Accepted Paper ARES Workshops
BASS
Modeling of Personalized Privacy Disclosure Behavior: A Formal Method Approach
A K M Nuhil Mehdy and, Hoda Mehrpouyan (Boise State University, USA)
Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments
Andraž Krašovec (European Comission, Joint Research Centre (JRC), Italy, and University of Ljubljana, Faculty of Computer and Information Science, Slovenia), Gianmarco Baldini (European Comission, Joint Research Centre (JRC), Italy), Veljko Pejović (University of Ljubljana, Faculty of Computer and Information Science, Slovenia)
A Medium-Interaction Emulation and Monitoring System for Operational Technology
Stefano Bistarelli, Emanuele Bosimini, Francesco Santini (University of Perugia, Italy)
A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection
Stefano Petrocchi (Department of Information Engineering, University of Pisa, Pisa, Italy), Giacomo Giorgi (Institute for Informatics and Telematics, National Research Council of Italy, Italy), Mario G. C. A. Cimino (Department of Information Engineering, University of Pisa, Italy)
Continuous User Authentication for Human-Robot Collaboration
Shurook S. Almohamade, John A. Clark, James Law (The university of Sheffield, UK)
CSA
AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm”
Pantaleone Nespoli, Félix Gómez Mármol (Department of Information and Communication Engineering, University of Murcia, Spain), Georgios Kambourakis (European Commission, Joint Research Centre (JRC), Italy)
Madrid Quantum Networks: A first step to quantum internet
Marta Irene García Cid (Indra, Spain), Laura Ortíz Martín, Vicente Martin Ayuso (UPM, Spain)
Understanding the Ethical and Regulatory boundaries of the Military Actuation on the Cyberspace.
Pedro Ramón y Cajal Ramo (Indra, Universidad Rey Juan Carlos, Spain), Jorge Maestre Vidal (Indra, Spain)
Message-of-the-Day (MOTD) Banner Language Variations as an Adaptive Honeypot Deterrent of Unauthorized Access
Samuel Jevitz, Filipo Sharevski (DePaul University, USA)
Adaptive Mitigation of Tactical Denial of Sustainability
Marco Antonio Sotelo Monge, Jorge Maestre Vidal and Roumen Daton Medenou Choumanof (Indra, Spain)
The Stress as Adversarial Factor for Cyber Decision Making
David Sandoval Rodríguez-Bermejo (Tarlogic, Universidad Carlos III de Madrid, Spain), Jorge Maestre Vidal (Indra, Spain), Juan Manuel Estévez Tapiador (Universidad Carlos III de Madrid, Spain)
CUING
Discovery of Single-Vendor Marketplace Operators in the Tor-Network
Fabian Brenner, Florian Platzer, Martin Steinebach (Fraunhofer SIT, Germany)
A Revised Taxonomy of Steganography Embedding Patterns
Steffen Wendzel (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany), Luca Caviglione (National Research Council of Italy, Italy), Wojciech Mazurczyk (FernUniversität in Hagen, Germany / Warsaw University of Technology, Poland), Aleksandra Mileva (University Goce Delcev, North Macedonia), Jana Dittmann, Christian Krätzer, Kevin Lamshöft (University of Magdeburg, Germany), Claus Vielhauer (TH Brandenburg, Germany / University of Magdeburg, Germany), Laura Hartmann (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany), Jörg Keller (FernUniversität in Hagen, Germany), Tom Neubert (TH Brandenburg, Germany / University of Magdeburg, Germany)
Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels
Yulduz Khodjaeva, Dr. Nur Zincir-Heywood (Dalhousie University, Faculty of Computer Science, Canada)
Risks and Opportunities for Information Hiding in DICOM Standard
Aleksandra Mileva (Faculty of Computer Science, University Goce Delcev, N. Macedonia), Luca Caviglion (National Research Council of Italy, Genova, Italy), Aleksandar Velinov (Faculty of Computer Science, University Goce Delcev, N. Macedonia), Steffen Wendzel (Worms University of Applied Sciences, Worms, and FernUniversität in Hagen, Germany), Vesna Dimitrova (Faculty of Computer Science and Engineering, Ss Cyril and Methodius University Skopje, Macedonia)
bccstego: A Framework for Investigating Network Covert Channels
Matteo Repetto, Luca Caviglione, Marco Zuppelli (National Research Council of Italy, Italy)
Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels
Tobias Schmidbauer (FernUniversität in Hagen, Germany), Steffen Wendzel (Worms University of Applied Sciences, Germany)
Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels
Piotr Nowakowski, Piotr Żórawski, Krzysztof Cabaj, Wojciech Mazurczyk (Warsaw University of Technology, Poland)
DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning
David Megias (Universitat Oberta de Catalunya, Spain), Minoru Kuribayashi (Okayama University, Japan), Andrea Rosales (Universitat Oberta de Catalunya, Spain), Wojciech Mazurczyk (Warsaw University of Technology, Poland)
Data Hiding Using Code Obfuscation
Pawel Rajba (University of Wroclaw, Poland), Wojciech Mazurczyk (Warsaw University of Technology, Poland)
Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks
Tom Neubert (Brandenburg University of Applied Sciences and University of Magdeburg, Germany), Christian Kraetzer (University of Magdeburg, Germany), Claus Vielhauer (Brandenburg University of Applied Sciences, Germany)
A Systematic Analysis of Covert Channels in the Network Time Protocol
Jonas Hielscher, Kevin Lamshoeft, Christian Kraetzer (Multimedia and Security Group, Otto-von-Guericke University Magdeburg, Jana Dittmann (Multimedia and Security Group, Otto-von-Guericke University Magdeburg)
Network Intrusion Detection in the Wild – the Orange use case
in theSIMARGL project
Mikolaj Komisarek (UTP University of Science and Technology, Poland), Marek Pawlicki (Uniwersytet Technologiczno-Przyrodniczy, Poland), Mikolaj Kowalski, Adrian Marzecki (Orange Polska, Poland), Rafal Kozik (Institute of Telecommunications, UTP Bydgoszcz, Poland), Michal Choras (ITTI Ltd., Poland)
exHide: Hiding Data within the exFAT File System
Julian Heeger, York Yannikos, Martin Steinebach (Fraunhofer SIT, Germany)
Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures
Alexander Hartl, Joachim Fabini (TU Wien, Austria), Christoph Roschger (Technologisches Gewerbemuseum, Austria), Peter Eder-Neuhauser, Marco Petrovic, Roman Tobler (Wiener Netze GmbH, Austria), Tanja Zseby (TU Wien, Austria)
CYBER-TIM
Evaluating the Data Inconsistency of Open-Source Vulnerability Repositories
Yuning Jiang, Manfred Jeusfeld, Jianguo Ding (University of Skövde, Sweden)
From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Threat Intelligence Sharing Platforms
Clemens Sauerwein (University of Innsbruck, Austria), Daniel Fischer, Milena Rubsamen, Guido Rosenberger, Dirk Stelzer (Technische Universität Ilmenau, Germany), Ruth Breu (University of Innsbruck, Austria)
Control Effectiveness: a Capture-the-Flag Study
Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith (Cybersecurity Centre, Department of Computer Science, University of Oxford, United Kingdom) Sadie Creese (University of Oxford, United Kingdom)
Towards Improving Identity and Access Management with the IdMSecMan Process Framework
Daniela Pöhn, Sebastian Seeber (Universität der Bundeswehr München, Research Institute CODE, Germany), Tanja Hanauer (Cancom GmbH, Germany), Jule Ziegler, David Schmitz (Leibniz Supercomputing Centre, Germany)
Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence
Yazid Merah, Tayeb Kenaza (Ecole Militaire Polytechnique, Algeria)
FARES
Reliable Data Transmission using Low Power Wide Area Networks (LPWAN) for Agricultural Applications
Franz Kuntke, Marcel Sinn, Christian Reuter (Science and Technology for Peace and Security (PEASEC), Technical University of Darmstadt, Germany)
Fighting organized crime by automatically detecting money laundering-related financial transactions
Andrea Tundis, Soujanya Nemalikanti, Max Mühlhäuser, (Technische Universität Darmstadt, Germany)
PUF-based Smart Tags for Supply Chain Management
Alberto Falcone, Carmelo Felicetti, Alfredo Garro, Alfredo Garro, Antonino Rullo, Domenico Sacci (University of Calabria, Italy)
An exploratory analysis on the impact of Shodan scanning tool on the network attacks
Andrea Tundis, Eric Marc Modo Nga, Max Mühlhäuser (Technische Universität Darmstadt, Germany)
Single-Use Delegatable Signatures Based on Smart Contracts
Stephan Krenn and Thomas Lorünser (AIT Austrian Institute of Technology, Austria)
Strong Anonymity is not Enough: Introducing Fault Tolerance to Planet-Scale Anonymous Communication Systems
Lennart Oldenburg (imec-COSIC KU Leuven, Belgium), Florian Tschorsch (Distributed Security Infrastructures, Technische Universität Berlin, Germany)
