default search action
16th ARES 2021: Vienna, Austria
- Delphine Reinhardt, Tilo Müller:
ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021. ACM 2021, ISBN 978-1-4503-9051-4
ARES Full I - Hardware Security and Trusted Computing
- Sara Ricci, Lukas Malina, Petr Jedlicka, David Smékal, Jan Hajny, Peter Cíbik, Petr Dzurenda, Patrik Dobias:
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs. 1:1-1:11 - Mónica P. Arenas, Hüseyin Demirci, Gabriele Lenzini:
Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting. 2:1-2:11 - Sebastian Paul, Felix Schick, Jan Seedorf:
TPM-Based Post-Quantum Cryptography: A Case Study on Quantum-Resistant and Mutually Authenticated TLS for IoT Environments. 3:1-3:10 - Lukas Jäger, Dominik Lorych:
Remote Attestation Extended to the Analog Domain. 4:1-4:10
ARES Full II - SoK Papers
- Kartick Kolachala, Ecem Simsek, Mohammed Ababneh, Roopa Vishwanathan:
SoK: Money Laundering in Cryptocurrencies. 5:1-5:10 - Patrick Kochberger, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg, Edgar R. Weippl:
SoK: Automatic Deobfuscation of Virtualization-protected Applications. 6:1-6:15 - Macarena C. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, Billy Bob Brumley:
SoK: Remote Power Analysis. 7:1-7:12
ARES Full III - Best Paper Session
- Daniel Zelle, Timm Lauser, Dustin Kern, Christoph Krauß:
Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods. 8:1-8:20 - Steven Engler, Ian Goldberg:
Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput. 9:1-9:11 - Endres Puschner, Christoph Saatjohann, Markus Willing, Christian Dresen, Julia Köbe, Benjamin Rath, Christof Paar, Lars Eckardt, Uwe Haverkamp, Sebastian Schinzel:
Listen to Your Heart: Evaluation of the Cardiologic Ecosystem. 10:1-10:10 - Max Maaß, Marc-Pascal Clement, Matthias Hollick:
Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet. 11:1-11:13
ARES Full IV - Anonymity, Privacy, and Fake News
- David Schatz, Michael Rossberg, Guenter Schaefer:
Optimizing Packet Scheduling and Path Selection for Anonymous Voice Calls. 12:1-12:10 - Satwik Prabhu Kumble, Dick H. J. Epema, Stefanie Roos:
How Lightning's Routing Diminishes its Anonymity. 13:1-13:10 - Michael Mühlhauser, Henning Pridöhl, Dominik Herrmann:
How Private is Android's Private DNS Setting? Identifying Apps by Encrypted DNS Traffic. 14:1-14:10 - Bahruz Jabiyev, Sinan Pehlivanoglu, Kaan Onarlioglu, Engin Kirda:
FADE: Detecting Fake News Articles on the Web. 15:1-15:10
ARES Full V - Software Security, Blockchain and Digital Forensics
- Emanuel Q. Vintila, Philipp Zieris, Julian Horsch:
MESH: A Memory-Efficient Safe Heap for C/C++. 16:1-16:10 - Enrico Bacis, Dario Facchinetti, Marco Guarnieri, Marco Rosa, Matthew Rossi, Stefano Paraboschi:
I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts. 17:1-17:10 - Kabul Kurniawan, Andreas Ekelhart, Elmar Kiesling, Dietmar Winkler, Gerald Quirchmayr, A Min Tjoa:
Virtual Knowledge Graphs for Federated Log Analysis. 18:1-18:11 - Thomas Dangl, Benjamin Taubmann, Hans P. Reiser:
RapidVMI: Fast and multi-core aware active virtual machine introspection. 19:1-19:10
ARES Full VI - Threat Detection
- Javad Forough, Monowar H. Bhuyan, Erik Elmroth:
Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach. 20:1-20:10 - Aditya Kuppa, Lamine M. Aouad, Nhien-An Le-Khac:
Linking CVE's to MITRE ATT&CK Techniques. 21:1-21:12 - Philipp Kuehn, Markus Bayer, Marc Wendelborn, Christian Reuter:
OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases. 22:1-22:11 - Thomas Rosenstatter, Tomas Olovsson, Magnus Almgren:
V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems. 23:1-23:10
ARES Full VII - Machine Learning
- Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval:
Secure Decision Forest Evaluation. 24:1-24:12 - Arthur Drichel, Nils Faerber, Ulrike Meyer:
First Step Towards EXPLAINable DGA Multiclass Classification. 25:1-25:13 - Boel Nelson:
Efficient Error Prediction for Differentially Private Algorithms. 26:1-26:12 - Aidmar Wainakh, Aleksej Strassheim, Tim Grube, Jörg Daubert, Max Mühlhäuser:
Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks. 27:1-27:11
ARES Short
- Zhen Huang, Xiaowei Yu:
Integer Overflow Detection with Delayed Runtime Test. 28:1-28:6 - Hiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito:
VTDroid: Value-based Tracking for Overcoming Anti-Taint-Analysis Techniques in Android Apps. 29:1-29:6 - Simon Ebbers, Fabian Ising, Christoph Saatjohann, Sebastian Schinzel:
Grand Theft App: Digital Forensics of Vehicle Assistant Apps. 30:1-30:6 - Saskia Nuñez von Voigt, Erik Daniel, Florian Tschorsch:
Self-Determined Reciprocal Recommender Systemwith Strong Privacy Guarantees. 31:1-31:6 - Florian Fenzl, Roland Rieke, Andreas Dominik:
In-vehicle detection of targeted CAN bus attacks. 32:1-32:7 - Nora Hofer, Pascal Schöttle, Alexander Rietzler, Sebastian Stabinger:
Adversarial Examples Against a BERT ABSA Model - Fooling Bert With L33T, Misspellign, and Punctuation, . 33:1-33:6
FARES I - Networks, Detection, and Privacy
- Mahmoud Abdallah, Nhien-An Le-Khac, Hamed Z. Jahromi, Anca Delia Jurcut:
A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs. 34:1-34:7 - Franz Kuntke, Marcel Sinn, Christian Reuter:
Reliable Data Transmission using Low Power Wide Area Networks (LPWAN) for Agricultural Applications. 35:1-35:9 - Lennart Oldenburg, Florian Tschorsch:
Strong Anonymity is not Enough: Introducing Fault Tolerance to Planet-Scale Anonymous Communication Systems. 36:1-36:6 - Pintu Lohar, Guodong Xie, Malika Bendechache, Rob Brennan, Edoardo Celeste, Ramona Trestian, Irina Tal:
Irish Attitudes Toward COVID Tracker App & Privacy: Sentiment Analysis on Twitter and Survey Data. 37:1-37:8 - Andrea Tundis, Soujanya Nemalikanti, Max Mühlhäuser:
Fighting organized crime by automatically detecting money laundering-related financial transactions. 38:1-38:10 - Andrea Tundis, Eric Marc Modo Nga, Max Mühlhäuser:
An exploratory analysis on the impact of Shodan scanning tool on the network attacks. 39:1-39:10
FARES II - Blockchain and Distributed Ledger Technologies
- Stephan Krenn, Thomas Lorünser:
Single-Use Delegatable Signatures Based on Smart Contracts. 40:1-40:7 - Alberto Falcone, Carmelo Felicetti, Alfredo Garro, Antonino Rullo, Domenico Saccà:
PUF-based Smart Tags for Supply Chain Management. 41:1-41:7 - Martin Pirker, Ernst Piller:
Obstacles and Challenges in Transforming Applications for Distributed Data Ledger Integration. 42:1-42:5
WSDF I
- Tyler Balon, Krikor Herlopian, Ibrahim M. Baggili, Cinthya Grajeda-Mendez:
Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts. 43:1-43:10 - Michael Galhuber, Robert Luh:
Time for Truth: Forensic Analysis of NTFS Timestamps. 44:1-44:10 - Cosimo Anglano, Massimo Canonico, Laura Giordano, Marco Guazzone, Daniele Theseider Dupré:
User action representation and automated reasoning for the forensic analysis of mobile devices. 45:1-45:7
WSDF II
- Vincent van der Meer, Jeroen van den Bos:
JPEG File Fragmentation Point Detection using Huffman Code and Quantization Array Validation. 46:1-46:7 - Oren Halvani, Lukas Graner:
POSNoise: An Effective Countermeasure Against Topic Biases in Authorship Analysis. 47:1-47:12 - Lukas Daubner, Raimundas Matulevicius:
Risk-Oriented Design Approach For Forensic-Ready Software Systems. 48:1-48:10 - Marcos Vinícius Adão Teixeira, Sandra Avila:
What should we pay attention to when classifying violent videos? 49:1-49:10 - Alex Sitterer, Nicholas Dubois, Ibrahim M. Baggili:
Forensicast: A Non-intrusive Approach & Tool For Logical Forensic Acquisition & Analysis of The Google Chromecast TV. 50:1-50:12
IWSMA I
- Rosangela Casolare, Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications. 51:1-51:7 - Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs. 52:1-52:7 - Shirish Kumar Singh, Kushagra Chaturvedy, Bharavi Mishra:
Multi-View Learning for Repackaged Malware Detection. 53:1-53:9 - Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss, Sihem Guemara El Fatmi:
Formal Validation of a Security Mechanism against the RSU Compromise Attack. 54:1-54:8 - Christian Wolschke, Stefan Marksteiner, Tobias Braun, Markus Wolf:
An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case. 55:1-55:9
IWCC II
- Pascal Wichmann, Matthias Marx, Hannes Federrath, Mathias Fischer:
Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic. 56:1-56:9 - Cassius Puodzius, Olivier Zendra, Annelie Heuser, Lamine Noureddine:
Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG). 57:1-57:12 - Alpesh Bhudia, Daniel O'Keeffe, Daniele Sgandurra, Darren Hurley-Smith:
RansomClave: Ransomware Key Management using SGX. 58:1-58:10
IWCC III
- Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer:
Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs. 59:1-59:12 - Bram van Dooremaal, Pavlo Burda, Luca Allodi, Nicola Zannone:
Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection. 60:1-60:10 - Salatiel Ezennaya-Gomez, Stefan Kiltz, Christian Kraetzer, Jana Dittmann:
A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis. 61:1-61:8
SSE I - Managing Security on Applications
- Tim Bender, Rolf Huesmann, Andreas Heinemann:
Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview. 62:1-62:6 - Tiago Espinha Gasiba, Andrei-Cristian Iosif, Ulrike Lechner, Maria Pinto-Albuquerque:
Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity Challenges. 63:1-63:8 - Abdulrahman Alhazmi, Nalin A. G. Arachchilage:
A Serious Game Design Framework for Software Developers to Put GDPR into Practice. 64:1-64:6
CUING II
- Mikolaj Komisarek, Marek Pawlicki, Mikolaj Kowalski, Adrian Marzecki, Rafal Kozik, Michal Choras:
Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project. 65:1-65:7 - David Megías, Minoru Kuribayashi, Andrea Rosales, Wojciech Mazurczyk:
DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning. 66:1-66:9
CUING III
- Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert:
A Revised Taxonomy of Steganography Embedding Patterns. 67:1-67:12 - Matteo Repetto, Luca Caviglione, Marco Zuppelli:
bccstego: A Framework for Investigating Network Covert Channels. 68:1-68:7 - Jonas Hielscher, Kevin Lamshöft, Christian Krätzer, Jana Dittmann:
A Systematic Analysis of Covert Channels in the Network Time Protocol. 69:1-69:11 - Tom Neubert, Claus Vielhauer, Christian Kraetzer:
Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks. 70:1-70:9
CUING IV
- Tobias Schmidbauer, Steffen Wendzel:
Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels. 71:1-71:10 - Yulduz Khodjaeva, Nur Zincir-Heywood:
Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels. 72:1-72:7 - Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk:
Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels. 73:1-73:8
CUING V
- Aleksandra Mileva, Luca Caviglione, Aleksandar Velinov, Steffen Wendzel, Vesna Dimitrova:
Risks and Opportunities for Information Hiding in DICOM Standard. 74:1-74:8 - Pawel Rajba, Wojciech Mazurczyk:
Data Hiding Using Code Obfuscation. 75:1-75:10 - Fabian Brenner, Florian Platzer, Martin Steinebach:
Discovery of Single-Vendor Marketplace Operators in the Tor-Network. 76:1-76:10 - Julian Heeger, York Yannikos, Martin Steinebach:
exHide: Hiding Data within the exFAT File System. 77:1-77:8 - Alexander Hartl, Joachim Fabini, Christoph Roschger, Peter Eder-Neuhauser, Marco Petrovic, Roman Tobler, Tanja Zseby:
Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures. 78:1-78:11
IoT-SECFOR I
- Salvatore Frontera, Riccardo Lazzeretti:
Bloom Filter based Collective Remote Attestation for Dynamic Networks. 80:1-80:10 - Qi Liu, Hubert B. Keller, Veit Hagenmeyer:
A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol. 81:1-81:10 - Umberto Morelli, Ivan Vaccari, Silvio Ranise, Enrico Cambiaso:
DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections. 82:1-82:9
iPAT
- Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos:
Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystems. 83:1-83:6 - Guodong Xie, Pintu Lohar, Claudia Florea, Malika Bendechache, Ramona Trestian, Rob Brennan, Regina Connolly, Irina Tal:
Privacy in Times of COVID-19: A Pilot Study in the Republic of Ireland. 84:1-84:6
CyberTIM I
- Clemens Sauerwein, Daniel Fischer, Milena Rubsamen, Guido Rosenberger, Dirk Stelzer, Ruth Breu:
From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms. 85:1-85:9 - Yuning Jiang, Manfred A. Jeusfeld, Jianguo Ding:
Evaluating the Data Inconsistency of Open-Source Vulnerability Repositories. 86:1-86:10 - Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Control Effectiveness: a Capture-the-Flag Study. 87:1-87:10 - Yazid Merah, Tayeb Kenaza:
Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence. 88:1-88:8 - Daniela Pöhn, Sebastian Seeber, Tanja Hanauer, Jule Anna Ziegler, David Schmitz:
Towards Improving Identity and Access Management with the IdMSecMan Process Framework. 89:1-89:10
IWSMR I
- Max Maaß, Henning Pridöhl, Dominik Herrmann, Matthias Hollick:
Best Practices for Notification Studiesfor Security and Privacy Issues on the Internet. 90:1-90:10 - Louise Axon, Arnau Erola, Alastair Janse van Rensburg, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese:
Practitioners' Views on Cybersecurity Control Adoption and Effectiveness. 91:1-91:10 - Simon Vrhovec, Luca Caviglione, Steffen Wendzel:
Crème de la Crème: Lessons from Papers in Security Publications. 92:1-92:9
IWSMR II
- Rafael Copstein, Jeff Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood:
Log Abstraction for Information Security: Heuristics and Reproducibility. 93:1-93:10 - Jörg Keller:
Chaotic Pseudo Random Number Generators: A Case Study on Replication Study Challenges. 94:1-94:4 - Marco Zuppelli, Luca Caviglione:
pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert Channels. 95:1-95:8
LPW I
- Antoine Boutet, Sonia Ben Mokhtar:
Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets. 96:1-96:10 - Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens:
A clustering approach to anonymize locations during dataset de-identification. 97:1-97:10 - Masakazu Fujio, Kenta Takahashi, Yosuke Kaga, Wataru Nakamura, Yoshiko Yasumura, Rie Shigetomi Yamaguchi:
Template Protected Authentication based on Location History and b-Bit MinHash. 98:1-98:8
CSA I
- Pedro Ramon y Cajal Ramo, Jorge Maestre Vidal:
Understanding the Ethical and Regulatory boundaries of the Military Actuation on the Cyberspace. 100:1-100:11
CSA II
- David Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Juan M. Estévez-Tapiador:
The Stress as Adversarial Factor for Cyber Decision Making. 101:1-101:10 - Marta Irene García Cid, Laura Ortiz Martín, Vicente Martín Ayuso:
Madrid Quantum Network: A First Step to Quantum Internet. 102:1-102:7 - Pantaleone Nespoli, Félix Gómez Mármol, Georgios Kambourakis:
AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm. 103:1-103:8 - Marco Antonio Sotelo Monge, Jorge Maestre Vidal, Roumen Daton Medenou Choumanof:
Adaptive Mitigation of Tactical Denial of Sustainability. 104:1-104:9
ENS II
- John Preuß Mattsson, Prajwol Kumar Nakarmi:
Nori: Concealing the Concealed Identifier in 5G. 105:1-105:7 - Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca:
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. 106:1-106:8 - Joo Yeon Cho, Andrew Sergeev:
Secure Open Fronthaul Interface for 5G Networks. 107:1-107:6 - Charilaos C. Zarakovitis, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, Qiang Ni, Charalambos Klitis, George Guirgis, Ana R. Cavalli, Nicholas Sgouros, Eftychia Makri, Antonios Lalas, Konstantinos Votis, George Amponis, Wissam Mallouli:
SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks. 108:1-108:10
IWSSEC I
- Marcos Cavalcanti, Pedro R. M. Inácio, Mário M. Freire:
Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms. 109:1-109:9 - Raphael Schermann, Ronald Toegl:
Managing Anonymous Keys in a Fog-Computing Platform. 110:1-110:5 - Iván García Aguilar, Antonio Muñoz Gallego:
A Threat Model Analysis of a Mobile Agent-based system on Raspberry Pi. 111:1-111:10
NG-SOC I
