<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=Windows-1252">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-ligatures:standardcontextual;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;
font-family:"Calibri",sans-serif;
mso-ligatures:none;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
{page:WordSection1;}
--></style>
</head>
<body lang="EN-CA" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">*****************************************************************************</p>
<p class="MsoNormal">Call for Participation in 16th International Symposium on Foundations & Practice</p>
<p class="MsoNormal">of Security (FPS 2023)</p>
<p class="MsoNormal"> December 11-13 2023
</p>
<p class="MsoNormal"> <a href="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fps-2023.com%2F&data=05%7C01%7C%7C9f76a214c0aa4170401708dbf37288b6%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638371445475594889%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BNRyyXYWfOwW1utynfX77nFwIfj0%2BT1aSH97GYF%2FN7w%3D&reserved=0" originalSrc="https://www.fps-2023.com/" shash="SMYzqSQkqfL+lwW6F7O/UnFYBXCpf7R7A9PlPNkmv4S+bjAdgT8uJ0njGBLNpWvwtDgnG0+gJHHxzK1HkHVgjnQ9Y7YLYnmyXrbGLhoXD9CZ7Wlss0kq7kMW5o1Ddqx8JyLgXI0Z3eYnDNL2dQdhnFKOArJX+Ntldp2af+NwX0g=">https://www.fps-2023.com/</a>
</p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"> </p>
<p class="MsoNormal">***************************************************************************</p>
<p class="MsoNormal">Register now at : <a href="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fps-2023.com%2Findex.php%2Fregistration%2F&data=05%7C01%7C%7C9f76a214c0aa4170401708dbf37288b6%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638371445475594889%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=sR6GppVXfeBCT2y8kymeApATm7N%2Bjf0%2F5JtY8UoYfbc%3D&reserved=0" originalSrc="https://www.fps-2023.com/index.php/registration/" shash="VaWBUsoxMATymzCoaQqOWD4U1Ly80ncV6urXuZ3uh++SsKwa2+UIjbWOfKGmCOFILe2zXuWIYVmp1bDFu03Fre6KpFW9cG53m3vZlcIdxUK5eUyxuzg7B25/pqsNwWBfR9eT5Z1eVBCt7wHAqYD6VUvNWCzDETQTaB+YjdhO6BE=">
https://www.fps-2023.com/index.php/registration/</a></p>
<p class="MsoNormal">***************************************************************************</p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Welcome to the 16th International Symposium on Foundations & Practice of</p>
<p class="MsoNormal">Security (FPS 2023).</p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">The 16th symposium will be hosted by the Bordeaux Institute of Technologies</p>
<p class="MsoNormal">(Bordeaux INP), in <b>Bordeaux, France, on December 11-13 2023</b>. We invite</p>
<p class="MsoNormal">researchers and practitioners from all countries working in security, privacy,</p>
<p class="MsoNormal">trustworthy data systems, and related areas to participate in the event.</p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">The aim of FPS is to discuss and exchange theoretical and practical ideas that</p>
<p class="MsoNormal">address security issues in interconnected systems. It aims to provide scientific</p>
<p class="MsoNormal">presentations and establish links and promote scientific collaboration, joint</p>
<p class="MsoNormal">research programs, and student exchanges between institutions involved in this</p>
<p class="MsoNormal">important and fast-moving research field.</p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">***************************************************************************</p>
<p class="MsoNormal">PROGRAM HIGHLIGHTS</p>
<p class="MsoNormal">***************************************************************************</p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><b>KEYNOTES<o:p></o:p></b></p>
<p class="MsoNormal">---------------------</p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Keynote 1: Laurent Oudot, Nomadic Honeypots: How to Create Actionable Cyber Threat Intelligence?</p>
<p class="MsoNormal">Keynote 2: StÈphanie Delaune, Formal verification of security protocols: the Squirrel prover</p>
