Program

We will be hosting the FPS 2022 conference on the first floor of the STEM building, in Room 117, which is located at 150 Louis-Pasteur Private at the University of Ottawa. Registration can be done here: Registration. If you are unable to be in Ottawa, you can still join online using this MS Teams link (same link for all three days). Speakers, please send us your presentation at your earlier convenience, so we could load them up ahead of the sessions.


Monday, December 12th, 2022
Tuesday, December 13th, 2022
Wednesday, December 14th, 2022

Keynotes & Sessions

Keynotes

Monday, December 12, 2021
09:00 – 10:00
Chair: Frédéric Cuppens
Searching for Searchable Encryption
Prof. Alexandra Boldyreva (Georgia Institute of Technology)     
Tuesday, December 13, 2021
09:00 – 10:00
Chair: Carlisle Adams
Secure Message Transmission Using Multiple Paths: Theory and Practice
Prof. Rei Safavi-Naini (University of Calgary)
Wednesday, December 14, 2021
09:00 – 10:00
Chair: Nadia Tawbi
Cyber Aspects of the Russian Ukraine War
Prof. Stephanie Carvin (Norman Paterson School of International Affairs)     

In-Person Sessions


Monday, December 12, 2021 – STEM building (Online)

Session 1: Machine Learning

Session Chair: Paola Branco

10:30 – 10:50P1: Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher
Amirhossein Ebrahimi Moghaddam, Francesco Regazzoni and Paolo Palmieri
10:50 – 11:10P2: Data-driven Evaluation of Intrusion Detectors : a Methodological Framework
Solayman Ayoubi, Gregory Blanc, Houda Jmila, Sébastien Tixeuil and Thomas Silverston
11:10 – 11:30P3: Deep-Learning-based Vulnerability Detection in Binary Executables
Andreas Schaad and Dominik Binder
11:30 – 11:50P4: CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter
Muhammad Mohzary, Khalid Almalki, Baek-Young Choi and Sejun Song

Session 2: Cryptography 1

Session Chair: Rei Safavi-Naini

13:30 – 13:50P5: A New Class of Trapdoor Verifiable Delay Functions
Ahmed M. Zawia and M. Anwar Hasan
13:50 – 14:10P6: A Survey on Identity-Based Blind Signature
Mirko Koscina, Pascal Lafourcade, Gael Marcadet, Charles Olivier-Anclin and Léo Robert
14:10 – 14:30P7: Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES
Martin Brisfors, Michail Moraitis and Elena Dubrova
14:30 – 14:50P8: Towards a Maturity Model for Crypto-Agility Assessment
Julian Hohm, Andreas Heinemann and Alexander Wiesmaier

Session 3: Cybercrime

Session Chair: Guy-Vincent Jourdan

15:30 – 15:50P9: A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection
Pavlo Burda, Luca Allodi and Nicola Zannone
15:50 – 16:10P10: Where is the Python Interpreter?
Guillaume Bonfante and Anuyan Ithayakumar
16:10 – 16:30P11: Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks
Daniel Fraunholz, Dominik Brunke, Lorenz Dumanski and Hartmut Koenig

Tuesday, December 13, 2021- STEM building (Online)

Session 4: Privacy

Session Chair: Nora Boulahia Cuppens

10:30 – 10:50P12: Malicious Human Behavior in Information System Security: Contribution to a Threat Model for Event Detection Algorithms
Olivier de Casanove and Florence Sedes
10:50 – 11:10P13: Underwater Confidential Communications in JANUS
Yannick Beaupré, Michel Barbeau and Stéphane Blouin
11:10 – 11:30P14: A Taxonomy and Gap-Analysis in Digital Privacy Education
Sumit Paul and David Knox
11:30 – 11:50P15: Differentially Private Friends Recommendation
Kamalkumar Macwan, Abdessamad Imine, Michael Rusinowitch 

Session 5: Cryptography 2

Session Chair: Joaquin Garcia-Alfaro 

15:10 – 15:30P16: Post-Quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone
Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier and David Pointcheval
15:30 – 15:50P17: Toward Secure Homomorphic Evaluation of Block-Cipher-Based Hash Functions
Adda Akram Bendoukha, Oana Stan, Renaud Sirdey, Quero Nicolas and Luciano Freitas
15:50 – 16:10P18: Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis
Shah Fahd, Mehreen Afzal, Dawood Shah, Waseem Iqbal and Atiya Hai
16:10 – 16:30P19: Security Analysis of Improved EDHOC Protocol
Baptiste Cottier and David Pointcheval


Wednesday, December 14, 2021- STEM building (Online)

Session 6: BlockChain

Session Chair: Laurent Mounier

10:30 – 10:50P20: Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts
Puneet Gill, Indrani Ray, Alireza Lotfi Takami and Mahesh Tripunitara
10:50 – 11:10P21: Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts
Sahar Salimpour, Farhad Kerama, Jorge Pe ̃na Queralta and Tomi Westerlund
11:10 – 11:30P22: Money Transfer on Transaction Signature-Based Ledger
Momoko Shiraishi and Hitoshi Aida
11:30 – 11:50P23: A Decentralized Mnemonic Backup System
Thierry Sans, David Ziming Liu and Kevin Oh
Session 7: IoT + Cryptography 3

Session Chair: Paria Shirani

13:30 – 13:50P24: If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes
Anthony Tam, Furkan Alaca and David Barrera
13:50 – 14:10P25: Towards Characterizing IoT Software Update Practices
Conner Bradley and David Barrera
14:10 – 14:30P26: Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords
Konrad-Felix Krentz and Thiemo Voigt
14:30 – 14:50P27: Two-layer Architecture for Signature-Based Attacks Detection Over Encrypted Network Traffic
Omar Tahmi, Chamseddine Talhi and Yacine Challal
Session 8: Social and Physical

Session Chair: Furkan Alaca

15:30 – 15:50P28: Defense Models for Data Recovery in Industrial Control Systems
Alvi Jawad and Jason Jaskolka
15:50 – 16:10P29: SCADA Radio Blackbox Reverse Engineering
Jean-Benoit Larouche, Sébastien Roy, Marc Frappier, Pierre-Martin Tardif and Frédéric Mailhot

Sponsors