FOUNDATIONS AND PRACTICE OF SECURITY PROGRAM

th l tionam a n r e Int mposiu Sy ND A S TION A D N Y FOU ECURIT OF S 9 P TIC C A R e Queb 2 Oc 4-26 E c, Ca tobe nada r 201 PROGRAM 6 ...
Author: Lilian Dorsey
11 downloads 2 Views 7MB Size
th

l tionam a n r e Int mposiu Sy

ND A S TION A D N Y FOU ECURIT OF S

9

P

TIC C A R e Queb

2

Oc 4-26

E

c, Ca

tobe

nada

r 201

PROGRAM

6

Dear participant,

Welcome to Quebec City, the capital of the province of Quebec. The city is known for its strong European feel, infuenced from its double heritage of French and English. Its name is derived from Algonquin, meaning “where the river narrows”. Indeed, driving an hour or two to the east will show you a part of the river whose locals colloquially refer to “the sea”. As you may have already noticed, Quebec City is fortifed, the only city north of Mexico whose walls still exist. We hope that you will have a fruitful week, and that you will enjoy what the city has to offer. You may bring your discussions for a walk on the Plains of Abraham, or down to the old city, where you will also find some of the fnest tables in Canada. We hope that you enjoy your stay, the conference, and hopefully, the weather.

General chairs Nora Cuppens and Nadia Tawbi

COMMITTEES FPS 2016

§Jordi Herrera, Universitat Autònoma de

Steering Committee

§Nadia Tawbi, Université Laval, CA §Nora Cuppens, Télécom Bretagne, FR

§Chunfu Jia, Nankai University, CN §Bruce Kapron, University of Victoria, CA §Raphaël Khoury, Université du Québec à

§Frédéric Cuppens, Telecom Bretagne, FR §Nora Cuppens-Boulahia, Telecom

General Chairs

Barcelona, ES

Chicoutimi, CA

PC Chairs

§Hyoungshick Kim, Sungkyunkwan

§Lingyu Wang, Concordia University, CA §Frédéric Cuppens, Télécom Bretagne, FR

§Evangelos Kranakis, Carleton University

Publications Chair

§Joaquin Garcia-Alfaro, Télécom SudParis, FR

University, KP

Computer Science, CA

§Pascal Lafourcade, VERIMAG, University of Grenoble, GD

§Giovanni Livraga, Università degli Studi di Milano, IT

§Luigi Logrippo, Université du Québec en Outaouais, CA

Local Organizing Committee

§Flaminia Luccio, Universita' Ca' Foscari

§Nadia Tawbi, Université Laval, CA §Josée Desharnais, Université Laval, CA §Andrew Bedford, Université Laval, CA

§Ilaria Matteucci, IIT-CNR, IT §Mohamed Mejri, Université Laval, CA §Guillermo Navarro-Arribas, Universitat

Publicity Chair

§Jordi Nin, Barcelona Supercomputing

§Raphaël Khoury, Université du Québec à Chicoutimi, CA

Program Committee

§Esma Aimeur, Université de Montréal, CA §Samiha Ayed, Telecom Bretagne, FR §Jordi Castellà-Roca, Universitat Rovira i Virgili, ES

§Frédéric Cuppens, Télécom Bretagne, FR §Nora Cuppens, Télécom Bretagne, FR §Mila Dalla Preda, University of Verona, IT §Jean-Luc Danger, Institut Télécom/Télécom ParisTech, CNRS/LTCI, FR

§Mourad Debbabi, Concordia University, CA §Josée Desharnais, Université Laval, CA §Nicola Dragoni, DTU, Compute, Technical University of Denmark, DK

§Martin Gagne, Wheaton College, US §Sebastien Gambs, Université du Québec à Montréal, CA

§Joaquin Garcia-Alfaro, Telecom SudParis, FR

Venezia, IT

Bretagne, FR

§Mourad Debbabi, Concordia University, CA §Joaquin Garcia-Alfaro, Telecom SudParis, FR

§Evangelos Kranakis, Carleton University, CA §Pascal Lafourcade, Universite d’Auvergne, FR

§Jean-Yves Marion, Mines de Nancy, FR §Ali Miri, Ryerson University, CA §Rei Safavi-Naini, Calgary University, CA §Nadia Tawbi, Universite Laval, CA Supported by : Chair of Cyber CNI, FR

Autonoma de Barcelona, ES

Center (BSC) - Universitat Politècnica de Catalunya (UPC), ES

§Melek Önen, EURECOM, FR §Andreas Pashalidis, BSI, DE §Marie-Laure Potet, Laboratoire Vérimag, FR §Silvio Ranise, FBK-Irst, IT §Andrea Saracino, Università di Pisa, IT §Claudio Soriente, Telefonica Research and Development, CL

Concordia University, CA Institut Techologies de l’information et Sociétés, Université Laval Springer, Part of Springer Science+Busines Media TELECOM Bretagne, FR

§Chamseddine Talhi, École de

Technologie Supérieure de Montréal, CA

§Nadia Tawbi, Université Laval, CA §Alexandre Viejo, Universitat Rovira i Virgili, ES §Lingyu Wang, Concordia University, CA

TELECOM SudParis, FR

§Lena Wiese, Georg-August Universität Göttingen, DE

§Nicola Zannone, Eindhoven University of

Université Laval, CA

Technology, NL

§Nur Zincir-Heywood, Dalhousie University, CA §Mohammad Zulkernine, Queen’s University, CA

Université du Québec à Chicoutimi, CA

MONDAY October 24th 8:30 8:30 9:00

9TH INTERNATIONAL SYMPOSIUM

FOUNDATIONS AND PRACTICE OF SECURRITY Pavillon Alphonse-Desjardins, ULaval Conferences: Room 4514 Coffee Break: Hall du Cercle Lunch: Room 4512

Registration FPS 2016 Opening and Announcements Keynote Talk 1. Machine Learning, Big Data and Security.

