Session chair:
Francesco Buccafurri, Università degli Studi Mediterranea di Reggio Calabria, Italy
Lecture Hall A
TAKEDOWN
Session chair:
Andrea Tundis, Technical University Darmstadt, Germany
Lecture Hall B
CITE I
Session chair:
Jon Shamah, EEMA, UK
Lecture Hall C
S-CI I
CyberSecurity and Critical Infrastructures
Session chair:
Stefan Katzenbeisser, TU Darmstadt, Germany
Lecture Hall D
Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme
David Bernhard, Oksana Kulyk and Melanie Volkamer
VMAttack: Deobfuscating Virtualization-Based Packed Binaries
Anatoli Kalysch, Johannes Götzfried and Tilo Müller
A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets
Jordi Soria-Comas and Josep Domingo-Ferrer
The TAKEDOWN Project: Main Objectives and Ongoing Activities
Dr.Ing. Andrea Tundis
Challenges of network steganography detection
Prof. Dr. Wojciech Mazurczyk
Protection of safety-relevant Critical Infrastructures: How cyber-crime can influence our everyday life and what we (can) do against it
Dr. Christian Schlehuber
Collaborative Security Monitoring
Prof. Dr. Mathias Fischer
Identity and Trustworthy Ecosystem
Jon Shamah
Introduction to ARIES
Eduardo González
Introduction to LIGHTEST
Heiko Roßnagel
The Aries Ecosystem
Jorge Bernal
The LIGHTest reference architecture
Sven Wagner
Rolling DICE – Lightweight Remote Attestation for COTS IoT Hardware
Lukas Jäger, Richard Petri and Andreas Fuchs
ZONESEC: built-in cyber-security for wide area surveillance system
Aljosa Pasic, Jose-Ramon Martinez-Salio and Susana Gonzalez Zarzosa
Protecting Future Maritime Communication
Karin Bernsmed, Christian Frøystad and Per Håkon Meland
12:30 - 13:30
Lunch
13:30 - 15:00
ARES Full II
Applications
Session chair:
Andrea Tundis, TU Darmstadt, Germany
Session chair:
Apostolos P. Fournaris, University of Patras, Greece
Lecture Hall D
Continuous Biometric Verification for Non-Repudiation of Remote Services
Enrico Schiavone, Andrea Ceccarelli and Andrea Bondavalli
Using Markov Chains to Model Sensor Network Reliability
Tom Arjannikov, Simon Diemert, Sudhakar Ganti, Chloe Lampman and Edward Wiebe
Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures
Arne Bilzhause, Henrich C. Pöhls, and Kai Samelin
The Archistar Secret-Sharing Backup Proxy
Andreas Happe, Florian Wohner, and Thomas Lorünser
Orchestrating Privacy Enhancing Technologies and Services with BPM Tools
Nicolás Notario, Alberto Crespo, Eduardo González Real, Eleonora Ciceri, Ilio Catallo, and Sauro Vicini
Blockchain-based Smart Contracts for Accountable Data Usage Control
Ricardo Neisse
DNS as the Foundation of the LIGHTest Infrastructure
Martin Hoffmann
CREDENTIAL - Towards a Cloud-Based yet Privacy-Friendly Identity Provider
Stephan Krenn
Wrap up and discussion
Known Unknowns in Cybersecurity research and transfer of results to the market
Aljosa Pasic, Technology Transfer Director of ATOS R&I department (ARI)
15:00 - 15:30
Coffee Break
15:30 - 17:00
ARES Full III
Trust
Session chair:
Max Mühlhäuser, TU Darmstadt, Germany
Lecture Hall A
SECPID II
Session Chair:
Kai Samelin, IBM Research - Zurich and TU Darmstadt, Switzerland/Germany
Lecture Hall B
SC-SRA
Session Chair:
Ralf Fiedler, Fraunhofer Center for Maritime Logistics and Services, Hamburg, Germany
Lecture Hall C
S-CI III
Critical Infrastructure Systems CyberSecurity Tools
Session chair:
Stefan Katzenbeisser, TU Darmstadt, Germany
Lecture Hall D
Establishing Mutually Trusted Channels for Remote Sensing Devices Using Trusted Execution Environments
Carlton Shepherd, Raja Naeem Akram and Konstantinos Markantonakis
Enabling Trust Assessement In Clouds-of-Clouds: A Similarity-Based Approach
Reda Yaich, Nora Cuppens and Frédéric Cuppens
Reliable Behavioural Factors in the Information Security Context
Peter Mayer, Alexandra Kunz and Melanie Volkamer
Towards the Adoption of Secure Cloud Identity Services
Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, and Felix Hörandner
Towards a Model of User-centered Privacy Preservation
Paul Grace and Mike Surridge
NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging
Harry Halpin
MITIGATE at a glance
Spyros Papastergiou
Cyber Attack Path Discovery in Maritime Supply Chains
