Third French Japanese Meeting on Cybersecurity

April 24-26th, Keio University (MITA Campus) - TOKYO


The development of Information sciences and technologies, of artificial intelligence techniques as well as the extension of the Internet network to connected objects represent tremendous opportunities while making our societies more and more vulnerable to the risks inherent to the cyberspace. Cyber-attacks against government institutions, critical infrastructures, companies and individuals have considerably developed and become sophisticated in recent years. Cybersecurity now raises privacy, competitiveness and national sovereignty issues. Being able to anticipate, create trust, protect data and manage crises has therefore become essential. Furthermore international cooperation is fundamental to understand and master the risks associated with the cyberspace, as they are by nature global. France and Japan have launched a bilateral political dialogue in 2014 in order to join forces on this topic.

Based on this common interest, a French-Japanese collaboration has been initiated in 2015 jointly by the French Embassy in Japan, NICT (the Japanese National Institute of Information and Communication Technologies), Keio University, Inria (the French national institute for research in computer science and applied mathematics) and CNRS (the French National Centre for Scientific Research). This initiative gave rise to seven French-Japanese technical working groups (see link) and to an annual Event dedicated to Cybersecurity, alternatively held in Japan and in France The 3rd Event of this series is organized in Tōkyō, on April 24-26th, 2017.

The two first days are devoted to the presentation of the cybersecurity strategy in Japan and in France, of current results of the collaboration, together with industrial sessions, plenary keynote speakers, and working group meetings welcoming academics and industrials contributions. The third day is dedicated to identifying new challenges on transversal topics: Olympics Games challenges, Security and Big Data, Certification from theoretical ground to industrial needs, Security of Industrial Control Systems.

This workshop that will bring together some 80 experts and stakeholders from both private and public sector, aims at mapping the current situation of French and Japanese knowledge and strengths in order to promote collaborations between the two countries.

Please download this announcement in Japanese here


Day 1April 24th
09:15 - 09:30Registration and welcoming of the attendees (Please prepare two business cards for the registration)
09:30 - 10:00 Welcome and introduction: Prof. Hiro Kokuryo, VP of Keio University, Dr. Hideyuki Tokuda, President of NICT, Mitsuhiro Okada, Koji Nakao, Claude Kirchner
10:00 - 10:45Big Data and Privacy : current trends and future challenges - Sébastien Gambs (UQAM)
10:45 - 11:15Coffee Break
11:15 - 11:45
  • Presentation of CSA EUnity - Grégory Blanc (IMT)
  • PreGDR cybersecurity - Jean-Yves Marion (Lorraine University and LORIA)
  • Cybersecurity activities in France and Europe - Claude Kirchner (Inria)
11:45 - 12:15Cybersecurity strategy in Japan - Mr. Yamauchi (NISC)
12:15 - 13:45Lunch Break
13:45 - 14:45Industrial session 1
  • Detection and classification of phishing webpages with supervised learning - Adrien Gendre (Vade Secure)
  • LIEF: Library to Instrument Executable Formats - Romain Thomas (Quarkslab)
  • Securing against cyber-attacks at physical level: Cyber-CPU – Sylvain Guilley & Yan-Taro Clochard (Secure-IC)
14:45 - 15:45Presentation of the current 7 active French-Japanese WGs
15:45 - 16:15Coffee Break
16:15 - 17:45Parallel session WG 1,2,6
  • Formal Methods - WG1, Main Conference Room (3rd Floor)

    16:05 - 16:10 Introduction - Mitsuhiro Okada (Keio University)

    16:10 - 16:25 Symbolic Verification of Complexity-Theoretic Properties of Cryptographic Protocols and Attack Discovery Using First Order Logic - Gergei Bana (University of Luxembourg) and Mitsuhiro Okada (Keio University)

    16:25 - 16:40 Modeling and analysis of information leakage - Yusuke Kawamoto (AIST)

    16:40 - 16:55 Pip: A Minimal Kernel for Proving Isolation - David Nowak Cristal (Lille University)

