{"id":25,"date":"2025-04-07T11:37:22","date_gmt":"2025-04-07T09:37:22","guid":{"rendered":"https:\/\/hub.imt-atlantique.fr\/fps2025\/?page_id=25"},"modified":"2025-12-04T10:51:43","modified_gmt":"2025-12-04T09:51:43","slug":"accepted-papers","status":"publish","type":"page","link":"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/","title":{"rendered":"Accepted Papers"},"content":{"rendered":"\n<p><h3>Accepted as regular papers<\/h3><\/p>\n\n\n\n<p>1. QUOKKA: Faster Secure Neural Network Inference with Early-Exit Technology, <em>by Daphnee Chabal, Dolly Sapra, Cees de Laat and Zoltan Mann.<\/em><\/p>\n\n\n\n<p>2. Watch Out for the Lifespan: Evaluating Backdoor Attacks Against Federated Model Adaptation, <em>by Bastien Vuillod, Pierre-Alain Moellic and Jean-Max Dutertre.<\/em><\/p>\n\n\n\n<p>3. Eliciting metrics and evaluating cyber resilience of a capability in the context of a multilayer enterprise architecture, <em>by Francis Wanko Naa, Nora Boulahia-Cuppens and Frederic Cuppens.<\/em><\/p>\n\n\n\n<p>4. Vexed by VEX Tools: Consistency Evaluation of Container Vulnerability Scanners, <em>by Yekatierina Churakova, Mathias Ekstedt and Larissa Schmid.<\/em><\/p>\n\n\n\n<p>5. ForensicChain: Blockchain-based Secure Digital Forensic Investigations, <em>by Petr Dzurenda, Minh Tran, Mubashar Iqbal, Sara Ricci, Vaclav Stupka, Raimundas Matulevicius and Lukas Malina.<\/em><\/p>\n\n\n\n<p>6. Socio-Technical Friction: An Emergent Grounded Theory of DevSecOps Challenges, <em>by Francesco Ferazza and Konstantinos Mersinas.<\/em><\/p>\n\n\n\n<p><strong>7. Scalable privacy-preserving database queries with FHE and PEKS, <em>by Nicolas Quero, Renaud Sirdey, Aymen Boudguiga, David Pointcheval, Quentin Sinh and Nadir Karam.<\/em><\/strong> <strong>*BEST PHD PAPER AWARD*<\/strong><\/p>\n\n\n\n<p>8. Real-Time Insider Threat Hunting Based on Dynamic Risk Indicators, <em>by N'Famoussa Kounon Nanamou, Neda Baghalizadeh-Moghadam, K\u00e9ren A Saint-Hilaire, Thibault Leblanc, Nora Cuppens, Fr\u00e9d\u00e9ric Cuppens and Anis Bkakria.<\/em><\/p>\n\n\n\n<p>9. WildCode: An Empirical Analysis of Code Generated by ChatGPT, <em>by Kobra Khanmohammadi, Pooria Roy, Raphael Khoury, Abdelwahab Hamou-Lhadj and Wilfried Patrick Konan.<\/em><\/p>\n\n\n\n<p>10. Towards a formal verification of the Bao Hypervisor, <em>by Alberto Tacchella, Jurij Miheli\u010d, David Cerdeira, Jos\u00e9 Martins, Sandro Pinto, Bruno Crispo and Marco Roveri.<\/em><\/p>\n\n\n\n<p>11. VOLTRON: Detecting Unknown Malware Using Graph-Based Zero-Shot Learning, <em>by Muhammed Tahir Akdeniz, Zeynep Yesilkaya, Ibrahim Enes Kose, Ismail Ulas Unal and Sevil Sen.<\/em><\/p>\n\n\n\n<p>12. Deep Learning-Driven Energy Auditing for Smart Grid Cyberattack Detection, <em>by Alexandre Dohin, Karim Zkik, Omar Mawloud and Abdellah Akilal.<\/em><\/p>\n\n\n\n<p>13. Towards adoption of private distributed ledgers for capital markets, <em>by Yeoh Wei Zhu, Shaltiel Eloul, Yash Satsangi, Imran Bashir and Sudhir Upadhyay.<\/em><\/p>\n\n\n\n<p>14. Finding Software Supply Chain Attack Paths with Logical Attack Graphs, <em>by Luis Soeiro, Thomas Robert and Stefano Zacchiroli.<\/em><\/p>\n\n\n\n<p>15. Towards Automated Botnet Threat Intelligence with Knowledge-Guided Large Language Models, <em>by Bassirou Badiane, Valerie Viet Triem Tong and Yufei Han<\/em>.<\/p>\n\n\n\n<p><strong>16. A Fairness-Aware Strategy for B5G Physical-layer Security Leveraging Reconfigurable Intelligent Surfaces, <em>by Alex Pierron, Michel Barbeau, Luca De Cicco, Jose Manuel Rubio Hernan and Joaquin Garcia-Alfaro.