Program

Presentation duration: 25 minutes, including 5 minutes for questions.
Coffee break: 15 minutes
Lunch break: 1 hour


PROGRAM
WEDNESDAY, OCTOBER 22 – AFTERNOON

TIME

ACTIVITY

12:00 – 13:00

Registration & Lunch

13:00 – 13:30

Opening ceremony & CRiSIS 2025 Presentation

13:30 – 14:30

Keynote Speaker – Dr. Michel Barbeau, Carleton University
Quantum AI and ML: New Resources and New Threats

14:30 – 14:45

Coffee Break

14:45–16:00

Session 1 : AI for Software Security

Isaac Osei Asante and Justice Kusi Obour — Unveiling the Invisible: A Synergistic Deep Learning Odyssey for Autonomous Bug Detection and Precision Localization in Labyrinthine Software Architectures

Arian Soltani, Abir Bala, Djeff Kanda Nkashama, Pierre-Martin Tardif, Ayoub Bahnasse, Marc Frappier and Froduald Kabanza — Improving the Accuracy of Embeddings for Matching Tasks in Cybersecurity Using Generated Dictionaries

Charmant Nicolas Shangwe, Alan Davoust and Raphaël Khoury — Beyond Detection: Evaluating LLMs’ Semantic Understanding of Code Vulnerabilities

16:00–16:15

Coffee Break

16:15 – 17:30

Session 2 – Cyber Threats & Prediction

Mohamed El Amine Bekhouche and Kamel Adi — Enhanced Cyber Threat Severity Prediction Leveraging CVSS and BERT-based Language Models

Shiwam Keshri, Nidhi Sonkar and Shiva Darshan Sl — A Hybrid Graph Neural Networks-Transformer Architecture for Enhanced Distributed Denial of Service Anomaly Detection in Cloud Network Data

Jason Green, Nabil Mahmoud, Hossein Sarrafzadeh and Ahmad Patooghy — A Data-Driven Framework for Performance Assessment of SIEM Solutions

17:30–19:00

Cocktail event


PROGRAM
THURSDAY, OCTOBER 23 – MORNING

TIME

ACTIVITY

08:30 – 09:30

Keynote Speaker – Thierry Gagnon – Zero Trust Starts at the Door: Rethinking Identity & authentication to build the Zero Trust future we need

09:30 – 09:45

Coffee Break

09:45- 11: 00

Session 3 – Distributed Systems and IoT Security

Arttu Paju, Juha Nurmi, Alejandro Cabrera Aldaya, Nicola Tuveri, Juha Savimäki, Marko Kivikangas and Brian McGillion — External Entropy Supply for IoT Devices Employing a RISC-V Trusted Execution Environment

Abdoul Fayçal Zoungrana, Moudoud Hajar, Etienne Gael Tajeuna and Kamel Adi — Adversarial Ensemble Framework: Leveraging GANs for Robust Intrusion Detection in IoT Networks

Hamed Fard, Mahsa Kholghi, Benedikt Groß and Gerhard Wunder — Machine and Deep Learning for Indoor UWB Jammer Localization

11:00 – 11:15

Coffee Break

11:15 -12:30

Session 4 – Intrusion Detection Systems (IDS)

Youssef Yamout, Shahrear Iqbal and Mohammad Zulkernine — CAGAID: Context-Aware Gait Anomaly-Based Intrusion Detection

Maxime Gourceyraud, Rim Ben Salem, Christopher Neal, Frédéric Cuppens and Nora Boulahia-Cuppens — Federated Intrusion Detection System Based on Unsupervised Machine Learning

Ines Guerziz, Tiago Falk, Bao Le Long and Zakaria Abou El Houda — Domain Adversarial Neural Networks with Adversarial Robustness Evaluation for Intrusion Detection Systems

