- Main FPS conference is to be held at IMT Atlantique from November 25th to 27th, 2025
- Main conference is accompanied by a one-day workshop on November 24th, 2025
- Afternoon workshops are open to FPS participants ; participation is free of charge
Download the detailed program here
FPS 2025 Program at glance:

Session 1 : Security, Privacy, and Trust in Blockchain & Emerging Distributed Systems
Session Chair : Yvon Kermarrec
| Pierre Saha Fobougong, Mohamed Mejri and Kamel Aldi | "Towards A Pragmatic Selection Of Self-Sovereign Identity Security Measures : Exploiting Mitre Att&ck Graph And Multi-criteria Optimization" |
| Petr Dzurenda, Minh Tran, Mubashar Iqbal, Sara Ricci, Vaclav Stupka, Raimundas Matulevicius and Lukas Malina | "ForensicChain: Blockchain-based Secure Digital Forensic Investigations" |
| Jan Ariel Ocampo, Lejla Islami and Mina Alishahi | "Privacy-Preserving Federated Learning for IoT Intrusion Detection in 6G Networks" |
| Remi Barbier, Francoise Sailhan, Alexandre Reiffers-Masson and Loic Machado | "Scaling Blockchains with zk-Rollups: State of the Art and Implementation" |
Session 2 : Cyber Resilience and Risk Management in Enterprise Architectures
Session Chair : Reda Yaich
| Francis Wanko Naa, Nora Boulahia-Cuppens and Frederic Cuppens | "Eliciting metrics and evaluating cyber resilience of a capability in multilayer enterprise architecture" |
| Arslane Fawzi Halilou and Natalia Stakhanova | "Predicting IoT Security Vulnerabilities from Device Specifications" |
| N'Famoussa Kounon Nanamou, Neda Baghalizadeh-Moghadam, Kéren A Saint-Hilaire, Thibault Leblanc, Nora Cuppens, Frédéric Cuppens and Anis Bkakria | "Real-Time Insider Threat Hunting Based on Dynamic Risk Indicators" |
| Babacar Mbaye and Mohamed Mejri | "Optimizing Resilience in IT Architectures : A Multi-Objective Ontology-Based Approach" |
| Barbara Carminati, Elena Ferrari, Christian Rondanini, Azhar Muhammad Shahid and Luca Clementi | "COBRA-Z: Collaborative Blockchain Risk Assessment for Zero Trust Architecture" |
Session 3 : Formal Methods and Automated Analysis for Secure Software Systems
Session Chair : Kassem KALLAS
| Yekatierina Churakova, Mathias Ekstedt and Larissa Schmid | "Vexed by VEX Tools: Consistency Evaluation of Container Vulnerability Scanners" |
| Alberto Tacchella, Jurij Mihelič, David Cerdeira, José Martins, Sandro Pinto, Bruno Crispo and Marco Roveri | "Roveri : Towards a formal verification of the Bao Hypervisor" |
| Luis Soeiro, Thomas Robert and Stefano Zacchiroli | " Finding Software Supply Chain Attack Paths with Logical Attack Graphs" |
| Rémi Garcia, Paolo Modesti and Leo Freitas | "From provable models to provable implementations: translating Alice & Bob security protocols to F*" |
| Quentin Goux and Nadira Lammari | "Automatic Attack Script Generation: a MDA Approach" |
| Ludjina Benoit, Rim Ben Salem, Nora Boulahia-Cuppens and Frédéric Cuppens | "Mining Reliable ABAC Policies: A Specificity and Confidence-Aware Extension of Rhapsody" |
Session 4 : ML and Intelligent Systems for Attack Detection and Trust Evaluation
Session Chair : Frédéric Cuppens
| Antoine Rebstock, Yann Busnel and Romaric Ludinard | "A Grammar-Driven Approach to Model and Detect APT Attack Sequences" |
| Bastien Vuillod, Pierre-Alain Moellic and Jean-Max | "Watch Out for the Lifespan: Evaluating Backdoor Attacks Against Federated Model Adaptation" |
| Seán Óg Murphy, Utz Roedig and Cormac Sreenan | "Sreenan : Systematic Security Context Weighting for Trust Algorithms via AI/ML Model Performance Analysis" |
| Kobra Khanmohammadi, Pooria Roy, Raphael Khoury, Abdelwahab Hamou-Lhadj and Wilfried Patrick Konan | "WildCode: An Empirical Analysis of Code Generated by ChatGPT" |
| Miguel Silva, Daniela Pinto, João Vitorino, Eva Maia, Isabel Praça, Ivone Amorim and Maria Viamonte | "Binary and Multiclass Cyberattack Classification on GeNIS Dataset" |
| Bassirou Badiane, Valerie Viet Triem Tong and Yufei Han | "Towards Automated Botnet Threat Intelligence with Knowledge-Guided Large Language Models" |
Session 5 : Industrial Track
