default search action
17th ARES 2022: Vienna, Austria
- ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022. ACM 2022, ISBN 978-1-4503-9670-7
ARES I - Best Papers
- Thomas Dangl, Stewart Sentanoe, Hans P. Reiser:
VMIFresh: Efficient and Fresh Caches for Virtual Machine Introspection. 1:1-1:9 - Davy Preuveneers, Wouter Joosen:
Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence. 2:1-2:11 - Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart:
Distance-based Techniques for Personal Microbiome Identification✱. 3:1-3:13 - Philip Empl, Daniel Schlette, Daniel Zupfer, Günther Pernul:
SOAR4IoT: Securing IoT Assets with Digital Twins. 4:1-4:10
ARES II - Privacy
- Simin Ghesmati, Walid Fdhila, Edgar R. Weippl:
SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy Techniques. 5:1-5:14 - Gonzalo Munilla Garrido, Johannes Sedlmeir, Matthias Babel:
Towards Verifiable Differentially-Private Polling. 6:1-6:11 - Sascha Sven Zmiewski, Jan Laufer, Zoltán Ádám Mann:
Automatic online quantification and prioritization of data protection risks. 7:1-7:10 - Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon, Vincent Naessens:
Reviewing review platforms: a privacy perspective. 8:1-8:10
ARES III - Cloud Security and Web Privacy
- Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl:
SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices. 9:1-9:10 - Angeliki Aktypi, Dimitris Karnikis, Nikos Vasilakis, Kasper Rasmussen:
Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing. 10:1-10:11 - Timi Heino, Robin Carlsson, Sampsa Rauti, Ville Leppänen:
Assessing discrepancies between network traffic and privacy policies of public sector web services. 11:1-11:6 - Benjamin Maximilian Berens, Heike Dietmann, Chiara Krisam, Oksana Kulyk, Melanie Volkamer:
Cookie Disclaimers: Impact of Design and Users' Attitude. 12:1-12:20
ARES IV - Web Security
- Pascal Wichmann, Maximilian Blochberger, Hannes Federrath:
Web Cryptography API: Prevalence and Possible Developer Mistakes. 13:1-13:10 - Vincent Drury, Luisa Lux, Ulrike Meyer:
Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns. 14:1-14:11 - Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilios Katos, Stefanos Vrochidis, Ioannis Kompatsiaris:
Web Bot Detection Evasion Using Deep Reinforcement Learning. 15:1-15:10 - Christian Oliva, Ignacio Palacio Marín, Luis Fernando Lago-Fernández, David Arroyo:
Rumor and clickbait detection by combining information divergence measures and deep learning techniques. 16:1-16:6
ARES V - Secure Software and Malware Detection
- Felix Dreissig, Jonas Röckl, Tilo Müller:
Compiler-Aided Development of Trusted Enclaves with Rust. 18:1-18:10 - Claudio A. Ardagna, Nicola Bena, Ramon Martín de Pozuelo:
Bridging the Gap Between Certification and Software Development. 19:1-19:10 - Tayssir Touili, Xin Ye:
SMODIC: A Model Checker for Self-modifying Code. 20:1-20:6
ARES VI - Network and Hardware Security
- Emilie Bout, Alessandro Brighente, Mauro Conti, Valeria Loscrì:
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks. 21:1-21:10 - Samuel Sulan, Martin Husák:
Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy. 22:1-22:6 - Davide Bove:
Secure Services for Standard RISC-V Architectures. 23:1-23:7 - Stefan Tauner:
RIPEMB: A framework for assessing hardware-assisted software security schemes in embedded systems. 24:1-24:6
ARES VII - Awareness and Incident Response
- Martin Husák, Milan Cermák:
SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response. 25:1-25:10 - Avi Shaked, Yulia Cherdantseva, Pete Burnap:
