FPS-2024: 17TH INTERNATIONAL SYMPOSIUM ON FOUNDATIONS & PRACTICE OF SECURITY
PROGRAM

Days: Monday, December 9th Tuesday, December 10th Wednesday, December 11th

Monday, December 9th

View this program: with abstractssession overviewtalk overview

10:30-12:05 Session 1: Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications
10:30
The Perfect Victim? Family Offices as Targets for Cybercriminals (abstract)
10:50
Advanced Real-Time Detection of Cyber Threat Information from Tweets (abstract)
11:10
Mitigating spillover effects of ransomware in financial markets: Lessons from the LockBit attacks (abstract)
11:25
Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective (abstract)
11:45
ICoSSiuM: an Integrated Communication Security Simulator for Maritime operations (abstract)
13:30-15:00 Session 2: Automating and enhancing security mechanisms in software systems and data management
13:30
Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security Experts (abstract)
13:50
An Approach to Determine a System's Behavioural Security Posture (abstract)
14:10
Secure Data Traceability for Mobile DataCollectors (abstract)
14:30
Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy (abstract)
16:20-17:35 Session 3: Cybersecurity and AI when applied to emerging technologies
16:20
Light-SABRE: A lightweight encrypted data distribution system for Internet of Things (abstract)
16:40
Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative Analysis (abstract)
17:00
Drone Anomaly Detection: Dataset and Unsupervised Machine Learning (abstract)
PRESENTER: Zhuo Chen
17:20
A Tool for Enabling Scalable Automation in Security Control Selection (abstract)
PRESENTER: Dylan Leveille
Tuesday, December 10th

View this program: with abstractssession overviewtalk overview

10:30-12:00 Session 4: Cybersecurity and Ethics

*includes a paper nominated for Best Paper Award

10:30
A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice (abstract)
10:50
An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy Mining (abstract)
11:05
Does Gender Matter? Examining and Mitigating Gender Bias in Fake News Detection (abstract)
PRESENTER: Dorsaf Sallami
11:25
ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-Domain Fake News Detection (abstract)
11:40
Parametric Automata for Dynamic Access Control Policies (abstract)
13:30-15:00 Session 5: Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure
13:30
Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses (abstract)
13:45
Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps (abstract)
14:05
Actively Secure Authenticated Data Acquisition Protocols: Advancing Substation Automation Security (abstract)
14:25
Enhancing Autonomy of Context-Aware Self-Healing in Fog Native Environments (abstract)
PRESENTER: Rasel Chowdhury
14:45
Detecting Cyber Attacks on Electric Vehicles Charging Stations (abstract)
Wednesday, December 11th

View this program: with abstractssession overviewtalk overview

09:10-10:45 Session 7: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace

*includes a paper nominated for Best Paper Award

09:10
Another Walk for Monchi (abstract)
09:25
An Innovative DSSE Framework: Ensuring Data Privacy and Query Verification in Untrusted Cloud Environments (abstract)
09:45
Privacy-Preserving Machine Learning Inference for Intrusion Detection (abstract)
10:05
Priv-IoT: Privacy-preserving Machine Learning in IoT Utilizing TEE and Lightweight Ciphers (abstract)
10:25
Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map (abstract)
13:30-15:00 Session 8: Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats

*includes a paper nominated for Best Paper Award

13:30
LocalIntel: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge (abstract)
13:50
Intelligent Green Efficiency for Intrusion Detection (abstract)
14:10
A Privacy-Preserving Behavioral Authentication System (abstract)
14:25
Automated Exploration of Optimal Neural Network Structures for Deepfake Detection (abstract)
14:40
An Empirical Study of Black-box based Membership Inference Attacks on a Real-World Dataset (abstract)
PRESENTER: Yujeong Kwon
15:15-16:45 Session 9: New trends of machine leaning and AI applied to cybersecurity
15:15
ModelForge: Using GenAI to Improve the Development of Security Protocols (abstract)
PRESENTER: Martin Duclos
15:35
Detecting Energy Attacks in the Battery-less Internet of Things (abstract)
15:55
Is Expert-Labeled Data Worth the Cost? Exploring Active and Semi-Supervised Learning Across Imbalance Scenarios in Financial Crime Detection (abstract)
16:10
ExploitabilityBirthMark: An Early Predictor of the Likelihood of Exploitation (abstract)
16:25
"You still have to study" - On the Security of LLM generated code. (abstract)