Program

Draft Program for 2017 Edition of CRiSIS Conference.

Tuesday

  • Registration

    -

    Registration to the conference

  • Welcome

    -

  • Invited speaker

    -

    Thomas Jensen
    Research Director, INRIA Rennes
    - Title : Information flow analysis against web tracking

  • Coffee Break

    -

  • Session 1: Vulnerability analysis and classification

    -

    - Automatic Vulnerability Classification using Machine Learning. Marian Gawron, Feng Cheng and Christoph Meinel.

    - On semantic approach for detecting anomalous insider accesses to DBMS. Muhammad Imran Khan, Barry O’sullivan and Simon Foley.

    - Towards a Security Event Data Classification. Gustavo Gonzalez, Jose Rubio Hernan and Joaquin Garcia-Alfaro.

  • Lunch

    -

  • Tutorial

    -

    Ronan Lashermes
    Fault Injection Attacks

  • Session 2: Apps security

    -

    - Unraveling Reflection Induced Sensitive Leaks in Android Apps. Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Gaur, Akka Zemmari, Mohamed Mosbah, Daya Ram Sharma and Mauro Conti.

    - Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions. Alessio Viticchié, Cataldo Basile and Antonio Lioy.

    - Using data integration to help design more secure applications. Sebastien Salva and Loukmen Regainia.

  • Coffee Break

    -

  • Session 3: Access Control and Filtering

    -

    - MA-MOrBAC: A Distributed Access Control Model Based On Mobile Agent for Multi-Organizational, Collaborative and Heterogeneous Systems. Zeineb Ben Yahya.

    - A formal approach for firewalls and IDS interoperability checking (short paper). Fakher Ben Ftima, Kamel Karoui and Henda Ben Ghezala.

    - A Vehicle Collision-Warning System based on Multipeer Connectivity and Off-the-shelf Smart-Devices (short paper). Bogdan Groza and Cosmin Briceag.

  • Welcome Cocktail

    -

Wednesday

  • Invited speaker

    -

    Chair: Joaquin Garcia Alfaro
    - Gérard Le Comte
    Strategic Security Leader, Societe Generale bank
    - Title: A journey in banking information security

  • Coffee Break

    -

  • Technical session on Cybersecurity chairs

    -

  • Panel on Cybersecurity chairs

    -

    • LCL Stéphane GRUNENWALD (Panel Chair - ETRS/DGF/GCYB)
    • Simon Foley (IMT-Atlantique, Cyber Critical National Infrastructure)
    • Patrick Hébrard (Naval Group/DCNS, Naval Cyberdefense)
    • Yvon Kermarrec (Ecole Navale, Naval Cyberdefense)
    • Paul Lajoie-Mazenc (EDF, Critical National Infrastructure)
    • Gerard Le Comte (Société Génerale, Critical National Infrastructure)
    • Axel Legay (INRIA - Threat Analysis)
    • Stéphane TAILLAT (Ecoles Militaires de St Cyr-Coëtquidan, Saint-Cyr Cyberdefence)

  • Lunch

    -

  • Social Event

    -

  • Gala Dinner

    -

Thursday

  • Invited speaker

    -

    Chair: Yvon Kermarrec
    - Arnaud Tisserand
    Research director, CNRS
    - Title : Hardware support for physical security

  • Coffee Break

    -

  • Session 4: Cloud security

    -

    - Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications. Khalil Hariss, Hassan Noura and Abed Ellatif Samhat.

    - A Study of Threat Detection Systems and Techniques in the Cloud. Pamela Carvallo, Ana R. Cavalli and Natalia Kushik.

  • Session 4: Cloud security

    -

    - Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications. Khalil Hariss, Hassan Noura and Abed Ellatif Samhat.

    - A Study of Threat Detection Systems and Techniques in the Cloud. Pamela Carvallo, Ana R. Cavalli and Natalia Kushik.

  • Session 5: Cyber-Insurance & Cyber Threat Intelligence

    -

    - Preventing the drop in security investments for non-competitive cyber-insurance market? Artsiom Yautsiukhin, Albina Orlando, Ganbayar Uuganbayar and Fabio Martinelli.

    -Towards an Anonymity Supported Platform for Shared Cyber Threat Intelligence (short paper). Thomas Wagner, Esther Palomar, Khaled Mahbub and Ali Abdallah.

  • Lunch

    -

  • Session 6: Human-Centric Security and Trust

    -

    - Phishing Attacks Root Causes. Hossein Abroshan, Jan Devos, Geert Poels and Eric Laermans.

    - Domain Name System without Root Servers. Matthäus Wander, Christopher Boelmann and Torben Weis.

    - Data Hiding on Social Media Communications Using Text Steganography (short paper). Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Po-Yang Huang, Chien-Hung Huang and Chin-Laung Lei.

  • Session 7: Risk Analysis

    -

    - Privacy Scoring of Social Network User Profiles through Risk Analysis. Sourya Joyee De and Abdessamad Imine.
    - A Method for Developing Qualitative Security Risk Assessment Algorithms. Gencer Erdogan and Atle Refsdal.
    - An empirical analysis of risk aversion in malware infections (short paper). Jude Jacob Nsiempba, Fanny Lalonde Lévesque, Nathalie De Marcellis-Warin and José M. Fernandez.

  • Conclusion and farewell

    -