default search action
15th ARES 2020: Virtual Event, Ireland
- Melanie Volkamer, Christian Wressnegger:
ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020. ACM 2020, ISBN 978-1-4503-8833-7
ARES 2020 program: Human factors in security
- Caroline Moeckel:
Attacker-centric thinking in security: perspectives from financial services practitioners. 1:1-1:10 - Martin Husák, Tomás Jirsík, Shanchieh Jay Yang:
SoK: contemporary issues and challenges to enable cyber situational awareness for network security. 2:1-2:10 - Pavlo Burda, Tzouliano Chotza, Luca Allodi, Nicola Zannone:
Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment. 3:1-3:10 - Marco De Bona, Federica Paci:
A real world study on employees' susceptibility to phishing attacks. 4:1-4:10
ARES 2020 program: Networks and botnets
- Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, Aviv Zohar:
SOK: cryptocurrency networking context, state-of-the-art, challenges. 5:1-5:13 - Marta Catillo, Antonio Pecchia, Massimiliano Rak, Umberto Villano:
A case study on the representativeness of public DoS network traffic data for cybersecurity research. 6:1-6:10 - Rui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, Katsunari Yoshioka, Tsutomu Matsumoto, Carlos Gañán, Michel van Eeten:
Disposable botnets: examining the anatomy of IoT botnet infrastructure. 7:1-7:10 - Harm Griffioen, Christian Doerr:
Quantifying autonomous system IP churn using attack traffic of botnets. 8:1-8:10
ARES 2020 program: Best paper session
- Leo Botler, Nermin Kajtazovic, Konrad Diwold, Kay Römer:
Jit fault detection: increasing availability in 1oo2 systems just-in-time. 9:1-9:10 - Jacob Leon Kröger, Jens Lindemann, Dominik Herrmann:
How do app vendors respond to subject access requests?: a longitudinal privacy study on iOS and Android Apps. 10:1-10:10 - Michael Pfeiffer, Franz Girlich, Michael Rossberg, Guenter Schaefer:
Vector packet encapsulation: the case for a scalable IPsec encryption protocol. 11:1-11:10
ARES 2020 program: Machine learning for security
- Yi Qin, Ryan Hunt, Chuan Yue:
Distinguishability of adversarial examples. 12:1-12:10 - Taichi Ishikawa, Yu-Lu Liu, David Lawrence Shepard, Kilho Shin:
Machine learning for tree structures in fake site detection. 13:1-13:10 - Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame:
MP2ML: a mixed-protocol machine learning framework for private inference. 14:1-14:10 - Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert:
Analyzing the real-world applicability of DGA classifiers. 15:1-15:11
ARES 2020 program: Networks and systems
- Erik Sy, Moritz Moennich, Tobias Mueller, Hannes Federrath, Mathias Fischer:
Enhanced performance for the encrypted web through TLS resumption across hostnames. 16:1-16:10 - Dominik Widhalm, Karl M. Göschka, Wolfgang Kastner:
SoK: a taxonomy for anomaly detection in wireless sensor networks focused on node-level techniques. 17:1-17:10 - Marietheres Dietz, Manfred Vielberth, Günther Pernul:
Integrating digital twin security simulations in the security operations center. 18:1-18:9 - Giovanni Maria Riva, Alexandr Vasenev, Nicola Zannone:
SoK: engineering privacy-aware high-tech systems. 19:1-19:10
ARES 2020 program: Side-channels and embedded systems
- Jan Richter-Brockmann, Pascal Sasdrich, Florian Bache, Tim Güneysu:
Concurrent error detection revisited: hardware protection against fault and side-channel attacks. 20:1-20:11 - Sepideh Pouyanrad, Jan Tobias Mühlberg, Wouter Joosen:
SCFMSP: static detection of side channels in MSP430 programs. 21:1-21:10 - Thomas Given-Wilson, Axel Legay:
Formalising fault injection and countermeasures. 22:1-22:11 - Michael Pucher, Christian Kudera, Georg Merzdovnik:
AVRS: emulating AVR microcontrollers for reverse engineering and security testing. 23:1-23:10
ARES 2020 program: Vulnerabilities and attacks
- Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet:
Confiance: detecting vulnerabilities in Java Card applets. 24:1-24:10 - Christoph Saatjohann, Fabian Ising, Luise Krings, Sebastian Schinzel:
STALK: security analysis of smartwatches for kids. 25:1-25:10 - Clément Elbaz, Louis Rilling, Christine Morin:
Fighting N-day vulnerabilities with automated CVSS vector prediction at disclosure. 26:1-26:10 - Felix Bohling, Tobias Mueller, Michael Eckel, Jens Lindemann:
Subverting Linux' integrity measurement architecture. 27:1-27:10
ARES 2020 program: Short papers
- Michael Holmes, George Theodorakopoulos:
Towards using differentially private synthetic data for machine learning in collaborative data science projects. 28:1-28:6 - Mazen Mohamad, Alexander Åström, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato:
Security assurance cases for road vehicles: an industry perspective. 29:1-29:6 - Andreas Meyer-Berg, Rolf Egert, Leon Böck, Max Mühlhäuser:
IoT dataset generation framework for evaluating anomaly detection mechanisms. 30:1-30:6 - Kazuhide Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon:
Feasibility study of a camera-based PUF in a realistic scenario. 31:1-31:6 - Anatoli Kalysch, Mark Deutel, Tilo Müller:
Template-based Android inter process communication fuzzing. 32:1-32:6 - Andreas Fuchs, Dustin Kern, Christoph Krauß, Maria Zhdanova:
HIP: HSM-based identities for plug-and-charge. 33:1-33:6 - Harry Halpin:
SoK: why Johnny can't fix PGP standardization. 34:1-34:6
FARES 2020 program: Security and privacy modelling
- Fanny Rivera-Ortiz, Liliana Pasquale:
Automated modelling of security incidents to represent logging requirements in software systems. 35:1-35:8 - Olga Villagrán-Velasco, Eduardo B. Fernández, Jorge L. Ortega-Arjona:
Refining the evaluation of the degree of security of a system built using security patterns. 36:1-36:7 - Vincenzo Mangini, Irina Tal, Arghir-Nicolae Moldovan:
An empirical study on the impact of GDPR and right to be forgotten - organisations and users perspective. 37:1-37:9
FARES 2020 program: Attacks and countermeasures
- Bhargav Kuchipudi, Ravi Teja Nannapaneni, Qi Liao:
Adversarial machine learning for spam filters. 38:1-38:6 - Franck Jeveme Panta, André Péninou, Florence Sèdes:
Negative filtering of CCTV Content - forensic video analysis framework. 39:1-39:10 - Jack Wilson, David McLuskie, Ethan Bayne:
Investigation into the security and privacy of iOS VPN applications. 40:1-40:9
WSDF 2020 program
- Oren Halvani, Lukas Graner, Roey Regev:
TAVeer: an interpretable topic-agnostic authorship verification method. 41:1-41:10 - Patrício Domingues, Ruben Nogueira, José Carlos Francisco, Miguel Frade:
Post-mortem digital forensic artifacts of TikTok Android App. 42:1-42:8 - Edward Harshany, Ryan Benton, David Bourrie, Michael Black, William Bradley Glisson:
DFS3: automated distributed file system storage state reconstruction. 43:1-43:10 - Benjamin Yankson, Farkhund Iqbal, Patrick C. K. Hung:
4P based forensics investigation framework for smart connected toys. 44:1-44:9 - Ben Lenard, James Wagner, Alexander Rasin, Jonathan Grier:
SysGen: system state corpus generator. 45:1-45:6 - Xiaoyu Du, Chris Hargreaves, John Sheppard, Felix Anda, Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation. 46:1-46:10 - Raphael Antonius Frick, Huajian Liu, Martin Steinebach:
Detecting double compression and splicing using benfords first digit law. 47:1-47:9 - Liza Ahmad, Salam Ismail Rasheed Khanji, Farkhund Iqbal, Faouzi Kamoun:
Blockchain-based chain of custody: towards real-time tamper-proof evidence management. 48:1-48:8 - Richard E. Overill:
Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations? 49:1-49:6
IWSMA 2020 program
- Rosangela Casolare, Carlo De Dominicis, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
VisualDroid: automatic triage and detection of Android repackaged applications. 50:1-50:7 - Mauro Conti, Giulio Rigoni, Flavio Toffalini:
ASAINT: a spy App identification system based on network traffic. 51:1-51:8 - Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:
Towards the performance evaluation of a clustering and trust based security mechanism for VANET. 52:1-52:6 - Fabian Fleischer, Marcel Busch, Phillip Kuhrt:
Memory corruption attacks within Android TEEs: a case study based on OP-TEE. 53:1-53:9 - Lukas Jäger, Richard Petri:
DICE harder: a hardware implementation of the device identifier composition engine. 54:1-54:8
IWCC 2020 program
- Aleksandra Pawlicka, Michal Choras, Marek Pawlicki:
Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective. 55:1-55:11 - Uwe Breidenbach, Martin Steinebach, Huajian Liu:
Privacy-enhanced robust image hashing with bloom filters. 56:1-56:10 - Roland Bolboaca, Teri Lenard, Béla Genge, Piroska Haller:
Locality sensitive hashing for tampering detection in automotive systems. 57:1-57:7 - Ludwig Englbrecht, Günther Pernul:
A privacy-aware digital forensics investigation in enterprises. 58:1-58:10 - Zhen Li, Qi Liao:
Ransomware 2.0: to sell, or not to sell a game-theoretical model of data-selling Ransomware. 59:1-59:9 - Mikolaj Komisarek, Michal Choras, Rafal Kozik, Marek Pawlicki:
Real-time stream processing tool for detecting suspicious network patterns using machine learning. 60:1-60:7 - Enrico Cambiaso, Maurizio Aiello, Maurizio Mongelli, Ivan Vaccari:
Detection and classification of slow DoS attacks targeting network servers. 61:1-61:7 - Guilherme Henrique Ribeiro, Elaine Ribeiro de Faria Paiva, Rodrigo Sanches Miani:
A comparison of stream mining algorithms on botnet detection. 62:1-62:10
SSE 2020 program: Secure software development
- Jose Andre Morales, Thomas P. Scanlon, Aaron Volkmann, Joseph Yankel, Hasan Yasar:
Security impacts of sub-optimal DevSecOps implementations in a highly regulated environment. 63:1-63:8
SSE 2020 program: Managing security on applications
- Michael P. Heinl, Alexander Giehl, Lukas Graif:
AntiPatterns regarding the application of cryptographic primitives by the example of ransomware. 64:1-64:10 - Marc Ohm, Arnold Sykosch, Michael Meier:
Towards detection of software supply chain attacks by forensic artifacts. 65:1-65:6 - Caine Silva, Sylvain Guérin, Raúl Mazo, Joël Champeau:
Contract-based design patterns: a design by contract approach to specify security patterns. 66:1-66:9
CUING 2020 program: Keynote session
- Tobias Schmidbauer, Steffen Wendzel:
Covert storage caches using the NTP protocol. 67:1-67:10 - Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione:
Design and performance evaluation of reversible network covert channels. 68:1-68:8 - Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk:
Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study. 69:1-69:10 - Daniel Vogel, Ulugbek Akhmedjanov, Marc Ohm, Michael Meier:
An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique. 70:1-70:10 - Niklas Bunzel, Martin Steinebach, Huajian Liu:
Non-blind steganalysis. 71:1-71:7 - Pawel Rajba, Wojciech Mazurczyk:
Exploiting minification for data hiding purposes. 72:1-72:9 - Damian Puchalski, Luca Caviglione, Rafal Kozik, Adrian Marzecki, Slawomir Krawczyk, Michal Choras:
Stegomalware detection through structural analysis of media files. 73:1-73:6 - Amir Khaleghi Moghaddam, Nur Zincir-Heywood:
Exploring data leakage in encrypted payload using supervised machine learning. 74:1-74:10 - Andrea Tundis, Gaurav Mukherjee, Max Mühlhäuser:
Mixed-code text analysis for the detection of online hidden propaganda. 76:1-76:7 - Florian Platzer, Marcel Schäfer, Martin Steinebach:
Critical traffic analysis on the tor network. 77:1-77:10 - Sean Rivera, Vijay K. Gurbani, Sofiane Lagraa, Antonio Ken Iannillo, Radu State:
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries. 78:1-78:10
IoT-SECFOR 2020 program
- Omair Faraj, David Megías, Abdel-Mehsen Ahmad, Joaquín García-Alfaro:
Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things. 79:1-79:10 - Niccolò Maltoni, Antonio Magnani, Luca Calderoni:
Privacy threats in low-cost people counting devices. 80:1-80:7 - Robert P. Markiewicz, Daniele Sgandurra:
Clust-IT: clustering-based intrusion detection in IoT environments. 81:1-81:9 - Calvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro:
PaperW8: an IoT bricking ransomware proof of concept. 82:1-82:10
iPAT 2020 program
- Rose Esmander, Pascal Lafourcade, Marius Lombard-Platet, Claudia Negri-Ribalta:
A silver bullet?: a comparison of accountants and developers mental models in the raise of blockchain. 83:1-83:10 - Angela Borchert, Nicolás E. Díaz Ferreyra, Maritta Heisel:
Balancing trust and privacy in computer-mediated introduction: featuring risk as a determinant for trustworthiness requirements elicitation. 84:1-84:10
CyberTIM 2020 program
- Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert:
Making use of NXt to nothing: the effect of class imbalances on DGA detection classifiers. 85:1-85:9 - Andrea Calesso, Mauro Conti, Martino Grasselli:
CyberWolf: assessing vulnerabilities of ICT-intensive financial markets. 86:1-86:7 - Dmitrii Vekshin, Karel Hynek, Tomás Cejka:
DoH Insight: detecting DNS over HTTPS by machine learning. 87:1-87:8
IWSMR 2020 program
- Arnold Sykosch, Christian Doll, Matthias Wübbeling, Michael Meier:
Generalizing the phishing principle: analyzing user behavior in response to controlled stimuli for IT security awareness assessment. 88:1-88:10 - Matthew Zaber, Suku Nair:
A framework for automated evaluation of security metrics. 89:1-89:11 - Daniela Pöhn, Wolfgang Hommel:
An overview of limitations and approaches in identity management. 90:1-90:10
LPW 2020 program
- Jana Medková:
Anonymization of geosocial network data by the (k, l)-degree method with location entropy edge selection. 91:1-91:8 - Jack K. Fitzsimons, Atul Mantri, Robert Pisarczyk, Tom Rainforth, Zhikuan Zhao:
A note on blind contact tracing at scale with applications to the COVID-19 pandemic. 92:1-92:6
WISI 2020 program
- Radoslava Svihrová, Christian Lettner:
A semi-supervised approach for network intrusion detection. 93:1-93:6 - Gerald Palfinger, Bernd Prünster:
AndroPRINT: analysing the fingerprintability of the Android API. 94:1-94:10 - Georgios N. Selimis, Rui Wang, Roel Maes, Geert Jan Schrijen, Mario Münzer, Stefan Ilic, Frans M. J. Willems, Lieneke Kusters:
RESCURE: a security solution for IoT life cycle. 95:1-95:10 - Fabio Martinelli, Oleksii Osliak, Paolo Mori, Andrea Saracino:
Improving security in industry 4.0 by extending OPC-UA with usage control. 96:1-96:10 - Hannes Sochor, Flavio Ferrarotti, Rudolf Ramler:
Automated security test generation for MQTT using attack patterns. 97:1-97:9
CSA 2020 program
- Rainer Diesch, Helmut Krcmar:
SoK: linking information security metrics to management success factors. 98:1-98:10 - Dmytro V. Lande, Andrei Snarskii, Oleh O. Dmytrenko, Igor Subach:
Relaxation time in complex network. 99:1-99:6 - Xavier Larriva-Novo, Mario Vega-Barbas, Víctor A. Villagrá, Diego Rivera, Mario Sanz Rodrigo, Manuel Alvarez-Campana:
Dynamic risk management architecture based on heterogeneous data sources for enhancing the cyber situational awareness in organizations. 100:1-100:9 - David Sandoval Rodríguez-Bermejo, Roumen Daton Medenou, Gerardo Ramis Pasqual De Riquelme, Jorge Maestre Vidal, Francesco Torelli, Salvador Llopis Sánchez:
Evaluation methodology for mission-centric cyber situational awareness capabilities. 101:1-101:9 - Roumen Daton Medenou, Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo Castrillo, Francisco José González Garrido, Álvaro Luis Martínez, David Nevado Catalán, Ao Hu, David Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Gerardo Ramis Pasqual De Riquelme, Antonio Berardi, Paolo De Santis, Francesco Torelli, Salvador Llopis Sánchez:
CYSAS-S3: a novel dataset for validating cyber situational awareness related tools for supporting military operations. 102:1-102:9 - Álvaro Luis Martínez, Víctor A. Villagrá González:
A novel automatic discovery system of critical assets in cyberspace-oriented military missions. 103:1-103:8 - Jorge Maestre Vidal, Marco Antonio Sotelo Monge:
Denial of sustainability on military tactical clouds. 104:1-104:9
5G-NS 2020 program
- Jordi Ortiz, Ramon Sanchez-Iborra, Jorge Bernal Bernabé, Antonio F. Skarmeta, Chafika Benzaid, Tarik Taleb, Pol Alemany, Raul Muñoz, Ricard Vilalta, Chrystel Gaber, Jean-Philippe Wary, Dhouha Ayed, Pascal Bisson, Maria Christopoulou, George Xilouris, Edgardo Montes de Oca, Gürkan Gür, Gianni Santinelli, Vincent Lefebvre, Antonio Pastor, Diego R. López:
INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networks. 105:1-105:10 - Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Marcin Gregorczyk, Maciej Purski, Wojciech Mazurczyk:
Distributed packet inspection for network security purposes in software-defined networking environments. 106:1-106:7 - Joo Yeon Cho, Andrew Sergeev:
Post-quantum MACsec key agreement for ethernet networks. 107:1-107:6 - Dayu Shi, Xun Zhang, Andrei Vladimirescu, Lina Shi, Yanqi Huang, Yourong Liu:
A device identification method based on LED fingerprint for visible light communication system. 108:1-108:7
EPESec 2020 program
- Athar Khodabakhsh, Sule Yildirim Yayilgan, Mohamed Abomhara, Maren Istad, Nargis Hurzuk:
Cyber-risk identification for a digital substation. 109:1-109:7 - Antonis Protopsaltis, Panagiotis G. Sarigiannidis, Dimitrios Margounakis, Anastasios Lytos:
Data visualization in internet of things: tools, methodologies, and challenges. 110:1-110:11 - Christos-Minas Mathas, Konstantinos-Panagiotis Grammatikakis, Costas Vassilakis, Nicholas Kolokotronis, Vasiliki-Georgia Bilali, Dimitris Kavallieros:
Threat landscape for smart grid systems. 111:1-111:7 - Toni Cantero-Gubert, Alba Colet-Subirachs, Pol Paradell, José Luis Domínguez-García:
Building a testing environment for SDN networks analysis for electrical grid applications. 112:1-112:6 - Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles:
Advanced metering infrastructures: security risks and mitigation. 113:1-113:8 - Dimitrios Vozikis, Eleni Darra, Tanel Kuusk, Dimitris Kavallieros, Aare Reintam, Xavier J. A. Bellekens:
On the importance of cyber-security training for multi-vector energy distribution system operators. 114:1-114:6 - Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, George Efstathopoulos, Paris-Alexandros Karypidis, Antonios Sarigiannidis:
DIDEROT: an intrusion detection and prevention system for DNP3-based SCADA systems. 115:1-115:8 - Theodoros Rokkas, Ioannis Neokosmidis:
Factors affecting the market adoption of cyber-security products in energy and electrical systems: the case of SPEAR. 116:1-116:8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.