<p class="MsoNormal">Keynote 3: Esma AÔmeur, Privacy and Cybersecurity Issues in the Era of Fake news and Generative Artificial Intelligence</p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><b>SESSIONS<o:p></o:p></b></p>
<p class="MsoNormal">---------------------</p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><b>1-IA and cyber security <o:p></o:p></b></p>
<p class="MsoNormal" style="text-indent:36.0pt">P1 76 Jo„o Vitorino, Miguel Silva, Eva Maia and Isabel PraÁa: An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection</p>
<p class="MsoNormal"> P2 42 Sadaf Md Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen and Youki Kadobayashi: Securing Smart Vehicles through Federated Learning</p>
<p class="MsoNormal"> P3 18 Daniel Fentham, David Parker and Mark Ryan: Using Reed-Muller Codes for Classification with Rejection and Recovery</p>
<p class="MsoNormal"> P4 51 Victor Aurora, Christopher Neal, Alexandre Proulx, Nora Boulahia-Cuppens and FrÈdÈric Cuppens: Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection</p>
<p class="MsoNormal"><b>2-Security Analysis <o:p></o:p></b></p>
<p class="MsoNormal"> P5 6 Mohamed Mekkouri and Christine Hennebert: Practices for Assessing the Security Level of Solidity Smart Contracts</p>
<p class="MsoNormal"> P6 25 Ruturaj Kiran Vaidya†and†Prasad Kulkarni: Effectiveness of Binary-Level CFI Techniques</p>
<p class="MsoNormal"> P7 79 Maxwel Bar-On, Bruhadeshwar Bezawada,†Indrakshi Ray†and†Indrajit Ray: A Small World ñPrivacy Preserving IoT Device-type Fingerprinting with Small Datasets</p>
<p class="MsoNormal"> P8 55 Pierre-Victor Besson, ValÈrie Viet Triem Tong, Gilles Guette, Guillaume Piolle and Erwan Abgrall: URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures</p>
<p class="MsoNormal"><b>3-Phishing & Social Network <o:p></o:p></b></p>
<p class="MsoNormal"> P9 17 Yukiko Sawaya, Ayane Sano, Takamasa Isohara, Akira Yamada and Ayako Komatsu: Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior?</p>
<p class="MsoNormal"> P10 44 Eric Dzeha and Guy-Vincent Jourdan: IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets</p>
<p class="MsoNormal"> P11 26 Emad Badawi,†Guy-Vincent Jourdan†and Iosif-Viorel: Onut Web Scams Detection System</p>
<p class="MsoNormal"><b>4-Vulnerabilities, Exploits, and Threats #1 <o:p>
</o:p></b></p>
<p class="MsoNormal"> P12 8 Mahmoud Zamani, Saquib Irtiza, Latifur Khan and Kevin Hamlen: VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes</p>
<p class="MsoNormal"> P13 2 Raphael Khoury, Bolduc JÈrÈmy, Jason LafreniËre and Abdel-Gany Junior Odedele: Analysis of Cryptographic CVEs: Lessons Learned and Perspectives</p>
<p class="MsoNormal"> P14 24 Mohamed El Amine Bekhouche and Kamel Adi: A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports.</p>
<p class="MsoNormal"> P15 74 Norah Ridley, Enrico Branca, Jadyn Kimber and Natalia Stakhanova: Enhancing Code Security Through Open-source Large Language Models: A Comparative Study</p>
<p class="MsoNormal"><b>5-Vulnerabilities, Exploits, and Threats #2</b></p>
<p class="MsoNormal"> P16 66 Seyed Behnam Andarzian, Cristian Daniele and Erik Poll: Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations</p>
<p class="MsoNormal"> P17 71 Farnood Faghihi, Mohammad Zulkernine and Steven Ding: Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware</p>
<p class="MsoNormal"> P18 52 Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, FrÈdÈric Cuppens and Alexandre Proulx: Automated Attacker Behaviour Classification Using Threat Intelligence Insights</p>
<p class="MsoNormal"> P19 61 Wassim Koribeche, David Espes and CÈdric Morin: UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls</p>
<p class="MsoNormal"><b>6- Malware Analysis <o:p></o:p></b></p>
<p class="MsoNormal"> P20 16 Julien Cassagne, Ettore Merlo,†Guy-Vincent Jourdan†and†Iosif Viorel Onut: Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code</p>
<p class="MsoNormal"> P21 29 Charles-Henry Bertand Van Ouytsel, Christophe Crochet, Axel Legay and Serena Lucca: On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr</p>
<p class="MsoNormal"> P22 46 Thanh-Hung Pham and Mizuhito Ogawa: Original Entry Point detection based on graph similarity</p>