Model-Based Incident Response Playbooks. 26:1-26:7 - Benedikt Putz, Manfred Vielberth, Günther Pernul:
BISCUIT - Blockchain Security Incident Reporting based on Human Observations. 27:1-27:6 - Emmanouil Samanis, Joseph Gardiner, Awais Rashid:
SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools. 28:1-28:12
ARES VIII - Threat Intelligence and Intrusion Detection
- Arthur Drichel, Justus von Brandt, Ulrike Meyer:
Detecting Unknown DGAs without Context Information. 29:1-29:12 - Mostafa Roshani, Mehdi Nobakht:
HybridDAD: Detecting DDoS Flooding Attack using Machine Learning with Programmable Switches. 30:1-30:11 - Mohamed Amine Merzouk, Joséphine Delas, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks. 31:1-31:6 - Joseph Khoury, Morteza Safaei Pour, Elias Bou-Harb:
A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale. 32:1-32:11
ARES IX - Cryptography
- Koki Morimura, Daisuke Maeda, Takashi Nishide:
Improved Integer-wise Homomorphic Comparison and Division based on Polynomial Evaluation. 33:1-33:10 - Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert:
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS. 34:1-34:11 - Heini Bergsson Debes, Thanassis Giannetsos:
ZEKRO: Zero-Knowledge Proof of Integrity Conformance. 35:1-35:10
ARES X - Authentication
- Reyhan Düzgün, Naheem Noah, Peter Mayer, Sanchari Das, Melanie Volkamer:
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays. 36:1-36:12 - David Biesner, Kostadin Cvejoski, Rafet Sifa:
Combining Variational Autoencoders and Transformer Language Models for Improved Password Generation. 37:1-37:6 - Christian Plappert, Andreas Fuchs, Ronald Heddergott:
Analysis and Evaluation of Hardware Trust Anchors in the Automotive Domain. 38:1-38:11 - Daniela Pöhn, Nils Gruschka, Leonhard Ziegler:
Multi-Account Dashboard for Authentication Dependency Analysis. 39:1-39:13
CSA I
- Yantsislav Yanakiev, Marta Irene García Cid, Jorge Maestre Vidal, Nikolai Stoianov, Marco Antonio Sotelo Monge:
VALKYRIES: Harmonization and Pre-Standardization of Technology, Training and Tactical Coordinated Operations for First Responders on EU MCI. 40:1-40:6 - Marta Irene García Cid, Jorge Álvaro González, Laura Ortiz Martín, Diego Del Río Gómez:
Disruptive Quantum Safe Technologies. 41:1-41:8
CSA II
- Samuel Zurowski, George Lord, Ibrahim M. Baggili:
A Quantitative Analysis of Offensive Cyber Operation (OCO) Automation Tools. 42:1-42:11
CUING I
- Mikolaj Komisarek, Marek Pawlicki, Maria-Elena Mihailescu, Darius Mihai, Mihai Carabas, Rafal Kozik, Michal Choras:
A novel, refined dataset for real-time Network Intrusion Detection. 43:1-43:8
CUING II
- Vaila Leask, Rémi Cogranne, Dirk Borghys, Helena Bruyninckx:
UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media. 44:1-44:8 - Massimo Guarascio, Marco Zuppelli, Nunziato Cassavia, Luca Caviglione, Giuseppe Manco:
Revealing MageCart-like Threats in Favicons via Artificial Intelligence. 45:1-45:7 - Luca Caviglione, Martin Grabowski, Kai Gutberlet, Adrian Marzecki, Marco Zuppelli, Andreas Schaffhauser, Wojciech Mazurczyk:
Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit. 46:1-46:7 - Marcin Kowalczyk, Agnieszka Malanowska, Wojciech Mazurczyk, Krzysztof Cabaj:
Web Page Harvesting for Automatized Large-scale Digital Images Anomaly Detection. 47:1-47:9
CUING III
- Carina Heßeling, Jörg Keller, Sebastian Litzinger:
Network Steganography Through Redundancy in Higher-Radix Floating-Point Representations. 48:1-48:7 - Niklas Bunzel, Tobias Chen, Martin Steinebach:
