
Program
Presentation duration: 25 minutes, including 5 minutes for questions.
Coffee break: 15 minutes
Lunch break: 1 hour

PROGRAM
WEDNESDAY, OCTOBER 22 – AFTERNOON
TIME
ACTIVITY
12:00 – 13:00

Registration & Lunch
13:00 – 13:30

Opening ceremony & CRiSIS 2025 Presentation
13:30 – 14:30

Keynote Speaker – Dr. Michel Barbeau, Carleton University
Quantum AI and ML: New Resources and New Threats
14:30 – 14:45

Coffee Break
14:45–16:00

Session 1 : AI for Software Security
Isaac Osei Asante and Justice Kusi Obour — Unveiling the Invisible: A Synergistic Deep Learning Odyssey for Autonomous Bug Detection and Precision Localization in Labyrinthine Software Architectures
Arian Soltani, Abir Bala, Djeff Kanda Nkashama, Pierre-Martin Tardif, Ayoub Bahnasse, Marc Frappier and Froduald Kabanza — Improving the Accuracy of Embeddings for Matching Tasks in Cybersecurity Using Generated Dictionaries
Charmant Nicolas Shangwe, Alan Davoust and Raphaël Khoury — Beyond Detection: Evaluating LLMs’ Semantic Understanding of Code Vulnerabilities
16:00–16:15

Coffee Break
16:15 – 17:30

Session 2 – Cyber Threats & Prediction
Mohamed El Amine Bekhouche and Kamel Adi — Enhanced Cyber Threat Severity Prediction Leveraging CVSS and BERT-based Language Models
Shiwam Keshri, Nidhi Sonkar and Shiva Darshan Sl — A Hybrid Graph Neural Networks-Transformer Architecture for Enhanced Distributed Denial of Service Anomaly Detection in Cloud Network Data
Jason Green, Nabil Mahmoud, Hossein Sarrafzadeh and Ahmad Patooghy — A Data-Driven Framework for Performance Assessment of SIEM Solutions
17:30–19:00

Cocktail event

PROGRAM
THURSDAY, OCTOBER 23 – MORNING
TIME
ACTIVITY
08:30 – 09:30

Keynote Speaker – Thierry Gagnon – Zero Trust Starts at the Door: Rethinking Identity & authentication to build the Zero Trust future we need
09:30 – 09:45

Coffee Break
09:45- 11: 00

Session 3 – Distributed Systems and IoT Security
Arttu Paju, Juha Nurmi, Alejandro Cabrera Aldaya, Nicola Tuveri, Juha Savimäki, Marko Kivikangas and Brian McGillion — External Entropy Supply for IoT Devices Employing a RISC-V Trusted Execution Environment
Abdoul Fayçal Zoungrana, Moudoud Hajar, Etienne Gael Tajeuna and Kamel Adi — Adversarial Ensemble Framework: Leveraging GANs for Robust Intrusion Detection in IoT Networks
Hamed Fard, Mahsa Kholghi, Benedikt Groß and Gerhard Wunder — Machine and Deep Learning for Indoor UWB Jammer Localization
11:00 – 11:15

Coffee Break
11:15 -12:30

Session 4 – Intrusion Detection Systems (IDS)
Youssef Yamout, Shahrear Iqbal and Mohammad Zulkernine — CAGAID: Context-Aware Gait Anomaly-Based Intrusion Detection
Maxime Gourceyraud, Rim Ben Salem, Christopher Neal, Frédéric Cuppens and Nora Boulahia-Cuppens — Federated Intrusion Detection System Based on Unsupervised Machine Learning
Ines Guerziz, Tiago Falk, Bao Le Long and Zakaria Abou El Houda — Domain Adversarial Neural Networks with Adversarial Robustness Evaluation for Intrusion Detection Systems
12:30–13:30

