+ All Categories
Home > Documents > 9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi...

9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi...

Date post: 31-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
12
th Quebec, Canada 24-26 October 2016 9 International Symposium FOUNDATIONS AND PRACTICE OF SECURITY PROGRAM
Transcript
Page 1: 9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi Castellà-Roca, Universitat Rovira i Virgili, ES §Frédéric Cuppens, Télécom Bretagne,

th

Quebec, Canada

24-26 October 20169 International

Symposium

FOUNDATIONS AND PRACTICE

OF SECURITY

PROGRAM

Page 2: 9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi Castellà-Roca, Universitat Rovira i Virgili, ES §Frédéric Cuppens, Télécom Bretagne,
Page 3: 9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi Castellà-Roca, Universitat Rovira i Virgili, ES §Frédéric Cuppens, Télécom Bretagne,

Dear participant,

Welcome to Quebec City, the capital of the province of Quebec. The city is known for its strong European feel, infuenced from its double heritage of French and English. Its name is derived from Algonquin, meaning “where the river narrows”. Indeed, driving an hour or two to the east will show you a part of the river whose locals colloquially refer to “the sea”. As you may have already noticed, Quebec City is fortifed, the only city north of Mexico whose walls still exist. We hope that you will have a fruitful week, and that you will enjoy what the city has to offer. You may bring your discussions for a walk on the Plains of Abraham, or down to the old city, where you will also find some of the fnest tables in Canada. We hope that you enjoy your stay, the conference, and hopefully, the weather.

General chairs Nora Cuppens and Nadia Tawbi

Page 4: 9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi Castellà-Roca, Universitat Rovira i Virgili, ES §Frédéric Cuppens, Télécom Bretagne,

FPS 2016General Chairs

§Nadia Tawbi, Université Laval, CA§Nora Cuppens, Télécom Bretagne, FR

PC Chairs

§Lingyu Wang, Concordia University, CA§Frédéric Cuppens, Télécom Bretagne, FR

Publications Chair

§Joaquin Garcia-Alfaro, Télécom SudParis, FR

Local Organizing Committee

§Nadia Tawbi, Université Laval, CA§Josée Desharnais, Université Laval, CA§Andrew Bedford, Université Laval, CA

Publicity Chair

§Raphaël Khoury, Université du Québec à Chicoutimi, CA

Program Committee

§Esma Aimeur, Université de Montréal, CA§Samiha Ayed, Telecom Bretagne, FR§Jordi Castellà-Roca, Universitat Rovira

i Virgili, ES§Frédéric Cuppens, Télécom Bretagne, FR§Nora Cuppens, Télécom Bretagne, FR§Mila Dalla Preda, University of Verona, IT§Jean-Luc Danger, Institut Télécom/Télé-

com ParisTech, CNRS/LTCI, FR§Mourad Debbabi, Concordia University, CA§Josée Desharnais, Université Laval, CA§Nicola Dragoni, DTU, Compute,

Technical University of Denmark, DK§Martin Gagne, Wheaton College, US§Sebastien Gambs, Université du Québec à Montréal, CA§Joaquin Garcia-Alfaro, Telecom

SudParis, FR

§Jordi Herrera, Universitat Autònoma de Barcelona, ES§Chunfu Jia, Nankai University, CN§Bruce Kapron, University of Victoria, CA§Raphaël Khoury, Université du Québec à

Chicoutimi, CA§Hyoungshick Kim, Sungkyunkwan

University, KP§Evangelos Kranakis, Carleton University

Computer Science, CA§Pascal Lafourcade, VERIMAG,

University of Grenoble, GD§Giovanni Livraga, Università degli Studi

di Milano, IT§Luigi Logrippo, Université du Québec en

Outaouais, CA§Flaminia Luccio, Universita' Ca' Foscari

Venezia, IT§Ilaria Matteucci, IIT-CNR, IT§Mohamed Mejri, Université Laval, CA§Guillermo Navarro-Arribas, Universitat

Autonoma de Barcelona, ES§Jordi Nin, Barcelona Supercomputing

Center (BSC) - Universitat Politècnica de Catalunya (UPC), ES§Melek Önen, EURECOM, FR§Andreas Pashalidis, BSI, DE§Marie-Laure Potet, Laboratoire Vérimag, FR§Silvio Ranise, FBK-Irst, IT§Andrea Saracino, Università di Pisa, IT§Claudio Soriente, Telefonica Research

and Development, CL

§Chamseddine Talhi, École de Technologie Supérieure de Montréal, CA§Nadia Tawbi, Université Laval, CA§Alexandre Viejo, Universitat Rovira i Virgili, ES§Lingyu Wang, Concordia University, CA

