default search action
16th ARES 2021: Vienna, Austria
- Delphine Reinhardt, Tilo Müller:
ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021. ACM 2021, ISBN 978-1-4503-9051-4
ARES Full I - Hardware Security and Trusted Computing
- Sara Ricci
, Lukas Malina, Petr Jedlicka, David Smékal, Jan Hajny, Peter Cíbik, Petr Dzurenda
, Patrik Dobias:
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs. 1:1-1:11 - Mónica P. Arenas
, Hüseyin Demirci, Gabriele Lenzini:
Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting. 2:1-2:11 - Sebastian Paul, Felix Schick, Jan Seedorf:
TPM-Based Post-Quantum Cryptography: A Case Study on Quantum-Resistant and Mutually Authenticated TLS for IoT Environments. 3:1-3:10 - Lukas Jäger, Dominik Lorych:
Remote Attestation Extended to the Analog Domain. 4:1-4:10
ARES Full II - SoK Papers
- Kartick Kolachala, Ecem Simsek, Mohammed Ababneh, Roopa Vishwanathan:
SoK: Money Laundering in Cryptocurrencies. 5:1-5:10 - Patrick Kochberger
, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg
, Edgar R. Weippl:
SoK: Automatic Deobfuscation of Virtualization-protected Applications. 6:1-6:15 - Macarena C. Martínez-Rodríguez
, Ignacio M. Delgado-Lozano
, Billy Bob Brumley
:
SoK: Remote Power Analysis. 7:1-7:12
ARES Full III - Best Paper Session
- Daniel Zelle, Timm Lauser
, Dustin Kern
, Christoph Krauß
:
Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods. 8:1-8:20 - Steven Engler, Ian Goldberg:
Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput. 9:1-9:11 - Endres Puschner
, Christoph Saatjohann, Markus Willing, Christian Dresen, Julia Köbe, Benjamin Rath, Christof Paar, Lars Eckardt, Uwe Haverkamp, Sebastian Schinzel:
Listen to Your Heart: Evaluation of the Cardiologic Ecosystem. 10:1-10:10 - Max Maaß, Marc-Pascal Clement, Matthias Hollick:
Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet. 11:1-11:13
ARES Full IV - Anonymity, Privacy, and Fake News
- David Schatz
, Michael Rossberg, Guenter Schaefer:
Optimizing Packet Scheduling and Path Selection for Anonymous Voice Calls. 12:1-12:10 - Satwik Prabhu Kumble
, Dick H. J. Epema, Stefanie Roos:
How Lightning's Routing Diminishes its Anonymity. 13:1-13:10 - Michael Mühlhauser, Henning Pridöhl, Dominik Herrmann:
How Private is Android's Private DNS Setting? Identifying Apps by Encrypted DNS Traffic. 14:1-14:10 - Bahruz Jabiyev, Sinan Pehlivanoglu, Kaan Onarlioglu, Engin Kirda:
FADE: Detecting Fake News Articles on the Web. 15:1-15:10
ARES Full V - Software Security, Blockchain and Digital Forensics
- Emanuel Q. Vintila, Philipp Zieris
, Julian Horsch
:
MESH: A Memory-Efficient Safe Heap for C/C++. 16:1-16:10 - Enrico Bacis
, Dario Facchinetti, Marco Guarnieri
, Marco Rosa, Matthew Rossi
, Stefano Paraboschi:
I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts. 17:1-17:10 - Kabul Kurniawan
, Andreas Ekelhart
, Elmar Kiesling, Dietmar Winkler, Gerald Quirchmayr, A Min Tjoa:
Virtual Knowledge Graphs for Federated Log Analysis. 18:1-18:11 - Thomas Dangl, Benjamin Taubmann, Hans P. Reiser:
RapidVMI: Fast and multi-core aware active virtual machine introspection. 19:1-19:10
ARES Full VI - Threat Detection
- Javad Forough, Monowar H. Bhuyan, Erik Elmroth:
Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach. 20:1-20:10 - Aditya Kuppa, Lamine M. Aouad, Nhien-An Le-Khac
:
Linking CVE's to MITRE ATT&CK Techniques. 21:1-21:12 - Philipp Kuehn
, Markus Bayer
, Marc Wendelborn, Christian Reuter:
OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases. 22:1-22:11 - Thomas Rosenstatter
, Tomas Olovsson, Magnus Almgren
:
V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems. 23:1-23:10
ARES Full VII - Machine Learning
- Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval:
Secure Decision Forest Evaluation. 24:1-24:12 - Arthur Drichel, Nils Faerber, Ulrike Meyer:
First Step Towards EXPLAINable DGA Multiclass Classification. 25:1-25:13 - Boel Nelson
:
Efficient Error Prediction for Differentially Private Algorithms. 26:1-26:12 - Aidmar Wainakh, Aleksej Strassheim, Tim Grube, Jörg Daubert, Max Mühlhäuser:
Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks. 27:1-27:11
ARES Short
- Zhen Huang
, Xiaowei Yu:
Integer Overflow Detection with Delayed Runtime Test. 28:1-28:6 - Hiroki Inayoshi
, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito
:
VTDroid: Value-based Tracking for Overcoming Anti-Taint-Analysis Techniques in Android Apps. 29:1-29:6 - Simon Ebbers
, Fabian Ising, Christoph Saatjohann, Sebastian Schinzel:
Grand Theft App: Digital Forensics of Vehicle Assistant Apps. 30:1-30:6 - Saskia Nuñez von Voigt, Erik Daniel, Florian Tschorsch:
Self-Determined Reciprocal Recommender Systemwith Strong Privacy Guarantees. 31:1-31:6 - Florian Fenzl
, Roland Rieke
, Andreas Dominik:
In-vehicle detection of targeted CAN bus attacks. 32:1-32:7 - Nora Hofer, Pascal Schöttle, Alexander Rietzler, Sebastian Stabinger:
Adversarial Examples Against a BERT ABSA Model - Fooling Bert With L33T, Misspellign, and Punctuation, . 33:1-33:6
FARES I - Networks, Detection, and Privacy
- Mahmoud Abdallah, Nhien-An Le-Khac
, Hamed Z. Jahromi, Anca Delia Jurcut
:
A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs. 34:1-34:7 - Franz Kuntke
, Marcel Sinn, Christian Reuter:
Reliable Data Transmission using Low Power Wide Area Networks (LPWAN) for Agricultural Applications. 35:1-35:9 - Lennart Oldenburg
, Florian Tschorsch:
Strong Anonymity is not Enough: Introducing Fault Tolerance to Planet-Scale Anonymous Communication Systems. 36:1-36:6 - Pintu Lohar, Guodong Xie, Malika Bendechache, Rob Brennan
, Edoardo Celeste
, Ramona Trestian, Irina Tal:
Irish Attitudes Toward COVID Tracker App & Privacy: Sentiment Analysis on Twitter and Survey Data. 37:1-37:8 - Andrea Tundis, Soujanya Nemalikanti, Max Mühlhäuser:
Fighting organized crime by automatically detecting money laundering-related financial transactions. 38:1-38:10 - Andrea Tundis, Eric Marc Modo Nga, Max Mühlhäuser:
An exploratory analysis on the impact of Shodan scanning tool on the network attacks. 39:1-39:10
FARES II - Blockchain and Distributed Ledger Technologies
- Stephan Krenn, Thomas Lorünser
:
Single-Use Delegatable Signatures Based on Smart Contracts. 40:1-40:7 - Alberto Falcone
, Carmelo Felicetti, Alfredo Garro, Antonino Rullo, Domenico Saccà:
PUF-based Smart Tags for Supply Chain Management. 41:1-41:7 - Martin Pirker
, Ernst Piller:
Obstacles and Challenges in Transforming Applications for Distributed Data Ledger Integration. 42:1-42:5
WSDF I
- Tyler Balon, Krikor Herlopian, Ibrahim M. Baggili, Cinthya Grajeda-Mendez:
Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts. 43:1-43:10 - Michael Galhuber, Robert Luh:
Time for Truth: Forensic Analysis of NTFS Timestamps. 44:1-44:10 - Cosimo Anglano, Massimo Canonico, Laura Giordano, Marco Guazzone
, Daniele Theseider Dupré
:
User action representation and automated reasoning for the forensic analysis of mobile devices. 45:1-45:7
