Instructions for pre-recorded video can be found here [link] for remote presenters only.

Pre Proceedings

It can be downloaded here (password needed)

Presentation

Duration of presentation :

  • SP (Short Paper) presentation: 12 min presentation + 3 minutes of questions
  • Regular paper presentation: 15 min presentation + 5 minutes of questions

FPS 2023 Program

The schedule is provided in “Central European Standard Time” which is the one of Paris (GMT+1).

  • Monday 11 Dec 2023
  • Tuesday 12 Dec 2023
  • Wednesday 13 Dec 2023

Monday 11 Dec 2023

08:00 - 08:44 Registration

No workshops in this session.

08:45 - 09:00 Opening Speech

Opening Speech

09:00 - 10:00 Keynote 1: Laurent Oudot

Laurent Oudot :
NOMADIC HONEYPOTS: HOW TO CREATE ACTIONABLE CYBER THREAT INTELLIGENCE?

10:00 - 11:00 Keynote 2: Stéphanie Delaune

Stéphanie Delaune
Formal verification of security protocols: the Squirrel prover

11:00 - 11:30 Coffee Break

Coffee Break

11:30 - 12:30 SP1

Short Papers 1

11:30 - 11:45 SP1 #58 Denis Obrezkov and Karsten Sohr UCAT: the Uniform Categorization for Access Control

58 Denis Obrezkov and Karsten Sohr UCAT: the Uniform Categorization for Access Control

11:45 - 12:00 SP2: #39 Markus Dahlmanns, Roman Matzutt, Chris Dax and Klaus Wehrle Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach

39 Markus Dahlmanns, Roman Matzutt, Chris Dax and Klaus Wehrle Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach

12:00 - 12:15 SP3: 57 Jan Eske Gesell, Robin Buchta, Kilian Dangendorf, Pascal Franzke, Felix Heine and Carsten Kleiner Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection

57 Jan Eske Gesell, Robin Buchta, Kilian Dangendorf, Pascal Franzke, Felix Heine and Carsten Kleiner Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection

12:15 - 12:30 SP4: #49 Mohammad Alnabhan and Paula Branco Evaluating Deep Learning for Cross-Domains Fake News Detection

49 Mohammad Alnabhan and Paula Branco Evaluating Deep Learning for Cross-Domains Fake News Detection

12:30 - 14:00 Lunch Break

Lunch Break

14:00 - 15:20 Artificial Intelligence (AI) Cybersecurity

Artificial Intelligence (AI) Cybersecurity

14:00 - 14:20 P1: #76 João Vitorino, Miguel Silva, Eva Maia and Isabel Praça An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection

76 João Vitorino, Miguel Silva, Eva Maia and Isabel Praça An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection

14:20 - 14:40 P2: #42 Sadaf Md Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen and Youki Kadobayashi Securing Smart Vehicles through Federated Learning

42 Sadaf Md Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen and Youki Kadobayashi Securing Smart Vehicles through Federated Learning

14:40 - 15:00 P3: #18 Daniel Fentham, David Parker and Mark Ryan Using Reed-Muller Codes for Classification with Rejection and Recovery

18 Daniel Fentham, David Parker and Mark Ryan Using Reed-Muller Codes for Classification with Rejection and Recovery

15:00 - 15:20 P4: #51 Victor Aurora, Christopher Neal, Alexandre Proulx, Nora Boulahia-Cuppens and Frédéric Cuppens

51 Victor Aurora, Christopher Neal, Alexandre Proulx, Nora Boulahia-Cuppens and Frédéric Cuppens

15:20 - 16:00 Coffee Break 2

Coffee Break 2

16:00 - 17:20 Security Analysis

Security Analysis

16:00 - 16:20 P5: #6 Mohamed Mekkouri and Christine Hennebert Practices for Assessing the Security Level of Solidity Smart Contracts

6 Mohamed Mekkouri and Christine Hennebert Practices for Assessing the Security Level of Solidity Smart Contracts

16:20 - 16:40 P6: #25 Ruturaj Kiran Vaidya and Prasad Kulkarni Effectiveness of Binary-Level CFI Techniques

25 Ruturaj Kiran Vaidya and Prasad Kulkarni Effectiveness of Binary-Level CFI Techniques

16:40 - 17:00 P7: #79 Maxwel Bar-On, Bruhadeshwar Bezawada, Indrakshi Ray and Indrajit Ray A Small World –Privacy Preserving IoT Device-type Fingerprinting with Small Datasets

