Program
Program for 2017 Edition of CRiSIS Conference.
Tuesday
-
Registration
-
Registration to the conference
-
Welcome
-
-
Invited speaker
-
Thomas Jensen
Research Director, INRIA Rennes
- Title : Information flow analysis against web tracking -
Coffee Break
-
-
Session 1: Vulnerability analysis and classification
-
- Automatic Vulnerability Classification using Machine Learning. Marian Gawron, Feng Cheng and Christoph Meinel.
- On semantic approach for detecting anomalous insider accesses to DBMS. Muhammad Imran Khan, Barry O’sullivan and Simon Foley.
- Towards a Security Event Data Classification. Gustavo Gonzalez, Jose Rubio Hernan and Joaquin Garcia-Alfaro. -
Lunch
-
-
Tutorial
-
Ronan Lashermes
Fault Injection Attacks -
Session 2: Apps security
-
- Unraveling Reflection Induced Sensitive Leaks in Android Apps. Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Gaur, Akka Zemmari, Mohamed Mosbah, Daya Ram Sharma and Mauro Conti.
- Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions. Alessio Viticchié, Cataldo Basile and Antonio Lioy.
- Using data integration to help design more secure applications. Sebastien Salva and Loukmen Regainia. -
Coffee Break
-
-
Session 3: Access Control and Filtering
-
- MA-MOrBAC: A Distributed Access Control Model Based On Mobile Agent for Multi-Organizational, Collaborative and Heterogeneous Systems. Zeineb Ben Yahya.
- A formal approach for firewalls and IDS interoperability checking (short paper). Fakher Ben Ftima, Kamel Karoui and Henda Ben Ghezala.
- A Vehicle Collision-Warning System based on Multipeer Connectivity and Off-the-shelf Smart-Devices (short paper). Bogdan Groza and Cosmin Briceag.
-
Welcome Cocktail
-
Wednesday
-
Invited speaker
-
Chair: Joaquin Garcia Alfaro
- Gérard Le Comte
Strategic Security Leader, Societe Generale bank
- Title: A journey in banking information security -
Coffee Break
-
-
Technical session on Cybersecurity chairs
-
-
Panel on Cybersecurity chairs
-
- LCL Stéphane GRUNENWALD (Panel Chair - ETRS/DGF/GCYB)
- Simon Foley (IMT-Atlantique, Cyber Critical National Infrastructure)
- Patrick Hébrard (Naval Group/DCNS, Naval Cyberdefense)
- Yvon Kermarrec (Ecole Navale, Naval Cyberdefense)
- Paul Lajoie-Mazenc (EDF, Critical National Infrastructure)
- Gerard Le Comte (Société Génerale, Critical National Infrastructure)
- Axel Legay (INRIA - Threat Analysis)
- Stéphane TAILLAT (Ecoles Militaires de St Cyr-Coëtquidan, Saint-Cyr Cyberdefence)
-
Lunch
-
-
Social Event
-
-
Gala Dinner
-
Thursday
-
Invited speaker
-
Chair: Yvon Kermarrec
- Arnaud Tisserand
Research director, CNRS
- Title : Hardware support for physical security -
Coffee Break
-
-
Session 4: Cloud security
-
- Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications. Khalil Hariss, Hassan Noura and Abed Ellatif Samhat.
- A Study of Threat Detection Systems and Techniques in the Cloud. Pamela Carvallo, Ana R. Cavalli and Natalia Kushik. -
Session 4: Cloud security
-
- Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications. Khalil Hariss, Hassan Noura and Abed Ellatif Samhat.
- A Study of Threat Detection Systems and Techniques in the Cloud. Pamela Carvallo, Ana R. Cavalli and Natalia Kushik. -
Session 5: Cyber-Insurance & Cyber Threat Intelligence
-
- Preventing the drop in security investments for non-competitive cyber-insurance market? Artsiom Yautsiukhin, Albina Orlando, Ganbayar Uuganbayar and Fabio Martinelli.
-Towards an Anonymity Supported Platform for Shared Cyber Threat Intelligence (short paper). Thomas Wagner, Esther Palomar, Khaled Mahbub and Ali Abdallah. -
Lunch
-
-
Session 6: Human-Centric Security and Trust
-
- Phishing Attacks Root Causes. Hossein Abroshan, Jan Devos, Geert Poels and Eric Laermans.
- Domain Name System without Root Servers. Matthäus Wander, Christopher Boelmann and Torben Weis.
- Data Hiding on Social Media Communications Using Text Steganography (short paper). Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Po-Yang Huang, Chien-Hung Huang and Chin-Laung Lei. -
Session 7: Risk Analysis
-
- Privacy Scoring of Social Network User Profiles through Risk Analysis. Sourya Joyee De and Abdessamad Imine.
- A Method for Developing Qualitative Security Risk Assessment Algorithms. Gencer Erdogan and Atle Refsdal.
- An empirical analysis of risk aversion in malware infections (short paper). Jude Jacob Nsiempba, Fanny Lalonde Lévesque, Nathalie De Marcellis-Warin and José M. Fernandez. -
Conclusion and farewell
-