WSDF II
- Vincent van der Meer, Jeroen van den Bos
:
JPEG File Fragmentation Point Detection using Huffman Code and Quantization Array Validation. 46:1-46:7 - Oren Halvani, Lukas Graner
:
POSNoise: An Effective Countermeasure Against Topic Biases in Authorship Analysis. 47:1-47:12 - Lukas Daubner
, Raimundas Matulevicius:
Risk-Oriented Design Approach For Forensic-Ready Software Systems. 48:1-48:10 - Marcos Vinícius Adão Teixeira, Sandra Avila:
What should we pay attention to when classifying violent videos? 49:1-49:10 - Alex Sitterer, Nicholas Dubois, Ibrahim M. Baggili:
Forensicast: A Non-intrusive Approach & Tool For Logical Forensic Acquisition & Analysis of The Google Chromecast TV. 50:1-50:12
IWSMA I
- Rosangela Casolare, Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications. 51:1-51:7 - Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs. 52:1-52:7 - Shirish Kumar Singh, Kushagra Chaturvedy, Bharavi Mishra:
Multi-View Learning for Repackaged Malware Detection. 53:1-53:9 - Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss, Sihem Guemara El Fatmi:
Formal Validation of a Security Mechanism against the RSU Compromise Attack. 54:1-54:8 - Christian Wolschke, Stefan Marksteiner
, Tobias Braun, Markus Wolf:
An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case. 55:1-55:9
IWCC II
- Pascal Wichmann
, Matthias Marx, Hannes Federrath, Mathias Fischer:
Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic. 56:1-56:9 - Cassius Puodzius, Olivier Zendra
, Annelie Heuser, Lamine Noureddine:
Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG). 57:1-57:12 - Alpesh Bhudia, Daniel O'Keeffe, Daniele Sgandurra, Darren Hurley-Smith
:
RansomClave: Ransomware Key Management using SGX. 58:1-58:10
IWCC III
- Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer:
Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs. 59:1-59:12 - Bram van Dooremaal, Pavlo Burda
, Luca Allodi, Nicola Zannone
:
Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection. 60:1-60:10 - Salatiel Ezennaya-Gomez, Stefan Kiltz, Christian Kraetzer, Jana Dittmann:
A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis. 61:1-61:8
SSE I - Managing Security on Applications
- Tim Bender
, Rolf Huesmann
, Andreas Heinemann:
Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview. 62:1-62:6 - Tiago Espinha Gasiba, Andrei-Cristian Iosif
, Ulrike Lechner, Maria Pinto-Albuquerque
:
Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity Challenges. 63:1-63:8 - Abdulrahman Alhazmi, Nalin A. G. Arachchilage:
A Serious Game Design Framework for Software Developers to Put GDPR into Practice. 64:1-64:6
CUING II
- Mikolaj Komisarek, Marek Pawlicki
, Mikolaj Kowalski
, Adrian Marzecki, Rafal Kozik, Michal Choras:
Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project. 65:1-65:7 - David Megías, Minoru Kuribayashi
, Andrea Rosales
, Wojciech Mazurczyk:
DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning. 66:1-66:9
CUING III
- Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva
, Jana Dittmann, Christian Krätzer, Kevin Lamshöft
, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert:
A Revised Taxonomy of Steganography Embedding Patterns. 67:1-67:12 - Matteo Repetto, Luca Caviglione, Marco Zuppelli
:
bccstego: A Framework for Investigating Network Covert Channels. 68:1-68:7 - Jonas Hielscher
, Kevin Lamshöft
, Christian Krätzer, Jana Dittmann:
