CRiSIS’2016 Program

September 5th
8:00 – 8:45
8:45 – 9:00
9:00 – 9:50
Session 1: Protection of personal data [chair: David Espes]

 – CLiKC: A privacy-mindful approach when sharing data
Esma Aimeur, Gilles Brassard and Jonathan Rioux.
 – Ransomware and the Legacy Crypto API
Aurélien Palisse, Hélène Le Bouder, Colas Le Guernic, Axel Legay and Jean-Louis Lanet.
9:50 – 11:15
Session 2: Risk and security analysis methodology [chair: Nora Cuppens]

 – A Formal Verification of Safe Update Point Detection in Dynamic Software Updating
Razika Lounas, Nisrine Jafri, Axel Legay, Mohamed Mezghiche and Jean-Louis Lanet.
 – Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams.
Hela Hakim, Asma Sellami and Hanene Ben Abdallah.
– Towards the weaving of the characteristics of good security requirements
Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère and Abdelmalek Benzekri.
11:15 – 11:45
Coffee Break
11:45 – 12:45
Keynote: Roberto Di Pietro, Nokia [chair: Jean Louis Lanet]
The future of security – a Bell Labs perspective
13:00 – 14:00
14:15 – 16:15
Tutorial 1: (Ruan He – Orange) [chair: Esma Aimeur]

Security of virtualization technologies
16:15 – 16:45
Coffee Break
16:45 – 17:35
Session 3 Methodology for security [chair: Anis Bkakria]

 – Towards Empirical Evaluation of Automated Risk Assessment Methods
Olga Gadyatskaya, Katsiaryna Labunets and Federica Paci.
– An n-sided polygonal model to calculate the impact of cyber security events
Gustavo Gonzalez-Granadillo, Joaquin Garcia-Alfaro and Herve Debar.
18:30 – 19:30 Gulf Stream aperitif and Posters presentation
September 6th
8:00 – 9:00
9:00 – 11:00
Tutorial 2 (Sheikh M. Habib – Technische Universitat Darmstadt) [chair: Esma Aimeur]

Computational trust methods for security risk quantification and management
11:00 – 11:30
Coffee Break
11:30 – 12:30
Session 4: Security and Formal Methods [chair: Axel Legay]

 – SPTool – equivalence checker for SAND attack trees
Yoann van den Boom, Barbara Kordy and Piotr Kordy.
 – A Memory Allocation Module of Contiki Formally Verified with Frama-C. A Case Study
Frédéric Mangano, Simon Duquennoy and Nikolai Kosmatov.
12:45 – 14:45
Social event (Morlaix Bay)
Aperitif Banquet
Gala dinner
September 7th
09:00 – 10:00
Keynote (ZonghuaZhang – Telecom Lille) [chair: Frédéric Cuppens]

10:00 – 10:30
Coffee Break
10:30 – 11:20
Session 5: Network security [chair: Zonghua Zhang]

 – A Proactive Stateful Firewall for Software Defined Networking
Salaheddine Zerkane, David Espes, Frédéric Cuppens and Philippe Le Parc.
 – Protocol reverse engineering: Challenges and obfuscation
Julien Duchêne, Colas Le Guernic, Eric Alata, Vincent Nicomette and Mohamed Kâaniche.
11:20 – 12:45
Session 6: Detection & monitoring [chair: Réda Yaich]

 – Detecting anomalous behavior in DBMS logs
Muhammad Imran Khan and Simon Foley.
 – Online link disclosure strategies for social networks
Younes Abid, Abdessamad Imine, Amedeo Napoli, Chedy Raissi and Michael Rusinowitch.
 – A framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory
Rui Abreu, César Andrés and Ana R. Cavalli.
13:00 – 14:00
14:15 – 15:45
Session 7: Cryptography [chair: Hélène Le Bouder]

 – High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication
Amine Mrabet, Nadia El-Mrabet, Ronan Lashermes, Jean Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager and Mohsen Machhout.
 – Improving Side-Channel Attacks against Pairing-Based Cryptography
Damien Jauvart, Jacques Fournier, Nadia El Mrabet and Louis Goubin.
 – A First DFA on PRIDE: from Theory to Practice
Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques Fournier and Renaud Sirdey.

Important Dates

Registration is open

Conference date/place:
5th-7th September, 2016, Roscoff, France.

Submission deadline:
June 29th, 2016

Deadline for short papers and posters:
July 6th, 2016

Acceptance Notification:
July 25th, 2016

Camera ready:
August 12th, 2016