[Om-announce] FPS 2023 - Call for Participation
Paria Shirani
pshirani at uottawa.ca
Sat Dec 2 21:07:47 CET 2023
*****************************************************************************
Call for Participation in 16th International Symposium on Foundations & Practice
of Security (FPS 2023)
December 11-13 2023
https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fps-2023.com%2F&data=05%7C01%7C%7C9f76a214c0aa4170401708dbf37288b6%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638371445475594889%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BNRyyXYWfOwW1utynfX77nFwIfj0%2BT1aSH97GYF%2FN7w%3D&reserved=0
***************************************************************************
Register now at : https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fps-2023.com%2Findex.php%2Fregistration%2F&data=05%7C01%7C%7C9f76a214c0aa4170401708dbf37288b6%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638371445475594889%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=sR6GppVXfeBCT2y8kymeApATm7N%2Bjf0%2F5JtY8UoYfbc%3D&reserved=0
***************************************************************************
Welcome to the 16th International Symposium on Foundations & Practice of
Security (FPS 2023).
The 16th symposium will be hosted by the Bordeaux Institute of Technologies
(Bordeaux INP), in Bordeaux, France, on December 11-13 2023. We invite
researchers and practitioners from all countries working in security, privacy,
trustworthy data systems, and related areas to participate in the event.
The aim of FPS is to discuss and exchange theoretical and practical ideas that
address security issues in interconnected systems. It aims to provide scientific
presentations and establish links and promote scientific collaboration, joint
research programs, and student exchanges between institutions involved in this
important and fast-moving research field.
***************************************************************************
PROGRAM HIGHLIGHTS
***************************************************************************
KEYNOTES
---------------------
Keynote 1: Laurent Oudot, Nomadic Honeypots: How to Create Actionable Cyber Threat Intelligence?
Keynote 2: StÈphanie Delaune, Formal verification of security protocols: the Squirrel prover
Keynote 3: Esma AÔmeur, Privacy and Cybersecurity Issues in the Era of Fake news and Generative Artificial Intelligence
SESSIONS
---------------------
1-IA and cyber security
P1 76 Jo„o Vitorino, Miguel Silva, Eva Maia and Isabel PraÁa: An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection
P2 42 Sadaf Md Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen and Youki Kadobayashi: Securing Smart Vehicles through Federated Learning
P3 18 Daniel Fentham, David Parker and Mark Ryan: Using Reed-Muller Codes for Classification with Rejection and Recovery
P4 51 Victor Aurora, Christopher Neal, Alexandre Proulx, Nora Boulahia-Cuppens and FrÈdÈric Cuppens: Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection
2-Security Analysis
P5 6 Mohamed Mekkouri and Christine Hennebert: Practices for Assessing the Security Level of Solidity Smart Contracts
P6 25 Ruturaj Kiran Vaidya†and†Prasad Kulkarni: Effectiveness of Binary-Level CFI Techniques
P7 79 Maxwel Bar-On, Bruhadeshwar Bezawada,†Indrakshi Ray†and†Indrajit Ray: A Small World ñPrivacy Preserving IoT Device-type Fingerprinting with Small Datasets
P8 55 Pierre-Victor Besson, ValÈrie Viet Triem Tong, Gilles Guette, Guillaume Piolle and Erwan Abgrall: URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures
3-Phishing & Social Network
P9 17 Yukiko Sawaya, Ayane Sano, Takamasa Isohara, Akira Yamada and Ayako Komatsu: Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior?
P10 44 Eric Dzeha and Guy-Vincent Jourdan: IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets
P11 26 Emad Badawi,†Guy-Vincent Jourdan†and Iosif-Viorel: Onut Web Scams Detection System
4-Vulnerabilities, Exploits, and Threats #1
P12 8 Mahmoud Zamani, Saquib Irtiza, Latifur Khan and Kevin Hamlen: VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes
P13 2 Raphael Khoury, Bolduc JÈrÈmy, Jason LafreniËre and Abdel-Gany Junior Odedele: Analysis of Cryptographic CVEs: Lessons Learned and Perspectives
P14 24 Mohamed El Amine Bekhouche and Kamel Adi: A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports.