A Systematic Analysis of Covert Channels in the Network Time Protocol. 69:1-69:11 - Tom Neubert, Claus Vielhauer, Christian Kraetzer:
Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks. 70:1-70:9
CUING IV
- Tobias Schmidbauer, Steffen Wendzel:
Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels. 71:1-71:10 - Yulduz Khodjaeva, Nur Zincir-Heywood:
Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels. 72:1-72:7 - Piotr Nowakowski, Piotr Zórawski
, Krzysztof Cabaj, Wojciech Mazurczyk:
Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels. 73:1-73:8
CUING V
- Aleksandra Mileva, Luca Caviglione, Aleksandar Velinov, Steffen Wendzel, Vesna Dimitrova:
Risks and Opportunities for Information Hiding in DICOM Standard. 74:1-74:8 - Pawel Rajba, Wojciech Mazurczyk:
Data Hiding Using Code Obfuscation. 75:1-75:10 - Fabian Brenner, Florian Platzer
, Martin Steinebach:
Discovery of Single-Vendor Marketplace Operators in the Tor-Network. 76:1-76:10 - Julian Heeger, York Yannikos
, Martin Steinebach:
exHide: Hiding Data within the exFAT File System. 77:1-77:8 - Alexander Hartl, Joachim Fabini, Christoph Roschger, Peter Eder-Neuhauser, Marco Petrovic, Roman Tobler, Tanja Zseby:
Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures. 78:1-78:11
IoT-SECFOR I
- Salvatore Frontera, Riccardo Lazzeretti:
Bloom Filter based Collective Remote Attestation for Dynamic Networks. 80:1-80:10 - Qi Liu
, Hubert B. Keller, Veit Hagenmeyer:
A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol. 81:1-81:10 - Umberto Morelli
, Ivan Vaccari
, Silvio Ranise, Enrico Cambiaso:
DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections. 82:1-82:9
iPAT
- Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos:
Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystems. 83:1-83:6 - Guodong Xie, Pintu Lohar, Claudia Florea, Malika Bendechache, Ramona Trestian, Rob Brennan
, Regina Connolly, Irina Tal:
Privacy in Times of COVID-19: A Pilot Study in the Republic of Ireland. 84:1-84:6
CyberTIM I
- Clemens Sauerwein, Daniel Fischer
, Milena Rubsamen, Guido Rosenberger, Dirk Stelzer
, Ruth Breu:
From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms. 85:1-85:9 - Yuning Jiang
, Manfred A. Jeusfeld
, Jianguo Ding:
Evaluating the Data Inconsistency of Open-Source Vulnerability Repositories. 86:1-86:10 - Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Control Effectiveness: a Capture-the-Flag Study. 87:1-87:10 - Yazid Merah, Tayeb Kenaza:
Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence. 88:1-88:8 - Daniela Pöhn
, Sebastian Seeber, Tanja Hanauer, Jule Anna Ziegler, David Schmitz:
Towards Improving Identity and Access Management with the IdMSecMan Process Framework. 89:1-89:10
IWSMR I
- Max Maaß, Henning Pridöhl, Dominik Herrmann, Matthias Hollick:
Best Practices for Notification Studiesfor Security and Privacy Issues on the Internet. 90:1-90:10 - Louise Axon, Arnau Erola, Alastair Janse van Rensburg, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness. 91:1-91:10 - Simon Vrhovec
, Luca Caviglione, Steffen Wendzel:
Crème de la Crème: Lessons from Papers in Security Publications. 92:1-92:9
IWSMR II
- Rafael Copstein, Jeff Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood:
Log Abstraction for Information Security: Heuristics and Reproducibility. 93:1-93:10 - Jörg Keller:
Chaotic Pseudo Random Number Generators: A Case Study on Replication Study Challenges. 94:1-94:4 - Marco Zuppelli
, Luca Caviglione:
pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert Channels. 95:1-95:8
