

{"id":352,"date":"2017-04-26T10:01:00","date_gmt":"2017-04-26T08:01:00","guid":{"rendered":"http:\/\/project.inria.fr\/FranceJapanICST\/?page_id=352"},"modified":"2024-03-20T08:57:21","modified_gmt":"2024-03-20T07:57:21","slug":"presentations","status":"publish","type":"page","link":"https:\/\/project.inria.fr\/FranceJapanICST\/wokshops\/2017-program\/presentations\/","title":{"rendered":"2017 Presentations"},"content":{"rendered":"<p><strong>MEETING PROGRAM<\/strong><\/p>\n<p><strong>Monday, April 24<\/strong><\/p>\n<p>09:30 &#8211; 10:00 Welcome and introduction : Prof. Hiro Kokuryo, Vice-President of Keio University,\u00a0\u00a0 Dr. Hideyuki Tokuda, President of NICT, Mitsuhiro Okada, Koji Nakao, Claude Kirchner<br \/>\n10:00 &#8211; 10:45 Keynote 1, S\u00e9bastien Gambs, UQAM :\u00a0 Big Data and Privacy &#8211; current trends and future challenges <a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/SGambs_presentation_2017.pdf\">(presentation)<\/a><br \/>\n10:45 &#8211; 11:15 Break<br \/>\n11:15 &#8211; 11:45 &#8211; Presentation of CSA Eunity: Gr\u00e9gory Blanc, IMT (<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/GBlanc_presentation_2017.pdf\">presentation)<\/a><br \/>\n&#8211; preGDR cybersecurity: Jean-Yves Marion, Universit\u00e9 de Lorraine and LORIA (<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/GAvoine_presentation_2017.pdf\">presentation)<\/a><br \/>\n&#8211; Cybersecurity academic activities in France and Europe: Claude Kirchner, Inria <a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/CKirchner_presentation_2017.pdf\">(presentation)<\/a><br \/>\n11:45 &#8211; 12:15 Cybersecurity strategy in Japan: Mr. Yamauchi, NISC (<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/TYamauchi_presentation_2017.pdf\">presentation)<\/a><\/p>\n<p>Lunch<\/p>\n<p>13:45 &#8211; 14:45 Industrial session 1<br \/>\n* Detection and classification of phishing webpages with supervised learning: Adrien Gendre, Vade Secure (presentation)<br \/>\n* LIEF &#8211; Library to Instrument Executable Formats: Romain Thomas, Quarkslab (<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/RThomas_presentation_2017.pdf\">presentation)<\/a><br \/>\n* Securing against cyber-attacks at physical level: Cyber-CPU: Sylvain Guilley and Yan-Taro Clochard, Secure IC <a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/YTClochard_presentation_2017.pdf\">(presentation)<\/a><br \/>\n14:45 &#8211; 15:45 Overall short presentations of the current 7 active French-Japanese WGs<br \/>\n15:45 &#8211; 16:05 Break<br \/>\n16:05 &#8211; 17:45 Parallel session WG 1, 2, 6:<br \/>\n-1- (Formal Method) Proving Security: from Formal\u00a0 to Practical,\u00a0 Main Conference Room (3rd Floor)<br \/>\n16:05 &#8211; 16:10\u00a0 Introduction Mitsuhiro Okada, Keio University<br \/>\n16:10 &#8211; 16:25 Symbolic Verification of Complexity-Theoretic Properties of Cryptographic Protocols and Attack Discovery Using First Order Logic,\u00a0 Gergei Bana, University of Luxembourg and Mitsuhiro Okada, Keio University<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/GBana_presentation_2017.pdf\"> (presentation)<\/a><br \/>\n16:25 &#8211; 16:40 Modeling and analysis of information leakage, Yusuke Kawamoto, AIST<br \/>\n16:40 &#8211; 16:55 Pip: A Minimal OS Kernel with Provable Isolation, David Nowak, CNRS &amp; Lille 1 University <a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/DNowak_presentation_2017.pdf\">(presentation)<\/a><br \/>\n16:55 &#8211; 17:10 Formal Foundations of 3D Geometry to Model Robot Manipulators, Reynald Affeldt, AIST <a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/RAffeldt_presentation_2017.pdf\">(presentation)<\/a><br \/>\n17:10 &#8211; 17:25 BE-PUM: A binary code analyzer and its applications on malware analysis, Mizuhito Ogawa, JAIST<br \/>\n17:25 &#8211; 17:40\u00a0 Logic and Computation (tentative title),\u00a0 Jean-Baptiste Joinet , Univ. Lyon 3, Guest Speaker of WG1<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/JBJoinet_presentation_2017.pdf\"> (presentation)<\/a><br \/>\n17:35 &#8211; 17:40 Concluding Discussion on Formal Method for Cybersecurity<br \/>\n-2- Cryptography: Room 1 {Tentative Program)<br \/>\n16:05 &#8211; 16:15 Introduction and Status of Working Group, Shiho Moriai (NICT) and Phong Nguyen (Inria and CNRS\/JFLI\/Univ. Tokyo)<br \/>\n16:15 &#8211; 16:40 Physical Attacks on Lattice-based