Nikolaos Polatidis
Risk Mitigation Approach - Optimal Mitigation Strategy
Stefan Schauer
R&D on Security issues for maritime critical infrastructures: SAURON project
Rafa Company
Preserving your privacy and managing your personal data with OPERANDO
Achilleas Papageorgiou
MITIGATE System for assessing cyber risks in ports' supply chains
Armend Duzha, MAGGIOLI & Panagiotis Gouvas
Using Ciphers for Failure Recovery in ITS Systems
Mustafa Ayoob, Wael Adi and Vassilis Prevelakis
Towards DDoS Attack Resilient Wide Area Monitoring Systems
Kubilay Demir and Neeraj Suri
Anomaly Detection for Simulated IEC-60870-5-104 Traffic
Ersi Hodo, Stepan Grebeniuk, Henri Ruotsalainen and Paul Tavolato
17:00 - 17:15
Room switch
17:15 - 18:15
ARES Full IV
Cryptography
Session chair:
Roger Hallman, Space & Naval Warfare Systems Center Pacific, USA
Lecture Hall A
SECPID III
Session Chair:
Stephan Krenn AIT Austrian Institute of Technology GmbH, Austria
Lecture Hall B
S-CI IV
Keynote Session
Session chair:
Apostolos P. Fournaris, University of Patras, Greece
Lecture Hall D
Secure Enrollment of Certificates Using Short PINs
Michael Rossberg and Markus Theil
Secure Matrix Multiplication with MapReduce
Xavier Bultel, Radu Ciucanu, Matthieu Giraud and Pascal Lafourcade
Self-healing Multi-Cloud Application Modelling
Erkuden Rios, Maria Carmen Palacios, and Eider Iturbe
Application of the holistic Data Privacy and Security Framework PaaSword
Sebastian Thomas Schork, Antonia Schwichtenberg, Spiros Alexakis, and George Moldovan
Challenges in securing critical infrastructures of the railway domain
Christian Schlehuber, Deutsche Bahn (DB)
19:15 - 21:30
Welcome Reception / Dinner
Meeting point: 18.30 in front of the university
Marta Milo,
University of Sheffield, UK
"Bring Mathematics into Biology: past, present and future impact on Heath"
Lecture Hall C
Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks
Andrea Tundis, Alfredo Garro, Teresa Gallo, Domenico Sacca, Simona Citrigno, Sabrina Graziano and Max Mühlhäuser
Attack Scenario Modeling for Smart Grids Assessment through Simulation
Andrea Tundis, Rolf Egert and Max Mühlhäuser
A Blockchain-based Approach for Data Accountability and Provenance Tracking
Ricardo Neisse, Gary Steri and Igor Nai-Fovino
Keynote: Richard Overill, King’s College London, UK
Title: The Sky: a Neglected Source of Error in Digital Forensic Investigations
Forensic Image Inspection Assisted by Deep Learning
Felix Mayer and Martin Steinebach
Abstract:
Last decade has seen a massive increase of data production in science. Particularly in the biomedical field, data has grown exponentially thanks to the development of technologies like next generation sequencing and high-throughput quantitative assays. The information that this data contains is only partially uncovered to this date, but the impact that it has on human progression and well being is already very clear.
Despite the ability to process large amount of data and to quantify fine details of biological processes, the costs, the time to perform such experiments and mainly the complexity of the systems remain in some cases still very prohibitive. For this reasons the use of mathematics to study complex systems in its entirety, looking at how they interacts, is having a great impact in current biology and healthcare. A variety of statistical, probabilistic and optimization techniques methods, like machine learning techniques, that allows to “learn” from the available data, to detect hidden patterns from large, noisy and complex datasets, is particularly suitable for application in medicine.
In this talk I will present examples of using machine learning techniques for a variety datasets from medical and biological problems and what are the advantages and disadvantages of this approach. I will also give examples when these techniques enabled to discover informative knowledge from a large complex system in the presence of small number of samples. Finally I will discuss how we use Machine Learning today for analysis of single-cell sequencing data and how we can use it for future more complex datasets generated integrating data from different sources.