P15 74 Norah Ridley, Enrico Branca, Jadyn Kimber and Natalia Stakhanova: Enhancing Code Security Through Open-source Large Language Models: A Comparative Study
5-Vulnerabilities, Exploits, and Threats #2
P16 66 Seyed Behnam Andarzian, Cristian Daniele and Erik Poll: Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations
P17 71 Farnood Faghihi, Mohammad Zulkernine and Steven Ding: Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware
P18 52 Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, FrÈdÈric Cuppens and Alexandre Proulx: Automated Attacker Behaviour Classification Using Threat Intelligence Insights
P19 61 Wassim Koribeche, David Espes and CÈdric Morin: UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls
6- Malware Analysis
P20 16 Julien Cassagne, Ettore Merlo,†Guy-Vincent Jourdan†and†Iosif Viorel Onut: Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code
P21 29 Charles-Henry Bertand Van Ouytsel, Christophe Crochet, Axel Legay and Serena Lucca: On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr
P22 46 Thanh-Hung Pham and Mizuhito Ogawa: Original Entry Point detection based on graph similarity
P23 59 Martin Brisfors,†Michail Moraitis, Gabriel Klasson Landin and Truls Jilborg: Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure
7-Security Design
P24 22 John Breton, Jason Jaskolka and George O. M. Yee: Hardening Systems Against Data Corruption Attacks at Design Time
P25 37 Ludovic Paillat, Claudia-Lavinia Ignat, Davide Frey, Mathieu Turuani and Amine Ismail: Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols
P26 20 Ruize Wang and Elena Dubrova: A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm
P27 30 Sayan Biswas, Kangsoo Jung and Catuscia Palamidessi: Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response
Short paper #1
SP1 58 Denis Obrezkov and Karsten Sohr: UCAT: the Uniform Categorization for Access Control
SP2 39 Markus Dahlmanns, Roman Matzutt, Chris Dax and Klaus Wehrle: Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach
SP3 57 Jan Eske Gesell, Robin Buchta, Kilian Dangendorf, Pascal Franzke, Felix Heine and Carsten Kleiner: Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection
SP4 49 Mohammad Alnabhan and Paula Branco: Evaluating Deep Learning for Cross-Domains Fake News Detection
Short paper #2
SP5 50 Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi and Mourad Debbabi: Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting
SP6 27 Ryosuke Kobayashi and Rie Yamaguchi Shigetomi: Trade-off between Authentication Performance and Detection Time for Zero-effort Attack in Location-based Authentication
SP7 73 Thijs Veugen, Vincent Dunning, Michiel Marcus and Bart Kamphorst: Secure Latent Dirichlet Allocation
SP8 21 Awaleh Houssein Meraneh, Fabien Autrel, HÈlËne Le Bouder and Marc Oliver Pahl: SADIS: real-time sound-based anomaly detection for industrial systems
SP9 32 Valeria ValdÈs RÌos, Fatiha Zaidi, Ana Rosa Cavalli and Wissam Mallouli: A resilience Component for a Digital Twin
***************************************************************************
Further details on the conference are available at
https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fps-2023.com%2F&data=05%7C01%7C%7C9f76a214c0aa4170401708dbf37288b6%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638371445475594889%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2BNRyyXYWfOwW1utynfX77nFwIfj0%2BT1aSH97GYF%2FN7w%3D&reserved=0
We are looking forward to seeing you soon in Bordeaux City, France
General Chairs
Toufik Ahmed, Bordeaux INP, CNRS LaBRI, UniversitÈ Bordeaux, France.
Nora Cuppens, …cole Polytechnique de MontrÈal, Canada
TPC Chairs
Mohamed Mosbah Bordeaux INP, CNRS LaBRI, UniversitÈ Bordeaux, France.
Florence SËdes, University Toulouse III Paul Sabatier, France
Nadia Tawbi, Laval University, Canada
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.openmath.org/pipermail/om-announce/attachments/20231202/80423b09/attachment-0001.htm>
More information about the Om-announce
mailing list