Obstacles and Challenges in Transforming Applications for Distributed Data Ledger Integration
Martin Pirker and Ernst Piller (Institute of IT Security Research, St.Pölten University of Applied Sciences, Austria)
A Hybrid CNN-LSTM Based Approach for Anomaly DetectionSystems in SDNs
Mahmoud Said Elsayed, NhienAn LEKHAC , Hamed Z. Jahromi, Anca Delia Jurcut (University College Dublin, Ireland)
Irish Attitudes Toward COVID Tracker App & Privacy: Sentiment Analysis on Twitter and Survey Data
Pintu Lohar, Guodong Xie (ADAPT centre, Dublin City University, Ireland), Malika Bendechache (ADAPT/Lero centre, School of Computing, Dublin City University, Ireland), Rob Brennan (ADAPT centre, School of Computing, Dublin City University, Ireland), Edoardo Celeste (ADAPT centre, School of Law, Dublin City University, Ireland), Ramona Trestian (Middlesex University London, UK) and Irina Tal (Lero centre, School of Computing, Dublin City University, Ireland)
IOT-SECFOR
A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol.
Qi Liu, Hubert B. Keller, Veit Hagenmeyer (Karlsruhe Institute of Technology, Germany)
Two Truths and a Lie: Exploring Soft Moderation of COVID-19 Misinformation with Amazon Alexa
Donald Gover, Filipo Sharevski (DePaul University, USA)
DoS Attacks in Available MQTT Implementations
Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections
Umberto Morelli (Fondazione Bruno Kessler, Italy), Ivan Vaccari (Consiglio Nazionale delle Ricerche, Italy), Silvio Ranise (Università degli Studi di Trento and Fondazione Bruno Kessler, Italy), Enrico Cambiaso (Consiglio Nazionale delle Ricerche, Italy)
Bloom Filter based Collective Remote Attestation for Dynamic Networks
Salvatore Frontera, Riccardo Lazzeretti (Sapienza University of Rome, Italy)
IPAT
Privacy in Times of COVID-19: A Pilot Study in the Republic of Ireland
Guodong Xie, Pintu Lohar (ADAPT centre, Dublin City University, Ireland ), Claudia Florea (Dublin City University, Ireland), Malika Bendechache (ADAPT/Lero centre, School of Computing, Dublin City University, Ireland), Ramona Trestian (Middlesex University London, UK), Rob Brennan (ADAPT centre, School of Computing, Dublin City University, Ireland), Regina Connolly(ADAPT/Lero centre, School of Business, Dublin City University, Ireland) and Irina Tal (Lero centre, School of Computing, Dublin City University, Ireland)
Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystems
Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos (University of Murcia, Spain)
IWAPS
Towards Secure Evaluation of Online Functionalities
Andreas Klinger, Ulrike Meyer (RWTH Aachen University, Germany)
A Holistic Approach to Enhanced Security and Privacy in Digital Health Passports
Tore Frederiksen (The Alexandra Institute, Denmark)
Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks
Aidmar Wainakh, Aleksej Strassheim, Tim Grube (Telecooperation Lab, Technical University of Darmstadt, Germany), Jörg Daubert (Mathematics and Computer Science, Philipps-Universität Marburg, Germany), Max Mühlhäuser (Telecooperation Lab, Technical University of Darmstadt, Germany)
A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection
Panagiotis Bountakas, Konstantinos Koutroumpouchos, Christos Xenakis (SSL, University of Piraeus, Greece)
Towards a standardized model for privacy-preserving Verifiable Credentials
Jesús García-Rodríguez, Rafael Torres Moreno, Jorge Bernal Bernabé, Antonio Skarmeta (University of Murcia, Spain)
ABEBox: A data driven access control for securing public cloud storage with efficient key revocation
Emanuele Raso, Lorenzo Bracciale, Pierpaolo Loreti, Giuseppe Bianchi (University of Rome Tor Vergata, Italy)
Towards Secure Evaluation of Online Functionalities
Andreas Klinger and Ulrike Meyer (RWTH Aachen University, Germany)
Solving the cold start problem in Trust Management in IoT
Michail Bampatsikos (National Centre for Scientific Research “Demokritos”, Institute of Informatics & Telecommunications, Greece), Ilias Politis (InQbit Innovations SRL, Romania), Christos Xenakis (SSL, University of Piraeus, Greece), Stelios, C. A. Thomopoulos (National Centre for Scientific Research Demokritos, Institute of Informatics & Telecommunications, Greece)
