Skip to main content

Lotfi Ben Othmane

Title: Clinical Associate Professor

Department: Computer Science and Engineering

College: College of Engineering

Curriculum Vitae

Curriculum Vitae Link

Education

  • PhD, Western Michigan University, 2010
    Major: Computer Science
    Dissertation: Active bundles for protecting con dentiality of sensitive data throughout their lifecycle
  • MS, University of Sherbrooke, 2000
    Major: Computer Science
    Specialization: Distributed Systems
  • BS, University of Sfax, 1995
    Major: Informatics applied to Management

Current Scheduled Teaching

CSCE 5934.864Directed StudySpring 2025
CSCE 5310.001Methods in Empirical AnalysisSpring 2025
CSCE 4565.001Secure Software DevelopmentSpring 2025
CSCE 4565.002Secure Software DevelopmentSpring 2025
CSCE 5565.001Secure Software DevelopmentSpring 2025
CSCE 5214.001Software Development for Artificial IntelligenceSpring 2025
CSCE 5934.864Directed StudyFall 2024
CSCE 6950.964Doctoral DissertationFall 2024
CSCE 5950.864Master's ThesisFall 2024
CSCE 4565.001Secure Software DevelopmentFall 2024 Syllabus SPOT
CSCE 4565.003Secure Software DevelopmentFall 2024 Syllabus SPOT
CSCE 4565.202Secure Software DevelopmentFall 2024 SPOT
CSCE 4565.204Secure Software DevelopmentFall 2024
CSCE 4565.206Secure Software DevelopmentFall 2024 SPOT
CSCE 5565.001Secure Software DevelopmentFall 2024 SPOT
CSCE 5565.003Secure Software DevelopmentFall 2024 SPOT
CSCE 5214.003Software Development for Artificial IntelligenceFall 2024 SPOT
CSCE 5214.004Software Development for Artificial IntelligenceFall 2024 SPOT
CSCE 5430.007Software EngineeringFall 2024 SPOT

Previous Scheduled Teaching

CSCE 5214.001Software Development for Artificial IntelligenceSummer 10W 2024 SPOT
CSCE 6950.964Doctoral DissertationSpring 2024
CSCE 5950.864Master's ThesisSpring 2024
CSCE 4565.001Secure Software DevelopmentSpring 2024 Syllabus SPOT
CSCE 5565.001Secure Software DevelopmentSpring 2024 Syllabus SPOT
CSCE 5214.001Software Development for Artificial IntelligenceSpring 2024 SPOT
CSCE 5934.864Directed StudyFall 2023
CSCE 6940.862Individual ResearchFall 2023
CSCE 5950.864Master's ThesisFall 2023
CSCE 4565.002Secure Software DevelopmentFall 2023 Syllabus SPOT
CSCE 4565.003Secure Software DevelopmentFall 2023 Syllabus SPOT
CSCE 5565.001Secure Software DevelopmentFall 2023 SPOT
CSCE 5565.003Secure Software DevelopmentFall 2023 SPOT
CSCE 5214.003Software Development for Artificial IntelligenceFall 2023 SPOT
CSCE 5214.004Software Development for Artificial IntelligenceFall 2023 SPOT
CSCE 6940.853Individual ResearchSummer 10W 2023
CSCE 5934.853Directed StudySpring 2023
CSCE 4565.001SECURE SOFTWARE SYSTEMSpring 2023 Syllabus SPOT
CSCE 5565.001Secure Software SystemsSpring 2023 SPOT
CSCE 5214.001Software Development for Artificial IntelligenceSpring 2023 SPOT
CSCE 5214.002Software Development for Artificial IntelligenceSpring 2023 SPOT
CSCE 5934.864Directed StudyFall 2022
CSCE 6940.862Individual ResearchFall 2022
CSCE 4565.001SECURE SOFTWARE SYSTEMFall 2022 Syllabus SPOT
CSCE 5565.001Secure Software SystemsFall 2022 SPOT
CSCE 5565.002Secure Software SystemsFall 2022 SPOT
CSCE 5214.003Software Development for Artificial IntelligenceFall 2022 SPOT
CSCE 5214.004Software Development for Artificial IntelligenceFall 2022 SPOT

