Program of the 7th Franco-Japanese Cybersecurity Workshop – October 24-26, 2022


Program of the 7th Franco-Japanese Cybersecurity Workshop – October 24-26, 2022

The 7th Franco-Japanese Cybersecurity Workshop will be held on October 24, 25 and 26, 2022 at Keio University, Tokyo, in presence, with some part online.

Registrations are now open

Please note that the Workshop is free and open to everyone but registration is mandatory.

Advanced Program

JST JAPAN CET FRANCE Monday October 24, 2022


Opening and Welcome address
Kohei Ito, President of Keio University
Shiho Moriai, NICT general director
Didier Marty-Dessus, Counsellor for Science and Technology at Embassy of France in Japan
Cécile Vigouroux, Inria’s director of international relations
Jacques Maleval, Director of CNRS NorthEast Asia Tokyo office
Koji Nakao, NICT
Ludovic Mé, Inria’s deputy scientific director in charge of cybersecurity
Mitsuhiro Okada, Keio University
Claude Kirchner, French national ethics committee (CCNE) and Inria
14:00-14:45 Inria and French national cybersecurity strategy
Ludovic Mé, Inria’s deputy scientific director in charge of cybersecurity
14:45-15:30 Introduction of Japanese Government Cybersecurity Strategy and Research and Development
Takaaki SAEKI, Counsellor, National center of Incident readiness and Strategy for Cybersecurity (NISC), Cabinet Secretariat, Government of Japan
15:30-16:00 Break
16:00-18:30 09:00-11:30 WG1 Formal Method Session (Hybrid session)
“AI-Fairness, Differential Privacy, Hypothesis Testing, Logical Verification”
Chair: Mitsuhiro Okada

  • On the need and applicability of Causality for Fairness
    Ruta Binkyte-Sadauskiene, Inria and Laboratoire d’Informatique de l’Ecole polytechnique
  • A privacy-preserving method for incremental collection of location data: differential privacy and beyond
    Sayan Biswas, Inria and Laboratoire d’Informatique de l’Ecole polytechnique
  • On Hypothesis Testing Interpretations of Renyi Differential Privacy
    Tetsuya Sato, Tokyo Institute of Technology
  • Reasoning About Hypothesis Testing Programs via Belief Hoare Logic
    Yusuke Kawamoto, AIST
  • Coq implementation of the computationally complete symbolic attacker
    Gergei Bana, University of Missouri
  • What is and will be, “Formal Method”?
    Mitsuhiro Okada, Keio University

 WG 2 “Cryptography” (On site only)
Chair: Phong Nguyen (Inria and ENS/PSL)

  • The NIST Post-Quantum Cryptography Standards
    Phong Nguyen (Inria and ENS/PSL)
  • Towards improved hash-and-sign lattice-based signatures
    Mehdi Tibouchi (NTT)
  • Forecasting cryptanalytic performance of quantum devices
    Yoshinori Aono (NICT)
19:30 Steering committee meeting/diner


08:55-09:00 Opening


AI and cybersecurity
·       Impact of New Internet Infrastructure
Jun Murai, Keio University
·       Avatar Society and Cyber Security
Hideki Sunahara, Keio University
·       Explainable AI for cybersecurity
Fabien Charmet, NICT
·       The value of learning for securing large-scale networks
Yann Busnel, IMT Atlantique, Rennes
·       Data protection
Hermann Gumpp, special Advisor Cybersecurity and Data Protection at DJW, Japanese-German Business Association
·     Discussion
Chair: Claude Kirchner
 10:45-11:00 Break

11:00 -12:30

Data collection, analysis, sharing for our join research
·       Introduction of CYNEX in NICT
Dai Inoue, NICT
·       Updates on IoT honeypot and malware analysis
Katsunari Yoshioka, YNU
·       Perspectives in Malware Research
Jean-Yves Marion, Loria (Université de Lorraine, CNRS) and IUF
·       Discussion
Chair Koji Nakao, NICT
12:30-14:00 Lunch Break
14:00 – 15:30 Cybersecurity research ethics
·       Recent hot topics and initiatives in Japan
Mitsuaki Akiyama, NTT
·       Recent hot topics and initiatives in France and EU
Claude Kirchner, CCNE and Inria
·       Discussion
Chair: Kavé Salamatian — Tallinn University of Technology
Participants : Mitsuaki Akiyama, Claude Kirchner, Mitsuhiro Okada
15:30 – 16:00 Break
16:00 – 18:30 WG “Events and Malware Analysis”
Chair: Dai Inoue,
·       Clone Hunting
Jean-Yves Marion, Loria (Université de Lorraine, CNRS) and IUF
·       An HDL Simulator with Direct Register Access for Improving Code Coverage
Ryoichi Isawa, NICT
·       Code deobfuscation: from white-blox to black-box
Sebastien Bardin, CEA
·       Scalable and Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering
Tianxiang He, Kyushu UniversityWG “Cooperation and Conflicts in Cyberspace”
Chair:   Kavé Salamatian
·       The indo-pacific region cyberstrategy with a focus on cable deployment in South Pacific islands
Sophie Hamel, Institut Français de Géopolitique
·       Title
·    Kave Salamatian tbc
WG “Network security and its performance measurement”
Chair: Gregory Blanc,
Télécom SudParis
·       Connecting the Dots: A knowledge Graph for Networking Data
Romain Fontugne, IIJ
·       Autonomous Driving Model Defense Study on Hijacking Adversarial Attack
Kabid Hassan Shibly, NAIST
·       Contributions of AI to the evaluation of intrusion detection systems
Gregory Blanc, Télécom SudParis
· Featuring, Monitoring and Detecting novel attacks targeting Low Latency services: the case of L4S
Guillaume Doyen, IMT Atlantique
·Auto-configuration of Intrusion Detection Systems Based on Past Experiences
Jérôme François, Inria
· Deep Learning-based Intrusion Detection Systems for In-vehicle CAN Bus Communication –
Md Delwar Hossain, NAIST
08:55-09:00 Opening
09:00-10:30 New areas and sectors for our joint research
·       Maritime sector
Kave Salamatian, Tallinn University of Technology
·       Connected car sector TBD
·       Global Security for the Metaverse
Claude Kirchner, CCNE and Inria
·       Medical sector
Bruno Charrat, CEA
·       Security testing of industrial components
Steffen Pfrang, Fraunhofer IOSB Karlsruhe
Chair: Koji Nakao
10:30-11:00 Break
11:00-12:30 General discussion on the organization of our cooperation

Chairs:  Ludovic Mé, Inria and Koji Nakao, NICT 

·       Summary of the previous sessions

·       Issues identified in our collaboration

·       Collaboration scheme to be considered

12:30 End of Workshop


Comments are closed.