CRISIS 2021 Program

Friday, November 12

9:00 to 9:15

Welcome – Prof. Ashfaq Khokar – Chair of the Electrical and Computer Department at Iowa State University

9:15 to 10:15

Keynotes – Prof. Bharat Bhargava – Securing Distributed Systems under Contested environments.

10:15 to 10:30


10:30 to 12:00

Papers sessions 1 – CPS and Hardware Security

10:30-11:00 – Threat Modeling of Cyber-Physical Systems in Practice. By Ameerah Muhsinah Jamil, Lotfi Ben Othmane and Altaz Valani. Paper

11:00-11:30 – AVSDA: Autonomous Vehicle Security Decay Assessment. By Lama Moukahal, Mohammad Zulkernine and Martin Soukup. Paper

11:30-12:00 – A TSX-Based KASLR Break: Bypassing UMIP and Descriptor-Table Exiting. By Mohammad Sina Karvandi, Saleh Khalaj Monfared, Mohammad Sina Kiarostami, Dara Rahmati and Saeid Gorgin. Paper

12:00 to 13:30

Lunch break

13:30 to 14:30

Papers sessions 2 – Network and Data Security

13:30-14:00 – Path-preserving Anonymization for Inter-domain Routing Policiescal Systems in Practice. By Xiaozhe Shao, Hossein Pishro-Nik, and Lixin Gao. Paper

14:00-14:30 – Policy Modeling and Anomaly Detection in ABAC Policies. By Maryam Davari and Mohammad Zulkernine. Paper

15:00 to 15:15


15:15 to 16:15

Papers sessions 3 – Short papers

15:15-15:35 – Designing a Service for Compliant Sharing of Sensitive Research Data. By Aakash Sharma, Thomas Bye Nilsen, Sivert Johansen, Dag Johansen and Håvard Johansen. Paper

15:35-15:55 – Authenticated Multi-Proxy Accumulation Schemes for Delegated Membership Proofs. By Hannes Salin, Dennis Fokin and Alexander Johansson. Paper

15:55-16:15 – Extending the Exposure Score of Web Browsers By Incorporating CVSS. By Fadi Mohsen, Adel Shtayye, Riham Naser, Lena Mohammad and Marten Struijk. Paper

16:15 to 17:00

Open discussion

Saturday, November 13

10:20 to 10:30


10:30 to 12:30

Papers sessions 4 – Attacks, Responses, and Security Management

10:30-11:00 – A Stakeholder-Centric Approach for Defining Metrics for Information Security Management Systems. By Anirban Sengupta. Paper

11:00-11:30 – A Novel Approach for Attack Tree to Attack Graph Transformation. By Nathan Daniel Schiele and Olga Gadyatskayarnine and Martin Soukup. Paper

11:30-12:00 – Intelligent Decision Support for Cybersecurity Incident Response Teams: Autonomic Architecture and Mitigation Search. By Camilo Correa, Jacques Robin, Raul Mazo, and Salvador Abreu. Paper

12:00-12:30 – Using Garbled Circuit for Secure Brokering. By Lotfi Ben Othmane and Noor Ahmed. Paper

12:30 to 12:45

Summary and feedback