§Lena Wiese, Georg-August Universität Göttingen, DE§Nicola Zannone, Eindhoven University of

Technology, NL§Nur Zincir-Heywood, Dalhousie University, CA§Mohammad Zulkernine, Queen’s

University, CA

COMMITTEES

Page 5: 9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi Castellà-Roca, Universitat Rovira i Virgili, ES §Frédéric Cuppens, Télécom Bretagne,

Steering Committee

§Frédéric Cuppens, Telecom Bretagne, FR§Nora Cuppens-Boulahia, Telecom

Bretagne, FR§Mourad Debbabi, Concordia University, CA§Joaquin Garcia-Alfaro, Telecom

SudParis, FR§Evangelos Kranakis, Carleton University, CA§Pascal Lafourcade, Universite

d’Auvergne, FR§Jean-Yves Marion, Mines de Nancy, FR§Ali Miri, Ryerson University, CA§Rei Safavi-Naini, Calgary University, CA§Nadia Tawbi, Universite Laval, CA

Supported by :

Université Laval, CA

Université du Québec à Chicoutimi, CA

Concordia University, CA

Chair of Cyber CNI, FR

TELECOM Bretagne, FR

Springer, Part of Springer Science+Busines Media

TELECOM SudParis, FR

Institut Techologies de l’information et Sociétés, Université Laval

Page 6: 9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi Castellà-Roca, Universitat Rovira i Virgili, ES §Frédéric Cuppens, Télécom Bretagne,

8:30 Registration8:30 FPS 2016 Opening and Announcements9:00 Keynote Talk 1. Machine Learning, Big Data and Security. Francois Laviolette.

10:00 Coffee Break

Session 1: Malware and Anomaly Detection10:30 MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes. Antonio La Marra, fabio Martinelli, Andrea Saracino and Mina

Sheikhalishahi.11:00 Andrana: Quick and Accurate Malware Detection for Android. Andrew Bedford, Sébastien Garvin, Josée Desharnais, Nadia Tawbi,

Hana Ajakan, Frederic Audet and Bernard Lebel.11:30 Micro-Signatures: The Effectiveness of Known Bad N-Grams for

Network Anomaly Detection (short paper). Richard Harang and Peter Mell.

11:55 Lunch

Session 2: Intrusion Response13:30 Multi-Criteria Recommender Approach for Supporting Intrusion

Response System. Tarek Bouyahia, Nora Cuppens-Boulahia, Frédéric Cuppens and

Fabien Autrel.14:00 An Optimal Metric-Aware Response Selection Strategy for Intrusion

Response Systems. Nadine Herold, Matthias Wachs, Stephan-A. Posselt and Georg

Carle.14:30 Attack Mitigation by Data Structure Randomization (short paper). Zhongtian Chen and Hao Han.

14:55 Coffee Break

Session 3: Vulnerability Analysis and Security Networking15:30 Vulnerability Analysis of Software Defined Networking. Salaheddine Zerkane, David Espes, Frédéric Cuppens and Philippe

Le Parc.16:00 Towards Metric-Driven, Application-Specific Visualization of Attack

Graphs. Mickael Emirkanian-Bouchard and Lingyu Wang.16:30 Insider threat likelihood assessment for access control systems:

Quantitative approach (short paper). SofieneBoulares,KamelAdiandLuigiLogrippo.

16:55 FPS 2016 Announcement

October 24thMONDAY

Conferences: Room 4514Coffee Break: Hall du CercleLunch: Room 4512

9TH INTERNATIONAL SYMPOSIUMFOUNDATIONS AND PRACTICE OF SECURRITYPavillon Alphonse-Desjardins, ULaval

6 FPS 2016

Page 7: 9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi Castellà-Roca, Universitat Rovira i Virgili, ES §Frédéric Cuppens, Télécom Bretagne,

October 25thTUESDAY

Pavillon Alphonse-Desjardins, ULaval

The Montmorency Falls (French: Chutes Montmorency) is a large waterfall on the Montmorency River in Quebec,Canada. The falls are located on the boundary between the borough of Beauport, and Boischatel, about 12 km (7.5 mi) from the heart of old Quebec City. The area surrounding the falls is protected within the Montmorency Falls Park (French:Parc de la Chutes-Montmorency). The falls are at the mouth of the Montmorency River where it drops over the cliff shore into the Saint Lawrence River, opposite the western end of the Île d'Orleans.

