Information Systems Security Conference
16–20 December 2025, Indore, Madhya Pradesh, India
Ushering Next Gen Cybersecurity through AI

ICISS 2025 - The 21st Annual International Information System Security Conference

Keynote Speakers

Bio:  Prof. Christopher Kruegel   is a Professor in the Computer Science Department at the University of California, Santa Barbara, and a member of the International Secure Systems Lab (iSecLab). He received his Ph.D. in Computer Science from the Technical University of Vienna, Austria. His research focuses on computer and communications security, with emphasis on malware analysis, web security, and the security of social networks. He is especially interested in building practical systems and making security tools publicly available, with a core focus on solving real- world threats. Prof. Kruegel has published over 100 papers in leading venues such as IEEE S&P, ACM SIGSAC, and USENIX Security. His work has earned numerous honors, including the NSF CAREER Award, the MIT Technology Review TR35 Award, and multiple best paper awards. He also co-founded Lastline, Inc., a company focused on advanced malware detection, acquired by VMware in 2020. 




Title: To be updated

Abstract: To be updated



Bio:  Prof. Elisa Bertino   is a Professor in the Department of Computer Science at Purdue University and a leading researcher in information and systems security. Her research focuses on the security of cellular networks, IoT systems, digital identity management, and AI techniques for cybersecurity. She leads Purdue's Cyber Space Security Lab (Cyber2Slab) and has made influential contributions to access control, data privacy, and secure distributed systems. Before joining Purdue in 2004, she was a Professor and Department Head at the University of Milan, Italy. She received her Ph.D. in Computer Science from the University of Pisa, Pisa, Italy, in 1980. Prof. Bertino is a Fellow of IEEE, ACM, and AAAS, and has received numerous awards, including the IEEE Computer Society 2002 Technical Achievement Award, the IEEE Computer Society 2005 Kanai Award, the ACM SIGSAC Outstanding Contributions Award, and the 2019–2020 ACM Athena Lecturer Award. She has served on the editorial boards of several leading journals, including ACM Transactions on Information and System Security, IEEE Security & Privacy Magazine, and IEEE Transactions on Dependable and Secure Computing. 


Title: To be updated

Abstract: To be updated



Bio:  Prof. Pranab Sen   is a professor at the School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai. He finished his PhD in 2001 from the same institute. He has held postdoctoral positions at Universite Paris at Orsay, France and at University of Waterloo, Canada, followed by a Research Staff position at NEC Laboratories, Princeton, USA. He joined his alma mater as faculty in 2006. He has been a Visiting Professor at McGill University, Canada and at the Centre for Quantum Technologies, National University of Singapore. He works in quantum computation, quantum information theory and quantum cryptography. Though his earlier work has been mostly theoretical, he is currently very interested in engineering issues involved in making quantum key distribution a practical reality. 






Title: Practical resilient efficient quantum key distribution

Abstract: Quantum key distribution (QKD) is a uniquely quantum way to generate a secure uniformly random secret key of n bits between two remote parties Alice and Bob who share only polylog n bits of prior uniformly random secret key. The final secret key should be secure even under eavesdropping action by a third party Eve who can listen into and tamper all communication between Alice and Bob in a limited fashion. Almost all known quantum key distribution (QKD) protocols use two way communication, including the earliest and most famous one viz. Bennett-Brassard 1984 (BB84). Also most known QKD protocols have an information reconciliation step where Alice and Bob go from their respective raw keys, which are slightly different due to Eve's actions, to their reconciled raw keys which are exactly the same. No provably correct efficient algorithm for information reconciliation suitable for QKD was known. All experimental implementations of QKD suffer significant channel losses, instrument imperfections etc. which have to be handled by additional classical two way communication. One way QKD becomes important in some critical / military scenarios. We design a strictly one way QKD protocol that is end to end efficient, resilient and practical to implement on today's hardware. Using the 4 BB84 quantum states, it can ideally tolerate up to 50% losses without eavesdropping bit and instrument errors, or 11% bit and instrument errors without losses. A tradeoff exists between losses and bit errors e.g. loss of 20% and bit error of 2% is tolerable in practice, which is a realistic figure. We also design new efficient resilient and practical two way protocols with much lesser communication overhead than earlier works.




Invited Speakers



Bio:  Dr. Nils Ole Tippenhauer   is a faculty member at the CISPA Helmholtz Center for Information Security in Saarbrücken, Germany, where he leads the SCy-Phy research group. His research focuses on the security of cyber-physical systems (CPS), physical-layer wireless security, industrial control systems (ICS), and the Industrial Internet of Things (IIoT). He is particularly interested in securing critical infrastructure such as power grids and water systems. Before joining CISPA, he was an Assistant Professor at the Singapore University of Technology and Design (SUTD), where he helped build practical testbeds for ICS and IIoT security. Dr. Tippenhauer received his Ph.D. (Dr. Sc.) in Computer Science from ETH Zurich and holds a degree in Computer Engineering from Hamburg University of Technology, Germany. He has received multiple best paper awards, including at DIMVA 2023, CPSIOTSEC 2022, ACSAC 2022, and CPSS 2017, and has served on program committees for leading conferences such as USENIX Security, CCS, and AsiaCCS. He also actively contributes to education through teaching core and advanced cybersecurity courses and supporting CTF and hacking communities. 


Title: To be updated

Abstract: To be updated