A web tool for analysing FIDO2/WebAuthn Requests and Responses
Athanasios Vasileios Grammatopoulos (SSL, University of Piraeus, Greece), Ilias Politis (InQbit Innovations SRL, Romania), Christos Xenakis (SSL, University of Piraeus, Greece)
Determining the Robustness of Privacy Enhancing DeID Against the ReID Adversary: An Experimental Study
Ankur Chattopadhyay, Robert Ruska (Northern Kentucky University, USA), Levi Pfantz (University of Wisconsin, United States of America)
Approaching the Data Protection Impact Assessment as a legal methodology to evaluate the degree of privacy by design achieved in technological proposals. A special reference to Identity Management systems
Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos (University of Murcia, Spain)
Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark – Usefulness, Barriers, and Recommendations
Mads Schaarup Andersen (Alexandria Instituttet A/S, Denmark)
IWCC
Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs
Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer (RWTH Aachen University, Germany)
A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis
Salatiel Ezennaya-Gomez, Stefan Kiltz, Christian Kraetzer, Jana Dittmann (Otto-von-Guericke University Magdeburg, Germany)
Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection
Bram van Dooremaal, Pavlo Burda, Luca Allodi and Nicola Zannone (Eindhoven University of Technology, Netherlands)
Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic
Pascal Wichmann, Matthias Marx, Hannes Federrath (Universität Hamburg, Security in Distributed Systems, Germany), Mathias Fischer (Universität Hamburg, IT-Security and Security Management, Germany)
Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG)
Cassius Puodzius, Olivier Zendra (INRIA, France), Annelie Heuser (IRISA, France), Lamine Noureddine (INRIA, France)
RansomClave: Ransomware Key Management using SGX
Alpesh Bhudia, Daniel O’Keeffe, Daniele Sgandurra, Darren Hurley-Smith (Royal Holloway, University of London, Information Security Group, United Kingdom)
IWSECC
Managing Anonymous Keys in a Fog-Computing Platform
Raphael Schermann and Ronald Toegl (Infineon Technologies Austria AG, Austria)
Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms
Marcos A. O. Cavalcanti, Pedro R. M. Inácio, Mário M. Freire (Instituto de Telecomunicações and Universidade da Beira Interior, Portugal)
A Threat Model Analysis of a Mobile Agent-based system on Raspberry Pi
Ivan Garcia, Antonio Munoz (University of Malaga, Spain)
IWSMA
Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs
Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi and Sihem Guemara El Fatmi (Digital Security Research Laboratory, Higher School of Communication of Tunis (SUP’COM), University of Carthage, Tunisia)
Formal Validation of a Security Mechanism against the RSU Compromise Attack
Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss and Sihem Guemara El Fatmi (Digital Security Research Laboratory, Higher School of Communication of Tunis (SUP’COM), University of Carthage, Tunisia)
An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case
Christian Wolschke (Fraunhofer IESE Kaiserslautern, Germany), Stefan Marksteiner (AVL List GmbH Graz, Austria), Tobias Braun (Fraunhofer IESE Kaiserslautern, Germany), Markus Wolf (AVL List GmbH Graz, Austria)
SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications
Rosangela Casolare (University of Molise, Pesche (IS) – Italy), Giovanni Ciaramella (IIT-CNR & University of Molise, Pisa – Italy), Fabio Martinelli (IIT-CNR, Pisa – Italy), Francesco Mercaldo (University of Molise & IIT-CNR, Campobasso – Italy), Antonella Santone (University of Molise, Campobasso – Italy)
Multi-View Learning for Repackaged Malware Detection
Shirish Singh (Columbia University, USA), Kushagra Chaturvedy (The LNMIIT, India), Bharavi Mishra (The LNMIIT, India)
IWSMR
Chaotic Pseudo Random Number Generators: A Case Study on Replication Study Challenges
Jörg Keller (FernUniversität in Hagen, Germany)
Practitioners’ Views on Cybersecurity Control Adoption and Effectiveness
Louise Axon, Arnau Erola, Alastair Janse van Rensburg (University of Oxford, UK), Jason R. C. Nurse (University of Kent, UK), Michael Goldsmith, Sadie Creese (University of Oxford, UK)