Published Intellectual Contributions

    Book Chapter

  • Ben Othmane, L., Brucker, A.D., Dashevskyi, S., Tsalovski, P. (2017). An Introduction to Data Analytics for Software Security. Empirical Research for Software Security: Foundations and Experience. CRC Press.
  • Cruzes, D.S., Ben Othmane, L. (2017). Threats to Validity in Empirical Software Security Research. Empirical Research for Software Security: Foundations and Experience. CRC Press.
  • Ben Othmane, L., Weffers, H., Mohamad, M.M., Wolf, M. (2015). A Survey of Security and Privacy in Connected Vehicles. Other. 217--247. Springer New York.
  • Ben Othmane, L., Weffers, H., Ranchal, R., Angin, P., Bhargava, B., Mohamad, M.M. (2013). A Case for Societal Digital Security Culture. Security and Privacy Protection in Information Processing Systems. 391--404. Springer Berlin Heidelberg.
  • Conference Proceeding

  • Jedh, M.B., Lee, J.K., Ben Othmane, L. (2023). Evaluation of the Architecture Alternatives for Real-time Intrusion Detection Systems for Connected Vehicles. IEEE International Conference on Software Quality, Reliability, and Security. NY, IEEE.
  • Pecka, N., Ben Othmane, L., Valani, A. (2022). Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment. Proceedings of the International Conference on Software and System Processes and International Conference on Global Software Engineering. 45--49.
  • Ben Othmane, L., Gantenbein, H., Yasar, H., Curzi, S., Valani, A., Prabhakar, A., Cuddy, R. (2022). Tutorial: Threat Modeling of Cloud-based Solutions. 2022 IEEE Secure Development Conference (SecDev). IEEE.
  • Ben Othmane, L., Jamil, A. (2022). Self-Confidence of Undergraduate Students in Designing Software Architecture. Proc. The Annual Conference The American Society for Engineering Education.
  • Ben Othmane, L., Ahmed, N. (2022). Using Garbled Circuit for Secure Brokering. The 16th International Conference on Risks and Security of Internet and Systems.
  • Jamil, A., Othmane, L.b., Valani, A. (2021). Threat Modeling of Cyber-Physical Systems in Practice. The 16th International Conference on Risks and Security of Internet and Systems.
  • Jamil, A., Khan, S., Lee, J.K., Ben Othmane, L. (2021). Towards Automated Threat Modeling of Cyber-Physical Systems. 7th International Conference on Software Engineering \& Computer Systems (ICSECS). 614--619.
  • Jamil, A.M., Ben Othmane, L., Altaz Valani, A., Abdelkhalek, M., Tek, A. (2020). The Current Practices of Changing Secure Software: An Empirical Study. The 35th ACM/SIGAPP Symposium on Applied Computing.
  • Othmane, L.B., Jamil, A., Abdelkhalek, M. (2019). Identification of the Impacts of Code Changes on the Security of Software. 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). 2 569--574.
  • Othmane, L.B., Lamm, M. (2019). Mindset for software architecture students. 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). 2 306--311.
  • Ben Othmane, L., Alvarez, V., Berner, K., Fuhrmann, M., Fuhrmann, W., Guss, A., Hartsock, T. (2018). A low-cost fleet monitoring system. 2018 IEEE International Smart Cities Conference (ISC2). 1--2.
  • Mohan, V., Ben Othmane, L., Kres, A. (2018). BP: Security concerns and best practices for the automation of software deployment processes - an industrial case study. IEEE Cybersecurity Development Conference (SecDev).
  • Sardesai, S., Ulybyshev, D., Ben Othmane, L., Bhargava, B. (2018). Impacts of Security Attacks on The Effectiveness of Collaborative Adaptive Cruise Control Mechanism. 2018 IEEE International Smart Cities Conference (ISC2). 1--5.
  • Ulybyshev, D., Alsalem, A.O., Bhargava, B., Savvides, S., Mani, G., Othmane, L.B. (2018). Secure data communication in autonomous v2x systems. 2018 IEEE International Congress on Internet of Things (ICIOT). 156--163.
  • Pfretzschner, B., Ben Othmane, L. (2017). Identification of dependency-based attacks on node. js. Proceedings of the 12th International Conference on Availability, Reliability and Security. 1--6.
  • Fernando, R., Ranchal, R., An, B., Ben Othmane, L., Bhargava, B. (2016). Consumer oriented privacy preserving access control for electronic health records in the cloud. IEEE cloud.
  • Pfretzschner, B., Ben Othmane, L. (2016). Dependency-based Attacks on Node. js. 2016 IEEE Cybersecurity Development (SecDev). 66--66.
  • Mohan, V., Othmane, L.B. (2016). Secdevops: Is it a marketing buzzword?-mapping research on security in devops. 2016 11th international conference on availability, reliability and security (ARES). 542--547.
  • Othmane, L.B., Ali, A. (2016). Towards effective security assurance for incremental software development the case of zen cart application. 2016 11th International Conference on Availability, Reliability and Security (ARES). 564--571.
