Full Description
This two volume constitutes the refereed proceedings of the 18th International Symposium on Foundations and Practice of Security, FPS 2025, held in Brest, France during November 25-27, 2025.
The 38 full and 8 short papers presented in this book were carefully reviewed and selected from 91 submissions. The papers were organized in the following topical sections:
Part I: Security, Privacy, and Trust in Emerging Distributed Systems; Cyber Resilience and Risk Management in Enterprise Architectures; Formal Methods and Automated Analysis for Secure Software Systems; Machine Learning and Intelligent Systems for Attack Detection and Trust Evaluation; Applications to Industry and Critical Infrastructure.
Part II: Advances in Privacy-Preserving Cryptography and Secure Computation; Secure and Intelligent Network Architectures for Next-Generation Communications; Secure, Explainable, and Efficient Machine Learning in Cybersecurity; Short Papers.
Contents
.- Advances in Privacy-Preserving Cryptography and Secure Computation.
.- Sender-Efficient Identity-Based Encryption with Reduced Server Trust in the Key Curator Model.
.- Counterfeit Coin Problem Can Be Extended to Secure Multiparty Computation.
.- StrawHat : Private Non-Interactive Gradient Boosting Decision Tree Evaluation Based on Homomorphic Encryption.
.- Scalable privacy-preserving database queries with FHE and PEKS.
.- Secure and Intelligent Network Architectures for Next-Generation Communications.
.- A Fairness-Aware Strategy for B5G Physical-layer Security Leveraging Reconfigurable Intelligent Surfaces.
.- APADV- Anonymous Proactive Distance Vector Routing in Connectivity-Restricted Environments.
.- A secure lightweight system based on device-to-device communication for objects sharing in local communities.
.- Consumer Zero Trust: Towards a Principled Adaptation of Zero Trust for Consumer Networks.
.- Revisiting Network Traffic Analysis: Compatible network flows for ML models.
.- Causal Graph Modeling of Network Traffic for Early Cyberattack Prediction.
.- Secure, Explainable, and Efficient Machine Learning in Cybersecurity.
.- VOLTRON: Detecting Unknown Malware Using Graph-Based Zero-Shot Learning.
.- Deep Learning-Driven Energy Auditing for Smart Grid Cyberattack Detection.
.- Interdependent Privacy in Smart Homes: Hunting for Bystanders in Privacy Policies.
.- QUOKKA: Faster Secure Neural Network Inference with Early-Exit Technology.
.- Short Papers.
.- Scaling Blockchains with zk-Rollups: State of the Art and Implementation.
.- COBRA-Z: Collaborative Blockchain Risk Assessment for Zero Trust Architecture.
.- Dynamic Multilayer Information System Cartography for Cybersecurity,Compliance and Industrial Governance: The CARTOGRAPHIT.
.- Energy Consumption of TLS, Searchable Encryption and Fully Homomorphic Encryption.
.- An Embarrassingly Parallel Cryptanalysis of EC(H)MQV.
.- Defending Model Inversion Attack Using an Improved Filter-Based Approach.
.- Verifiability of Unlearning Schemes Through Local Explanation.
.- Anomaly-Aware Aggregation for Robust Peer-to-Peer Machine Learning.