Best Practices for Notification Studies for Security and Privacy Issues on the Internet
Max Maass (Technical University Darmstadt, Germany), Henning Pridöhl, Dominik Herrmann (Otto-Friedrich-Universität Bamberg, Germany), Matthias Hollick (Technical University Darmstadt, Germany)
Log Abstraction for Information Security: Heuristics and Reproducibility
Rafael Copstein (Dalhousie University, Canada), Jeff Schwartzentruber (2Keys, Canada), Nur Zincir-Heywood, Malcolm I. Heywood (Dalhousie University, Canada)
pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert Channels
Marco Zuppelli, Luca Caviglione (National Research Council of Italy, Italy)
Crème de la Crème: Lessons from Papers in Top Publications
Simon Vrhovec (University of Maribor, Slovenia), Luca Caviglione (National Research Council of Italy, Italy), Steffen Wendzel (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany)
LPW
A clustering approach to anonymize locations during dataset de-identification
Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens (imec-DistriNet, Belgium)
Template Protected Authentication based on Location History and b-Bit MinHash
Masakazu Fujio, Kenta Takahashi, Yosuke Kaga, Wataru Nakamura, Yoshiko Yasumura (Research and Development Group, Hitachi, Ltd., Japan) Rie Shigetomi Yamaguchi (Social ICT Research Center, University of Tokyo, Tokyo, Japan)
Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets
Antoine Boutet (Univ Lyon, INSA Lyon, Inria, CITI, France), Sonia Ben Mokhtar (Univ Lyon, INSA Lyon, LIRIS, France )
SEC-HEALTH
DeCanSec: A Decentralized Architecture for Secure Statistical Computations on Distributed Health Registry Data
Narasimha Raghavan Veeraragavan, Jan Franz Nygård (Department of Registry Informatics, Cancer Registry of Norway, Norway)
Towards Interoperable Vaccination Certificate Services
Andreea Ancuta Corici (Fraunhofer FOKUS Berlin, Germany), Tina Hühnlein and Detlef Hühnlein (ecsec GmbH Michelau, Germany), Olaf Rode (Fraunhofer FOKUS Berlin, Germany)
The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations
Kitty Kioskli (University of Brighton, School of Computing, Engineering & Mathematics, Centre for Secure, Intelligent and Usable Systems (CSIUS), United Kingdom & Gruppo Maggioli, Research and Development Lab, Greece), Theo Fotis (University of Brighton, School of Health Sciences, Centre for Secure, Intelligent and Usable Systems (CSIUS), United Kingdom), Haralambos Mouratidis (University of Brighton, School of Computing, Engineering & Mathematics, Centre for Secure, Intelligent and Usable Systems (CSIUS), United Kingdom)
Userspace Software Integrity Measurement
Michael Eckel and Tim Riemann (Fraunhofer SIT, Germany)
Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia
Muhammad Ali Fauzi, Prosper Yeng, Bian Yang (Norwegian University of Science and Technology, Norway), Dita Rachmayani (Universitas Brawijaya, Indonesia)
SSE
Software Development Processes for ADs, SMCs and OSCssupporting Usability, Security, and Privacy Goals – an Overview
Tim Bender, Rolf Huesmann, Prof. Dr. Andreas Heinemann (Hochschule Darmstadt, Germany)
Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity Challenges
Tiago Espinha Gasiba (Siemens AG Munich, Germany), Iosif Andrei-Cristian (Technische Universität München, Siemens AG Munich, Germany), Ulrike Lechner (Universität der Bundeswehr München Neubiberg, Germany), Maria Pinto-Albuquerque (Instituto Universitário de Lisboa (ISCTE-IUL), ISTAR Lisboa, Portugal)
A Serious Game Design Framework for Software Developers to Put GDPR into practice
Abdulrahman Alhazmi (The Department of Computer Science and IT, School of Engineering and Mathematical Sciences at La Trobe University, Australia), Nalin Asanka Gamagedara Arachchilage (The School of Computer Science, The University of Auckland, New Zealand and The Department of Computer Science and IT, School of Engineering and Mathematical Sciences, La Trobe University, Australia)
WSDF
Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts
Tyler Balon, Krikor Herlopian, Ibrahim Baggili, Cinthya Grajeda-Mendez (University of New Haven, United States)
What should we pay attention to when classifying violent videos?