LPW I
- Antoine Boutet, Sonia Ben Mokhtar:
Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets. 96:1-96:10 - Jenno Verdonck
, Kevin De Boeck
, Michiel Willocx
, Jorn Lapon, Vincent Naessens:
A clustering approach to anonymize locations during dataset de-identification. 97:1-97:10 - Masakazu Fujio, Kenta Takahashi, Yosuke Kaga, Wataru Nakamura, Yoshiko Yasumura, Rie Shigetomi Yamaguchi:
Template Protected Authentication based on Location History and b-Bit MinHash. 98:1-98:8
CSA I
- Pedro Ramon y Cajal Ramo
, Jorge Maestre Vidal:
Understanding the Ethical and Regulatory boundaries of the Military Actuation on the Cyberspace. 100:1-100:11
CSA II
- David Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Juan M. Estévez-Tapiador:
The Stress as Adversarial Factor for Cyber Decision Making. 101:1-101:10 - Marta Irene García Cid
, Laura Ortiz Martín, Vicente Martín Ayuso:
Madrid Quantum Network: A First Step to Quantum Internet. 102:1-102:7 - Pantaleone Nespoli, Félix Gómez Mármol, Georgios Kambourakis:
AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm. 103:1-103:8 - Marco Antonio Sotelo Monge, Jorge Maestre Vidal, Roumen Daton Medenou Choumanof:
Adaptive Mitigation of Tactical Denial of Sustainability. 104:1-104:9
ENS II
- John Preuß Mattsson, Prajwol Kumar Nakarmi:
Nori: Concealing the Concealed Identifier in 5G. 105:1-105:7 - Zujany Salazar, Huu Nghia Nguyen
, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca:
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. 106:1-106:8 - Joo Yeon Cho, Andrew Sergeev:
Secure Open Fronthaul Interface for 5G Networks. 107:1-107:6 - Charilaos C. Zarakovitis
, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, Qiang Ni, Charalambos Klitis
, George Guirgis
, Ana R. Cavalli, Nicholas Sgouros, Eftychia Makri, Antonios Lalas, Konstantinos Votis, George Amponis
, Wissam Mallouli:
SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks. 108:1-108:10
IWSSEC I
- Marcos Cavalcanti, Pedro R. M. Inácio, Mário M. Freire:
Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms. 109:1-109:9 - Raphael Schermann, Ronald Toegl:
Managing Anonymous Keys in a Fog-Computing Platform. 110:1-110:5 - Iván García Aguilar
, Antonio Muñoz Gallego
:
A Threat Model Analysis of a Mobile Agent-based system on Raspberry Pi. 111:1-111:10
NG-SOC I
- Martin Husák, Martin Lastovicka, Daniel Tovarnák:
System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling. 112:1-112:8 - Andrea Corsini
, Shanchieh Jay Yang, Giovanni Apruzzese
:
On the Evaluation of Sequential Machine Learning for Network Intrusion Detection. 113:1-113:10 - Philip Dale Huff, Kylie McClanahan, Thao Le, Qinghua Li:
A Recommender System for Tracking Vulnerabilities. 114:1-114:7
BASS I
- Shurook S. Almohamade, John A. Clark, James Law
:
Continuous User Authentication for Human-Robot Collaboration. 115:1-115:9
BASS II
- A. K. M. Nuhil Mehdy, Hoda Mehrpouyan:
Modeling of Personalized Privacy Disclosure Behavior: A Formal Method Approach. 116:1-116:13 - Andraz Krasovec, Gianmarco Baldini, Veljko Pejovic
:
Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments. 117:1-117:7 - Stefano Bistarelli, Emanuele Bosimini, Francesco Santini:
A Medium-Interaction Emulation and Monitoring System for Operational Technology. 118:1-118:7 - Stefano Petrocchi, Giacomo Giorgi, Mario G. C. A. Cimino:
A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection. 119:1-119:9
EPESec I
- Simon Hacks