    16:55 - 17:10 Security proof tools with Coq Proof-Assistant System [tbc] - Reynald Affeldt (AIST)

    17:10 - 17:25 BE-PUM: A binary code analyzer and its applications on malware analysis - Mizuo Ogawa (JAIST)

    17:25 - 17:40 Logic and Computation [tbc] - Jean-Baptiste Joinet (Lyon 3 University) Guest Speaker of WG1

    17:35 - 17:40 Concluding Discussion on Formal Method for Cybersecurity

  • Cryptography - WG2, Room 1

    16:05 - 16:15 Introduction and Status of Working Group - Shiho Moriai (NICT) and Phong Nguyen (Inria and CNRS/JFLI/University of Tokyo)

    16:15 - 16:40 Physical Attacks on Lattice-based Cryptography - Mehdi Tibouchi (NTT)

    16:40 - 17:05 Random Sampling Revisited: Lattice Enumeration with Discrete Pruning - Yoshinori Aono (NICT)

    17:05 - 17:30 Selection of Cryptographic Algorithms: ANSSI Recommendations, an Outline - Guénaël Renault (ANSSI)

    17:30 - 17:40 Discussion and Future plans - Shiho Moriai (NICT) and Phong NguyenSymbolic Verification of Complexity-Theoretic Properties of Cryptographic Protocols and Attack Discovery Using First Order Logic (Inria and CNRS/JFLI/University of Tokyo)

  • ICS/ITS - WG6, Room 2
17:45 - 18:30Identity of Things: Nano Artifact Metrics Using Silicon Random Nanostructures - Tsutomu Matsumoto (Yokohama National University)
18:30Closing remarks - Jacques Maleval (Embassy of France in Japan)
19:00Reception at the Embassy of France in Tokyo

Please find the itinerary to the Embassy here or download it

Day 2April 25th
09:15 - 09:30Registration and welcoming of the attendees
09:30 - 10:15Introduction of Nekoma project - Yuki Kadobayashi (NAIST)
10:15 - 10:45Coffee Break
10:45 - 12:00Industrial session 2
  • Industry protection with ICS security and Threat intelligence - Stéphane Leeme (Airbus)
  • Security issues and solutions for next generation factories - Yuki Ueda (Trend Micro)
12:00 - 14:00Lunch Break
14:00 - 14:30Future academic and industrial shared challenges in cybersecurity - Round table coordinated by Koji Nakao
14:30 - 16:00Parallel session WG 3, 4, 5, 7
  • Events and Malware Analysis - WG3, Room 1

    14:30 - 14:50 Latest Update of NICTER Project - Large-scale monitoring and preliminary analysis for IoT malware - Daisuke Inoue (NICT)

    14:50 - 15:10 (tentative title: IoTPOT and IoT malware) Katsunari Yoshioka (YNU)

    15:10 - 15:30 (tentative title: current work on malware detection either on our paper at Security and Privacy) Jean-Yves Marion (Université de Lorraine and LORIA)

    15:30 - 15:50 Applications of BE-PUM: packer identification and beyond - Mizuhito Ogawa (JAIST)

    15:50 - 16:00 Discussion on WG 3 further collaboration

  • System Security and IoT security - WG4, Room 2

    14:30-14:50 SCA in TrustZone on mobile phone - Sébanjila Kevin Bukasa (Inria)

    14:50-15:10 Recent Trends on White-Box Cryptography - Yuto Nakano (KDDI Research Inc.)

    15:10 - 15:30 Securing software against cache timing attacks - Sylvain Guilley (Secure-IC)

    15:30-16:00 Discussion - Shinsaku Kiyomoto (KDDI Research Inc.)