Cryptography, Mehdi Tibouchi (NTT)<br \/>\n16:40 &#8211; 17:05 Random Sampling Revisited: Lattice Enumeration with Discrete Pruning, Yoshinori Aono (NICT)<br \/>\n17:05 &#8211; 17:30 Selection of Cryptographic Algorithms: ANSSI Recommendations \u2013 an Outline, Gu\u00e9na\u00ebl Renault (ANSSI)<br \/>\n17:30 &#8211; 17:40 Discussion and Future plans,\u00a0 Shiho Moriai (NICT) and Phong Nguyen (Inria and CNRS\/JFLI\/Univ. Tokyo)<br \/>\n-6- ICS\/ITS: Room 2<br \/>\n16:05 &#8211; 16:15 Introduction and Status of Working Group, Assia Tria (CEA) and Koji Nakao (NICT)<br \/>\n16:15 &#8211; 17:00 Introduction of CSSC, Dr. Kiuchi (CSSC)<br \/>\n17:05 &#8211; 17:30 Presentation from Francem Lo\u00efc Gu\u00e9zo<br \/>\n17:30 &#8211; 17:40 Discussion and Future plans, Assia Tria (CEA) and Koji Nakao (NICT)<br \/>\n17:45 &#8211; 18:30 Keynote 2, Tsutomu Matsumoto, Yokohama National University : Identity of Things: Nano Artifact Metrics Using Silicon Random Nanostructures<br \/>\n18:30\u00a0 Closing remarks of the day by Jacques Maleval, French Embassy<\/p>\n<p>19:00 Reception at French Embassy<\/p>\n<p><strong>Tuesday, April 25<\/strong><\/p>\n<p>09:30 &#8211; 10:15 Keynote 3, Yuki Kadobayashi, Nara Institute of Science and Technology (NAIST), Experiences in Japan-France collaboration through existing funding instruments: the case of NECOMA project<br \/>\n10:15 &#8211; 10:45 Break<br \/>\n10:45 &#8211; 11:30\u00a0 Industrial session 2<br \/>\n* Security issues and solutions for next generation Factories, Yuki Ueda, Trend Micro <a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/YUeda_presentation_2017.pdf\">(presentation)<\/a><br \/>\n11:30 &#8211; 12:00 Strategic cooperation \/ funding strategy: H\u00e9l\u00e8ne Kirchner, Inria (p<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/DPEI_Presentation_2017.pdf\">resentation)<\/a><\/p>\n<p>12:00 &#8211; 13:30 Lunch<\/p>\n<p>13:30 &#8211; 14:30 Round table Future academic and industrial shared challenges in cybersecurity [Coordinated by Koji Nakao and Claude Kirchner]<br \/>\n14:30 &#8211; 16:00 Parallel session WG 3, 4, 5, 7:<br \/>\n-3- Events and Malware Analysis: Room 1<br \/>\n14:30 &#8211; 14:50 Latest Update on NICTER Project: Large-scale monitoring and preliminary analysis for IoT malware, Daisuke Inoue, NICT<br \/>\n14:50 &#8211; 15:10 Latest Update on IoTPOT: current implementation, deployment and results, Katsunari Yoshioka, YNU<br \/>\n15:10 &#8211; 15:30 Latest update on Morphological analysis: Analysing obsfusacated x86 using dynamic and formal methods, Jean-Yves Marion, Universit\u00e9 de Lorraine and LORIA<br \/>\n15:30 &#8211; 15:50 Applications of BE-PUM: packer identification and beyond, Mizuhito Ogawa, JAIST<br \/>\n15:50 &#8211; 16:00 Discussion on WG 3 further collaboration<br \/>\n-4- System Security and IoT security: Room 2 (Ground Floor)<br \/>\n14:30 &#8211; 14:50 SCA in TrustZone on mobile phone, S\u00e9banjila Kevin Bukasa, Inria<br \/>\n14:50 &#8211; 15:10 Recent Trends on White-Box Cryptography, Yuto Nakano, KDDI Research Inc.<br \/>\n15:10 &#8211; 15:30 Securing software against cache timing attacks, Sylvain Guilley, Secure-IC<br \/>\n15:30 &#8211; 16:00\u00a0 Discussion, Shinsaku Kiyomoto, KDDI Research Inc.<br \/>\n&#8211; Feedback from ISO\/IEC SC27 Hamilton meeting<br \/>\n&#8211; Future Direction of WG4<br \/>\n&#8211; Research Collaboration<br \/>\n-5- Technologies on Sanitization, Generalization and Data Mining for privacy preserving: Room 3<br \/>\n&#8211; Privacy-preserving Logistic Regression, Shiho Moriai, Le Trieu Phong, NICT <a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/SMoriai_LeTrieu_presentation_2017.pdf\">(presentation)<\/a><br \/>\n&#8211; Data anonymization competition PWSCUP 2016, Hiroaki Kikuchi, Meiji U. <a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/HKikuchi_presentation_2017.pdf\">(presentation)<\/a><br \/>\n&#8211; Anonymizationand Re-identification for Personal Transaction Data, Hiroshi Nakagawa, U. of Tokyo <a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/HNakagawa_presentation_2017.pdf\">(presentation)<\/a><br \/>\n-7- Networks security: Main Conference Room on 3rd Floor<br \/>\n14:30 &#8211; 14:40 Introduction\/updates of WG 7<br \/>\n14:40 &#8211; 15:00 Characterizing International Routing Detours, Romain Fontugne, IIJ <a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/RFontugne_presetation_2007.pdf\">(presentation)<\/a><br \/>\n15:00 &#8211; 15:20 Name Anomaly Detection in ICN, Thomas Silverston, NICT <a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/TSilverston_presentation_2017.pdf\">(presentation)<\/a><br \/>\n15:20 &#8211; 15:40 Building Security Services on top of SDN, Gr\u00e9gory Blanc, IMT <a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/Blanc_presentation_2017.pdf\">(presentation<\/a>)<br \/>\n15:40 &#8211; 16:00 Open Discussions<br \/>\n&#8211; Research collaborations<br \/>\n&#8211; Future Direction<br \/>\n16:00 &#8211; 16:30 Break<br \/>\n16:30 &#8211; 17:15 Keynote 4,\u00a0 Caroline Fontaine, CNRS and IMT-Atlantique: About homomorphic encryption (<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/CFontaine_presentation_2017.pdf\">presentation)<\/a><br \/>\n17:15 end of session<\/p>\n<p>19:00 Closed Conference Dinner for speakers and WGs<\/p>\n<p><strong>Wednesday, April 26<\/strong><br \/>\n10:00 &#8211; 10:10 Short presentation about the attacks currently conducted on the French presidential elections, Loic Guezo, Trend Micro<br \/>\n10:10 &#8211; 12:10 Security and Big Data \/ machine learning<br \/>\n&#8211; Network Anomaly Detection: Alban Siffer, Irisa &amp; Amossys (p<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/ASiffer_Presentation_2017.pdf\">resentation)<\/a><br \/>\n&#8211;\u00a0 Big data for security: a cyberstrategic approach: Kav\u00e9 Salamatian, Savoie University (<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/KSalamatian_presentation_2017.pdf\">presentation)<\/a><br \/>\n&#8211;\u00a0 Security Big Data Analytic: Ban Tao, NICT (<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/TBan_presentation_2017.pdf\">presentation)<\/a><\/p>\n<p>12:10-13:30 \u3000\u3000Lunch<\/p>\n<p>13:30 &#8211; 14:30 Looking back on Rio2016 Games and Stepping forward to Tokyo2020 Games, Takeshi Tachi, Tokyo Olympic Committee<br \/>\n14:30 &#8211; 15:00 Forward looking toward Olympic Cyber Security in 2020, Tsutomu Shimizu, Trend Micro (<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/Trend-Micro_Shimizu_presentation_2017.pdf\">presentation)<\/a><br \/>\n15:00 &#8211; 15:30 Panel discussion<\/p>\n<p>15:30 &#8211; 16:00 Break<\/p>\n<p>16:00 &#8211; 17:00 Security of Industrial Control Systems (organised by Koji Nakao and Assia Tria)<br \/>\n&#8211; ICS security in Japan\uff1aIntroduction of Control System Security Center, Kenzo Yoshimatsu, Control System Security Center (CSSC) (<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/KYoshimatsu_presentation_2017.pdf\">presentation)<\/a><br \/>\n&#8211; Cybersecurity at CEA TECH: Assessments and solutions, Assia Tria, CEA (<a href=\"http:\/\/project.inria.fr\/FranceJapanICST\/files\/2017\/05\/ATria_presentation_2017.pdf\">presentation)<\/a><br \/>\n17:00 &#8211; 17:30 Concluding Panel on perspectives: June Murai, Koji Nakao, Mitsu Okada, Claude and H\u00e9l\u00e8ne Kirchner<br \/>\n17:30 Closing remarks and end of meeting<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MEETING PROGRAM Monday, April 24 09:30 &#8211; 10:00 Welcome and introduction : Prof. Hiro Kokuryo, Vice-President of Keio University,\u00a0\u00a0 Dr. Hideyuki Tokuda, President of NICT, Mitsuhiro Okada, Koji Nakao, Claude Kirchner 10:00 &#8211; 10:45 Keynote 1, S\u00e9bastien Gambs, UQAM :\u00a0 Big Data and Privacy &#8211; current trends and future challenges\u2026<\/p>\n<p class=\"continue-reading-button\"> <a class=\"continue-reading-link\" href=\"https:\/\/project.inria.fr\/FranceJapanICST\/wokshops\/2017-program\/presentations\/\">Continue reading<i class=\"crycon-right-dir\"><\/i><\/a><\/p>\n","protected":false},"author":290,"featured_media":0,"parent":306,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-352","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/pages\/352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/users\/290"}],"replies":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/comments?post=352"}],"version-history":[{"count":30,"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/pages\/352\/revisions"}],"predecessor-version":[{"id":1293,"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/pages\/352\/revisions\/1293"}],"up":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/pages\/306"}],"wp:attachment":[{"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/media?parent=352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}