TUESDAY October 25th

8:30 9:00

Registration Keynote Talk 2. A morphological Approach to binary Code Analysis. Jean-Yves Morin

Francois Laviolette.

10:00 Coffee Break

10:00 Coffee Break

Session 4: Privacy and Verification 10:30 An Enhancement of Privacy-preserving Wildcards Pattern Matching.

Session 1: Malware and Anomaly Detection



10:30 MalProfiler: Automatic and Effective Classification of Android

Tushar Kanti Saha and Takeshi Koshiba.

Malicious Apps in Behavioral Classes. Antonio La Marra, fabio Martinelli, Andrea Saracino and Mina Sheikhalishahi. 11:00 Andrana: Quick and Accurate Malware Detection for Android. Andrew Bedford, Sébastien Garvin, Josée Desharnais, Nadia Tawbi, Hana Ajakan, Frederic Audet and Bernard Lebel. 11:30 Micro-Signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection (short paper). Richard Harang and Peter Mell.

11:00 Privacy-aware Data Sharing in a Tree-based Categorical Clustering

11:55 Lunch

13:30 A Multi-Round Side Channel Attack on AES using Belief Propagation.

Algorithm. Mina Sheikhalishahi, Mohamed Mejri, Nadia Tawbi and Fabio Martinelli. 11:30 Three Views of Log Trace Triaging. Raphael Khoury, Sébastien Gaboury and Sylvain Hallé. 12:00 Lunch

Session 5: Crypto and Communication Security Hélène Le Bouder, Ronan Lashermes, Gaël Thomas, Yanis Linge and Jean-Yves Zie. 14:00 Anonymizable Ring Signature Without Pairing. Olivier Blazy, Xavier Bultel and Pascal Lafourcade. 14:30 Security analysis of WirelessHART communication scheme. Lyes Bayou, David Espes, Nora Cuppens-Boulahia and Frédéric Cuppens.

Session 2: Intrusion Response 13:30 Multi-Criteria Recommender Approach for Supporting Intrusion

Response System. Tarek Bouyahia, Nora Cuppens-Boulahia, Frédéric Cuppens and Fabien Autrel. 14:00 An Optimal Metric-Aware Response Selection Strategy for Intrusion Response Systems. Nadine Herold, Matthias Wachs, Stephan-A. Posselt and Georg Carle. 14:30 Attack Mitigation by Data Structure Randomization (short paper). Zhongtian Chen and Hao Han.

15:30 FPS-2017 Presentation 16:00 FPS 2016 Social Event and Gala Dinner

14:55 Coffee Break

Session 3: Vulnerability Analysis and Security Networking 15:30 Vulnerability Analysis of Software Defined Networking.

Salaheddine Zerkane, David Espes, Frédéric Cuppens and Philippe Le Parc. 16:00 Towards Metric-Driven, Application-Specific Visualization of Attack Graphs. Mickael Emirkanian-Bouchard and Lingyu Wang. 16:30 Insider threat likelihood assessment for access control systems: Quantitative approach (short paper). Sofiene Boulares, Kamel Adi and Luigi Logrippo. 16:55 FPS 2016 Announcement

FPS

2016

6

The Montmorency Falls (French: Chutes Montmorency) is a large waterfall on the Montmorency River in Quebec,Canada. The falls are located on the boundary between the borough of Beauport, and Boischatel, about 12 km (7.5 mi) from the heart of old Quebec City. The area surrounding the falls is protected within the Montmorency Falls Park (French:Parc de la Chutes-Montmorency). The falls are at the mouth of the Montmorency River where it drops over the cliff shore into the Saint Lawrence River, opposite the western end of the Île d'Orleans.

WEDNESDAY October 26th

8:30 9:00

Registration Keynote Talk 3. The Bitcoin & Blockchain Technology.

Jeremy Clark.

10:00 Coffee Break

Session 6: Malware and Antivirus 10:30 Function classification for the retro-engineering of malwares.

Guillaume Bonfante and Julien Oury Nogues. 11:00 On the Feasibility of Malware Authorship Attribution.

Saed Alrabaee, Paria Shirani, Mourad Debbabi and Lingyu Wang. 11:30 Semantically Non-Preserving Transformations for Antivirus Evalua-



tion (short paper). Erkan Ersan, Lior Malka and Bruce Kapron.

11:55 Lunch

Session 7: Web, Cloud, and Delegation 13:30 A self-correcting information flow control model for the web-browser.

Deepak Subramanian, Guillaume Hiet and Christophe Bidan. 14:00 Threat Modeling for Cloud Data Center Infrastructures.

Nawaf Alhebaishi, Lingyu Wang, Sushil Jajoda and Anoop Singhal. 14:30 Strategies for Incorporating Delegation into Attribute-Based Access

Control (ABAC) (short paper). Daniel Servos and Sylvia L. Osborn. 14:55 Coffee Break

Session 8: Physical Security 15:30 Patrolling Trees with Mobile Robots.



Jurek Czyzowicz,Adrian Kosowski, Evangelos Kranakis, and Najmeh Taleb. 16:00 Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection Approach. Oscar Guillen, Fabrizio De Santis, Ralf Brederlow and Georg Sigl.

FPS

2016

8

9TH INTERNATIONAL SYMPOSIUM ON FOUNDATIONS AND PRACTICE OF SECURITY

9

Campus Map

FPS

2016

10

9TH INTERNATIONAL SYMPOSIUM ON FOUNDATIONS AND PRACTICE OF SECURITY

11