrie Viet Triem Tong, Gilles Guette, Guillaume Piolle and Erwan Abgrall: URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures
3-Phishing & Social Network
                P9           17           Yukiko Sawaya, Ayane Sano, Takamasa Isohara, Akira Yamada and Ayako Komatsu:              Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior?
                P10        44           Eric Dzeha and Guy-Vincent Jourdan:       IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets
                P11        26           Emad Badawi,†Guy-Vincent Jourdan†and Iosif-Viorel: Onut           Web Scams Detection System
4-Vulnerabilities, Exploits, and Threats #1
                P12        8              Mahmoud Zamani, Saquib Irtiza, Latifur Khan and Kevin Hamlen: VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes
                P13        2              Raphael Khoury, Bolduc JÈrÈmy, Jason LafreniËre and Abdel-Gany Junior Odedele:                Analysis of Cryptographic CVEs: Lessons Learned and Perspectives
                P14        24           Mohamed El Amine Bekhouche and Kamel Adi:   A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports.
                P15        74           Norah Ridley, Enrico Branca, Jadyn Kimber and Natalia Stakhanova:            Enhancing Code Security Through Open-source Large Language Models: A Comparative Study
5-Vulnerabilities, Exploits, and Threats #2
                P16        66           Seyed Behnam Andarzian, Cristian Daniele and Erik Poll: Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations
                P17        71           Farnood Faghihi, Mohammad Zulkernine and Steven Ding:             Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware
                P18        52           Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, FrÈdÈric Cuppens and Alexandre Proulx:  Automated Attacker Behaviour Classification Using Threat Intelligence Insights
                P19        61           Wassim Koribeche, David Espes and CÈdric Morin:             UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls
6- Malware Analysis
                P20        16           Julien Cassagne, Ettore Merlo,†Guy-Vincent Jourdan†and†Iosif Viorel Onut:           Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code
                P21        29           Charles-Henry Bertand Van Ouytsel, Christophe Crochet, Axel Legay and Serena Lucca:      On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr
                P22        46           Thanh-Hung Pham and Mizuhito Ogawa:                Original Entry Point detection based on graph similarity
                P23        59           Martin Brisfors,†Michail Moraitis, Gabriel Klasson Landin and Truls Jilborg:             Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure
7-Security Design
                P24        22           John Breton, Jason Jaskolka and George O. M. Yee:            Hardening Systems Against Data Corruption Attacks at Design Time
                P25        37           Ludovic Paillat, Claudia-Lavinia Ignat, Davide Frey, Mathieu Turuani and Amine Ismail:                Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols
                P26        20           Ruize Wang and Elena Dubrova: A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm
                P27        30           Sayan Biswas, Kangsoo Jung and Catuscia Palamidessi:     Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response


Short paper #1
                SP1         58           Denis Obrezkov and Karsten Sohr:             UCAT: the Uniform Categorization for Access Control
                SP2         39           Markus Dahlmanns, Roman Matzutt, Chris Dax and Klaus Wehrle:               Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach
                SP3         57           Jan Eske Gesell, Robin Buchta, Kilian Dangendorf, Pascal Franzke, Felix Heine and Carsten Kleiner: Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection
                SP4         49           Mohammad Alnabhan and Paula Branco:               Evaluating Deep Learning for Cross-Domains Fake News Detection
Short paper #2
                SP5         50           Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi and Mourad Debbabi:                Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting
                SP6         27           Ryosuke Kobayashi and Rie Yamaguchi Shigetomi:              Trade-off between Authentication Performance and Detection Time for Zero-effort Attack in Location-based Authentication
                SP7         73           Thijs Veugen, Vincent Dunning, Michiel Marcus and Bart Kamphorst:         Secure Latent Dirichlet Allocation
                SP8         21           Awaleh Houssein Meraneh, Fabien Autrel, HÈlËne Le Bouder and Marc Oliver Pahl:                SADIS: real-time sound-based anomaly detection for industrial systems
                SP9         32           Valeria ValdÈs RÌos, Fatiha Zaidi, Ana Rosa Cavalli and Wissam Mallouli:    A resilience Component for a Digital Twin



***************************************************************************
Further details on the conference are available at
https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fps-2023.com%2F&data=05%7C01%7C%7C9f76a214c0aa4170401708dbf37288b6%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638371445475594889%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BNRyyXYWfOwW1utynfX77nFwIfj0%2BT1aSH97GYF%2FN7w%3D&reserved=0

We are looking forward to seeing you soon in Bordeaux City, France

General Chairs
Toufik Ahmed, Bordeaux INP, CNRS LaBRI,  UniversitÈ Bordeaux, France.
Nora Cuppens, …cole Polytechnique de MontrÈal, Canada

TPC Chairs
Mohamed Mosbah Bordeaux INP, CNRS LaBRI,  UniversitÈ Bordeaux, France.
Florence SËdes, University Toulouse III Paul Sabatier, France
Nadia Tawbi, Laval University, Canada
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.openmath.org/pipermail/om-announce/attachments/20231202/80423b09/attachment-0001.htm>


More information about the Om-announce mailing list