Session Chair : Davis Espes
| Pierre Mahieux, Mouhamadou Bamba Sakho, Gouenou Coatrieux and Reda Bellafqira | "An Improved Paillier-Based Reversible Watermarking Scheme for 3D Models with Reduced Complexity" |
| Yeoh Wei Zhu, Shaltiel Eloul, Yash Satsangi, Imran Bashir and Sudhir Upadhyay | "Towards adoption of private distributed ledgers for capital markets" |
| Florence Sèdes and Brice Chellet | "Dynamic Multilayer Information System Cartography for Cybersecurity, Compliance and Industrial Governance" |
| Francesco Ferazza and Konstantinos Mersinas | "Socio-Technical Friction: An Emergent Grounded Theory of DevSecOps Challenges" |
| Tanja Pavleska, Giovanni Paolo Sellitto, Helder Aranha and Massimiliano Masi | "Secure-by-Design Architectures for Cooperative Intelligent Transport Systems" |
| Leonie Wolf, Samson Umezulike, Gurur Öndarö, Sebastian Schinzel and Fabian Ising | "Practical Evaluation of the Crypto-Agility Maturity Model" |
Session 6 : Advances in Privacy-Preserving Cryptography and Secure Computation
Session Chair : Nora Cuppens Boulahia
| Yuan Liang, Giovanni Di Crescenzo and Haining Wang | "Sender-Efficient Identity-Based Encryption with Reduced Server Trust in the Key Curator Model" |
| Shohei Kaneko, Yang Li, Kazuo Sakiyama and Daiki Miyahara | "Counterfeit Coin Problem Can Be Extended to Secure Multiparty Computation" |
| El Hadji Mamadou Dia, Walid Arabi, Anis Bkakria and Reda Yaich | "Private Non-Interactive Gradient Boosting Decision Tree Evaluation Based on Homomorphic Encryption" |
| Nicolas Quero, Renaud Sirdey, Aymen Boudguiga, David Pointcheval, Quentin Sinh and Nadir Karam | "Scalable privacy-preserving database queries with FHE and PEKS" |
| Marc Damie, Mihai Pop and Merijn Posthuma | "Energy Consumption of TLS, Searchable Encryption and Fully Homomorphic Encryption" |
| Augustin P. Sarr | "An Embarrassingly Parallel Cryptanalysis of EC(H)MQV" |
Session 7 : Secure and Intelligent Network Architectures for Next-Generation Communications
Session Chair : Omar Mawloud
| Alex Pierron, Michel Barbeau, Luca De Cicco, Jose Manuel Rubio Hernan and Joaquin Garcia-Alfaro | "A Fairness-Aware Strategy for B5G Physical-layer Security Leveraging Reconfigurable Intelligent Surfaces" |
| Lucas Schrass, Yu Shen and Stefanie Roos | "Anonymous Proactive Distance Vector Routing in Connectivity-Restricted Environments" |
| Andrea Fulgence Ndreveloarisoa, Frédéric Guidec and Mawloud Omar | "A secure lightweight system based on device-to-device communication for objects sharing in local communities" |
| Matthew Bush, Dave McKay and Atefeh Mashatan | "Consumer Zero Trust: Towards a Principled Adaptation of Zero Trust for Consumer Networks " |
| João Vitorino, Daniela Pinto, Eva Maia, Ivone Amorim and Isabel Praça | "Revisiting Network Traffic Analysis: Compatible Network Flows for ML Models" |
| Hocine Attoumi, Etienne Gael Tajeuna and Mohand Said Allili | "Causal Graph Modeling of Network Traffic for Early Cyberattack Prediction" |
Session 8 : Secure, Explainable, and Efficient Machine Learning in Cybersecurity
Session Chair : Ranwa Al Mallah
| Ananta Raha, Junaeid Ahmed, Md Shohrab Hossain and Suryadipta Majumdar | "Defending Model Inversion Attack Using an Improved Filter-Based Approach" |
| Muhammed Tahir Akdeniz, Zeynep Yesilkaya, Ibrahim Enes Kose, Ismail Ulas Unal and Sevil Sen | "VOLTRON: Detecting Unknown Malware Using Graph-Based Zero-Shot Learning" |
| Alexandre Dohin, Karim Zkik, Omar Mawloud and Abdellah Akilal | "Deep Learning-Driven Energy Auditing for Smart Grid Cyberattack Detection" |
| Saba Kasrelou, Samuel Pierre and Ranwa Al-Mallah | "Verifiability of Unlearning Schemes Through Local Explanation" |
| Myria Bouhaddi, Feriel Sadoun and Kamel Adi | "Anomaly-Aware Aggregation for Robust Peer-to-Peer Machine Learning" |
| Shuaishuai Liu, Gergely Acs and Gergely Biczók | "Interdependent Privacy in Smart Homes: Hunting for Bystanders in Privacy Policies" |
| Daphnee Chabal, Dolly Sapra, Cees de Laat and Zoltan Mann | "QUOKKA: Faster Secure Neural Network Inference with Early-Exit Technology" |