  • Othmane, L.b., Chehrazi, G., Bodden, E., Tsalovski, P., Brucker, A.D., Miseldine, P. (2015). Factors impacting the effort required to fix security vulnerabilities. International Conference on Information Security. 102--119.
  • Lilien, L.T., Othmane, L.b., Angin, P., Bhargava, B., Salih, R.M., DeCarlo, A. (2015). Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks. Proc. 33rd IEEE International Symposium on Reliable Distributed Systems Workshops (SRDSW).
  • Al-Hadhrami, N., Aziz, B., Sardesai, S., Othmane, L.b. (2015). Incremental Development of RBAC-controlled E-marking System Using the B Method. Proc. the 10th International Conference on Availability, Reliability and Security (ARES 2015).
  • Oueslati, H., Rahman, M.M., Ben Othmane, L. (2015). Literature Review of the Challenges of Developing Secure Software Using the Agile Approach. Proc. of the 10th International Conference on Availability, Reliability and Security.
  • Ben Othmane, L., Cerqueus, T., Thiery, A., Salehie, M., Noel, N., Labaere, A., Domingues, R\'emi, Cordier, A., Ventresque, A., Pasquale, L., others. (2015). Response to Emergency Situations in a Traffic Management System. Proc. International Conference on Computer Information Systems.
  • Renaud, K., Flowerday, S., Ben Othmane, L., Volkamer, M. (2015). “I Am Because We Are”: Developing and Nurturing an African Digital Security Culture. African Cyber Citizenship Conference 2015.
  • Othmane, L.b., Angin, P., Bhargava, B. (2014). Using Assurance Cases to Develop Iteratively Security Features Using Scrum. The First International Workshop on Software Assurance (SAW 2014 )--Proc. the 9th International Conference on Availability, Reliability and Security (ARES).
  • Ben Othmane, L., Bhuse, V., Lilien, L.T. (2013). Incorporating lab experience into computer security courses. 2013 World Congress on Computer and Information Technology (WCCIT). 1--4.
  • Bhargava, B., Ranchal, R., Othmane, L.B. (2013). Secure Information Sharing in Digital Supply Chains. Proceedings of IEEE IACC.
  • Lilien, L., Elbes, M., Othmane, L.b., Salih, R. (2013). Simulation of Emergency Response Operations for a Static Chemical Spill within a Building using an Opportunistic Resource Utilization Network. The 13th annual IEEE Conference on Technologies for Homeland Security (HST ’13).
  • Ben Othmane, L., Al-Fuqaha, A., ben Hamida, E., van den Brand, M. (2013). Towards Extended Safety in Connected Vehicles. 16th International IEEE Conference on Intelligent Transportation Systems-(ITSC), 2013. 652--657.
  • Ben Othmane, L., Weffers, H., Klabbers, M. (2013). Using attacker capabilities and motivations in estimating security risk. Workshop on Risk Perception in IT Security and Privacy. Newcastle, UK.
  • Azarmi, M., Bhargava, B., Angin, P., Ranchal, R., Ahmed, N., Sinclair, A., Linderman, M., Othmane, L.b. (2012). An End-to-End Security Auditing Approach for Service Oriented Architectures. 31st IEEE International Symposium on Reliable Distributed Systems (SRDS 2012).
  • Salih, R.M., Lilien, L., Othmane, L.b. (2012). Protecting Patients’ Electronic Health Records Using Enhanced Active Bundles. 6th International Conference on Pervasive Computing Technologies for Healthcare.
  • M. Salih, R., Ben Othmane, L., Lilien, L. (2011). Privacy Protection in Pervasive Healthcare Monitoring Systems with Active Bundles. Parallel and Distributed Processing with Applications Workshops (ISPAW), 2011 Ninth IEEE International Symposium on. 311--315.
  • Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Ben Othmane, L., Lilien, L. (2010). An Entity-centric Approach for Privacy and Identity Management in Cloud Computing. Reliable Distributed Systems, 2010 29th IEEE Symposium on. 177--183.
  • Ranchal, R., Bhargava, B., Othmane, L.B., Lilien, L., Kim, A., Kang, M., Linderman, M. (2010). Protection of Identity Information in Cloud Computing without Trusted Third Party. Reliable Distributed Systems, 2010 29th IEEE Symposium on. 368--372.
  • Lilien, L., Al-Alawneh, A., Ben Othmane, L. (2010). The pervasive trust foundation for security in next generation networks. Proceedings of the 2010 New Security Paradigms Workshop. 129--142.
  • Ben Othmane, L., Lilien, L. (2009). Protecting Privacy of Sensitive Data Dissemination Using Active Bundles. Privacy, Security, Trust and the Management of e-Business, 2009. CONGRESS'09. World Congress on. 202--213.
  • Ben-Othmane, L., Lilien, L. (2008). Protecting Sensitive Data throughout Its Life Cycle. Proc. Graduate Student Symposium, the 6th Annual Conference on Privacy, Security and Trust (PST2008). 12--13.
  • Journal Article