<\/em><\/strong> <strong>*BEST PAPER AWARD*<\/strong><\/p>\n\n\n\n<p>17. Binary and Multiclass Cyberattack Classification on GeNIS Dataset, <em>by Miguel Silva, Daniela Pinto, Jo\u00e3o Vitorino, Eva Maia, Isabel Pra\u00e7a, Ivone Amorim and Maria Viamonte.<\/em><\/p>\n\n\n\n<p>18. Optimizing Resilience in IT Architectures: A Multi-Objective Ontology-Based Approach,&nbsp; <em>by Babacar Mbaye and Mohamed Mejri.<\/em><\/p>\n\n\n\n<p>19. APADV \u2013 Anonymous Proactive Distance Vector Routing in Connectivity-Restricted Environments, <em>by Lucas Schrass, Yu Shen and Stefanie Roos.<\/em><\/p>\n\n\n\n<p>20. Secure-by-Design Architectures for Cooperative Intelligent Transport Systems: A Standards-Aligned Approach, <em>by Tanja Pavleska, Giovanni Paolo Sellitto, Helder Aranha and Massimiliano Masi.<\/em><\/p>\n\n\n\n<p>21. Sender-Efficient Identity-Based Encryption with Reduced Server Trust in the Key Curator Model, <em>by Yuan Liang, Giovanni Di Crescenzo and Haining Wang.<\/em><\/p>\n\n\n\n<p>22. A secure lightweight system based on device-to-device communication for objects sharing in local communities, <em>by Andrea Fulgence Ndreveloarisoa, Fr\u00e9d\u00e9ric Guidec and Mawloud Omar.<\/em><\/p>\n\n\n\n<p>23. Counterfeit Coin Problem Can Be Extended to Secure Multiparty Computation, <em>by Shohei Kaneko, Yang Li, Kazuo Sakiyama and Daiki Miyahara.<\/em><\/p>\n\n\n\n<p>24. A Grammar-Driven Approach to Model and Detect APT Attack Sequences, <em>by Antoine Rebstock, Yann Busnel and Romaric Ludinard.<\/em><\/p>\n\n\n\n<p>25. An Improved Paillier-Based Reversible Watermarking Scheme for 3D Models with Reduced Complexity, <em>by Pierre Mahieux, Mouhamadou Bamba Sakho, Gouenou Coatrieux and Reda Bellafqira.<\/em><\/p>\n\n\n\n<p>26. Revisiting Network Traffic Analysis: Compatible network flows for ML models, <em>by Jo\u00e3o Vitorino, Daniela Pinto, Eva Maia, Ivone Amorim and Isabel Pra\u00e7a.<\/em><\/p>\n\n\n\n<p>27. Interdependent Privacy in Smart Homes: Hunting for Bystanders in Privacy Policies, <em>by Shuaishuai Liu, Gergely Acs and Gergely Bicz\u00f3k.<\/em><\/p>\n\n\n\n<p>28. Automatic Attack Script Generation: a MDA Approach, <em>by Quentin Goux and Nadira Lammari.<\/em><\/p>\n\n\n\n<p>29. From provable models to provable implementations: translating Alice &amp; Bob security protocols to F*, <em>by R\u00e9mi Garcia, Paolo Modesti and Leo Freitas.<\/em><\/p>\n\n\n\n<p>30. Predicting IoT Security Vulnerabilities from Device Specifications, <em>by Arslane Fawzi Halilou and Natalia Stakhanova.<\/em><\/p>\n\n\n\n<p>31. Systematic Security Context Weighting for Trust Algorithms via AI\/ML Model Performance Analysis, <em>by Se\u00e1n \u00d3g Murphy, Utz Roedig and Cormac Sreenan.<\/em><\/p>\n\n\n\n<p>32. Towards A Pragmatic Selection Of Self-Sovereign Identity Security Measures: Exploiting Mitre Att&amp;ck Graph And Multi-criteria Optimization, <em>by Pierre Saha Fobougong, Mohamed Mejri and Kamel Adi.<\/em><\/p>\n\n\n\n<p>33. Mining Reliable ABAC Policies: A Specificity and Confidence-Aware Extension of Rhapsody, <em>by Ludjina Benoit, Rim Ben Salem, Nora Boulahia-Cuppens and Fr\u00e9d\u00e9ric Cuppens.<\/em><\/p>\n\n\n\n<p>34. Consumer Zero Trust: Towards a Principled Adaptation of Zero Trust for Consumer Networks, <em>by Matthew Bush, Dave McKay and Atefeh Mashatan.<\/em><\/p>\n\n\n\n<p>35. Causal Graph Modeling of Network Traffic for Early Cyberattack Prediction, <em>by Hocine Attoumi, Etienne Gael Tajeuna and Mohand Said Allili.