Information Systems Security Conference
16-20 December 2025, Indore, Madhya Pradesh, India
Ushering Next Gen Cybersecurity through AI

ICISS 2025 — The 21st Annual International Information System Security Conference

Keynote Speakers

Prof. Christopher Kruegel

Prof. Christopher Kruegel

is a Professor in the Computer Science Department at the University of California, Santa Barbara, and a member of the International Secure Systems Lab (iSecLab). He received his Ph.D. in Computer Science from the Technical University of Vienna, Austria. His research focuses on computer and communications security, with emphasis on malware analysis, web security, and the security of social networks. He is especially interested in building practical systems and making security tools publicly available, with a core focus on solving real- world threats. Prof. Kruegel has published over 100 papers in leading venues such as IEEE S&P, ACM SIGSAC, and USENIX Security. His work has earned numerous honors, including the NSF CAREER Award, the MIT Technology Review TR35 Award, and multiple best paper awards. He also co-founded Lastline, Inc., a company focused on advanced malware detection, acquired by VMware in 2020.

Title: To be updated

Abstract: To be updated

Prof. Elisa Bertino

Prof. Elisa Bertino

is a Professor in the Department of Computer Science at Purdue University and a leading researcher in information and systems security. Her research focuses on the security of cellular networks, IoT systems, digital identity management, and AI techniques for cybersecurity. She leads Purdue's Cyber Space Security Lab (Cyber2Slab) and has made influential contributions to access control, data privacy, and secure distributed systems. Before joining Purdue in 2004, she was a Professor and Department Head at the University of Milan, Italy. She received her Ph.D. in Computer Science from the University of Pisa, Pisa, Italy, in 1980. Prof. Bertino is a Fellow of IEEE, ACM, and AAAS, and has received numerous awards, including the IEEE Computer Society 2002 Technical Achievement Award, the IEEE Computer Society 2005 Kanai Award, the ACM SIGSAC Outstanding Contributions Award, and the 2019-2020 ACM Athena Lecturer Award. She has served on the editorial boards of several leading journals, including ACM Transactions on Information and System Security, IEEE Security & Privacy Magazine, and IEEE Transactions on Dependable and Secure Computing.

Title: To be updated

Abstract: To be updated

Prof. Pranab Sen

Prof. Pranab Sen

Works in quantum computation, information theory, and cryptography; currently focused on engineering practical quantum key distribution.

Title: Practical resilient efficient quantum key distribution

Abstract:Quantum key distribution (QKD) is a uniquely quantum way to generate a secure uniformly random secret key of n bits between two remote parties Alice and Bob who share only polylog n bits of prior uniformly random secret key. The final secret key should be secure even under eavesdropping action by a third party Eve who can listen into and tamper all communication between Alice and Bob in a limited fashion. Almost all known quantum key distribution (QKD) protocols use two way communication, including the earliest and most famous one viz. Bennett-Brassard 1984 (BB84). Also most known QKD protocols have an information reconciliation step where Alice and Bob go from their respective raw keys, which are slightly different due to Eve's actions, to their reconciled raw keys which are exactly the same. No provably correct efficient algorithm for information reconciliation suitable for QKD was known. All experimental implementations of QKD suffer significant channel losses, instrument imperfections etc. which have to be handled by additional classical two way communication. One way QKD becomes important in some critical / military scenarios. We design a strictly one way QKD protocol that is end to end efficient, resilient and practical to implement on today's hardware. Using the 4 BB84 quantum states, it can ideally tolerate up to 50% losses without eavesdropping bit and instrument errors, or 11% bit and instrument errors without losses. A tradeoff exists between losses and bit errors e.g. loss of 20% and bit error of 2% is tolerable in practice, which is a realistic figure. We also design new efficient resilient and practical two way protocols with much lesser communication overhead than earlier works.

Invited Speakers

Dr. Nils Ole Tippenhauer

Dr. Nils Ole Tippenhauer

is a faculty member at the CISPA Helmholtz Center for Information Security in Saarbrücken, Germany, where he leads the SCy-Phy research group. His research focuses on the security of cyber-physical systems (CPS), physical-layer wireless security, industrial control systems (ICS), and the Industrial Internet of Things (IIoT). He is particularly interested in securing critical infrastructure such as power grids and water systems. Before joining CISPA, he was an Assistant Professor at the Singapore University of Technology and Design (SUTD), where he helped build practical testbeds for ICS and IIoT security. Dr. Tippenhauer received his Ph.D. (Dr. Sc.) in Computer Science from ETH Zurich and holds a degree in Computer Engineering from Hamburg University of Technology, Germany. He has received multiple best paper awards, including at DIMVA 2023, CPSIOTSEC 2022, ACSAC 2022, and CPSS 2017, and has served on program committees for leading conferences such as USENIX Security, CCS, and AsiaCCS. He also actively contributes to education through teaching core and advanced cybersecurity courses and supporting CTF and hacking communities. .

Title: To be updated

Abstract: To be updated

Tutorials

Prof. Rajiv Ranjan

Prof. Rajiv Ranjan

is the Chair Professor for the Internet of Things in the School of Computing of Newcastle University, United Kingdom. He is the director of the Networked and Ubiquitous Systems Engineering (NUSE) Group in the School of Computing. He is the Research Director of Newcastle Urban Observatory and served as Academic Director (School's Chair) of the School of Computing from 2020-24. He is an internationally established scientist in the area of Distributed Systems (having published over 300 scientific papers out of which about 60 papers in the IEEE/ACM Transactions Journals). He is a fellow of IEEE (2024), Academia Europaea (2022) and the Asia-Pacific Artificial Intelligence Association (2023). He is also the Founding Director of the International Centre (UK- Australia) on the EV Security and National Edge Artificial Intelligence Hub, both funded by EPSRC.

Title: Federated Learning: Architecture, Threat Landscape, and Defence Mechanisms

Abstract: Federated Learning (FL) is an emerging machine learning paradigm that enables collaborative model training across decentralized devices or servers holding local data, without exchanging the raw data itself. This privacy-preserving approach is increasingly adopted in applications such as mobile computing, healthcare, and finance, where data sensitivity and regulatory constraints are paramount. This tutorial will provide a comprehensive overview of FL, beginning with its core architecture, including the client-server model, communication protocols, and aggregation techniques such as Federated Averaging (FedAvg). We will delve into the practical challenges of FL, particularly those arising from non-IID data distributions, limited communication bandwidth, and device heterogeneity. A key focus of the tutorial will be the threat landscape in FL. We will explore a range of attacks including poisoning attacks, inference attacks, and model inversion, illustrating how adversaries can compromise model integrity or extract private information. The session will then transition into defence mechanisms, covering state-of-the-art techniques such as differential privacy, secure aggregation, and anomaly detection frameworks.

Dr. Devki Nandan Jha

Dr. Devki Nandan Jha

is an Assistant Professor at School of Computing, Newcastle University, UK. He is also a Visiting Researcher at the University of Oxford. The main theme of his research revolves around automatic, zero-trust and intelligent Cloud and IoT applications (Edge-Cloud systems, healthcare systems, transportation systems).

Title: Jointly Presenting with Prof. Rajiv Ranjan