  • Jedh, M., Othmane, L.b., Ahmed, N., Bhargava, B. (2021). Detection of Message Injection Attacks onto the CAN Bus using Similarities of Successive Messages-Sequence Graphs. Other. 16 4133--4146.
  • Ben Othmane, L., Dhulipala, L., Multari, N., Govindarasu, M. (2020). On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus. IEEE Transactions on Dependable and Secure Computing. 19 (1) 468 - 481. IEEE.
  • Ranchal, R., Bhargava, B., Angin, P., Ben Othmane, L. (2018). Epics: A framework for enforcing security policies in composite web services. IEEE Transactions on Services Computing. IEEE.
  • Othmane, L.B., Chehrazi, G., Bodden, E., Tsalovski, P., Brucker, A.D. (2017). Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. Other. 2 (2) 107--124. Springer.
  • Al-Hadhrami, N., Aziz, B., Ben Othmane, L. (2016). An Incremental B-Model for RBAC-Controlled Electronic Marking System. Other. 7 (2) 37--64. IGI Global.
  • Oueslati, H., Rahman, M.M., Ben Othmane, L., Ghani, I., Arbain, A.F. (2016). Evaluation of the challenges of developing secure software using the agile approach. Other. 7 (1) 17--37. IGI Global.
  • Ben Othmane, L., Ranchal, R., Fernando, R., Bhargava, B., Bodden, E. (2015). Incorporating attacker capabilities in risk estimation and mitigation. Other. 51 41--61. Elsevier.
  • Son, J., Bhuse, V., Othmane, L.B., Lilien, L. (2015). Incorporating lab experience into computer security courses: three case studies. Other. 7 (2) 69--80.
  • Lilien, L.T., Ben Othmane, L., Angin, P., DeCarlo, A., Salih, R.M., Bhargava, B. (2014). A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks. Journal of Network and Computer Applications. Academic Press.
  • Ben Othmane, L., Angin, P., Weffers, H., Bhargava, B. (2014). Extending the Agile Development Process to Develop Acceptably Secure Software. IEEE Transactions on Dependable and Secure Computing. 11 (6) 497--509. IEEE.
  • Othmane, L.b., Fernando, R., Ranchal, R., Bhargava, B., Bodden, E. (2014). Likelihood of Threats to Connected Vehicles. International Journal of Next-Generation Computing. 5 (3) 290--303.
  • Ben Othmane, L., Weffers, H., Angin, P., Bhargava, B. (2013). A Time-Evolution Model for the Privacy Degree of Information Disseminated in Online Social Networks. Other. Inderscience Publishers.
  • Other

