

{"id":577,"date":"2018-11-19T14:25:01","date_gmt":"2018-11-19T13:25:01","guid":{"rendered":"http:\/\/project.inria.fr\/FranceJapanICST\/?page_id=577"},"modified":"2018-11-26T17:17:39","modified_gmt":"2018-11-26T16:17:39","slug":"2018-workshop-program-2","status":"publish","type":"page","link":"https:\/\/project.inria.fr\/FranceJapanICST\/wokshops\/2018-workshop-program\/2018-workshop-program-2\/","title":{"rendered":"2018 Workshop Program"},"content":{"rendered":"<p>Wednesday, May 16 (1st day for Technical Workshop)<\/p>\n<p>09:00 \u2013 9:30 Welcome and introduction.  Mitsuhiro Okada, Koji Nakao, Claude Kirchner, Kav\u00e9 Salamatian (Amphi 016 IAE)<br \/>\n09:30 \u2013 10:15 Keynote 1: Gildas Avoine, Authentication with Proximity Check (Amphi 016 IAE)<br \/>\n10:15 \u2013 10:30 Break<br \/>\n10:30 \u2013 11:15 Keynote 2, Prof. Shikata, Design and Analysis of Lightweight Authentication (Amphi 016 IAE)<br \/>\n11:15 \u2013 12:00 Overall short presentations of the current 7 active French-Japanese WGs and of the objectives of the new created one (WG8, see below) (Amphi 016 IAE)<\/p>\n<p>Lunch (at CROUS)<\/p>\n<p>13:30 \u2013 15:30 Parallel session WG 1, 2, 6, 8<\/p>\n<p>    WG1 Cryptographic Protocol Verification\/Privacy by Formal Methods (Amphi B14)<\/p>\n<p>*13:30-14:00 Gergei Bana (University of Luxembourg) and Mitsuhiro Okada (Keio University)<br \/>\n\u201cCryptographic protocols and formal methods for verifications of complexity-theoretic properties; our latest progresses.<\/p>\n<p>*14:00-14:25 Konstantinos Chatzikokolakis (CNRS &#038; \u00c9cole Polytechnique)<br \/>\n\u201cPrivacy Leakage Games\u201d<\/p>\n<p>*14:25-14:45 Yusuke Kawamoto (AIST)<br \/>\n\u201cObfuscation Mechanisms with Distribution Privacy\u201d<\/p>\n<p>*14:45-15:10 Catuscia Palamidessi (Inria &#038; \u00c9cole Polytechnique)<br \/>\n\u201cLocal Differential Privacy on Metric Spaces: optimizing the trade-off with utility\u201d<\/p>\n<p>*15:10-15:30 Takao Murakami (AIST)<br \/>\n\u201cToward Distribution Estimation under Local Differential Privacy with Small Samples\u201d<\/p>\n<p>    WG6 <ICS\/ITS> (Room C203)<br \/>\n    WG3 Events collection by sensor technologies and exchange for joint analysis  of attack events with malware (detailed program to appear soon) (Room C204)<br \/>\n    15:30- 15:45 Break<br \/>\n    15:45- 17:15 Panel on Artificial Intelligence and cybersecurity (including algorithm transparency and ethics) (Amphi B14 )<br \/>\n    Participants : Nozha Boujemaa (Inria), Mitsu Okada (Keio), Kave Salamatian (USMB), Gilles Dowek (tbc)<\/p>\n<p>Moderator: Claude Kirchner<br \/>\n17:15 \u2013 18:30 \u2013 Panel Tokyo 2020 (Olympic) and France 2024 (Amphi B14 )<br \/>\n18:30- Bus leaving for dinner at \u201cLa ferme de la Charbonni\u00e8re \u201d<\/p>\n<p>Thursday, May 17 (2nd day for Technical Workshop)<br \/>\n09:30 \u2013 10:15 Keynote 3, Tachio Terauchi, Information Flow Security and its Application to Side-Channel-Attack Resilience (Waseda University) (Amphi B14 )<br \/>\n10:15 \u2013 11:00 Keynote 4, Claude Casteluccia, Towards Cognitive Security (INRIA) (Amphi B14 )<br \/>\n11:00 \u2013 11:15 Break<br \/>\n11:15-12:00- Keynote 5, Patrice Abry: A retrospective on more than 15 years of cooperation between France and Japan on Statistical anomaly detection, (ENS-Lyon) (Amphi B14 )<\/p>\n<p>12:00 \u2013 13:30 Lunch (CROUS)<br \/>\n13:30 \u2013 15:30 Parallel session WG 3, 4, 5, 7<\/p>\n<p>    WG2 Lattice-based cryptography \/ Post-quantum cryptography<br \/>\n    WG4 Countermeasure against Side Channel Attacks (C110)<br \/>\n    * 14:00-14:30 From France:<br \/>\n    (Dr. Micha\u00ebl Timbert:<br \/>\n    Hardware assisted detection of errors in the stack<br \/>\n    and in the control flow graph).<br \/>\n    * 14:30-15:00 From Japan<br \/>\n    (Prof. Junji Shikata (YNU):<br \/>\n    Developing Aggregate Message Authentication Codes and<br \/>\n    its standardization).* 15:00-15:20 from France<br \/>\n    (Prof. Sylvain Guilley (T\u00e9l\u00e9com ParisTech\/Secure-IC):<br \/>\n    IoT security: some ISO\/IEC JTC1\/SC27\/WG3 standardization activities).* 15:20-15:40 From Japan<br \/>\n    (Dr. Kazuhide Fukushima (KDDI Research):<br \/>\n    Security analysis of Oblivious RAM under active attack model).