Marcos Teixeira, Institute of Computing and Sandra Avila (Institute of Computing, University of Campinas, Brazil)
Risk-Oriented Design Approach For Forensic-Ready Software Systems
Lukas Daubner (Faculty of Informatics, Masaryk University, Czech Republic), Raimundas Matulevičius (University of Tartu, Estonia)
User action representation and automated reasoning for the forensic analysis of mobile devices
Cosimo Anglano, Massimo Canonico, Laura Giordano, Marco Guazzone and Daniele Theseider Dupré (DISIT, Università del Piemonte Orientale, Italy)
POSNoise: An Effective Countermeasure Against Topic Biases in Authorship Analysis
Oren Halvani, Lukas Graner (Fraunhofer Institute for Secure Information Technology SIT, Germany)
Time for Truth: Forensic Analysis of NTFS Timestamps
Michael Galhuber (St. Pölten University of Applied Sciences, Austria), Robert Luh (University of Vienna, Austria & St. Pölten University of Applied Sciences, Austria)
JPEG File Fragmentation Point Detection using Huffman Code and Quantization Array Validation
Vincent van der Meer (Zuyd University of Applied Sciences, The Netherlands), Jeroen van den Bos (Netherlands Forensic Institute, The Netherlands)
Forensicast: A Nonintrusive Approach \& Tool For Logical Forensic Acquisition \& Analysis of The Google Chromecast TV
Alex Sitterer, Nicholas Dubois, Ibrahim Baggili (Connecticut Institute of Technology, University of New Haven, USA)
Accepted Paper ARES EU SYMPOSIUM WORKSHOPS
ENS
5Greplay: a 5G Network Traffic Fuzzer – Application to Attack Injection
Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes De Oca (Montimage, France)
Nori: Concealing the Concealed Identifier in 5G
John Preuß Mattsson, Prajwol Kumar Nakarmi (Ericsson Research, Sweden)
SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks
Charilaos C. Zarakovitis (National Center for Scientific Research “Demokritos”, Greece),
Dimitris Klonidis (Ubitech Limited, Cyprus), Zujany Salazar (Montimage, France), Anna Prudnikova, (Secura BV, Netherlands), Arash Bozorgchenani (University of Lancaster, United Kingdom), Qiang Ni (University of Lancaster, United Kingdom), Charalambos Klitis, George Guirgis, (EBOS, Cyprus), Ana R. CAVALLI ( Montimage, France), Nicholas Sgouros (Eight Bells LTD, Cyprus), Eftychia Makri, Antonios Lalas (Centre for Research and Technology Hellas CERTH, Greece), Konstantinos Votis (Ethniko Kentro Erevnas Kai Technologikis, Greece), George Amponis (K3Y, Bulgaria), Wissam Mallouli (Montimage EURL, France)
Secure Open Fronthaul Interface for 5G Networks
Joo Yeon Cho (ADVA Optical Networking SE, Martinsried, Germany), Andrew Sergeev (ADVA Optical Networking Israel Ltd. Ra’anana, Israel)
EPESEC
Secure exchange of cyber threat intelligence using TAXII and distributed ledger technologies – application for electrical power and energy system
Maryam Pahlevan (Aalto University, Finland), Artemis Voulkidis, Terpsichori-Helen Velivassaki (Synelixis Solutions SA, Greece)
Integrating Security Behavior into Attack Simulations
Simon Hacks, Ismail Butun, Robert Lagerström (KTH Royal Institute of Technology, Sweden), Andrei Buhaiu (Swedish Defence University), Anna Georgiadou, Ariadni Michalitsi – Psarrou (National Technical University of Athens, Greece)
Pan-European Cybersecurity Incidents Information Sharing Platform to support NIS Directive
Dimitrios, D, Skias (Intrasoft International S.A., Luxembourg), Sofia, Tsekeridou (Intrasoft International S.A., Greece), Theodore Zahariadis (Synelixis Solutions S.A., Greece), Artemis Voulkidis (Synelixis Solutions S.A., Greece), Terpsichori-Helen, Velivassaki (Synelixis Solutions S.A., Greece), Konstantina Fotiadou (Synelixis Solutions S.A., Greece)