12:30–13:30

Lunch Break

PROGRAM
THURSDAY, OCTOBER 23 – AFTERNOON

TIME

ACTIVITY

13:30 – 14:45

Session 5 – Privacy and Digital Trust

Masoud Barati, Chen Zhou, Nafiseh Kahani, Diana Rogachova, Diana Addae and Raymond Xiao — Transparent Consent Tracking in Child-Oriented LLM Applications via Smart Contracts

Mahboobeh Dorafshanian, Mohamed Mejri and Djedjiga Mouheb — Interpreting Differential Privacy: Linking Privacy Budget to Disclosure Risk

Alicia Pang, Katsiaryna Labunets and Olga Gadyatskaya — Privacy in ERP Systems: Behavioral Models of Developers and Consultants

14:45 – 15:00

Coffee Break

15:00 – 16:40

Session 6 – Vulnerabilities and Resilience

Rosario Rizza, Riccardo Sisto and Fulvio Valenza — Analysis of the eBPF Vulnerabilities in the Linux Kernel

Arslane Fawzi Halilou and Natalia Stakhanova — Revealing Unreported OT Vulnerabilities from Public Discussions

Yvon Kermarrec — Strengthening Maritime Cyber Resilience: The Imperative Need for a Global and Cooperative MOOC Initiative

Pierre Saha Fobougong, Nancy Badran, Mohamed Mejri and Kamel Adi — Improving Hyperledger Indy With Post-Quantum And Optimal Credential Attributes Selection Agents

17:00–22:00

Guided excursion in Gatineau Park followed by a Gala Dinner at the renowned restaurant L’Orée du Bois.


PROGRAM
FRIDAY, OCTOBER 24 – MORNING

TIME

ACTIVITY

08:30 – 09:30

Keynote Speaker – Dr. Gabriela Nicolescu, Polytechnique Montréal
Cybersecurity for avionics

09:30 -09:45

Coffee Break

09:45 – 11:50

Session 7 – Privacy, Threat Analysis, and Explainable Cybersecurity

Radia Kassa, Kamel Adi and Abdelkamel Tari — Adaptive Noise Injection Guided by Feature Importance for Membership Privacy in MLaaS

Viet Huy Ha, Eric Totel and Vincent Gauthier — Generating Causal Logs to Explain Attacks

Rezika Bouzid and Raphaël Khoury — Evaluating the Effectiveness of ChatGPT for Analyzing Real-World Multi-File Cryptographic Vulnerabilities

Inoussa Mouiche and Sherif Saad — Context-Aware Entity-Relation Extraction for Threat Intelligence Knowledge Graphs

Nicholas Pecka, Lotfi Ben Othmane and Renee Bryce — Toward Automated Identification of Potential Threats to Large Software Using Association of Threats to Call Graph Cluster Types

11:50–12:50

Lunch Break

PROGRAM
FRIDAY, OCTOBER 24 – AFTERNOON

TIME

ACTIVITY

12:50 – 14:05

Session 8 – Advanced Attacks and Strategic Detection

Austin Carthy, Nafiz Sadman and Farhana Zulkernine — SiamesePhish: An Advanced AI-Powered URL Embedding Approach with Synthetic URLs for Phishing Detection

Ashkan Moradi, Yi Zhu and Tiago Falk — Towards Lightweight On-Device Audio Deepfake Detection Using Squeezeformers

Myria Bouhaddi and Kamel Adi — Strategic Detection of APTs through Federated Spatio-Temporal Graph Learning and Stackelberg Defense

14:05 – 14:20

Coffee Break

14:20 – 15:35

Session 9 – Security Governance, Compliance, and Adaptive Systems

Hadeer Ahmed, Issa Traore, Sherif Saad and Mohammad Mamun — DriftRL: A Reinforcement Learning Framework for Simulating Textual Data Drift in Cybersecurity

Franck Arnaud Fotso Kuate, Omer Nguena Timo and Florent Avellaneda — Role Mining in RBAC for Preserving Confidentiality

Md Mehedi Hassan Onik — The Impacts of (Anti)Encryption Laws on Secure Technology Development: A Case Study of Australia

15:35 – 15:50

Closing Speech and Announcement of CRiSIS’2026