Lunch Break

PROGRAM
THURSDAY, OCTOBER 23 – AFTERNOON
TIME
ACTIVITY
13:30 – 14:45

Session 5 – Privacy and Digital Trust
Masoud Barati, Chen Zhou, Nafiseh Kahani, Diana Rogachova, Diana Addae and Raymond Xiao — Transparent Consent Tracking in Child-Oriented LLM Applications via Smart Contracts
Mahboobeh Dorafshanian, Mohamed Mejri and Djedjiga Mouheb — Interpreting Differential Privacy: Linking Privacy Budget to Disclosure Risk
Alicia Pang, Katsiaryna Labunets and Olga Gadyatskaya — Privacy in ERP Systems: Behavioral Models of Developers and Consultants
14:45 – 15:00

Coffee Break
15:00 – 16:40

Session 6 – Vulnerabilities and Resilience
Rosario Rizza, Riccardo Sisto and Fulvio Valenza — Analysis of the eBPF Vulnerabilities in the Linux Kernel
Arslane Fawzi Halilou and Natalia Stakhanova — Revealing Unreported OT Vulnerabilities from Public Discussions
Yvon Kermarrec — Strengthening Maritime Cyber Resilience: The Imperative Need for a Global and Cooperative MOOC Initiative
Pierre Saha Fobougong, Nancy Badran, Mohamed Mejri and Kamel Adi — Improving Hyperledger Indy With Post-Quantum And Optimal Credential Attributes Selection Agents
17:00–22:00


Guided excursion in Gatineau Park followed by a Gala Dinner at the renowned restaurant L’Orée du Bois.

PROGRAM
FRIDAY, OCTOBER 24 – MORNING
TIME
ACTIVITY
08:30 – 09:30

Keynote Speaker – Dr. Gabriela Nicolescu, Polytechnique Montréal
Cybersecurity for avionics
09:30 -09:45

Coffee Break
09:45 – 11:50

Session 7 – Privacy, Threat Analysis, and Explainable Cybersecurity
Radia Kassa, Kamel Adi and Abdelkamel Tari — Adaptive Noise Injection Guided by Feature Importance for Membership Privacy in MLaaS
Viet Huy Ha, Eric Totel and Vincent Gauthier — Generating Causal Logs to Explain Attacks
Rezika Bouzid and Raphaël Khoury — Evaluating the Effectiveness of ChatGPT for Analyzing Real-World Multi-File Cryptographic Vulnerabilities
Inoussa Mouiche and Sherif Saad — Context-Aware Entity-Relation Extraction for Threat Intelligence Knowledge Graphs
Nicholas Pecka, Lotfi Ben Othmane and Renee Bryce — Toward Automated Identification of Potential Threats to Large Software Using Association of Threats to Call Graph Cluster Types
11:50–12:50

Lunch Break

PROGRAM
FRIDAY, OCTOBER 24 – AFTERNOON
TIME
ACTIVITY
12:50 – 14:05

Session 8 – Advanced Attacks and Strategic Detection
Austin Carthy, Nafiz Sadman and Farhana Zulkernine — SiamesePhish: An Advanced AI-Powered URL Embedding Approach with Synthetic URLs for Phishing Detection
Ashkan Moradi, Yi Zhu and Tiago Falk — Towards Lightweight On-Device Audio Deepfake Detection Using Squeezeformers
Myria Bouhaddi and Kamel Adi — Strategic Detection of APTs through Federated Spatio-Temporal Graph Learning and Stackelberg Defense
14:05 – 14:20

Coffee Break
14:20 – 15:35

Session 9 – Security Governance, Compliance, and Adaptive Systems
Hadeer Ahmed, Issa Traore, Sherif Saad and Mohammad Mamun — DriftRL: A Reinforcement Learning Framework for Simulating Textual Data Drift in Cybersecurity
Franck Arnaud Fotso Kuate, Omer Nguena Timo and Florent Avellaneda — Role Mining in RBAC for Preserving Confidentiality
Md Mehedi Hassan Onik — The Impacts of (Anti)Encryption Laws on Secure Technology Development: A Case Study of Australia
15:35 – 15:50

Closing Speech and Announcement of CRiSIS’2026