<\/em><\/p>\n\n\n\n<p>36. Privacy-Preserving Federated Learning for IoT Intrusion Detection in 6G Networks, <em>by Jan Ariel Ocampo, Lejla Islami and Mina Alishahi.<\/em><\/p>\n\n\n\n<p>37. StrawHat: Private Non-Interactive Gradient Boosting Decision Tree Evaluation Based on Homomorphic Encryption, <em>by El Hadji Mamadou Dia, Walid Arabi, Anis Bkakria and Reda Yaich.<\/em><\/p>\n\n\n\n<p>38. Practical Evaluation of the Crypto-Agility Maturity Model, <em>by Leonie Wolf, Samson Umezulike, Gurur \u00d6ndar\u00f6, Sebastian Schinzel and Fabian Ising.<\/em><\/p>\n\n\n\n<p><h3>Accepted as short papers<\/h3><\/p>\n\n\n\n<p>1. Energy Consumption of TLS, Searchable Encryption and Fully Homomorphic Encryption, <em>by Marc Damie, Mihai Pop and Merijn Posthuma.<\/em><\/p>\n\n\n\n<p>2. Verifiability of Unlearning Schemes Through Local Explanation, <em>by Saba Kasrelou, Samuel Pierre and Ranwa Al-Mallah.<\/em><\/p>\n\n\n\n<p>3. COBRA-Z: Collaborative Blockchain Risk Assessment for Zero Trust Architecture, <em>by Barbara Carminati, Elena Ferrari, Christian Rondanini, Azhar Muhammad Shahid and Luca Clementi.<\/em><\/p>\n\n\n\n<p>4. Scaling Blockchains with zk-Rollups: State of the Art and Implementation, <em>by Remi Barbier, Francoise Sailhan, Alexandre Reiffers-Masson and Loic Machado.<\/em><\/p>\n\n\n\n<p>5. An Embarrassingly Parallel Cryptanalysis of EC(H)MQV, by Augustin P. Sarr.<\/p>\n\n\n\n<p>6. Anomaly-Aware Aggregation for Robust Peer-to-Peer Machine Learning, <em>by Myria Bouhaddi, Feriel Sadoun and Kamel Adi.<\/em><\/p>\n\n\n\n<p>7. Defending Model Inversion Attack Using an Improved Filter-Based Approach, <em>by Ananta Raha, Junaeid Ahmed, Md Shohrab Hossain and Suryadipta Majumdar.<\/em><\/p>\n\n\n\n<p>8. Dynamic Multilayer Information System Cartography for Cybersecurity, Compliance and Industrial Governance: The CARTOGRAPHIT Framework, <em>by Florence S\u00e8des and Brice Chellet.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Accepted as regular papers 1. QUOKKA: Faster Secure Neural Network Inference with Early-Exit Technology, by Daphnee Chabal, Dolly Sapra, Cees de Laat and Zoltan Mann. 2. Watch Out for the Lifespan: Evaluating Backdoor Attacks Against Federated Model Adaptation, by Bastien Vuillod, Pierre-Alain Moellic and Jean-Max Dutertre. 3. Eliciting metrics and evaluating cyber resilience of a [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":22,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-25","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Accepted Papers - FPS 2025<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Accepted Papers - FPS 2025\" \/>\n<meta property=\"og:description\" content=\"Accepted as regular papers 1. QUOKKA: Faster Secure Neural Network Inference with Early-Exit Technology, by Daphnee Chabal, Dolly Sapra, Cees de Laat and Zoltan Mann. 2. Watch Out for the Lifespan: Evaluating Backdoor Attacks Against Federated Model Adaptation, by Bastien Vuillod, Pierre-Alain Moellic and Jean-Max Dutertre. 3. Eliciting metrics and evaluating cyber resilience of a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/\" \/>\n<meta property=\"og:site_name\" content=\"FPS 2025\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-04T09:51:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/\",\"url\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/\",\"name\":\"Accepted Papers - FPS 2025\",\"isPartOf\":{\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/#website\"},\"datePublished\":\"2025-04-07T09:37:22+00:00\",\"dateModified\":\"2025-12-04T09:51:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information