default search action
18th ARES 2023: Benevento, Italy
- Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023. ACM 2023
ARES 2023 Full Research Papers
- Florian Draschbacher:
A2P2 - An Android Application Patching Pipeline Based On Generic Changesets. 1:1-1:11 - Antonin Dufka, Petr Svenda:
Enabling Efficient Threshold Signature Computation via Java Card API. 2:1-2:10 - Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde:
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports. 3:1-3:11 - Hayyu Imanda, Kasper Rasmussen:
Nakula: Coercion Resistant Data Storage against Time-Limited Adversary. 4:1-4:11 - Pritha Gupta, Jan Peter Drees, Eyke Hüllermeier:
Automated Side-Channel Attacks using Black-Box Neural Architecture Search. 5:1-5:11 - Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto:
Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts. 6:1-6:12 - Wil Liam Teng, Kasper Rasmussen:
Actions Speak Louder Than Passwords: Dynamic Identity for Machine-to-Machine Communication. 7:1-7:11 - Sarah Abdelwahab Gaballah, Thanh Hoang Long Nguyen, Lamya Abdullah, Ephraim Zimmer, Max Mühlhäuser:
Mitigating Intersection Attacks in Anonymous Microblogging. 8:1-8:11 - Yazan Boshmaf, Isuranga Perera, Udesh Kumarasinghe, Sajitha Liyanage, Husam Al Jawaheri:
Dizzy: Large-Scale Crawling and Analysis of Onion Services. 9:1-9:11 - Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens:
A hybrid anonymization pipeline to improve the privacy-utility balance in sensitive datasets for ML purposes. 10:1-10:11 - Sascha Nägele, Lorena Korn, Florian Matthes:
Adoption of Information Security Practices in Large-Scale Agile Software Development: A Case Study in the Finance Industry. 11:1-11:12 - Simon Ott, Monika Kamhuber, Joana Pecholt, Sascha Wessel:
Universal Remote Attestation for Cloud and Edge Platforms. 12:1-12:11 - Gábor Fuchs, Roland Nagy, Levente Buttyán:
A Practical Attack on the TLSH Similarity Digest Scheme. 13:1-13:10 - Manuel Barbosa, André Cirne, Luís Esquível:
Rogue key and impersonation attacks on FIDO2: From theory to practice. 14:1-14:11 - Axel Charpentier, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich:
Real-Time Defensive Strategy Selection via Deep Reinforcement Learning. 15:1-15:11 - Miguel Peidro-Paredes, José María de Fuentes, Lorena González-Manzano, Miguel Velasco-Gomez:
Characterizing the MasterPrint threat on Android devices with capacitive sensors. 16:1-16:11 - Rudolf Mayer, Alicja Karlowicz, Markus Hittmeir:
k-Anonymity on Metagenomic Features in Microbiome Databases. 17:1-17:11 - Willem Verheyen, Tim Van hamme, Sander Joos, Davy Preuveneers, Wouter Joosen:
Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems. 18:1-18:11 - Dairo de Ruck, Victor Goeman, Michiel Willocx, Jorn Lapon, Vincent Naessens:
Linux-based IoT Benchmark Generator For Firmware Security Analysis Tools. 19:1-19:10 - Amir Sharif, Francesco Antonio Marino, Giada Sciarretta, Giuseppe De Marco, Roberto Carbone, Silvio Ranise:
Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities. 20:1-20:11 - Timm Lauser, Christoph Krauß:
Formal Security Analysis of Vehicle Diagnostic Protocols. 21:1-21:11 - David Schatz, Michael Rossberg, Guenter Schaefer:
Evaluating Statistical Disclosure Attacks and Countermeasures for Anonymous Voice Calls. 22:1-22:10 - Dan Turner, Siamak F. Shahandashti, Helen Petrie:
The Effect of Length on Key Fingerprint Verification Security and Usability. 23:1-23:11 - Olivier Blazy, Céline Chevalier, Guillaume Renaut, Thomas Ricosset, Éric Sageloli, Hugo Senet:
Efficient Implementation of a Post-Quantum Anonymous Credential Protocol. 24:1-24:11 - Armin Memar Zahedani, Jelle Vos, Zekeriya Erkin:
Practical Verifiable & Privacy-Preserving Double Auctions. 25:1-25:9 - Heini Bergsson Debes, Thanassis Giannetsos:
RETRACT: Expressive Designated Verifier Anonymous Credentials. 26:1-26:12 - Ulf Kargén, Noah Mauthe, Nahid Shahmehri:
Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps. 27:1-27:12 - David Allison, Paul Smith, Kieran McLaughlin:
Digital Twin-Enhanced Incident Response for Cyber-Physical Systems. 28:1-28:10
ARES 2023 Short Research Papers
- Christoph Döpmann, Florian Tschorsch:
Modeling Tor Network Growth by Extrapolating Consensus Data. 29:1-29:7 - Daniel Fischer, Clemens Sauerwein, Martin Werchan, Dirk Stelzer:
An Exploratory Study on the Use of Threat Intelligence Sharing Platforms in Germany, Austria and Switzerland. 30:1-30:7 - May Myat Thu, Maria Méndez Real, Maxime Pelcat, Philippe Besnier:
You Only Get One-Shot: Eavesdropping Input Images to Neural Network by Spying SoC-FPGA Internal Bus. 31:1-31:7 - Chuanqi Xu, Jakub Szefer:
Long-Term Analysis of the Dependability of Cloud-based NISQ Quantum Computers. 32:1-32:6
ARES 2023 SoK Research Papers
- Marc Ohm, Charlene Stuke:
SoK: Practical Detection of Software Supply Chain Attacks. 33:1-33:11 - Arttu Paju, Muhammad Owais Javed, Juha Nurmi, Juha Savimäki, Brian McGillion, Billy Bob Brumley:
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications. 34:1-34:15 - Dipkamal Bhusal, Rosalyn Shin, Ajay Ashok Shewale, Monish Kumar Manikya Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi:
SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability. 35:1-35:12
Accepted Workshop Papers and EU Projects Symposium Workshop Papers 2023 CSA
- Yantsislav Yanakiev, Sergio López Bernal, Alberto Montarelo Navajo, Nikolai Stoianov, Manuel Gil Pérez, Carmen Curto Martin:
Approach to harmonisation of technological solutions, operating procedures, preparedness and cross-sectorial collaboration opportunities for first aid response in cross-border mass-casualty incidents. 36:1-36:9 - Henrik Karlzén, Teodor Sommestad:
Automatic incident response solutions: a review of proposed solutions' input and output. 37:1-37:9 - Martin Bedoya, Sara Palacios Chavarro, Daniel Díaz López, Pantaleone Nespoli, Estefania Laverde, Sebastián Suárez:
Securing cloud-based military systems with Security Chaos Engineering and Artificial Intelligence. 38:1-38:9 - David Lopes Antunes, Salvador Llopis Sánchez:
The Age of fighting machines: the use of cyber deception for Adversarial Artificial Intelligence in Cyber Defence. 39:1-39:6 - Frida Muñoz Plaza, Marco Antonio Sotelo Monge, Hector Gonzalez Ordi:
Towards the Definition of Cognitive Warfare and Related Countermeasures: A Systematic Review. 40:1-40:7
CUING
- Jens Lindemann:
How to hide your VM from the big bad wolf? Co-location resistance vs. resource utilisation in VM placement strategies. 41:1-41:11 - Michael Schneider, Daniel Spiekermann, Jörg Keller:
Network Covert Channels in Routing Protocols. 42:1-42:8 - Daniel Lerch-Hostalot, David Megías:
Real-world actor-based image steganalysis via classifier inconsistency detection. 43:1-43:9 - Martin Steinebach:
An Analysis of PhotoDNA. 44:1-44:8 - Pawel Rajba, Jörg Keller, Wojciech Mazurczyk:
Proof-of-work based new encoding scheme for information hiding purposes. 45:1-45:8
ENS
- Barbora Hrdá, Sascha Wessel:
Confidential Quantum Computing. 46:1-46:10 - Mikolaj Komisarek, Marek Pawlicki, Tomi Simic, David Kavcnik, Rafal Kozik, Michal Choras:
Modern NetFlow network dataset with labeled attacks and detection methods. 47:1-47:8 - Francesco Mancini, Giuseppe Bianchi:
ScasDK - A Development Kit for Security Assurance test in Multi-Network-Function 5G. 48:1-48:8 - Natan Orzechowski, Karol Rzepka, Przemyslaw Szary, Krzysztof Cabaj, Wojciech Mazurczyk, Helen C. Leligou, Marcin Przybyszewski, Rafal Kozik, Michal Choras:
Security Architecture in the SILVANUS project. 49:1-49:9
EPESec
- Georgios Gkoktsis, Hagen Lauer, Lukas Jäger:
Risk Assessments in Virtual Power Plants with NESCOR Criteria, Practical Application, Advantages and Disadvantages. 50:1-50:11 - Panagiotis I. Radoglou-Grammatikis, Athanasios Liatifis, Christos Dalamagkas, Alexios Lekidis, Konstantinos Voulgaridis, Thomas Lagkas, Nikolaos Fotos, Sofia-Anna Menesidou, Thomas Krousarlis, Pedro Ruzafa Alcazar, Juan Francisco Martinez, Antonio F. Skarmeta, Alberto Molinuevo Martín, Iñaki Angulo, Jesus Villalobos Nieto, Hristo Koshutanski, Rodrigo Diaz Rodriguez, Ilias Siniosoglou, Orestis Mavropoulos, Konstantinos Kyranou, Theocharis Saoulidis, Allon Adir, Ramy Masalha, Emanuele Bellini, Nicholas Kolokotronis, Stavros Shiaeles, Jose Garcia Franquelo, George Lalas, Andreas Zalonis, Antonis Voulgaridis, Angelina D. Bintoudi, Konstantinos Votis, David Pampliega, Panagiotis G. Sarigiannidis:
ELECTRON: An Architectural Framework for Securing the Smart Electrical Grid with Federated Detection, Dynamic Risk Assessment and Self-Healing. 51:1-51:8 - Dimitrios Christos Asimopoulos, Panagiotis I. Radoglou-Grammatikis, Ioannis Makris, Valeri M. Mladenov, Konstantinos E. Psannis, Sotirios K. Goudos, Panagiotis G. Sarigiannidis:
Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems. 52:1-52:8 - Marios Siganos, Panagiotis I. Radoglou-Grammatikis, Igor Kotsiuba, Evangelos K. Markakis, Ioannis D. Moscholios, Sotirios K. Goudos, Panagiotis G. Sarigiannidis:
Explainable AI-based Intrusion Detection in the Internet of Things. 53:1-53:10
EPIC-ARES (joint session with SSE and IWSECC)
- Christian Plappert, Lukas Jäger, Alexander Irrgang, Chandrasekhar Potluri:
Secure Multi-User Contract Certificate Management for ISO 15118-20 Using Hardware Identities. 54:1-54:11 - Stefan Tatschner, Sebastian N. Peters, David Emeis, John Morris, Thomas Newe:
A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations. 55:1-55:8 - Andreas Diepenbrock, Jonas Fleck, Sabine Sachweh:
An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data Protection. 56:1-56:7 - Jose Andre Morales, Hasan Yasar:
Experiences with Secure Pipelines in Highly Regulated Environments. 57:1-57:9 - Jan Willemson:
Creating a Decryption Proof Verifier for the Estonian Internet Voting System. 58:1-58:7 - Srinivas Vivek:
Attack on "A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server". 59:1-59:3 - Mila Dalla Preda, Francesco Masaia:
Exploring NFT Validation through Digital Watermarking. 60:1-60:6 - Daniel Gómez Aguado, Marta Irene García Cid, Laura Ortiz Martín, Vicente Martín Ayuso:
Simulated environment for multiparty quantum digital signature across the network. 61:1-61:10
ETACS
- Victor Goeman, Dairo de Ruck, Ilse Bohé, Jorn Lapon, Vincent Naessens:
IoT Security Seminar: Raising Awareness and Sharing Critical Knowledge. 62:1-62:8 - Jan Hajny, Marek Sikora, Konstantinos Adamos, Fabio Di Franco:
Curricula Designer with Enhanced ECSF Analysis. 63:1-63:7 - Frantisek Kasl, Pavel Loutocký, Jakub Vostoupal:
The Curation Mechanism for the Czech National Qualifications Framework in Cybersecurity. 64:1-64:6 - Yianna Danidou, Sara Ricci, Antonio F. Skarmeta, Jiri Hosek, Stefano Zanero, Imre Lendak:
DJM-CYBER: A Joint Master in Advanced Cybersecurity. 65:1-65:10 - Alan Briones Delgado, Sara Ricci, Argyro Chatzopoulou, Jakub Cegan, Petr Dzurenda, Ioannis Koutoudis:
Enhancing Cybersecurity Education in Europe: The REWIRE's Course Selection Methodology. 66:1-66:7 - Lukas Hafner, Florian Wutz, Daniela Pöhn, Wolfgang Hommel:
TASEP: A Collaborative Social Engineering Tabletop Role-Playing Game to Prevent Successful Social Engineering Attacks. 67:1-67:10 - Laura Gamisch, Daniela Pöhn:
A Study of Different Awareness Campaigns in a Company. 68:1-68:8 - Willi Lazarov, Tomas Stodulka, Tiina Schafeitel-Tähtinen, Marko Helenius, Zdenek Martinasek:
Interactive Environment for Effective Cybersecurity Teaching and Learning. 69:1-69:9 - Marko Zivanovic, Imre Lendak, Ranko Popovic:
Dynamic Cybersecurity Curriculum Optimization Method (DyCSCOM). 70:1-70:9 - Gabriele Costa, Silvia de Francisci, Serenella Valiani, Paolo Prinetto:
Why Mary Can Hack: Effectively Introducing High School Girls to Cybersecurity. 71:1-71:8
FARES
- Vincent Drury, Jakob Drees, Ulrike Meyer:
Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name Notation. 72:1-72:10 - Jan-Phillip Makowski, Daniela Pöhn:
Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins. 73:1-73:9 - Marta Catillo, Andrea Del Vecchio, Antonio Pecchia, Umberto Villano:
A Case Study with CICIDS2017 on the Robustness of Machine Learning against Adversarial Attacks in Intrusion Detection. 74:1-74:8 - Khanh-Huu-The Dam, Axel Legay:
Mitigate Data Poisoning Attack by Partially Federated Learning. 75:1-75:9 - Michael Mayowa Farayola, Irina Tal, Malika Bendechache, Takfarinas Saber, Regina Connolly:
Fairness of AI in Predicting the Risk of Recidivism: Review and Phase Mapping of AI Fairness Techniques. 76:1-76:10 - Ayman Youssef, Mohamed Abdelrazek, Chandan K. Karmakar:
Program Characterization for Software Exploitation Detection. 77:1-77:8 - Pasquale Caporaso, Giuseppe Bianchi, Francesco Quaglia:
JITScanner: Just-in-Time Executable Page Check in the Linux Operating System. 78:1-78:8 - Francesco Mercaldo, Giovanni Ciaramella, Antonella Santone, Fabio Martinelli:
Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning. 79:1-79:10 - Luigi Coppolino, Roberto Nardone, Alfredo Petruolo, Luigi Romano, Andrej Souvent:
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids. 80:1-80:10 - Stefano Bistarelli, Michele Ceccarelli, Chiara Luchini, Ivan Mercanti, Francesco Santini:
A Survey of Steganography Tools at Layers 2-4 and HTTP. 81:1-81:9 - Gianpietro Castiglione, Giampaolo Bella, Daniele Francesco Santamaria:
Towards Grammatical Tagging for the Legal Language of Cybersecurity. 82:1-82:9
GRASEC
- Lionel Tailhardat, Raphaël Troncy, Yoan Chabot:
Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems. 83:1-83:9 - Mohamed-Lamine Messai, Hamida Seba:
IoT Network Attack Detection: Leveraging Graph Learning for Enhanced Security. 84:1-84:7 - Noriaki Kamiyama, Takuto Kudo:
Investigating Impact of Fake-Type Content Poisoning Attack on NDN. 85:1-85:10 - Andrea Saracino, Marco Simoni:
Graph-Based Android Malware Detection and Categorization through BERT Transformer. 86:1-86:7
IoT-SECFOR
- Malte Küppers, Marko Schuba, Georg Neugebauer, Tim Hoener, Sacha Hack:
Security Analysis of the KNX Smart Building Protocol. 87:1-87:7 - Philipp Schubaur, Peter Knauer, Dominik Merli:
FISMOS - An FPGA Implementation of a Security Module as Open Source. 88:1-88:8 - Narasimha Raghavan Veeraragavan, Jan Franz Nygård:
Securing Federated GANs: Enabling Synthetic Data Generation for Health Registry Consortiums. 89:1-89:9 - Michael Eckel, Tanja Gutsche, Hagen Lauer, Andre Rein:
A Generic IoT Quantum-Safe Watchdog Timer Protocol. 90:1-90:10
IWAPS
- Daniela Pöhn, Niklas Mörsdorf, Wolfgang Hommel:
Needle in the Haystack: Analyzing the Right of Access According to GDPR Article 15 Five Years after the Implementation. 91:1-91:10 - George Petihakis, Dimitrios Kiritsis, Aristeidis Farao, Panagiotis Bountakas, Aggeliki Panou, Christos Xenakis:
A Bring Your Own Device security awareness survey among professionals. 92:1-92:10 - Sakshyam Panda, Emmanouil Panaousis, George Loukas, Konstantinos Kentrotis:
Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles. 93:1-93:9 - Michail Bampatsikos, Ilias Politis, Vaios Bolgouras, Christos Xenakis:
Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT. 94:1-94:8 - Vaios Bolgouras, Kostantinos Papadamou, Ioana Stroinea, Michail Papadakis, George Gugulea, Michael Sirivianos, Christos Xenakis:
Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era. 95:1-95:8 - Alexandru Vulpe, Cosmin Dobrin, Apostol Stefan, Alexandru Caranica:
AI/ML-based real-time classification of Software Defined Networking traffic. 96:1-96:7 - Federica Paci, Jacopo Pizzoli, Nicola Zannone:
A Comprehensive Study on Third-Party User Tracking in Mobile Applications. 97:1-97:8 - Konstantinos Loupos, Harris Niavis, Fotis Michalopoulos, George Misiakoulis, Antonio F. Skarmeta, Jesús Garcia, Angel Palomares, Hui Song, Rustem Dautov, Francesca Giampaolo, Rosella Mancilla, Francesca Costantino, Dimitri Van Landuyt, Sam Michiels, Stefan More, Christos Xenakis, Michail Bampatsikos, Ilias Politis, Konstantinos Krilakis, Sokratis Vavilis:
An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management. 98:1-98:6 - Meriem Benyahya, Teri Lenard, Anastasija Collen, Niels Alexander Nijdam:
A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles. 99:1-99:10 - Vasileios Pantelakis, Panagiotis Bountakas, Aristeidis Farao, Christos Xenakis:
Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic. 100:1-100:8 - Pantelitsa Leonidou, Nikos Salamanos, Aristeidis Farao, Maria Aspri, Michael Sirivianos:
A Qualitative Analysis of Illicit Arms Trafficking on Darknet Marketplaces. 101:1-101:9 - Athanasios Sarlas, Alexandros Kalafatelis, Georgios Alexandridis, Michail-Alexandros Kourtis, Panagiotis Trakadas:
Exploring Federated Learning for Speech-based Parkinson's Disease Detection. 102:1-102:6 - Thodoris Ioannidis, Vaios Bolgouras, Christos Xenakis, Ilias Politis:
Securing the Flow: Security and Privacy Tools for Flow-based Programming. 103:1-103:6 - Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
Parameterizing poisoning attacks in federated learning-based intrusion detection. 104:1-104:8
IWCC
- Alpesh Bhudia, Anna Cartwright, Edward J. Cartwright, Darren Hurley-Smith, Julio C. Hernandez-Castro:
Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. 105:1-105:11 - Dimitrios Georgoulias, Ricardo Yaben, Emmanouil Vasilomanolakis:
Cheaper than you thought? A dive into the darkweb market of cyber-crime products. 106:1-106:10 - Gargi Sarkar, Hardeep Singh, Subodh Kumar, Sandeep K. Shukla:
Tactics, Techniques and Procedures of Cybercrime: A Methodology and Tool for Cybercrime Investigation Process. 107:1-107:10 - Juha Nurmi, Mikko S. Niemelä, Billy Bob Brumley:
Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access. 108:1-108:12
Research Track
- Stefan Schauer, Tamara Hadjina, Melita Damjanovic, Eva María Muñoz Navarro, Juan Jose Hernandez-Montesinos, Javier Hingant Gómez, Lazaros Papadopoulos:
Detecting a Complex Attack Scenario in an Airport: The PRAETORIAN Framework. 109:1-109:7 - Tim H. Stelkens-Kobsch, Hilke Boumann, Florian Piekert, Meilin Schaper, Nils Carstengerdes:
A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures. 110:1-110:10 - Sandra König, Abdelkader Magdy Shaaban, Tamara Hadjina, Klemen Gregorc, Albert Kutej:
Identification and Evaluation of Cyber-Physical Threats on Interdependent Critical Infrastructures. 111:1-111:5 - Lazaros Papadopoulos, Antonios Karteris, Dimitrios Soudris, Eva María Muñoz Navarro, Juan Jose Hernandez-Montesinos, Stéphane Paul, Nicolas Museux, Sandra König, Manuel Egger, Stefan Schauer, Javier Hingant Gómez, Tamara Hadjina:
PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats. 112:1-112:6
SecIndustry
- Marco Lucchese, Francesco Lupia, Massimo Merro, Federica Paci, Nicola Zannone, Angelo Furfaro:
HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems. 113:1-113:10 - Stash Kempinski, Shuaib Ichaarine, Savio Sciancalepore, Emmanuele Zambon:
ICSvertase: A Framework for Purpose-based Design and Classification of ICS Honeypots. 114:1-114:10 - Alexios Karagiozidis, Martin Gergeleit:
A Forensic I/O Recorder for Industrial Control Systems Using PLCs and OPC UA. 115:1-115:9 - Riccardo Cestaro, Mauro Conti, Elonora Mancini, Federico Turrin:
OpenScope-sec: An ADS-B Simulator to Support the Security Research. 116:1-116:6 - Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu:
PLC Logic-Based Cybersecurity Risks Identification for ICS. 117:1-117:10 - Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu, Nelson Nkawa:
Automated ICS template for STRIDE Microsoft Threat Modeling Tool. 118:1-118:7 - Jessica B. Heluany, Vasileios Gkioulos:
Survey on Digital Twins: from concepts to applications. 119:1-119:8 - Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati:
Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AI. 120:1-120:10 - Vittoria Cozza, Mila Dalla Preda, Marco Lucchese, Massimo Merro, Nicola Zannone:
Towards Obfuscation of Programmable Logic Controllers. 121:1-121:10
SECPID
- Aivo Kalu, Burak Can Kus, Peeter Laud, Kin Long Leung, Nikita Snetkov, Jelizaveta Vakarjuk:
CACS: A Cloud Privacy-Preserving Attribute Management System. 122:1-122:9 - Stephan Krenn, Jan Orlicky, Daniel Slamanig, Tomas Trpisovský:
RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving Privacy. 123:1-123:9 - Stefan More:
Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes. 124:1-124:9 - Christoph Döberl, Wolfgang Eibner, Simon Gärtner, Manuela Kos, Florian Kutschera, Sebastian Ramacher:
Quantum-resistant End-to-End Secure Messaging and Email Communication. 125:1-125:8 - Paul James, Stephan Laschet, Sebastian Ramacher, Luca Torresetti:
Key Management Systems for Large-Scale Quantum Key Distribution Networks. 126:1-126:9
SP2I
- Patrik Dobias, Lukas Malina, Petr Ilgner, Petr Dzurenda:
On Efficiency and Usability of Group Signatures on Smartphone and Single-board Platforms. 127:1-127:9 - Mariia Bakhtina, Kin Long Leung, Raimundas Matulevicius, Ahmed Awad, Petr Svenda:
A Decentralised Public Key Infrastructure for X-Road. 128:1-128:8 - Rizwan Patan, Reza M. Parizi:
Securing Data Exchange in the Convergence of Metaverse and IoT Applications. 129:1-129:8 - Lukas Daubner, Adam Povazanec:
Data Loss Prevention Solution for Linux Endpoint Devices. 130:1-130:10 - Lukas Malina, Patrik Dobias, Jan Hajny, Kim-Kwang Raymond Choo:
On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures. 131:1-131:10 - Mari Seeba, Tarmo Oja, Maria Pibilota Murumaa, Václav Stupka:
Security level evaluation with F4SLE. 132:1-132:8
STAM
- Eider Iturbe, Erkuden Rios, Angel Rego, Nerea Toledo:
Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework. 133:1-133:8 - Manh-Dung Nguyen, Anis Bouaziz, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca:
A deep learning anomaly detection framework with explainability and robustness. 134:1-134:7 - Eduard Paul Enoiu, Dragos Truscan, Andrey Sadovykh, Wissam Mallouli:
VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices. 135:1-135:9 - Erkuden Rios, Eider Iturbe, Angel Rego, Nicolas Ferry, Jean-Yves Tigli, Stéphane Lavirotte, Gérald Rocher, Phu Hong Nguyen, Hui Song, Rustem Dautov, Wissam Mallouli, Ana Rosa Cavalli:
The DYNABIC approach to resilience of critical infrastructures. 136:1-136:8 - Mario Barbareschi, Salvatore Barone, Valentina Casola, Salvatore Della Torca, Daniele Lombardi:
Automatic Test Generation to Improve Scrum for Safety Agile Methodology. 137:1-137:6 - Francesco G. Caccavale, Huu Nghia Nguyen, Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli:
HTTP/2 Attacks Generation using 5Greplay. 138:1-138:7
Trustbus
- Gelareh Hasel Mehri, Inez L. Wester, Federica Paci, Nicola Zannone:
Mitigating Privilege Misuse in Access Control through Anomaly Detection. 139:1-139:10 - Agata Kruzikova, Vashek Matyas:
Fingerprint forgery training: Easy to learn, hard to perform. 140:1-140:7 - Emma Lavens, Davy Preuveneers, Wouter Joosen:
Mitigating undesired interactions between liveness detection components in biometric authentication. 141:1-141:8 - Marwan Abbas-Escribano, Hervé Debar:
An Improved Honeypot Model for Attack Detection and Analysis. 142:1-142:10 - Malte Hellmeier, Julia Pampus, Haydar Qarawlus, Falk Howar:
Implementing Data Sovereignty: Requirements & Challenges from Practice. 143:1-143:9 - Marco De Vincenzi, Ilaria Matteucci, Fabio Martinelli, Stefano Sebastio:
Application of Secure Two-Party Computation in a Privacy-Preserving Android App. 144:1-144:7 - Sarwar Sayeed, Nikolaos Pitropakis, William J. Buchanan, Evangelos K. Markakis, Dimitra Papatsaroucha, Ilias Politis:
TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework. 145:1-145:10 - Alperen Aksoy, Dogan Kesdogan:
Effect of Group Based Synchronization on User Anonymity in Mix Networks. 146:1-146:9 - Syh-Yuan Tan, Swee-Huay Heng:
New Identity-Based Identification and Signature Schemes in the Standard Model. 147:1-147:8 - Ralf Gundelach, Dominik Herrmann:
Cookiescanner: An Automated Tool for Detecting and Evaluating GDPR Consent Notices on Websites. 148:1-148:8 - Sascha Löbner, Sebastian Pape, Vanessa Bracamonte:
User Acceptance Criteria for Privacy Preserving Machine Learning Techniques. 149:1-149:8 - Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas:
Bypassing antivirus detection: old-school malware, new tricks. 150:1-150:10 - Henrik Graßhoff, Florian Adamsky, Stefan Schiffner:
Smartphones in a Microwave: Formal and Experimental Feasibility Study on Fingerprinting the Corona-Warn-App. 151:1-151:7
WSDF
- Abdullah Alshaya, Adam Kardorff, Christian Facundus, Ibrahim M. Baggili, Golden G. Richard III:
Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) Controller. 152:1-152:8 - Jannik Neth, Marko Schuba, Karsten Brodkorb, Georg Neugebauer, Tim Hoener, Sacha Hack:
Digital Forensics Triage App for Android. 153:1-153:6 - Jelle Bouma, Hugo Jonker, Vincent van der Meer, Eddy Van Den Aker:
Reconstructing Timelines: From NTFS Timestamps to File Histories. 154:1-154:9 - Cosimo Anglano, Massimo Canonico, Andrea Cepollina, Davide Freggiaro, Alderico Gallo, Marco Guazzone:
Enabling the forensic study of application-level encrypted data in Android via a Frida-based decryption framework. 155:1-155:10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.