<p class="MsoNormal"> P23 59 Martin Brisfors,†Michail Moraitis, Gabriel Klasson Landin and Truls Jilborg: Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure</p>
<p class="MsoNormal"><b>7-Security Design <o:p></o:p></b></p>
<p class="MsoNormal"> P24 22 John Breton, Jason Jaskolka and George O. M. Yee: Hardening Systems Against Data Corruption Attacks at Design Time</p>
<p class="MsoNormal"> P25 37 Ludovic Paillat, Claudia-Lavinia Ignat, Davide Frey, Mathieu Turuani and Amine Ismail: Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols</p>
<p class="MsoNormal"> P26 20 Ruize Wang and Elena Dubrova: A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm</p>
<p class="MsoNormal"> P27 30 Sayan Biswas, Kangsoo Jung and Catuscia Palamidessi: Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response</p>
<p class="MsoNormal">
</p>
<p class="MsoNormal">
</p>
<p class="MsoNormal"><b>Short paper #1 <o:p></o:p></b></p>
<p class="MsoNormal"> SP1 58 Denis Obrezkov and Karsten Sohr: UCAT: the Uniform Categorization for Access Control</p>
<p class="MsoNormal"> SP2 39 Markus Dahlmanns, Roman Matzutt, Chris Dax and Klaus Wehrle: Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach</p>
<p class="MsoNormal"> SP3 57 Jan Eske Gesell, Robin Buchta, Kilian Dangendorf, Pascal Franzke, Felix Heine and Carsten Kleiner: Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection</p>
<p class="MsoNormal"> SP4 49 Mohammad Alnabhan and Paula Branco: Evaluating Deep Learning for Cross-Domains Fake News Detection</p>
<p class="MsoNormal"><b>Short paper #2 <o:p></o:p></b></p>
<p class="MsoNormal"> SP5 50 Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi and Mourad Debbabi: Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting</p>
<p class="MsoNormal"> SP6 27 Ryosuke Kobayashi and Rie Yamaguchi Shigetomi: Trade-off between Authentication Performance and Detection Time for Zero-effort Attack in Location-based Authentication</p>
<p class="MsoNormal"> SP7 73 Thijs Veugen, Vincent Dunning, Michiel Marcus and Bart Kamphorst: Secure Latent Dirichlet Allocation</p>
<p class="MsoNormal"> SP8 21 Awaleh Houssein Meraneh, Fabien Autrel, HÈlËne Le Bouder and Marc Oliver Pahl: SADIS: real-time sound-based anomaly detection for industrial systems</p>
<p class="MsoNormal"> SP9 32 Valeria ValdÈs RÌos, Fatiha Zaidi, Ana Rosa Cavalli and Wissam Mallouli: A resilience Component for a Digital Twin</p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">***************************************************************************</p>
<p class="MsoNormal">Further details on the conference are available at </p>
<p class="MsoNormal"><a href="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fps-2023.com%2F&data=05%7C01%7C%7C9f76a214c0aa4170401708dbf37288b6%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638371445475594889%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BNRyyXYWfOwW1utynfX77nFwIfj0%2BT1aSH97GYF%2FN7w%3D&reserved=0" originalSrc="https://www.fps-2023.com/" shash="SMYzqSQkqfL+lwW6F7O/UnFYBXCpf7R7A9PlPNkmv4S+bjAdgT8uJ0njGBLNpWvwtDgnG0+gJHHxzK1HkHVgjnQ9Y7YLYnmyXrbGLhoXD9CZ7Wlss0kq7kMW5o1Ddqx8JyLgXI0Z3eYnDNL2dQdhnFKOArJX+Ntldp2af+NwX0g=">https://www.fps-2023.com/</a></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">We are looking forward to seeing you soon in Bordeaux City, France</p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><span lang="FR">General Chairs<o:p></o:p></span></p>
<p class="MsoNormal"><span lang="FR">Toufik Ahmed, Bordeaux INP, CNRS LaBRI, UniversitÈ Bordeaux, France.<o:p></o:p></span></p>
<p class="MsoNormal"><span lang="FR">Nora Cuppens, …cole Polytechnique de MontrÈal, Canada<o:p></o:p></span></p>
<p class="MsoNormal"><span lang="FR"><o:p> </o:p></span></p>
<p class="MsoNormal"><span lang="FR">TPC Chairs<o:p></o:p></span></p>
<p class="MsoNormal"><span lang="FR">Mohamed Mosbah Bordeaux INP, CNRS LaBRI, UniversitÈ Bordeaux, France.<o:p></o:p></span></p>
<p class="MsoNormal"><span lang="FR">Florence SËdes, University Toulouse III Paul Sabatier, France<o:p></o:p></span></p>
<p class="MsoNormal">Nadia Tawbi, Laval University, Canada</p>
</div>
</body>
</html>