Instructions for pre-recorded video can be found here [link] for remote presenters only.
Pre Proceedings
It can be downloaded here (password needed)
Presentation
Duration of presentation :
- SP (Short Paper) presentation: 12 min presentation + 3 minutes of questions
- Regular paper presentation: 15 min presentation + 5 minutes of questions
FPS 2023 Program
The schedule is provided in “Central European Standard Time” which is the one of Paris (GMT+1).
- Monday 11 Dec 2023
- Tuesday 12 Dec 2023
- Wednesday 13 Dec 2023
Monday 11 Dec 2023
08:00 - 08:44 Registration
No workshops in this session.
08:45 - 09:00 Opening Speech
Opening Speech
09:00 - 10:00 Keynote 1: Laurent Oudot
Laurent Oudot :
NOMADIC HONEYPOTS: HOW TO CREATE ACTIONABLE CYBER THREAT INTELLIGENCE?
10:00 - 11:00 Keynote 2: Stéphanie Delaune
Stéphanie Delaune
Formal verification of security protocols: the Squirrel prover
11:00 - 11:30 Coffee Break
Coffee Break
11:30 - 12:30 SP1
Short Papers 1
11:30 - 11:45 SP1 #58 Denis Obrezkov and Karsten Sohr UCAT: the Uniform Categorization for Access Control
58 Denis Obrezkov and Karsten Sohr UCAT: the Uniform Categorization for Access Control
11:45 - 12:00 SP2: #39 Markus Dahlmanns, Roman Matzutt, Chris Dax and Klaus Wehrle Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach
39 Markus Dahlmanns, Roman Matzutt, Chris Dax and Klaus Wehrle Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach
12:00 - 12:15 SP3: 57 Jan Eske Gesell, Robin Buchta, Kilian Dangendorf, Pascal Franzke, Felix Heine and Carsten Kleiner Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection
57 Jan Eske Gesell, Robin Buchta, Kilian Dangendorf, Pascal Franzke, Felix Heine and Carsten Kleiner Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection
12:15 - 12:30 SP4: #49 Mohammad Alnabhan and Paula Branco Evaluating Deep Learning for Cross-Domains Fake News Detection
49 Mohammad Alnabhan and Paula Branco Evaluating Deep Learning for Cross-Domains Fake News Detection
12:30 - 14:00 Lunch Break
Lunch Break
14:00 - 15:20 Artificial Intelligence (AI) Cybersecurity
Artificial Intelligence (AI) Cybersecurity
14:00 - 14:20 P1: #76 João Vitorino, Miguel Silva, Eva Maia and Isabel Praça An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection
76 João Vitorino, Miguel Silva, Eva Maia and Isabel Praça An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection
14:20 - 14:40 P2: #42 Sadaf Md Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen and Youki Kadobayashi Securing Smart Vehicles through Federated Learning
42 Sadaf Md Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen and Youki Kadobayashi Securing Smart Vehicles through Federated Learning
14:40 - 15:00 P3: #18 Daniel Fentham, David Parker and Mark Ryan Using Reed-Muller Codes for Classification with Rejection and Recovery
18 Daniel Fentham, David Parker and Mark Ryan Using Reed-Muller Codes for Classification with Rejection and Recovery
15:00 - 15:20 P4: #51 Victor Aurora, Christopher Neal, Alexandre Proulx, Nora Boulahia-Cuppens and Frédéric Cuppens
51 Victor Aurora, Christopher Neal, Alexandre Proulx, Nora Boulahia-Cuppens and Frédéric Cuppens
15:20 - 16:00 Coffee Break 2
Coffee Break 2
16:00 - 17:20 Security Analysis
Security Analysis
16:00 - 16:20 P5: #6 Mohamed Mekkouri and Christine Hennebert Practices for Assessing the Security Level of Solidity Smart Contracts
6 Mohamed Mekkouri and Christine Hennebert Practices for Assessing the Security Level of Solidity Smart Contracts
16:20 - 16:40 P6: #25 Ruturaj Kiran Vaidya and Prasad Kulkarni Effectiveness of Binary-Level CFI Techniques
25 Ruturaj Kiran Vaidya and Prasad Kulkarni Effectiveness of Binary-Level CFI Techniques
17:00 - 17:20 P8: #55 Pierre-Victor Besson, Valérie Viet Triem Tong, Gilles Guette, Guillaume Piolle and Erwan Abgrall URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures
55 Pierre-Victor Besson, Valérie Viet Triem Tong, Gilles Guette, Guillaume Piolle and Erwan Abgrall URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures
Tuesday 12 Dec 2023
08:00 - 09:00 Registration day 2
Registration
10:00 - 11:00 Keynote 3: Esma Aïmeur
Esma Aïmeur : Privacy and Cybersecurity Issues in the Era of Fake news and Generative Artificial Intelligence
11:00 - 11:30 Coffee Break 3
Coffee Break 3
11:30 - 12:45 SP2
Short Papers 2
11:30 - 11:45 SP5: #50 Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi and Mourad Debbabi Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting
50 Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi and Mourad Debbabi Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting
11:45 - 12:00 SP6: #27 Ryosuke Kobayashi and Rie Yamaguchi Shigetomi Trade-off between Authentication Performance and Detection Time for Zero-effort Attack in Location-based Authentication
27 Ryosuke Kobayashi and Rie Yamaguchi Shigetomi Trade-off between Authentication Performance and Detection Time for Zero-effort Attack in Location-based Authentication