Unsupervised Ethical Equity Evaluation of Adversarial Federated Networks
Ilias Siniosoglou (University of Western Macedonia, Greece), Vasileios Argyriou (Kingston University, United Kingdom), Stamatia Bibi (University of Western Macedonia, Greece), Thomas Lagkas (International Hellenic University), Panagiotis Sarigiannidis (University of Western Macedonia, Greece)
ETACS
SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security Laboratories
Joachim Fabini, Alexander Hartl, Fares Meghdouri, Claudia Breitenfellner, Tanja Zseby (Institute of Telecommunications, TU Wien, Austria)
Building Open Source Cyber Range To Teach Cyber Security
Tomáš Lieskovan, Jan Hajný (Ústav telekomunikací, Fakulta elektrotechniky a komunikačních technologií, Czech Republic)
PESTLE Analysis of Cybersecurity Education
Sara Ricci, Vladimir Janout (Brno University of Technology, Czech Republic), Simon Parker (Deutsches Krebsforschungszentrum, Germany), Jan Jerabek, Jan Hajny (Brno University of Technology, Czech Republic), Argyro Chatzopoulou (APIROPLUS Solutions Ltd., Cyprus), Remi Badonnel (University of Lorraine, France)
The Matter of Cybersecurity Expert Workforce Scarcity in the Czech Republic and Its Alleviation Through the Proposed Qualifications Framework
Jakub Drmola (Department of Political Science, Faculty of Social Studies, Masaryk University, Czech Republic), František Kasl, Pavel Loutocký (Postdoc researcher, CERIT, Faculty of Informatics and Institute of Law and Technology, Faculty of Law, Masaryk University, Czech Republic), Miroslav Mareš (Professor, Department of Political Science, Faculty of Social Studies, Masaryk University, Czech Republic), Tomáš Pitner (Associate professor, CERIT and Department of Computer Systems and Communications, Faculty of Informatics, Masaryk University, Czech Republic), Jakub Vostoupal (Researcher, CERIT, Faculty of Informatics and Institute of Law and Technology, Faculty of Law, Masaryk University, Czech Republic)
Nautilus: A Tool For Automated Deployment And Sharing Of Cyber Range Scenarios
Giorgio Bernardinetti (CNIT/University of Rome “Tor Vergata”, Italy), Stefano Iafrate (CNIT, Italy), Giuseppe Bianchi (CNIT/University of Rome “Tor Vergata”, Italy)
Do Security Reports Meet Usability? – Lessons Learned from Using Actionable Mitigations for Patching TLS Misconfigurations
Salvatore Manfredi (Security & Trust, Fondazione Bruno Kessler, Trento, Italy & DIBRIS, University of Genoa, Genova, Italy), Mariano Ceccato (University of Verona, Verona, Italy), Giada Sciarretta (Security & Trust, Fondazione Bruno Kessler, Trento, Italy), Silvio Ranise (Security & Trust, Fondazione Bruno Kessler, Trento, Italy) & Department of Mathematics, University of Trento, Trento, Italy)
Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training
Maxime PUYS and Pierre-Henri THEVENON (Univ. Grenoble Alpes, CEA, LETI, DSYS, F-38000 Grenoble, France), Stéphane MOCANU (Univ. Grenoble Alpes, CNRS, Inria, Grenoble-INP, Grenoble, France)
Cybersecurity Curricula Designer
Jan Hajny, Sara Ricci (Brno University of Technology, Czech Republic), Edmundas Piesarskas (L3CE: Lithuanian Cybercrime Center of Excellence for Training, Research and Education, Lithuania), Marek Sikora (Brno University of Technology, Czech Republic)
MI-LXC: A Small-Scale Internet-Like Environment for Network Security Teaching
Francois Lesueur (INSA Lyon, CITI, Laboratoire Cogitamus, France), Camille Noûs (Laboratoire Cogitamus, France)
NG-SOC
System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling
Martin Husák, Martin Laštovička, Daniel Tovarňák (Masaryk University, Czech Republic)
On the Evaluation of Sequential Machine Learning for Network Intrusion Detection
