Accepted Papers
Virtual & Invisible Private Network: a Zero-Trust Architecture for Anonymous Communication on the Internet (WiP)
We present the first version of Virtual & Invisible Private Network (VIPN), a novel low-latency, secure, and anonymous communication technology designed to overcome the limitations of existing network anonymization architectures. Traditional decentralized systems require trusting intermediary proxies in charge of relaying users’ traffic. This reliance introduces significant vulnerabilities, including potential traffic attribution, man-in-the-middle attacks and sensitive information exposure if a relay is compromised. Additionally, these architectures often lack compatibility with all IP protocols and QoS; thus they fail to support modern applications effectively. In this paper, we review the shortcomings of current approaches and propose a new architecture that mitigates these risks. We evaluate the guarantees of our solution against various adversarial models and provide first insights from a real-world deployment. Finally, we highlight the current architecture limitations and future ongoing challenges.
Frédéric Laurent
(Snowpack, France)
;
Baptiste Polve
(Snowpack, France)
;
Guillaume Nibert
(Snowpack - Sorbonne Université, CNRS, LIP6, France)
;
Alexis Olivereau
(CEA LIST, France)
Language: English (subtitled in French)
Regular or short paper
Work in Progress (WiP)
Can You Spot the Trap? Honeypot Detection in the Face of Evolving Evasion Tactics (SoK)
Honeypots are important tools in network security, offering a means to detect, deflect, and analyze malicious activity. However, their effectiveness relies on remaining undetected. High-skill attackers are aware of honeypots and develop detection and evasion tactics. This paper presents a systematization of knowledge of the current state of honeypot detection, providing an overview of techniques employed in both laboratory and real-world settings.
Mathis Durand
(IMT Atlantique, France)
;
Alexandre Dey
(Airbus, France)
;
Yvon Kermarrec
(IMT Atlantique, France)
;
Marc-Oliver Pahl
(IMT Atlantique, France)
Language: English (subtitled in French)
Systematization of Knowledge (SoK)
Lead a Security Supervision Project (SoK, practice)
Security supervision is a key activity in securing information systems. Together with threat intelligence and incident response, it plays a key role in handling security incidents. This operational-level document sets out best practices for organizing and managing a security monitoring service. In particular, the resources it proposes can help to create a security supervision capability
Cyril Poirret
(ANSSI, France)
Language: French (subtitled in English)
Systematization of Knowledge (SoK)
Simulating Online Behaviours and Threat Patterns for Training Against Influence Operations (WiP)
Social media platforms have enabled large-scale influence campaigns, designed by threat actors to manipulate public opinion. These campaigns use coordinated accounts to spread fake information or amplify information (e.g., disinformation, astroturfing), swaying opinions and paralysing decision-making. To mitigate these impacts, nongovernmental and governmental entities train in simulated informational environments emulating social network platforms and their exchanges. During the trainings, the animation team must implement specific informational Tactics Techniques and Procedures (TTPs) to achieve customized educational objectives. The simulation of TTPs requires credible social networks, which must notably contain diverse user types (bots, trolls, casual users, influencers, etc.) and recreate social interactions to generate both normal behaviours and malicious behaviours. This paper introduces a framework designed to generate personalized social networks graphs for training sessions, tailored specifically to the needs of the trainers. This framework allows the modelling of referenced influence operations in order to reproduce specific attacks such as astroturfing or corrupted influencers to increase the training credibility, the pedagogical impact, and capitalising on existing knowledge. We illustrate the coherence of these simulations through two case studies, which aim at reproducing astroturfing attacks and corrupt influencers tactics. We show that our simulation of these tactics coherently reproduces the documented attacks, and we assess the results through topology metrics and information diffusion metrics.
Ulysse Oliveri
(Université de Rennes - IRISA UMR 6074 / Airbus Defence andSpace, France)
;
Alexandre Dey
(Airbus, France)
;
Guillaume Gadek
(Airbus Defence and Space, France)
Language: English (subtitled in French)
Regular or short paper
Work in Progress (WiP)
Machine Learning in Digital Twins for Threat Estimation and Detection (SoK)
The convergence of Digital Twin (DT) technology and Machine Learning (ML) presents a promising combination for enhancing cybersecurity by proactively predicting threats and attacks. This paper proposes a comprehensive taxonomy of Digital Twins for cybersecurity, categorizing its roles in threat prediction and attack detection. By analyzing methodologies, feature selection strategies, and AI tools employed across implementations, it highlights their current capabilities and limitations.
Hugo Bourreau
(IMT Atlantique, France)
;
Marc-Oliver Pahl
(IMT Atlantique, France)
;
Fabien Dagnat
(IMT Atlantique, Lab-STICC, France)
;
Fehmi Jaafar
(UQAC, Canada)
Language: English (subtitled in French)
Systematization of Knowledge (SoK)
Trust-Aware Vertical Intrusion Detection for IoT via Evolutionary Graph Neural Networks
The rapid proliferation of IoT technologies has fundamentally reshaped smart infrastructures, spanning from domestic applications to complex industrial systems. However, this layered and geographically distributed architecture introduces multifaceted security challenges, particularly in identifying coordinated or stealthy threats that propagate across different levels of the system. Traditional intrusion detection systems (IDS), typically deployed in isolation either at the edge or within the cloud, struggle to achieve the necessary global visibility and often exhibit delayed responsiveness in such dynamic environments. In this paper, we propose a novel vertical intrusion detection framework tailored to multi-layered IoT networks. Our system enables hierarchical correlation and fusion of alerts across edge, fog, and cloud layers by combining localized anomaly detection with a global graph neural network (GNN) that performs structural and temporal reasoning over an alert graph. To ensure robustness in adversarial settings, we introduce an evolutionary game-theoretic mechanism based on replicator dynamics, which dynamically adjusts the trust levels of inter-node connections. The nodes evaluate the reliability of their neighbors based on accuracy and detection consistency, leading to reinforcement of cooperative behaviors and marginalization of compromised participants. Experimental results show that our architecture improves detection performance, reduces false positives, and adapts effectively to changing threat landscapes.
Myria Bouhaddi
(Université du Québec en Outaouais, Canada)
;
Kamel Adi
(Université du Québec en Outaouais, Canada)
Language: French (subtitled in English)
Regular or short paper
Invited speaker
Original and unpublished work presenting new methods, experimental results, or knowledge advances.
Analyses and syntheses that organize and clarify existing knowledge (in C&ESAR's context, potentially simple analysis and synthesis results on a narrow topic).
Applied work sharing practical expertise or operational experience.
Early-stage or evolving work presenting promising ideas and preliminary results that still require further validation.