- Martin Husák, Martin Lastovicka, Daniel Tovarnák:
System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling. 112:1-112:8 - Andrea Corsini, Shanchieh Jay Yang, Giovanni Apruzzese:
On the Evaluation of Sequential Machine Learning for Network Intrusion Detection. 113:1-113:10 - Philip Dale Huff, Kylie McClanahan, Thao Le, Qinghua Li:
A Recommender System for Tracking Vulnerabilities. 114:1-114:7
BASS I
- Shurook S. Almohamade, John A. Clark, James Law:
Continuous User Authentication for Human-Robot Collaboration. 115:1-115:9
BASS II
- A. K. M. Nuhil Mehdy, Hoda Mehrpouyan:
Modeling of Personalized Privacy Disclosure Behavior: A Formal Method Approach. 116:1-116:13 - Andraz Krasovec, Gianmarco Baldini, Veljko Pejovic:
Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments. 117:1-117:7 - Stefano Bistarelli, Emanuele Bosimini, Francesco Santini:
A Medium-Interaction Emulation and Monitoring System for Operational Technology. 118:1-118:7 - Stefano Petrocchi, Giacomo Giorgi, Mario G. C. A. Cimino:
A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection. 119:1-119:9
EPESec I
- Simon Hacks, Ismail Butun, Robert Lagerström, Andrei Buhaiu, Anna Georgiadou, Ariadni Michalitsi-Psarrou:
Integrating Security Behavior into Attack Simulations. 120:1-120:13 - Dimitrios Skias, Sofia Tsekeridou, Theodore B. Zahariadis, Artemis C. Voulkidis, Terpsichori Helen Velivassaki, Konstantina Fotiadou:
Pan-European Cybersecurity Incidents Information Sharing Platform to support NIS Directive. 121:1-121:7 - Maryam Pahlevan, Artemis C. Voulkidis, Terpsichori Helen Velivassaki:
Secure exchange of cyber threat intelligence using TAXII and distributed ledger technologies - application for electrical power and energy system. 122:1-122:8 - Ilias Siniosoglou, Vasileios Argyriou, Stamatia Bibi, Thomas Lagkas, Panagiotis G. Sarigiannidis:
Unsupervised Ethical Equity Evaluation of Adversarial Federated Networks. 123:1-123:6
IWAPS I
- Ankur Chattopadhyay, Robert Ruska Jr., Levi Pfantz:
Determining the Robustness of Privacy Enhancing DeID Against the ReID Adversary: An Experimental Study. 124:1-124:11 - Athanasios Vasileios Grammatopoulos, Ilias Politis, Christos Xenakis:
A web tool for analyzing FIDO2/WebAuthn Requests and Responses. 125:1-125:10 - Jesús García Rodríguez, Rafael Torres Moreno, Jorge Bernal Bernabé, Antonio F. Skarmeta:
Towards a standardized model for privacy-preserving Verifiable Credentials. 126:1-126:6
IWAPS II
- Panagiotis Bountakas, Konstantinos Koutroumpouchos, Christos Xenakis:
A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection. 127:1-127:12 - Michail Bampatsikos, Ilias Politis, Christos Xenakis, Stelios C. A. Thomopoulos:
Solving the cold start problem in Trust Management in IoT. 128:1-128:9 - Emanuele Raso, Lorenzo Bracciale, Pierpaolo Loreti, Giuseppe Bianchi:
ABEBox: A data driven access control for securing public cloud storage with efficient key revocation. 129:1-129:7 - Mads Schaarup Andersen:
Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark - Usefulness, Barriers, and Recommendations. 130:1-130:8
IWAPS III
- Andreas Klinger, Ulrike Meyer:
Towards Secure Evaluation of Online Functionalities. 131:1-131:14 - Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos:
Approaching the Data Protection Impact Assessment as a legal methodology to evaluate the degree of privacy by design achieved in technological proposals. A special reference to Identity Management systems. 132:1-132:9 - Tore Kasper Frederiksen:
A Holistic Approach to Enhanced Security and Privacy in Digital Health Passports. 133:1-133:10
SecRS I
- Carolina Adaros Boye, Paul Kearney, Mark B. Josephs, Hans Ulmer:
An Indicators-of-Risk Library for Industrial Network Security. 134:1-134:9 - Henrique Santos, André Oliveira, Lúcia Soares, Alan Satis, Alexandre J. T. Santos:
Information Security Assessment and Certification within Supply Chains. 135:1-135:6
SecHealth I - Cybersecurity
- Kitty Kioskli, Theo Fotis, Haralambos Mouratidis:
The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations. 136:1-136:9 - Muhammad Ali Fauzi, Prosper Kandabongee Yeng, Bian Yang, Dita Rachmayani:
Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia. 137:1-137:8
SecHealth II - Integrity and Privacy
- Michael Eckel, Tim Riemann:
Userspace Software Integrity Measurement. 138:1-138:11 - Andreea Ancuta Corici, Tina Hühnlein, Detlef Hühnlein, Olaf Rode:
Towards Interoperable Vaccination Certificate Services. 139:1-139:9 - Narasimha Raghavan Veeraragavan, Jan Franz Nygård:
DeCanSec: A Decentralized Architecture for Secure Statistical Computations on Distributed Health Registry Data. 140:1-140:9
ETACS II - Education
- Salvatore Manfredi, Mariano Ceccato, Giada Sciarretta, Silvio Ranise:
Do Security Reports Meet Usability?: Lessons Learned from Using Actionable Mitigations for Patching TLS Misconfigurations. 141:1-141:13 - Sara Ricci, Vladimir Janout, Simon Parker, Jan Jerabek, Jan Hajny, Argyro Chatzopoulou, Remi Badonnel:
PESTLE Analysis of Cybersecurity Education. 142:1-142:8 - Jakub Drmola, Frantisek Kasl, Pavel Loutocký, Miroslav Mares, Tomás Pitner, Jakub Vostoupal:
The Matter of Cybersecurity Expert Workforce Scarcity in the Czech Republic and Its Alleviation Through the Proposed Qualifications Framework. 143:1-143:6 - Jan Hajny, Sara Ricci, Edmundas Piesarskas, Marek Sikora:
Cybersecurity Curricula Designer. 144:1-144:7
ETACS III - Cyber Ranges
- François Lesueur, Camille Noûs:
MI-LXC: A Small-Scale Internet-Like Environment for Network Security Teaching. 145:1-145:6 - Giorgio Bernardinetti, Stefano Iafrate, Giuseppe Bianchi:
Nautilus: A Tool For Automated Deployment And Sharing Of Cyber Range Scenarios. 146:1-146:7 - Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu:
Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training. 147:1-147:10 - Joachim Fabini, Alexander Hartl, Fares Meghdouri, Claudia Breitenfellner, Tanja Zseby:
SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security Laboratories. 148:1-148:11 - Tomás Lieskovan, Jan Hajny:
Building Open Source Cyber Range To Teach Cyber Security. 149:1-149:11
SP2I I - Security Analysis and Privacy
- Katharina Hofer-Schmitz:
A Formal Analysis of EnOcean's Teach-in and Authentication. 150:1-150:8 - Mariia Bakhtina, Raimundas Matulevicius:
Information Security Analysis in the Passenger-Autonomous Vehicle Interaction. 151:1-151:10
SP2I II - Applied Cryptography in Intelligent Infrastructures
- Petr Dzurenda, Sara Ricci, Raúl Casanova Marques, Jan Hajny, Petr Cika:
Secret Sharing-based Authenticated Key Agreement Protocol. 152:1-152:10 - Petr Dzurenda, Carles Angles-Tafalla, Sara Ricci, Lukas Malina:
Privacy-Preserving Online Parking Based on Smart Contracts. 153:1-153:10
SP2I III - Security and Trust in Intelligent Infrastructures
- Rupa Chiramdasu, Gautam Srivastava, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu:
A Machine Learning Driven Threat Intelligence System for Malicious URL Detection. 154:1-154:7 - Stefania Bartoletti, Giuseppe Bianchi, Danilo Orlando, Ivan Palamà, Nicola Blefari-Melazzi:
Location Security under Reference Signals' Spoofing Attacks: Threat Model and Bounds. 155:1-155:5
SME-SP I
- George Pantelis, Petros Petrou, Sophia Karagiorgou, Dimitrios Alexandrou:
On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web. 156:1-156:7
SME-SP II
- José Javier de Vicente Mohino, Wissam Mallouli, José Francisco Ruiz, Max van Haastrecht:
GEIGER: Solution for small businesses to protect themselves against cyber-threats. 157:1-157:4 - Max van Haastrecht, Injy Sarhan, Alireza Shojaifar, Louis Baumgartner, Wissam Mallouli, Marco Spruit:
A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME Needs. 158:1-158:12 - Bernd Remmele, Jessica Peichl:
Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small Enterprises. 159:1-159:7 - Alireza Shojaifar, Heini Järvinen:
Classifying SMEs for Approaching Cybersecurity Competence and Awareness. 160:1-160:7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.