Using Telegram as a carrier for image steganography: Analysing Telegrams API limits. 49:1-49:8 - Tobias Schmidbauer, Jörg Keller, Steffen Wendzel:
Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication. 50:1-50:10 - Tom Neubert, Antonio José Caballero Morcillo, Claus Vielhauer:
Improving Performance of Machine Learning based Detection of Network Steganography in Industrial Control Systems. 51:1-51:8
CUING IV
- Pawel Rajba, Wojciech Mazurczyk:
Limitations of Web Cryptojacking Detection: A Practical Evaluation. 52:1-52:6 - York Yannikos, Julian Heeger, Martin Steinebach:
Data Acquisition on a Large Darknet Marketplace. 53:1-53:6 - Florian Platzer, Alexandra Lux:
A Synopsis of Critical Aspects for Darknet Research. 54:1-54:8 - Martin Steinebach, Tiberius Berwanger, Huajian Liu:
Towards Image Hashing Robust Against Cropping and Rotation. 55:1-55:7
ENS I
- Aleksandra Pawlicka, Marek Pawlicki, Rafal Renk, Rafal Kozik, Michal Choras:
The cybersecurity-related ethical issues of cloud technology and how to avoid them. 56:1-56:7
ENS II
- Mohammed A. Abdelmaguid, Hossam S. Hassanein, Mohammad Zulkernine:
SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET. 57:1-57:10 - Marek Pawlicki, Rafal Kozik, Michal Choras:
Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection. 58:1-58:6 - Georgios Agrafiotis, Eftychia Makri, Ioannis Flionis, Antonios Lalas, Konstantinos Votis, Dimitrios Tzovaras:
Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion. 59:1-59:7 - Prajwol Kumar Nakarmi, Jakob Sternby, Ikram Ullah:
Applying Machine Learning on RSRP-based Features for False Base Station Detection. 60:1-60:7
ENS III
- Zahra Nezhadian, Enrico Branca, Natalia Stakhanova:
Analysis and prediction of web proxies misbehavior. 61:1-61:11 - Seongmin Park, Ilsun You, Hoonyong Park, Dowon Kim:
Analyzing RRC Replay Attack and Securing Base Station with Practical Method. 62:1-62:8 - Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Ahmed Taffal:
Sim2Testbed Transfer: NDN Performance Evaluation. 63:1-63:9 - Karol Rzepka, Przemyslaw Szary, Krzysztof Cabaj, Wojciech Mazurczyk:
Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications. 64:1-64:9
ENS IV
- Davide Cocca, Antonio Pirozzi, Corrado Aaron Visaggio:
We cannot trust in you: a study about the dissonance among anti-malware engines. 65:1-65:13 - Pascal Wichmann, Alexander Groddeck, Hannes Federrath:
FileUploadChecker: Detecting and Sanitizing Malicious File Uploads in Web Applications at the Request Level. 66:1-66:10 - Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Heng Siong Lim, Qiang Ni, Antonios Gouglidis, Wissam Mallouli:
Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks. 67:1-67:6 - Chrystel Gaber, Ghada Arfaoui, Yannick Carlinet, Nancy Perrot, Laurent Valleyre, Marc Lacoste, Jean-Philippe Wary, Yacine Anser, Rafal Artych, Aleksandra Podlasek, Edgardo Montes de Oca, Vinh Hoa La, Vincent Lefebvre, Gürkan Gür:
The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service. 68:1-68:7
EPESec I
- László Erdodi, Pallavi Kaliyar, Siv Hilde Houmb, Aida Akbarzadeh, André Jung Waltoft-Olsen:
Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104. 69:1-69:10 - Jose Antonio Lopez, Iñaki Angulo, Saturnino Martinez:
Substation-Aware. An intrusion detection system for the IEC 61850 protocol. 70:1-70:7 - Alexios Lekidis:
Cyber-security measures for protecting EPES systems in the 5G area. 71:1-71:10 - Evangelos Chaskos, Jason Diakoumakos, Nicholas Kolokotronis, George Lepouras:
Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification Model. 72:1-72:9 - Athanasios Liatifis, Christos Dalamagkas, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Evangelos K. Markakis, Valeri M. Mladenov, Panagiotis G. Sarigiannidis:
Fault-Tolerant SDN Solution for Cybersecurity Applications. 73:1-73:6 - Engla Rencelj Ling, Jose Eduardo Urrea Cabus, Ismail Butun, Robert Lagerström, Johannes Olegård:
Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis. 74:1-74:7
EPESec II
- Dimitrios Skias, Sofia Tsekeridou, Theodore B. Zahariadis, Artemis C. Voulkidis, Terpsichori Helen Velivassaki:
Demonstration of alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform to Cybersecurity policy, regulatory and legislative advancements. 75:1-75:8 - Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis:
A Collaborative Intelligent Intrusion Response Framework for Smart Electrical Power and Energy Systems. 76:1-76:10 - Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis:
Evaluating The Cyber-Security Culture of the EPES Sector: Applying a Cyber-Security Culture Framework to assess the EPES Sector's resilience and readiness. 77:1-77:10 - Theodoros Rokkas, Ioannis Neokosmidis:
Classifying the factors affecting the adoption of the SDN-microSENSE innovations. 78:1-78:6
ETACS I - Cybersecurity Education, Training and Awareness
- Sunil Chaudhary, Marko Kompara, Sebastian Pape, Vasileios Gkioulos:
Properties for Cybersecurity Awareness Posters' Design and Quality Assessment. 79:1-79:8 - Tomás Lieskovan, Jan Hajny:
Security of Smart Grid Networks in the Cyber Ranges. 80:1-80:8 - Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda, Stylianos Karagiannis:
Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory. 81:1-81:8
ETACS II - Cybersecurity Skills Frameworks and Tools
- Jan Hajny, Marek Sikora, Athanasios Vasileios Grammatopoulos, Fabio Di Franco:
Adding European Cybersecurity Skills Framework into Curricula Designer. 82:1-82:6 - Jakub Vostoupal, Frantisek Kasl, Pavel Loutocký, Tomás Pitner, Patrik Valo, Adam Valalský, Damián Paranic:
The Platform for Czech National Qualifications Framework in Cybersecurity. 83:1-83:6 - Sara Ricci, Marek Sikora, Simon Parker, Imre Lendak, Yianna Danidou, Argyro Chatzopoulou, Remi Badonnel, Donatas Alksnys:
Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation. 84:1-84:10
FARES I - Post-Quantum, Digital Identity, & Access Control
- Amir Sharif, Matteo Ranzi, Roberto Carbone, Giada Sciarretta, Silvio Ranise:
SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes. 85:1-85:10 - Tahir Ahmad, Umberto Morelli, Silvio Ranise:
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness. 86:1-86:10 - Markus Rautell, Outi-Marja Latvala, Visa Antero Vallivaara, Kimmo Halunen:
Applying a cryptographic metric to post-quantum lattice-based signature algorithms. 87:1-87:8 - Giovanni Ciaramella, Giacomo Iadarola, Francesco Mercaldo, Marco Storto, Antonella Santone, Fabio Martinelli:
Introducing Quantum Computing in Mobile Malware Detection. 88:1-88:8
FARES II - Threat Intelligence and Detection
- Martin Macák, Radek Vaclavek, Dasa Kusniráková, Raimundas Matulevicius, Barbora Buhnova:
Scenarios for Process-Aware Insider Attack Detection in Manufacturing. 89:1-89:10 - Marta Catillo, Antonio Pecchia, Umberto Villano:
Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding. 90:1-90:7 - Lukás Sadlek, Pavel Celeda, Daniel Tovarnák:
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. 91:1-91:8 - Xinrun Zhang, Akshay Mathur, Lei Zhao, Safia Rahmat, Quamar Niyaz, Ahmad Y. Javaid, Xiaoli Yang:
