CRiSIS 2013:   Program

23rd  October

9.00 – 10.00  Conference Registration

10.00 – 12.00  Tutorial 1 : “Parsifal: writing efficient and robust binary parsers, quickly” by Olivier Levillain

12.30-13.30   Lunch

14.00-16.00  Tutorial 2: “How to develop secure applications with Aspect-Oriented  Programming”   by  Mónica Pinto  and José Miguel Horcas

20.00 Social event

24th  October

9.00 – 9.20  Conference Registration

9.20 – 9.30  Welcome

 PhD Workshop 

9.30 – 11.00

Accessing Secure Information using Export file Fraudulence    G. Bouffard, T. Khefif, J.-L. Lanet, I.Kane and S. Casanova Salvia.

Misbehaviour Monitoring on System-of-Systems Components  N. Shone, Q.Shi, M.Merabti and K. Kifayat.

What Security for Electronic Exams?  R. Giustolisi, G. Lenzini and G. Bella.

Economic Impact of Software Security activities in Software Development; Usable metrics for economic analyses     G. Chehrazi.

 11.00 – 11.15  Coffee break

 Short Papers Session

11.15 – 12.30

MASS: An Efficient and Secure Broadcast Authentication Scheme for Resource Constrained Devices   W. B. Jaballah, M. Conti, . Di Pietro, M. Mosbah and N. V. Verde.

A Complete Tableau Procedure for Risk Analysis  M. Cristani, E. Karafili and L. Viganò.

Semantic-based Context-aware Alert Fusion for Distributed Intrusion Detection  Systems    A. Sadighian,  S. T. Zargar,  J.M. Fernandez and A. Lemay.

12.30 -14  Lunch

 Main Conference

14.00 – 15.30   Session Security Management

Detection of Attack Strategies , S. Alsuhibany, C. Morisset and A. van Moorsel.

A Formal Methodology for Enterprise Information Security Risk  Assessment, J. Bhattacharjee, A. Sengupta and C. Mazumdar.

 Uniqueness of the File Systems Genome: Supporting Arguments and   Massive Experimental Measurements, R. Di Pietro, L. Vincenzo Mancini,   A.Villani and D. Vitali.

15.30 – 15.45  Coffee break

15.45 – 17.15  Session Privacy

Controlled Information Sharing for Unplanned Emergencies, E. Ferrari,  B. Carminati and M. Guglielmi

CREPUSCOLO:  A Collusion Resistant Privacy Preserving Location  Verification System,  E. Canlar, M. Conti, B. Crispo and R. Di Pietro.

Privacy-enhanced Filtering and Collection Middleware in EPCglobal  Networks ,  W. Tounsi, N. Cuppens-Boulahia, F.Cuppens and J.Garcia-Alfaro.

17.30  Social Event

20.00  Social Dinner

 25th  October

9.00 – 10.00  Keynote:  Simon Foley: Security Risk Management

10.00 – 10.30 Session Attacks and Defenses

Predictive Vulnerability Scoring in the Context of Insufficient Information  Availability , H. Ghani, J. L. Garcia, N.Suri, A. Khelil and N.Alkadri.

10.30 – 10.45 Coffee break

10.45 – 12.45 Session Attacks and Defenses

A Defending Java Card Virtual Machine to Thwart Fault Attacks by Microarchitectural Support, M. Lackner, R. Berlach, M. Hraschan, R.  Weiss and C. Steger.

Quantitative Assessment of Software Vulnerabilities Based on  Economic-Driven Security Metrics, H. Ghani, J. L. Garcia and N. Suri.

Selective Record Route DoS Traceback, M. Alenezi and M.Reed

 An Event Processing Approach for Threats Monitoring of Service  Compositions, D. Ayed, M. Asim and D. Llewellyn-Jones.

13.00 – 14.00 Lunch 

End of Crisis 2013

G. Chehrazi