    • Feedback from ISO/IEC SC27 Hamilton meeting
    • Future Direction of WG4
    • Research Collaboration

  • Technologies on Sanitization, Generalization and Data Mining for privacy preserving - WG5, Room 3
    • Privacy-preserving logistic regression - Shiho Moriai, Le Trieu Phong (NICT)
    • Data anonymization competition PWSCUP 2016 - Hiroaki Kikuchi (Meiji University)
    • Anonymization and Re-identification for Personal Transaction Data - Hiroshi Nakagawa (University of Tokyo)
    • [tbd] - Sebastien Gambs (UQAM)
    • [tbd] - Caroline Fontaine (CNRS and IMT-Atlantique)
  • Networks security - WG7, Main Conference Room on 3rd Floor

    14:30 - 14:40 Introduction/updates of WG 7

    14:40 - 15:00 Characterizing International Routing Detours - Romain Fontugne (IIJ)

    15:00 - 15:20 Name Anomaly Detection in ICN - Thomas Silverston (NICT)

    15:20 - 15:40 Building Security Services on top of SDN - Grégory Blanc (IMT)

    15:40 - 16:00 Open Discussions

    • Research collaborations
    • Future Direction

16:00 - 16:30Coffee Break
16:30 - 17:15About homomorphic encryption - Caroline Fontaine (IMT)
17:15 - 17:45Cooperation & funding strategy - Hélène Kirchner (Inria)
17:45End of session
Day 3April 26th
09:15 - 10:00Registration and welcoming of the attendees
10:00 - 12:00Security and Big Data, machine learning
  • Network Anomaly Detection - Alban Siffer (Irisa & Amossys)
  • Big data for security: a cyberstrategic approach - Kavé Salamatian (Savoie University)
  • Security Big Data Analytic - Ban Tao (NICT) [tbc]
12:30 - 13:30Lunch Break
13:30 - 14:30Looking back on Rio 2016 Games and Stepping forward to Tokyo 2020 Games - Takeshi Tachi (Tokyo Olympic Committee)
14:30 - 15:00Supportive Technical Solution for Tokyo 2020 from France - ATOS [tbc]
15:00 - 15:30Panel
15:30 - 16:00Coffee Break
16:00 - 17:00Security of Industrial Control Systems - organized by Koji Nakao and Assia Tria
  • ICS security in Japan: Introduction of the Control System Security Center - Kenzo Yoshimatsu (Control System Security Center)
  • Control System Security Center - Ichiro Murase (Secretary General)
17:00 - 17:30Concluding Panel on perspectives - June Murai [tbc], Koji Nakao, Mitsu Okada, Claude and Hélène Kirchner, Phong Nguyen
17:30Closing remarks

Committees and working groups

WG1Formal Methods - Cryptographic Protocol Verification/Privacy by Formal Methods
  • Bana Gergei
  • Kostas Chatzikokolakis
  • Palamidessi Catuscia
  • Okada Mitsuhiro
WG2Cryptography - Lattice-based cryptography / Post-quantum cryptography
  • Nguyen Phong
  • Shiho Moriai
WG3Events and Malware Analysis - Events collection by sensor technologies and exchange for joint analysis of attack events with malware analysis
  • Marion Jean-Yves
  • Dai Inoue
  • Mizuhito Ogawa
WG4System Security and IoT security - Countermeasure against Side Channel Attacks (using Polymorphic Code)
  • Lanet Jean-Louis
  • Kiyomoto Shinsaku
WG5Privacy - Technologies on Sanitization, Generalization and Data Mining for privacy preserving (to be applicable for specific applications
  • Gambs Sébastien
  • Hiro Kikuchi
WG6ICS/ITS Security
  • Tria Assia
  • Koji Nakao
WG7Network, network security, measurement - Virtualization, SDN security, including measurement of security performance and effectiveness
  • Silverston Thomas
  • Shin Miyakawa

General Information

Attendance to the Event is by invitation only. Registration is mandatory.

  • Contact: cyber-meeting-2017[at]
  • Language: English
  • Organizers: NICT, Keio University, Inria, CNRS, Department for Science and Technology of the Embassy of France in Japan
  • Venue: Keio University (MITA Campus), North Building - Please download the map of the campus here