Tentative Program CRISIS 2020


Wednesday, November 4, 2020

13:45 – 15:00

General Welcome & CRISIS 2020 Keynote

15:00 – 15:30

BREAK

15:30 – 17:00

Session 1: Vulnerabilities, Attacks & Intrusion Detection

15:30-16:00 – Measuring and Modeling Software Vulnerability Security Advisory Platforms. By L. Miranda, D. Vieira, M.  Nogueira, L. Ventura, M. Bicudo, M. Martins, L. Senos, L. de Aguiar, E. Lovat and D. Menasche (Federal University of Rio de Janeiro, Brazil & Siemens Corporate Research, USA)

16:00-16:30 – Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs. By Karim Lounis and Mohammad Zulkernine (Queen’s University, Canada)

16:30-17:00 – A Deeper Analysis of Adversarial Examples in Intrusion Detection. By Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens and Reda Yaich (IMT Atlantique, IRT SystemX, France ; Polytechnique Montréal, Canada, Ecole Supérieure d’Informatique, Algeria)


Thursday, November 5, 2020

10:30 – 12:00

Session 2: TLS, Openness & Security Control

10:30-11:00 – Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits. By Olivier Levillain (Télécom SudParis, France)  

11:00-11:30 – Security through Transparency and Openness in Computer Design. By Ivo Emanuilov (KU Leuven, Belgium)

11:30-12:00 – An ML Behavior-based Security Control for Smart Home Systems. By Noureddine Amraoui and Belhassen Zouari (Higher School of Communications of Tunis, Tunisia)

12:00 – 13:30

BREAK

13:30 – 15:30

Session 3: Short Papers I

13:30-13:50 – Augmented Voting Reality. By Hervé Chabanne, Emmanuelle Dottax and Denis Dumont (Idemia, France)  

13:50-14:10 – Code-Embedding: An Efficient Http Pre-processing Technique to Enhance Web-Security. By Ines Jemal, Haddar Med Amine, Omar Cheikhrouhou and Adel Mahfoudhi (University of Sfax, Tunisia)

14:10-14:30 – Enhancement of a business model with a Business Contextual Risk Model. By Zakariya Kamagaté, Jacques Simonin, Yvon Kemarrec (IMT Atlantique, France)  

14:10-14:30 – Secure Data Processing for Industrial Remote Diagnosis and Maintenance. By Walid Arabi, Reda Yaich, Mawloud Omar and Aymen Boudguiga (IRT SystemX & CEA, France)

14:30 – 15:00

BREAK

15:00 – 17:00

Session 4: Access Control, Risk Assessment & Security Knowledge

15:00-15:30 – A Posteriori Analysis of Policy Temporal Compliance. By Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens and Olivier Raynaud (IMT Atlantique & Be-ys Research, France ; Polytechnique Montreal, Canada)  

15:30-16:00 – Asset-driven Approach for Security Risk Assessment in IoT Systems. By S.  Chehida, A. Baouya, D. Fernández, P. Brun, G. Massot, M. Bozga, S. Bensalem (University Grenoble Alpes, CNRS/Verimag & Airbus CyberSecurity, France)  

16:00-16:30 – Heterogeneous security events prioritization using auto-encoders. By Alexandre Dey, Éric Totel and Sylvain Navers (Airbus CyberSecurity & IMT Atlantique, France)

16:30-17:00 – Community Knowledge about Security: Identification and Classification of User Contributions. By Fabien Patrick Viertel, Wasja Brunotte, Yannick Evers and Kurt Schneider (Leibniz Universität Hannover, Germany)  


Friday, November 6, 2020

10:00 – 11:00

Session 5: Short Papers II

10:00-10:20 – Towards Attacker Attribution for Risk Analysis. By Elena Doynikova, Evgenia Novikova, Diana Gaifulina and Igor Kotenko (St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, Russia) 

10:20-10:40 – Modelling and Verification of Safety of Access Control in SCADA Systems. By Inna Vistbakka and Elena Troubitsyna (Åbo Akademi University, Finland & KTH, Sweden)

10:40-11:00 – Security Assessment and Hardening of Autonomous Vehicles. By Samir Ouchani and Abdelaziz Khaled (CESI eXia, France)  

11:00 – 11:30

BREAK

11:30 – 13:00

Session 6: Risk Analysis, Neural Networks & Web Protection

11:30-12:00 – Modelling Security Risk Scenarios using Subjective Attack Trees. By Nasser Al-Hadhrami, Matthew Collinson and Nir Oren (University of Aberdeen, UK)

12:00-12:30 – Premium Access to Convolutional Neural Networks. By Julien Bringer, Herve Chabanne and Linda Guiga (Kallistech, IDEMIA and Télécom Paris, France)

12:30-13:00 – An OWASP Top Ten Driven Survey for Web Application Protection Methods. By O. Ben Fredj, O. Cheikhrouhou, M. Krichen, H. Hamam, A. Derhab (ENIS, Tunisia; Imam University, Saudi Arabia; University of Moncton, Canada; King Saud University, Saudi Arabia)

12:30 – 14:00

BREAK

14:00 – 15:30

Session 7: Infrastructure Security & Malware Detection

14:00-14:30 – Autonomous Vehicle Security: Literature Review of Real Attack Experiments. By S. Bouchelaghem, A. Bouabdallah, M. Omar (SystemX & Université de Technologie de Compiègne, France ; Université de Bejaia, Algeria)

14:30-15:00 – New Dataset for Industry 4.0 to address the change in threat landscape. By S. Alem, D. Espes, E. Martin, L. Nana, F. De Lamotte (Lab-STICC, France)  

15:00-15:30 – Toward Semantic-Based Android Malware Detection Using Model Checking. By Souad El Hatib, Loïc Ricaud, Josée Desharnais and Nadia Tawbi (Laval University, Canada)

15:30 – 15:45

FAREWELL/CLOSING