79 Maxwel Bar-On, Bruhadeshwar Bezawada, Indrakshi Ray and Indrajit Ray A Small World –Privacy Preserving IoT Device-type Fingerprinting with Small Datasets

17:00 - 17:20 P8: #55 Pierre-Victor Besson, Valérie Viet Triem Tong, Gilles Guette, Guillaume Piolle and Erwan Abgrall URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures

55 Pierre-Victor Besson, Valérie Viet Triem Tong, Gilles Guette, Guillaume Piolle and Erwan Abgrall URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures

18:00 - 20:00 Social Event: Cocktail

Social Event: Cocktail

Tuesday 12 Dec 2023

08:00 - 09:00 Registration day 2

Registration

09:00 - 10:00 Phishing & Social Network

Phishing & Social Network

09:00 - 09:20 P9: #17 Yukiko Sawaya, Ayane Sano, Takamasa Isohara, Akira Yamada and Ayako Komatsu Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior?

17 Yukiko Sawaya, Ayane Sano, Takamasa Isohara, Akira Yamada and Ayako Komatsu Does the Anchoring Effect Influence Individuals' Anti-Phishing Behavior?

09:20 - 09:40 P10: #44 Eric Dzeha and Guy-Vincent Jourdan IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets

44 Eric Dzeha and Guy-Vincent Jourdan IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets

09:40 - 10:00 P11: #26 Emad Badawi, Guy-Vincent Jourdan and Iosif-Viorel Onut Web Scams Detection System

26 Emad Badawi, Guy-Vincent Jourdan and Iosif-Viorel Onut Web Scams Detection System

10:00 - 11:00 Keynote 3: Esma Aïmeur

Esma Aïmeur : Privacy and Cybersecurity Issues in the Era of Fake news and Generative Artificial Intelligence

11:00 - 11:30 Coffee Break 3

Coffee Break 3

11:30 - 12:45 SP2

Short Papers 2

11:30 - 11:45 SP5: #50 Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi and Mourad Debbabi Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting

50 Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi and Mourad Debbabi Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting

11:45 - 12:00 SP6: #27 Ryosuke Kobayashi and Rie Yamaguchi Shigetomi Trade-off between Authentication Performance and Detection Time for Zero-effort Attack in Location-based Authentication

27 Ryosuke Kobayashi and Rie Yamaguchi Shigetomi Trade-off between Authentication Performance and Detection Time for Zero-effort Attack in Location-based Authentication

12:00 - 12:15 SP8: #21 Awaleh Houssein Meraneh, Fabien Autrel, Hélène Le Bouder and Marc Oliver Pahl SADIS: real-time sound-based anomaly detection for industrial systems

21 Awaleh Houssein Meraneh, Fabien Autrel, Hélène Le Bouder and Marc Oliver Pahl SADIS: real-time sound-based anomaly detection for industrial systems

12:15 - 12:30 SP9: #32 Valeria Valdés Ríos, Fatiha Zaidi, Ana Rosa Cavalli and Wissam Mallouli

32 Valeria Valdés Ríos, Fatiha Zaidi, Ana Rosa Cavalli and Wissam Mallouli

12:45 - 14:00 Lunch Break day 2

Lunch Break day 2

14:00 - 15:20 Vulnerabilities, Exploits, and Threats #1

Vulnerabilities, Exploits, and Threats

14:00 - 14:20 P12: #8 Mahmoud Zamani, Saquib Irtiza, Latifur Khan and Kevin Hamlen VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes

8 Mahmoud Zamani, Saquib Irtiza, Latifur Khan and Kevin Hamlen VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes

14:20 - 14:40 P13: #2 Raphael Khoury, Bolduc Jérémy, Jason Lafrenière and Abdel-Gany Junior Odedele Analysis of Cryptographic CVEs: Lessons Learned and Perspectives

2 Raphael Khoury, Bolduc Jérémy, Jason Lafrenière and Abdel-Gany Junior Odedele Analysis of Cryptographic CVEs: Lessons Learned and Perspectives

14:40 - 15:00 P14: #24 Mohamed El Amine Bekhouche and Kamel Adi A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports.