<br \/>\n    WG5 Technologies on Sanitization, Generalization and Data Mining for privacy preserving (Amphi B14 )<br \/>\n    (PWSCUP 2017)<\/p>\n<p>    *13h30-13h55 : Benjamin Nugyen (INSA Centre-Val-de-Loire) : \u00ab Personalized k-anonymity \u00bb<br \/>\n    *13h55-14h20 : Hiromi Arai (Riken AIP) : \u00ab Framework for privacy-preserving anomaly detection \u00bb<br \/>\n    *14h20-14h45 : Antoine Boutet (INSA Lyon) : \u00ab Feedback on the Shonan Meeting on Anonymization methods and inference attacks \u00bb<br \/>\n    *14h45-15h10 : S\u00e9bastien Gambs (UQAM) : \u00ab Towards an international Data Anonymization and Re-identification Competition (DARC) \u00bb<br \/>\n    *15h10-15h30 : Brainstorming for possible collaborations and future projects between France and Japan on privacy<br \/>\n    WG7 <Network, network security, measurement> Virtualization, SDN security, including measurement of security performance and effectiveness (C111)<br \/>\n    \u2013 Thomas Silverston (From  Shibaura Institute of Technology)<br \/>\n    \u2013 Kav\u00e9 Salamatian : Large scale BGP monitoring and detection of large scale events<\/p>\n<p>15:30-15:45- Break<br \/>\n15:45 \u2013 17:30 Industrial session (Amphi B14 )<br \/>\nThree presentations are expected (two from France, one from Japan)<br \/>\nAbout Big Data Security \/ machine learning and etc.<br \/>\n\u201d SCADA Security (France)<br \/>\n\u201d IoT platforms and Security (CEA)<br \/>\n\u201d Japan Presentation<br \/>\n17:30 \u2013 18:15 Strategic cooperation \/ funding strategy: Christine Morin, Inria (Amphi B14 )<br \/>\n18:15 Conference Dinner<\/p>\n<p>Friday, May 18 (Policy session)<\/p>\n<p>09:30-10:15 Policy Key Note -1 Theodore Christakis, \u201cLost in the clouds : Legal challenges for the European Union, Japan and the United States after the \u201cClarifying Lawful Use of Overseas Data (CLOUD)\u201d Act\u201d (Amphi B14 )<\/p>\n<p>10:15- 11:00 Policy Key Note-2 Koji Nakao (On behalf of NISC and MIC) (Amphi B14 )<br \/>\n11:00 \u2013 11:15 Break<br \/>\n11:15- 12:15- Panel on cyber-norms and international cooperations on cybersecurity<br \/>\nAude Gery, Karine Banellier (tbc), (somebody from trend micro) (Amphi B14 )<br \/>\n12:15-13:45- Lunch at Crous<br \/>\n13:45- 14:30 Policy Key Note-3 from Japan (Jun Murai) (Amphi B14 )<br \/>\n14:30-15:30- Panel on cyberstrategy, cartography of cyberspace, evaluation of international cyber-threads (Amphi B14 )<br \/>\nLouis Petiniaud, Kave Salamatian,<br \/>\n15:30-15:45- Break<br \/>\n15:45 \u2013 16:45 Panel on perspectives: June Murai, Koji Nakao, Mitsu Okada, Claude and H\u00e9l\u00e8ne Kirchner, Phong Nguyen (Amphi B14 )<br \/>\n16:45 Closing remarks and end of meeting at 17:00<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wednesday, May 16 (1st day for Technical Workshop) 09:00 \u2013 9:30 Welcome and introduction. Mitsuhiro Okada, Koji Nakao, Claude Kirchner, Kav\u00e9 Salamatian (Amphi 016 IAE) 09:30 \u2013 10:15 Keynote 1: Gildas Avoine, Authentication with Proximity Check (Amphi 016 IAE) 10:15 \u2013 10:30 Break 10:30 \u2013 11:15 Keynote 2, Prof. Shikata,\u2026<\/p>\n<p class=\"continue-reading-button\"> <a class=\"continue-reading-link\" href=\"https:\/\/project.inria.fr\/FranceJapanICST\/wokshops\/2018-workshop-program\/2018-workshop-program-2\/\">Continue reading<i class=\"crycon-right-dir\"><\/i><\/a><\/p>\n","protected":false},"author":1295,"featured_media":0,"parent":556,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-577","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/pages\/577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/users\/1295"}],"replies":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/comments?post=577"}],"version-history":[{"count":1,"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/pages\/577\/revisions"}],"predecessor-version":[{"id":578,"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/pages\/577\/revisions\/578"}],"up":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/pages\/556"}],"wp:attachment":[{"href":"https:\/\/project.inria.fr\/FranceJapanICST\/wp-json\/wp\/v2\/media?parent=577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}