  • Kallel, S., Cuppens, Frederic, Boulahia Cuppens, N., Hadj Kacem, A., Ben Othmane, L. (2021). Special issue on risk and security of smart systems. 61 Elsevier. https://dl.acm.org/doi/abs/10.1016/j.jisa.2021.102925
  • Ben Othmane, L., Dhulipala, L. (2020). Injection of RPM and speed reading messages onto the CAN bus of a moving vehicle. Other. (https://dx.doi.org/10.21227/s1jy-h433)
  • Ben Othmane, L., Jaatun, M.G., Weippl, E. (2017). Empirical research for software security: foundations and experience. CRC Press.
  • Baluda, M., Fuchs, A., Holzinger, P., Nguyen, L., Ben Othmane, L., Poller, A., Repp, J\"urgen, Sp\"ath, Johannes, Steffan, J., Triller, S., others. (2015). Security Analysis of TrueCrypt. Other.
  • Ph.D. Thesis

  • Ben Othmane, L. (2010). Active Bundles for Protecting Confidentiality of Sensitive Data Throughout Their Lifecycle. Western Michigan University.
  • ben Othman, L. (2000). D\'eveloppement d'un syst\`eme de gestion de workflows distribu\'e. Universit\'e de Sherbrooke.

Contracts, Grants and Sponsored Research

    Fellowship

  • Ben Othmane, L., "Secure function evaluation for time-sensitive data," sponsored by Air Force Research Lab, Summer Faculty Visit, Federal, $14832 Funded. (2021 - 2021).
  • Ben Othmane, L., "Controlled data dissemination in suspicious environments," sponsored by Air Force Research Lab, Summer Faculty Visit, Federal, $11700 Funded. (2020 - 2020).
  • Grant - Research

  • Ben Othmane, L. (Principal), "SBIR Phase I: Using Brainwaves in Virtual Reality Applications," sponsored by National Science Foundation, Federal, $276000 Funded. (2022 - 2023).
  • Sponsored Research

  • Ben Othmane, L., "Measurement of the reaction of the brain to transcranial magnetic stimulation: a new way to monitor brain reactions," sponsored by Iowa State University, College of Engineering, State, $16993 Funded. (2021 - 2022).
  • Ben Othmane, L., "Detection of cyber-attack on cars - proof of concept," sponsored by Regents Innovation Fund, Iowa State University, State, $10000 Funded. (2020 - 2020).
,
Overall
Summative Rating
Challenge and
Engagement Index
Response Rate

out of 5

out of 7
%
of
students responded
  • Overall Summative Rating (median):
    This rating represents the combined responses of students to the four global summative items and is presented to provide an overall index of the class’s quality. Overall summative statements include the following (response options include a Likert scale ranging from 5 = Excellent, 3 = Good, and 1= Very poor):
    • The course as a whole was
    • The course content was
    • The instructor’s contribution to the course was
    • The instructor’s effectiveness in teaching the subject matter was
  • Challenge and Engagement Index:
    This rating combines student responses to several SPOT items relating to how academically challenging students found the course to be and how engaged they were. Challenge and Engagement Index items include the following (response options include a Likert scale ranging from 7 = Much higher, 4 = Average, and 1 = Much lower):
    • Do you expect your grade in this course to be
    • The intellectual challenge presented was
    • The amount of effort you put into this course was
    • The amount of effort to succeed in this course was
    • Your involvement in course (doing assignments, attending classes, etc.) was
CLOSE