8:30 Registration9:00 Keynote Talk 2. A morphological Approach to binary Code Analysis. Jean-Yves Morin

10:00 Coffee Break

Session 4: Privacy and Verification 10:30 An Enhancement of Privacy-preserving Wildcards Pattern Matching. TusharKantiSahaandTakeshiKoshiba.11:00 Privacy-aware Data Sharing in a Tree-based Categorical Clustering

Algorithm. Mina Sheikhalishahi, Mohamed Mejri, Nadia Tawbi and Fabio Martinelli.11:30 Three Views of Log Trace Triaging. RaphaelKhoury,SébastienGabouryandSylvainHallé.

12:00 Lunch

Session 5: Crypto and Communication Security13:30 A Multi-Round Side Channel Attack on AES using Belief Propagation. Hélène Le Bouder, Ronan Lashermes, Gaël Thomas, Yanis Linge

and Jean-Yves Zie.14:00 Anonymizable Ring Signature Without Pairing. Olivier Blazy, Xavier Bultel and Pascal Lafourcade.14:30 Security analysis of WirelessHART communication scheme. Lyes Bayou, David Espes, Nora Cuppens-Boulahia and Frédéric

Cuppens.

15:30 FPS-2017 Presentation

16:00 FPS 2016 Social Event and Gala Dinner

Page 8: 9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi Castellà-Roca, Universitat Rovira i Virgili, ES §Frédéric Cuppens, Télécom Bretagne,

8:30 Registration9:00 Keynote Talk 3. The Bitcoin & Blockchain Technology. Jeremy Clark.

10:00 Coffee Break

Session 6: Malware and Antivirus10:30 Function classification for the retro-engineering of malwares. Guillaume Bonfante and Julien Oury Nogues.11:00 On the Feasibility of Malware Authorship Attribution. Saed Alrabaee, Paria Shirani, Mourad Debbabi and Lingyu Wang.11:30 Semantically Non-Preserving Transformations for Antivirus Evalua-

tion (short paper). ErkanErsan,LiorMalkaandBruceKapron.

11:55 Lunch

Session 7: Web, Cloud, and Delegation13:30 A self-correcting information flow control model for the web-browser. Deepak Subramanian, Guillaume Hiet and Christophe Bidan.14:00 Threat Modeling for Cloud Data Center Infrastructures. Nawaf Alhebaishi, Lingyu Wang, Sushil Jajoda and Anoop Singhal.14:30 Strategies for Incorporating Delegation into Attribute-Based Access

Control (ABAC) (short paper). Daniel Servos and Sylvia L. Osborn.

14:55 Coffee Break

Session 8: Physical Security15:30 Patrolling Trees with Mobile Robots. JurekCzyzowicz,AdrianKosowski,EvangelosKranakis,andNajmeh

Taleb.16:00 Towards Side-Channel Secure Firmware Updates - A Minimalist

Anomaly Detection Approach. Oscar Guillen, Fabrizio De Santis, Ralf Brederlow and Georg Sigl.

WEDNESDAYOctober 26th

8 FPS 2016

Page 9: 9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi Castellà-Roca, Universitat Rovira i Virgili, ES §Frédéric Cuppens, Télécom Bretagne,

99TH INTERNATIONAL SYMPOSIUM ON FOUNDATIONS AND PRACTICE OF SECURITY

Page 10: 9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi Castellà-Roca, Universitat Rovira i Virgili, ES §Frédéric Cuppens, Télécom Bretagne,

10 FPS 2016

Page 11: 9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi Castellà-Roca, Universitat Rovira i Virgili, ES §Frédéric Cuppens, Télécom Bretagne,

Campus Map

119TH INTERNATIONAL SYMPOSIUM ON FOUNDATIONS AND PRACTICE OF SECURITY

Page 12: 9 th um - Université Laval · 2016-11-16 · §Samiha Ayed, Telecom Bretagne, FR §Jordi Castellà-Roca, Universitat Rovira i Virgili, ES §Frédéric Cuppens, Télécom Bretagne,

Recommended