24 Mohamed El Amine Bekhouche and Kamel Adi A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports.

15:00 - 15:20 P15: #74 Norah Ridley, Enrico Branca, Jadyn Kimber and Natalia Stakhanova Enhancing Code Security Through Open-source Large Language Models: A Comparative Study

74 Norah Ridley, Enrico Branca, Jadyn Kimber and Natalia Stakhanova Enhancing Code Security Through Open-source Large Language Models: A Comparative Study

15:20 - 16:00 Coffee Break 4

No workshops in this session.

16:00 - 17:20 Vulnerabilities, Exploits, and Threats #2

Vulnerabilities, Exploits, and Threats #2

16:00 - 16:20 P16: #66 Seyed Behnam Andarzian, Cristian Daniele and Erik Poll Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations

66 Seyed Behnam Andarzian, Cristian Daniele and Erik Poll Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations

16:20 - 16:40 P17: #71 Farnood Faghihi, Mohammad Zulkernine and Steven Ding Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware

71 Farnood Faghihi, Mohammad Zulkernine and Steven Ding Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware

16:40 - 17:00 P18: #52 Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens and Alexandre Proulx Automated Attacker Behaviour Classification Using Threat Intelligence Insights

52 Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens and Alexandre Proulx Automated Attacker Behaviour Classification Using Threat Intelligence Insights

17:00 - 17:20 P19: #61 Wassim Koribeche, David Espes and Cédric Morin UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls

61 Wassim Koribeche, David Espes and Cédric Morin UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls

19:00 - 21:00 Social Event: Dinner

Social Event: Dinner
Le Café du Port -
1-2 Quai Deschamps
33100 - BORDEAUX

Wednesday 13 Dec 2023

08:00 - 09:00 Registration day 3

Registration day 3

09:00 - 10:20 Malware Analysis

Malware Analysis

09:00 - 09:20 P20: #16 Julien Cassagne, Ettore Merlo, Guy-Vincent Jourdan and Iosif Viorel Onut Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code

16 Julien Cassagne, Ettore Merlo, Guy-Vincent Jourdan and Iosif Viorel Onut Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code

09:20 - 09:40 P21: #29 Charles-Henry Bertand Van Ouytsel, Christophe Crochet, Axel Legay and Serena Lucca On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr

29 Charles-Henry Bertand Van Ouytsel, Christophe Crochet, Axel Legay and Serena Lucca On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr

09:40 - 10:00 P22: #46 Thanh-Hung Pham and Mizuhito Ogawa Original Entry Point detection based on graph similarity

46 Thanh-Hung Pham and Mizuhito Ogawa Original Entry Point detection based on graph similarity

10:00 - 10:20 P23: #59 Martin Brisfors, Michail Moraitis, Gabriel Klasson Landin and Truls Jilborg Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure

59 Martin Brisfors, Michail Moraitis, Gabriel Klasson Landin and Truls Jilborg Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure

10:20 - 11:00 Coffee Break 5

Coffee Break 5

11:00 - 12:20 7-Security Design

7-Security Design

11:00 - 11:20 P24: #22 John Breton, Jason Jaskolka and George O. M. Yee Hardening Systems Against Data Corruption Attacks at Design Time

22 John Breton, Jason Jaskolka and George O. M. Yee Hardening Systems Against Data Corruption Attacks at Design Time

11:20 - 11:40 P25: #37 Ludovic Paillat, Claudia-Lavinia Ignat, Davide Frey, Mathieu Turuani and Amine Ismail Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols

37 Ludovic Paillat, Claudia-Lavinia Ignat, Davide Frey, Mathieu Turuani and Amine Ismail Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols

11:40 - 12:00 P26: #20 Ruize Wang and Elena Dubrova A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm

20 Ruize Wang and Elena Dubrova A shared key recovery attack on a masked implementation of CRYSTALS-Kyber's encapsulation algorithm

12:00 - 12:20 P27: #30 Sayan Biswas, Kangsoo Jung and Catuscia Palamidessi Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response

30 Sayan Biswas, Kangsoo Jung and Catuscia Palamidessi Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response

12:20 - 12:35 Closing, best paper award and announcement of FPS 2024

Closing, best paper award and announcement of FPS 2024

12:35 - 14:15 Lunch Break day 3

Lunch Break day 3

Sponsors