, Ismail Butun, Robert Lagerström, Andrei Buhaiu, Anna Georgiadou
, Ariadni Michalitsi-Psarrou
:
Integrating Security Behavior into Attack Simulations. 120:1-120:13 - Dimitrios Skias, Sofia Tsekeridou
, Theodore B. Zahariadis, Artemis C. Voulkidis
, Terpsichori Helen Velivassaki, Konstantina Fotiadou:
Pan-European Cybersecurity Incidents Information Sharing Platform to support NIS Directive. 121:1-121:7 - Maryam Pahlevan, Artemis C. Voulkidis
, Terpsichori Helen Velivassaki:
Secure exchange of cyber threat intelligence using TAXII and distributed ledger technologies - application for electrical power and energy system. 122:1-122:8 - Ilias Siniosoglou
, Vasileios Argyriou, Stamatia Bibi, Thomas Lagkas, Panagiotis G. Sarigiannidis:
Unsupervised Ethical Equity Evaluation of Adversarial Federated Networks. 123:1-123:6
IWAPS I
- Ankur Chattopadhyay, Robert Ruska Jr., Levi Pfantz:
Determining the Robustness of Privacy Enhancing DeID Against the ReID Adversary: An Experimental Study. 124:1-124:11 - Athanasios Vasileios Grammatopoulos, Ilias Politis, Christos Xenakis:
A web tool for analyzing FIDO2/WebAuthn Requests and Responses. 125:1-125:10 - Jesús García Rodríguez
, Rafael Torres Moreno
, Jorge Bernal Bernabé, Antonio F. Skarmeta:
Towards a standardized model for privacy-preserving Verifiable Credentials. 126:1-126:6
IWAPS II
- Panagiotis Bountakas
, Konstantinos Koutroumpouchos, Christos Xenakis:
A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection. 127:1-127:12 - Michail Bampatsikos
, Ilias Politis, Christos Xenakis, Stelios C. A. Thomopoulos
:
Solving the cold start problem in Trust Management in IoT. 128:1-128:9 - Emanuele Raso
, Lorenzo Bracciale, Pierpaolo Loreti, Giuseppe Bianchi:
ABEBox: A data driven access control for securing public cloud storage with efficient key revocation. 129:1-129:7 - Mads Schaarup Andersen:
Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark - Usefulness, Barriers, and Recommendations. 130:1-130:8
IWAPS III
- Andreas Klinger
, Ulrike Meyer:
Towards Secure Evaluation of Online Functionalities. 131:1-131:14 - Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos:
Approaching the Data Protection Impact Assessment as a legal methodology to evaluate the degree of privacy by design achieved in technological proposals. A special reference to Identity Management systems. 132:1-132:9 - Tore Kasper Frederiksen:
A Holistic Approach to Enhanced Security and Privacy in Digital Health Passports. 133:1-133:10
SecRS I
- Carolina Adaros Boye, Paul Kearney, Mark B. Josephs
, Hans Ulmer:
An Indicators-of-Risk Library for Industrial Network Security. 134:1-134:9 - Henrique Santos
, André Oliveira, Lúcia Soares, Alan Satis, Alexandre J. T. Santos
:
Information Security Assessment and Certification within Supply Chains. 135:1-135:6
SecHealth I - Cybersecurity
- Kitty Kioskli
, Theo Fotis
, Haralambos Mouratidis:
The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations. 136:1-136:9 - Muhammad Ali Fauzi
, Prosper Kandabongee Yeng, Bian Yang, Dita Rachmayani:
Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia. 137:1-137:8
SecHealth II - Integrity and Privacy
- Michael Eckel, Tim Riemann:
Userspace Software Integrity Measurement. 138:1-138:11 - Andreea Ancuta Corici, Tina Hühnlein, Detlef Hühnlein, Olaf Rode:
Towards Interoperable Vaccination Certificate Services. 139:1-139:9 - Narasimha Raghavan Veeraragavan, Jan Franz Nygård:
DeCanSec: A Decentralized Architecture for Secure Statistical Computations on Distributed Health Registry Data. 140:1-140:9
ETACS II - Education
- Salvatore Manfredi
, Mariano Ceccato
, Giada Sciarretta, Silvio Ranise:
Do Security Reports Meet Usability?: Lessons Learned from Using Actionable Mitigations for Patching TLS Misconfigurations. 141:1-141:13 - Sara Ricci
, Vladimir Janout, Simon Parker
, Jan Jerabek
, Jan Hajny, Argyro Chatzopoulou, Remi Badonnel:
PESTLE Analysis of Cybersecurity Education. 142:1-142:8 - Jakub Drmola, Frantisek Kasl
, Pavel Loutocký
, Miroslav Mares
, Tomás Pitner, Jakub Vostoupal
:
The Matter of Cybersecurity Expert Workforce Scarcity in the Czech Republic and Its Alleviation Through the Proposed Qualifications Framework. 143:1-143:6 - Jan Hajny, Sara Ricci
, Edmundas Piesarskas, Marek Sikora:
Cybersecurity Curricula Designer. 144:1-144:7
ETACS III - Cyber Ranges
- François Lesueur, Camille Noûs:
MI-LXC: A Small-Scale Internet-Like Environment for Network Security Teaching. 145:1-145:6 - Giorgio Bernardinetti, Stefano Iafrate, Giuseppe Bianchi:
Nautilus: A Tool For Automated Deployment And Sharing Of Cyber Range Scenarios. 146:1-146:7 - Maxime Puys
, Pierre-Henri Thevenon, Stéphane Mocanu
:
Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training. 147:1-147:10 - Joachim Fabini, Alexander Hartl, Fares Meghdouri, Claudia Breitenfellner, Tanja Zseby:
SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security Laboratories. 148:1-148:11 - Tomás Lieskovan, Jan Hajny:
Building Open Source Cyber Range To Teach Cyber Security. 149:1-149:11
SP2I I - Security Analysis and Privacy
- Katharina Hofer-Schmitz:
A Formal Analysis of EnOcean's Teach-in and Authentication. 150:1-150:8 - Mariia Bakhtina
, Raimundas Matulevicius:
Information Security Analysis in the Passenger-Autonomous Vehicle Interaction. 151:1-151:10
SP2I II - Applied Cryptography in Intelligent Infrastructures
- Petr Dzurenda
, Sara Ricci
, Raúl Casanova Marques, Jan Hajny, Petr Cika:
Secret Sharing-based Authenticated Key Agreement Protocol. 152:1-152:10 - Petr Dzurenda
, Carles Angles-Tafalla
, Sara Ricci
, Lukas Malina:
Privacy-Preserving Online Parking Based on Smart Contracts. 153:1-153:10
SP2I III - Security and Trust in Intelligent Infrastructures
- Rupa Chiramdasu
, Gautam Srivastava, Sweta Bhattacharya
, Praveen Kumar Reddy Maddikunta
, Thippa Reddy Gadekallu
:
A Machine Learning Driven Threat Intelligence System for Malicious URL Detection. 154:1-154:7 - Stefania Bartoletti, Giuseppe Bianchi, Danilo Orlando, Ivan Palamà, Nicola Blefari-Melazzi:
Location Security under Reference Signals' Spoofing Attacks: Threat Model and Bounds. 155:1-155:5
SME-SP I
- George Pantelis, Petros Petrou, Sophia Karagiorgou, Dimitrios Alexandrou:
On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web. 156:1-156:7
SME-SP II
- José Javier de Vicente Mohino, Wissam Mallouli, José Francisco Ruiz, Max van Haastrecht
:
GEIGER: Solution for small businesses to protect themselves against cyber-threats. 157:1-157:4 - Max van Haastrecht
, Injy Sarhan, Alireza Shojaifar, Louis Baumgartner, Wissam Mallouli, Marco Spruit
:
A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME Needs. 158:1-158:12 - Bernd Remmele, Jessica Peichl:
Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small Enterprises. 159:1-159:7 - Alireza Shojaifar, Heini Järvinen:
Classifying SMEs for Approaching Cybersecurity Competence and Awareness. 160:1-160:7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.