An Early Detection of Android Malware Using System Calls based Machine Learning Model. 92:1-92:9
IOSec I
- Masahiro Ishii, Kento Mori, Ryoichi Kuwana, Satoshi Matsuura:
Multi-label Classification of Cybersecurity Text with Distant Supervision. 93:1-93:9 - Siegfried Hollerer, Thilo Sauter, Wolfgang Kastner:
Risk Assessments Considering Safety, Security, and Their Interdependencies in OT Environments. 94:1-94:8 - Christos Tselios, Ilias Politis, Christos Xenakis:
Improving Network, Data and Application Security for SMEs. 95:1-95:8
IoT-SECFOR I - Security Assessment and Threat Analysis
- Kamakshi Srikumar, Komal Kashish, Kolja Eggers, Nicolás E. Díaz Ferreyra, Julian Koch, Thorsten Schüppstuhl, Riccardo Scandariato:
STRIPED: A Threat Analysis Method for IoT Systems. 96:1-96:6 - SeongHan Shin, Tomoyuki Ogawa, Ryo Fujita, Mari Itoh, Hirotaka Yoshida:
An Investigation of PSA Certified. 97:1-97:8
IoT-SECFOR II - Security Attacks and Solutions
- Henri Ruotsalainen:
Reactive Jamming Detection for LoRaWAN Based on Meta-Data Differencing. 98:1-98:8 - Ahmed Lekssays, Giorgia Sirigu, Barbara Carminati, Elena Ferrari:
MalRec: A Blockchain-based Malware Recovery Framework for Internet of Things. 99:1-99:8 - Lukas Jäger, Dominik Lorych, Michael Eckel:
A Resilient Network Node for the Industrial Internet of Things. 100:1-100:10
IWAPS I - Blockchain Security Applications
- Vaios Bolgouras, Anna Angelogianni, Ilias Politis, Christos Xenakis:
Trusted and Secure Self-Sovereign Identity framework. 101:1-101:6 - Mandana Falahi, Andrei Vasilateanu, Nicolae Goga, George Suciu, Mari-Anais Sachian, Robert Florescu, Stefan-Daniel Stanciu:
Improving Security and Scalability in Smart Grids using Blockchain Technologies. 102:1-102:7 - Harris Niavis, Konstantinos Loupos:
ConSenseIoT: A Consensus Algorithm for Secure and Scalable Blockchain in the IoT context. 103:1-103:6
IWAPS II - Next Generation Security Applications
- Antonio Muñoz:
Secure Mobile Agents on Embedded Boards: a TPM based solution. 104:1-104:7 - Anastassios Voudouris, Ilias Politis, Christos Xenakis:
Secret sharing a key in a distributed way, Lagrange vs Newton. 105:1-105:7 - Razvan-Alexandru Bratulescu, Robert-Ionut Vatasoiu, Sorina-Andreea Mitroi, George Suciu, Mari-Anais Sachian, Daniel-Marian Dutu, Serban-Emanuel Calescu:
Fraudulent Activities in the Cyber Realm: DEFRAUDify Project: Fraudulent Activities in the Cyber Realm: DEFRAUDify Project. 106:1-106:5
IWAPS III - Cyber Insurance Applications
- Mohamed Ahmed, Sakshyam Panda, Christos Xenakis, Emmanouil Panaousis:
MITRE ATT&CK-driven Cyber Risk Assessment. 107:1-107:10 - Markos Charalambous, Aristeidis Farao, George Kalatzantonakis, Panagiotis Kanakakis, Nikos Salamanos, Evangelos Kotsifakos, Evangellos Froudakis:
Analyzing Coverages of Cyber Insurance Policies Using Ontology. 108:1-108:7
IWCC
- Mehdi Akbari Gurabi, Avikarsha Mandal, Jan Popanda, Robert Rapp, Stefan Decker:
SASP: a Semantic web-based Approach for management of Sharable cybersecurity Playbooks. 109:1-109:8 - Axel Charpentier, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich:
Deep Reinforcement Learning-Based Defense Strategy Selection. 110:1-110:11 - Bethany Sumner, Gokila Dorai, John Heslen:
Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms. 111:1-111:10 - François Labrèche, Enrico Mariconti, Gianluca Stringhini:
Shedding Light on the Targeted Victim Profiles of Malicious Downloaders. 112:1-112:10
IWCSEC I - Fast-Paced and Secure Code Development and Deployment
- Angelo Sotgiu, Maura Pintor, Battista Biggio:
Explainability-based Debugging of Machine Learning for Vulnerability Discovery. 113:1-113:8 - Luca Mecenero, Ranindya Paramitha, Ivan Pashchenko, Fabio Massacci:
Lightweight Parsing and Slicing for Bug Identification in C. 114:1-114:10 - Simone Scalco, Ranindya Paramitha, Duc-Ly Vu, Fabio Massacci:
On the feasibility of detecting injections in malicious npm packages. 115:1-115:8 - Anusha Bambhore Tukaram, Simon Schneider, Nicolás E. Díaz Ferreyra, Georg Simhandl, Uwe Zdun, Riccardo Scandariato:
Towards a Security Benchmark for the Architectural Design of Microservice Applications. 116:1-116:7 - Clinton Cao, Agathe Blaise, Sicco Verwer, Filippo Rebecchi:
Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster. 117:1-117:9 - Raluca Brasoveanu, Yusuf Karabulut, Ivan Pashchenko:
Security Maturity Self-Assessment Framework for Software Development Lifecycle. 118:1-118:8
IWCSEC II - Software Certification
- Ákos Milánkovich, Gergely Eberhardt, Dávid Lukács:
The AssureMOSS security certification scheme. 119:1-119:10
IWSECC
- Ioannis Kalderemidis, Aristeidis Farao, Panagiotis Bountakas, Sakshyam Panda, Christos Xenakis:
GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments. 120:1-120:9 - Santosh Kumar Upadhyaya, Srinivas Vivek:
Revisiting a Privacy-Preserving Location-based Service Protocol using Edge Computing. 121:1-121:5 - Mathias Schüpany, Martin Pirker:
A Revisit of Attestable Nodes for Networked Applications. 122:1-122:7
IWSMA
- Amal Hbaieb, Samiha Ayed, Lamia Chaari:
Federated learning based IDS approach for the IoV. 123:1-123:6
IWSMR
- Sanaz Adel Alipour, Rita Orji, Nur Zincir-Heywood:
Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the Literature. 124:1-124:9 - Daniela Pöhn, Wolfgang Hommel:
TaxIdMA: Towards a Taxonomy for Attacks related to Identities. 125:1-125:13 - Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis:
Cyber-Security Culture Assessment in Academia: A COVID-19 Study: Applying a Cyber-Security Culture Framework to assess the Academia's resilience and readiness. 126:1-126:8
IWSRSC
- Marc Ohm, Felix Boes, Christian Bungartz, Michael Meier:
On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages. 127:1-127:10 - Arne Roar Nygård, Sokratis K. Katsikas:
SoK: Combating threats in the digital supply chain. 128:1-128:8
PCSCI I - Critical Infrastructures and Interdependencies
- Sandra König, Abdelkader Magdy Shaaban:
Parametrization of Probabilistic Risk Models. 129:1-129:6
PCSCI II - Technologies and Use Cases
- Antonios Karteris, Georgios Tzanos, Lazaros Papadopoulos, Konstantinos P. Demestichas, Dimitrios Soudris, Juliette Pauline Philibert, Carlos López Gómez:
A Methodology for enhancing Emergency Situational Awareness through Social Media. 130:1-130:7
SecHealth I - Authentication of Medical Devices
- Marwa Gadala, Lorenzo Strigini, Radek Fujdiak:
Authentication for Operators of Critical Medical Devices: A Contribution to Analysis of Design Trade-offs. 131:1-131:9
SecHealth II - Privacy
- Harry Halpin:
A Critique of EU Digital COVID-19 Certificates: Do Vaccine Passports Endanger Privacy? 132:1-132:8 - Samuel Wairimu, Lothar Fritsch:
Modelling privacy harms of compromised personal medical data - beyond data breach. 133:1-133:9
SECPID I
- Alessandro Brighente, Mauro Conti, Savio Sciancalepore:
Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing. 134:1-134:11 - Salatiel Ezennaya-Gomez, Edgar Blumenthal, Marten Eckardt, Justus Krebs, Christopher Kuo, Julius Porbeck, Emirkan Toplu, Stefan Kiltz, Jana Dittmann:
Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective. 135:1-135:12 - Cavidan Yakupoglu, Kurt Rohloff:
Towards Efficient FHE Based cPIR Schemes and Their Parameter Selection. 136:1-136:11
SECPID II
- Stefan More, Lukas Alber:
YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC. 137:1-137:8 - Saurabh Deochake, Vrushali Channapattan:
Identity and Access Management Framework for Multi-tenant Resources in Hybrid Cloud Computing. 138:1-138:8 - Harry Halpin:
All that is Solid Melts into Air: Towards Decentralized Cryptographic Access Control. 139:1-139:6
SP2I I - Applied Cryptography, Security and Privacy
- Raúl Casanova Marqués, Petr Dzurenda, Jan Hajny:
Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card. 140:1-140:8 - Petr Dzurenda, Raúl Casanova Marqués, Lukas Malina:
Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials. 141:1-141:9
SP2I II - Security and Machine Learning in Intelligent Infrastructures
- Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Afra Mashhadi:
CloudFL: A Zero-Touch Federated Learning Framework for Privacy-aware Sensor Cloud. 142:1-142:8 - Branka Stojanovic, Helmut Neuschmied, Martin Winter, Ulrike Kleb:
Enhanced Anomaly Detection for Cyber-Attack Detection in Smart Water Distribution Systems. 143:1-143:7
SP2I III - Security and Trust in Intelligent Infrastructures
- Petr Jedlicka, Lukas Malina, Tomas Gerlich, Zdenek Martinasek, Jan Hajny, Petr Socha:
On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography. 144:1-144:9 - Abasi-Amefon Obot Affia, Raimundas Matulevicius:
Security Risk Management in Shared Mobility Integration. 145:1-145:10 - Takahiro Ueda, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto:
An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive Devices. 146:1-146:8
SSE I - Malware and Vulnerability Analysis
- Tayssir Touili:
Register Automata for Malware Specification. 147:1-147:7 - Holger Schmidt, Max van Aerssen, Christian Leich, Abdulkader Benni, Salar Al Ali, Jakob Tanz:
CopypastaVulGuard - A browser extension to prevent copy and paste spreading of vulnerable source code in forum posts. 148:1-148:8 - Emma Lavens, Pieter Philippaerts, Wouter Joosen:
A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners. 149:1-149:10 - Charles-Henry Bertrand Van Ouytsel, Khanh-Huu-The Dam, Axel Legay:
Symbolic analysis meets federated learning to enhance malware identifier. 150:1-150:10
SSE II - Managing Security on Applications
- Dominik Lorych, Lukas Jäger:
Design Space Exploration of DICE. 151:1-151:10 - Daniele Granata, Massimiliano Rak, Giovanni Salzillo:
MetaSEnD: A Security Enabled Development Life Cycle Meta-Model. 152:1-152:10 - Vera Schmitt, Maija Poikela, Sebastian Möller:
Android Permission Manager, Visual Cues, and their Effect on Privacy Awareness and Privacy Literacy. 153:1-153:12 - Katsuyuki Umezawa, Hiroki Koyanagi, Sven Wohlgemuth, Yusuke Mishina, Kazuo Takaragi:
Safety and Security Analysis using LDA based on Case Reports: Case Study and Trust Evaluation Method. 154:1-154:7 - Hasan Yasar, Sam E. Teplov:
DevSecOps In Embedded Systems: An Empirical Study Of Past Literature. 155:1-155:6
WSDF
- Vaia-Maria Angeli, Ahmad Atamli, Erisa Karafili:
Forensic analysis of Tor in Windows environment: A case study. 156:1-156:10 - Philipp Boigner, Robert Luh:
WSL2 Forensics: Detection, Analysis & Revirtualization. 157:1-157:7 - Hannes Mareen, Glenn Van Wallendael, Peter Lambert, Fouad Khelifi:
Fast and Blind Detection of Rate-Distortion-Preserving Video Watermarks. 158:1-158:7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.