for Authors\",\"item\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Accepted Papers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/#website\",\"url\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/\",\"name\":\"FPS 2025\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/#organization\",\"name\":\"FPS 2025\",\"url\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/04\/cropped-Capture-decran-2025-04-08-a-15.45.39.png\",\"contentUrl\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/04\/cropped-Capture-decran-2025-04-08-a-15.45.39.png\",\"width\":512,\"height\":512,\"caption\":\"FPS 2025\"},\"image\":{\"@id\":\"https:\/\/hub.imt-atlantique.fr\/fps2025\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Accepted Papers - FPS 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/","og_locale":"fr_FR","og_type":"article","og_title":"Accepted Papers - FPS 2025","og_description":"Accepted as regular papers 1. QUOKKA: Faster Secure Neural Network Inference with Early-Exit Technology, by Daphnee Chabal, Dolly Sapra, Cees de Laat and Zoltan Mann. 2. Watch Out for the Lifespan: Evaluating Backdoor Attacks Against Federated Model Adaptation, by Bastien Vuillod, Pierre-Alain Moellic and Jean-Max Dutertre. 3. Eliciting metrics and evaluating cyber resilience of a [&hellip;]","og_url":"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/","og_site_name":"FPS 2025","article_modified_time":"2025-12-04T09:51:43+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/","url":"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/","name":"Accepted Papers - FPS 2025","isPartOf":{"@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/#website"},"datePublished":"2025-04-07T09:37:22+00:00","dateModified":"2025-12-04T09:51:43+00:00","breadcrumb":{"@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/accepted-papers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/hub.imt-atlantique.fr\/fps2025\/"},{"@type":"ListItem","position":2,"name":"Information for Authors","item":"https:\/\/hub.imt-atlantique.fr\/fps2025\/authors\/"},{"@type":"ListItem","position":3,"name":"Accepted Papers"}]},{"@type":"WebSite","@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/#website","url":"https:\/\/hub.imt-atlantique.fr\/fps2025\/","name":"FPS 2025","description":"","publisher":{"@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hub.imt-atlantique.fr\/fps2025\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/#organization","name":"FPS 2025","url":"https:\/\/hub.imt-atlantique.fr\/fps2025\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/#\/schema\/logo\/image\/","url":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/04\/cropped-Capture-decran-2025-04-08-a-15.45.39.png","contentUrl":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-content\/uploads\/2025\/04\/cropped-Capture-decran-2025-04-08-a-15.45.39.png","width":512,"height":512,"caption":"FPS 2025"},"image":{"@id":"https:\/\/hub.imt-atlantique.fr\/fps2025\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/pages\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":6,"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/pages\/25\/revisions"}],"predecessor-version":[{"id":890,"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/pages\/25\/revisions\/890"}],"up":[{"embeddable":true,"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/pages\/22"}],"wp:attachment":[{"href":"https:\/\/hub.imt-atlantique.fr\/fps2025\/wp-json\/wp\/v2\/media?parent=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}