Full Description
This two volume constitutes the refereed proceedings of the 18th International Symposium on Foundations and Practice of Security, FPS 2025, held in Brest, France during November 25-27, 2025.
The 38 full and 8 short papers presented in this book were carefully reviewed and selected from 91 submissions. These papers were organized in the following topical sections:
Part I: Security, Privacy, and Trust in Emerging Distributed Systems; Cyber Resilience and Risk Management in Enterprise Architectures; Formal Methods and Automated Analysis for Secure Software Systems; Machine Learning and Intelligent Systems for Attack Detection and Trust Evaluation; Applications to Industry and Critical Infrastructure.
Part II: Advances in Privacy-Preserving Cryptography and Secure Computation; Secure and Intelligent Network Architectures for Next-Generation Communications; Secure, Explainable, and Efficient Machine Learning in Cybersecurity; Short Papers.
Contents
.- Security, Privacy, and Trust in Emerging Distributed Systems.
.- Towards A Pragmatic Selection Of Self-Sovereign Identity Security Measures : Exploiting Mitre Att&ck Graph And Multi-criteria Optimization.
.- ForensicChain: Blockchain-based Secure Digital Forensic Investigations.
.- Privacy-Preserving Federated Learning for IoT Intrusion Detection in 6G Networks.
.- Cyber Resilience and Risk Management in Enterprise Architectures.
.- Eliciting metrics and evaluating cyber resilience of a capability in the context of a multilayer enterprise architecture.
.- Predicting IoT Security Vulnerabilities from Device Specification.
.- Real-Time Insider Threat Hunting Based on Dynamic Risk Indicators.
.- Optimizing Resilience in IT Architectures: A Multi-Objective Ontology-Based Approach.
.- Formal Methods and Automated Analysis for Secure Software Systems.
.- Vexed by VEXTools: Consistency Evaluation of Container Vulnerability Scanners.
.- Towards a formal verification of the Bao Hypervisor.
.- Finding Software Supply Chain Attack Paths with Logical Attack Graphs.
.- From provable models to provable implementations: translating Alice & Bob security protocols to F*.
.- Automatic Attack Script Generation: a MDA Approach.
.- Mining Reliable ABAC Policies: A Specificity and Confidence-Aware Extension of Rhapsody.
.- Machine Learning and Intelligent Systems for Attack Detection and Trust Evaluation.
.- A Grammar-Driven Approach to Model and Detect APT Attack Sequences.
.- Watch Out for the Lifespan: Evaluating Backdoor Attacks Against Federated Model Adaptation.
.- Systematic Security Context Weighting for Trust Algorithms via AI/ML Model Performance Analysis.
.- WildCode: An Empirical Analysis of Code Generated by ChatGPT.
.- Binary and Multiclass Cyberattack Classification on GeNIS Dataset.
.- Towards Automated Botnet Threat Intelligence with Knowledge-Guided Large Language Models.
.- Applications to Industry and Critical Infrastructure.
.- An Improved Paillier-Based Reversible Watermarking Scheme for 3D Models with Reduced Complexity.
.- Towards adoption of private distributed ledgers for capital markets.
.- Socio-Technical Friction: An Emergent Grounded Theory of DevSecOps Challenges.
.- Secure-by-Design Architectures for Cooperative Intelligent Transport Systems: A Standards-Aligned Approach.
.- Practical Evaluation of the Crypto-Agility Maturity Model.