Andrea Corsini (University of Modena and Reggio Emilia, Italy), Shanchieh Jay Yang (Rochester Institute of Technology, USA), Giovanni Apruzzese (University of Liechtenstein, Liechtenstein)
A Recommender System for Tracking Vulnerabilities
Philip Huff, Kylie McClanahan (University of Arkansas, USA), Thao Le (Bastazo, Inc., USA) and Qinghua Li (University of Arkansas, USA)
SEC-RS
An Indicators-of-Risk Library for Industrial Network Security
Carolina Adaros-Boye, Paul Kearney and Mark Josephs (Birmingham City University, United Kingdom), Hans Ulmer (Bosch, Germany)
Information Security Assessment and Certification within Supply Chains
Henrique Santos, André Oliveria, Lúcia Soares, Alan Satis, Alexandre Santos (ALGORITMI R&D Centre, University of Minho, Portugal)
SME-SP
Classifying SMEs for Approaching Cybersecurity Competence and Awareness
Alireza Shojaifar (FHNW, IIT, Switzerland AND Utrecht University, Dept. of Information and Computing Sciences, Netherlands) and Heini Järvinen (Tech.eu, Belgium)
A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME Needs
Max van Haastrecht (Utrecht University, The Netherlands), Injy Sarhan (Utrecht University, The Netherlands and Arab Academy for Science, Technology and Maritime Transport (AASTMT), Egypt), Alireza Shojaifar and Louis Baumgartner (Fachhochschule Nordwestschweiz (FHNW), Switzerland), Wissam Mallouli (Montimage, France), Marco Spruit (Leiden University Medical Centre (LUMC), The Netherlands & Leiden University, The Netherlands & Utrecht University, The Netherlands)
Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small Enterprises
Bernd Remmele, Jessica Peichl (University of Education Freiburg, Germany)
On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web
George Pantelis, Petros Petrou, Sophia Karagiorgou, Dimitrios Alexandrou (UBITECH LTD, Greece)
GEIGER: Solution for small businesses to protect themselves against cyber-threats
José Javier de Vicente Mohino (ATOS, Spain), Wissam Mallouli (Montimag, France), José Francisco Ruiz (ATOS, Spain), Max van Haastrecht (University of Utrecht, Netherlands)
SP2I
A Formal Analysis of EnOcean’s Teach-in and Authentication
Katharina Hofer-Schmitz (JOANNEUM RESEARCH Forschungsgesellschaft mbH, DIGITAL – Institute for Information and Communication Technologies Graz, Austria)
Secret Sharing-based Authenticated Key Agreement Protocol
Petr Dzurenda, Sara Ricci, Raúl Casanova-Marqués, Jan Hajny, Petr Cika (Department of Telecommunications, Brno University of Technology, Czech Republic)
Privacy-Preserving Online Parking Based on Smart Contracts
Petr Dzurenda ( Department of Telecommunications, Brno University of Technology, Czech Republic), Carles Anglès-Tafalla (Departament d’Enginyeria Informàtica i Matemàtiques, Universitat Rovira i Virgili, Spain), Sara Ricci, Lukas Malina (Department of Telecommunications, Brno University of Technology, Czech Republic)
A Machine Learning Driven Threat Intelligence System for Malicious URL Detection
Rupa Chiramdasu (VR Siddhartha Engineering College, India), Gautam Srivastava (Brandon University, Canada), Sweta Bhattacharya (VIT, India), Praveen Kumar Reddy (VIT, India), Thippa Reddy Gadekallu (VIT, India)
Information Security Analysis in the Passenger-Autonomous Vehicle Interaction
Mariia Bakhtina, Raimundas Matulevičius (University of Tartu, Estonia)
Location Security under Reference Signals’ Spoofing Attacks: Threat Model and Bounds
Stefania Bartoletti (National Research Council of Italy, IEIIT-CNR / CNIT), Giuseppe Bianchi (Università degli Studi di Roma Tor Vergata /CNIT), Danilo Orlando (Università degli Studi “Niccolò Cusano”), Ivan Palamà, Nicola Blefari-Melazzi (Università degli Studi di Roma Tor Vergata /CNIT)