Accepted Papers

Hela Hakim, Asma Sellami and Hanene Ben Abdallah.
Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams
Gustavo Gonzalez-Granadillo, Joaquin Garcia-Alfaro and Herve Debar.
An n-sided polygonal model to calculate the impact of cyber security events
Yoann van den Boom, Barbara Kordy and Piotr Kordy.
SPTool – equivalence checker for SAND attack trees
Younes Abid, Abdessamad Imine, Amedeo Napoli, Chedy Raissi and Michael Rusinowitch.
Online link disclosure strategies for social networks
Esma Aimeur, Gilles Brassard and Jonathan Rioux.
CLiKC: A privacy-mindful approach when sharing data
Frédéric Mangano, Simon Duquennoy and Nikolai Kosmatov.
A Memory Allocation Module of Contiki Formally Verified with Frama-C. A Case Study
Amine Mrabet, Nadia El-Mrabet, Ronan Lashermes, Jean Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager and Mohsen Machhout.
High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication
Olga Gadyatskaya, Katsiaryna Labunets and Federica Paci.
Towards Empirical Evaluation of Automated Risk Assessment Methods
Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette and Mohamed Kâaniche.
Protocol reverse engineering: Challenges and obfuscation
Salaheddine Zerkane, David Espes, Frédéric Cuppens and Philippe Le Parc.
A Proactive Stateful Firewall for Software Defined Networking
Damien Jauvart, Jacques Fournier, Nadia El Mrabet and Louis Goubin.
Improving Side-Channel Attacks against Pairing-Based Cryptography
Aurélien Palisse, Hélène Le Bouder, Jean-Louis Lanet, Colas Le Guernic and Axel Legay.
Ransomware and the Legacy Crypto API
Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques Fournier and Renaud Sirdey.
A First DFA on PRIDE: from Theory to Practice
Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère and Abdelmalek Benzekri.
Towards the weaving of the characteristics of good security requirements
Razika Lounas, Nisrine Jafri, Axel Legay, Mohamed Mezghiche and Jean-Louis Lanet.
A Formal Verification of Safe Update Point Detection in Dynamic Software Updating
Rui Abreu, César Andrés and Ana R. Cavalli.
A framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory
Muhammad Imran Khan and Simon Foley.
Detecting anomalous behavior in DBMS logs

Important Dates

Registration is open

Conference date/place:
5th-7th September, 2016, Roscoff, France.

Submission deadline:
June 29th, 2016

Deadline for short papers and posters:
July 6th, 2016

Acceptance Notification:
July 25th, 2016

Camera ready:
August 12th, 2016