12:00 - 12:15 SP8: #21 Awaleh Houssein Meraneh, Fabien Autrel, Hélène Le Bouder and Marc Oliver Pahl SADIS: real-time sound-based anomaly detection for industrial systems
21 Awaleh Houssein Meraneh, Fabien Autrel, Hélène Le Bouder and Marc Oliver Pahl SADIS: real-time sound-based anomaly detection for industrial systems
12:15 - 12:30 SP9: #32 Valeria Valdés Ríos, Fatiha Zaidi, Ana Rosa Cavalli and Wissam Mallouli
32 Valeria Valdés Ríos, Fatiha Zaidi, Ana Rosa Cavalli and Wissam Mallouli
12:45 - 14:00 Lunch Break day 2
Lunch Break day 2
14:00 - 15:20 Vulnerabilities, Exploits, and Threats #1
Vulnerabilities, Exploits, and Threats
14:00 - 14:20 P12: #8 Mahmoud Zamani, Saquib Irtiza, Latifur Khan and Kevin Hamlen VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes
8 Mahmoud Zamani, Saquib Irtiza, Latifur Khan and Kevin Hamlen VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes
14:20 - 14:40 P13: #2 Raphael Khoury, Bolduc Jérémy, Jason Lafrenière and Abdel-Gany Junior Odedele Analysis of Cryptographic CVEs: Lessons Learned and Perspectives
2 Raphael Khoury, Bolduc Jérémy, Jason Lafrenière and Abdel-Gany Junior Odedele Analysis of Cryptographic CVEs: Lessons Learned and Perspectives
14:40 - 15:00 P14: #24 Mohamed El Amine Bekhouche and Kamel Adi A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports.
24 Mohamed El Amine Bekhouche and Kamel Adi A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports.
15:00 - 15:20 P15: #74 Norah Ridley, Enrico Branca, Jadyn Kimber and Natalia Stakhanova Enhancing Code Security Through Open-source Large Language Models: A Comparative Study
74 Norah Ridley, Enrico Branca, Jadyn Kimber and Natalia Stakhanova Enhancing Code Security Through Open-source Large Language Models: A Comparative Study
15:20 - 16:00 Coffee Break 4
No workshops in this session.
16:00 - 17:20 Vulnerabilities, Exploits, and Threats #2
Vulnerabilities, Exploits, and Threats #2
16:00 - 16:20 P16: #66 Seyed Behnam Andarzian, Cristian Daniele and Erik Poll Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations
66 Seyed Behnam Andarzian, Cristian Daniele and Erik Poll Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations
16:40 - 17:00 P18: #52 Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens and Alexandre Proulx Automated Attacker Behaviour Classification Using Threat Intelligence Insights
52 Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens and Alexandre Proulx Automated Attacker Behaviour Classification Using Threat Intelligence Insights
17:00 - 17:20 P19: #61 Wassim Koribeche, David Espes and Cédric Morin UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls
61 Wassim Koribeche, David Espes and Cédric Morin UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls
Wednesday 13 Dec 2023
08:00 - 09:00 Registration day 3
Registration day 3
09:00 - 10:20 Malware Analysis
Malware Analysis
09:20 - 09:40 P21: #29 Charles-Henry Bertand Van Ouytsel, Christophe Crochet, Axel Legay and Serena Lucca On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr
29 Charles-Henry Bertand Van Ouytsel, Christophe Crochet, Axel Legay and Serena Lucca On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr
09:40 - 10:00 P22: #46 Thanh-Hung Pham and Mizuhito Ogawa Original Entry Point detection based on graph similarity
46 Thanh-Hung Pham and Mizuhito Ogawa Original Entry Point detection based on graph similarity
10:00 - 10:20 P23: #59 Martin Brisfors, Michail Moraitis, Gabriel Klasson Landin and Truls Jilborg Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure
59 Martin Brisfors, Michail Moraitis, Gabriel Klasson Landin and Truls Jilborg Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure
10:20 - 11:00 Coffee Break 5
Coffee Break 5
11:00 - 12:20 7-Security Design
7-Security Design
11:00 - 11:20 P24: #22 John Breton, Jason Jaskolka and George O. M. Yee Hardening Systems Against Data Corruption Attacks at Design Time
22 John Breton, Jason Jaskolka and George O. M. Yee Hardening Systems Against Data Corruption Attacks at Design Time
11:20 - 11:40 P25: #37 Ludovic Paillat, Claudia-Lavinia Ignat, Davide Frey, Mathieu Turuani and Amine Ismail Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols
37 Ludovic Paillat, Claudia-Lavinia Ignat, Davide Frey, Mathieu Turuani and Amine Ismail Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols
11:40 - 12:00 P26: #20 Ruize Wang and Elena Dubrova A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm
20 Ruize Wang and Elena Dubrova A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm
12:00 - 12:20 P27: #30 Sayan Biswas, Kangsoo Jung and Catuscia Palamidessi Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response
30 Sayan Biswas, Kangsoo Jung and Catuscia Palamidessi Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response
12:20 - 12:35 Closing, best paper award and announcement of FPS 2024
Closing, best paper award and announcement of FPS 2024
12:35 - 14:15 Lunch Break day 3
Lunch Break day 3