10:30 - 11:00
Session chair:
Mohamed Shehab, University of North Carolina Charlotte, USA
Lecture Hall A
WSDF II
Session chair:
Richard Overill, King’s College London, UK
Lecture Hall B
IWCC I
Session Chair:
Prof. Wojciech Mazurczyk, Warsaw University of Technology, Poland
Lecture Hall C
CD-MAKE I
MAKE Topology
Session chair:
Massimo Ferri, University of Bologna, Italy
Lecture Hall D
Measuring privacy in high dimensional microdata collections
Spyros Boukoros and Stefan Katzenbeisser
Constrained PET Composition for Measuring Enforced Privacy
Sebastian Funke, Alexander Wiesmaier and Jörg Daubert
A Holistic Approach for Privacy Protection in E-Government
Konstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis, Mattia Salnitri, Paolo Giorgini and José R. Ruiz
On the Usefulness of Compression-Models for Authorship Verification
Oren Halvani, Christian Winter and Lukas Graner
Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT)
Tanveer Zia, Peng Liu and Weili Han
Forensic State Acquisition from Internet of Things (FSIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition
Christopher Meffert, Devon Clark, Ibrahim Baggili and Frank Breitinger
Keynote: Dr. Martin Gilje Jaatun, SINTEF Digital, Norway
Cyber Security in Critical Infrastructure Domains
Type Me the Truth! Detecting Deceitful Users via Keystroke Dynamics
Merylin Monaro, Riccardo Spolaor, Qianqian Li, Mauro Conti, Luciano Gamberini and Giuseppe Sartori
Resource Hints in HTML5: A New Pandora’s Box of Security Nightmares
Natalija Vlajic
On Distance Mapping from non-Euclidean Spaces to Euclidean Space
Yoan Miche, Ian Oliver, Wei Ren, Silke Holtmanns, Kaj-Mikael Björk and Amaury Lendasse
Some Remarks on the Algebraic Properties of Group Invariant Operators in Persistent Homology
Patrizio Frosini and Nicola Quercioli
Decentralized Computation of Homology in Wireless Sensor Networks Using Spanning Trees
Domen Soberl, Primož Škraba and Neža Mramor Kosta
Detecting and Ranking API Usage Pattern in Large Source Code Repository: A LFM based Approach
Jitong Zhao and Yan Liu
Neil D. Lawrence,
University of Sheffield and Amazon, UK
"Cloaking Functions: Differential Privacy with Gaussian Processes"
Lecture Hall A
14:30 - 14:35
Room switch
14:35 - 15:35/16:00
ARES Full VII
Privacy II
Session chair:
Edgar Weippl, SBA Research, Austria
Lecture Hall A
IWSMA
Session chair:
Peter Kieseberg, SBA Research, Austria
Lecture Hall B
IWCC II
Session Chair:
Prof. Wojciech Mazurczyk, Warsaw University of Technology, Poland
Lecture Hall C
CD-MAKE II
MAKE Smart Factory
Session chair:
Sebastian Büttner, Ostwestfalen-Lippe University of Applied Sciences, Germany
Lecture Hall D
Memory carving can finally unveil your embedded personal data
Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine and Christophe Rosenberger
PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices
Saeed Ibrahim Saeed Alqahtani and Shujun Li
The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model
Abeer Aljarrah, Mohamed Shehab
Quantitative Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps
Ayman Youssef, Ahmed F. Shosha
A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols
Orhan Ermis, Serif Bahtiyar, Emin Anarim and Mehmet Ufuk Caglayan
Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
Masoomeh Sepheri and Alberto Trombetta
Towards a Framework for Assistance Systems to Support Work Processes in Smart Factories
Michael Fellmann, Sebastian Robert, Sebastian Büttner, Henrik Mucha and Carsten Röcker
Managing Complexity: Towards Intelligent Error-Handling Assistance Trough Interactive Alarm Flood Reduction
Sebastian Büttner, Paul Wunderlich, Oliver Niggemann and Carsten Röcker
Online Self-disclosure: From Users' Regrets to Instructional Awareness
Nicolás Emilio Díaz Ferreyra, Rene Meis and Maritta Heisel
Predicting Chronic Heart Failure using Diagnoses Graphs
Saurabh Nagrecha, Keith Feldman, Pamela Bilo Thomas and Nitesh V. Chawla
15:35/16:00 - 16:15
Coffee Break
16:15 - 19:30
Excursion Scilla and Chianalea
Meeting point: 16.20 in front of the University
Ares Full VIII
Network Security and Intrusion Detection
Session chair:
Mathias Fischer, Universität Hamburg, Germany
Lecture Hall A
CUING I
Keynote Session
Session chair:
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Lecture Hall B
SSE I
DevSecOps and Cloud Computing
Session Chair:
Lotfi ben Othmane, Iowa State University, USA
Lecture Hall C
FARES I
Critical Infrastuctures and Cyber2Physical
Session chair:
Domenico Saccà, University of Calabria, Italy
Lecture Hall D
CD-MAKE III
MAKE Privacy
Session chair:
Peter Kieseberg, SBA Research, Austria
Lecture Hall E
Lightweight Address Hopping for Defending the IPv6 IoT
Aljosha Judmayer, Johanna Ullrich, Georg Merzdovnik, Artemios Voyiatzis and Edgar Weippl
Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter
Norbert Blenn, Vincent Ghiette and Christian Doerr
On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts
Martin Husák, Jaroslav Kašpar, Elias Bou-Harb and Pavel Čeleda
SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream
Quentin Le Sceller, Elmouatez Billah Karbab, Mourad Debbabi and Farkhund Iqbalb
Keynote I: Prof. Wojciech Mazurczyk, Warsaw University of Technology
Criminal Use of Information Hiding (CUIng) initiative: past, present and future
Keynote II: Dr. Shujun Li, University of Surrey
A new paradigm of information hiding? Hiding in activities of the cyber-physical-social world
Identification of Dependency-based Attacks on Node.js
Brian Pfretzschner and Lotfi ben Othmane
DevOps for Better Software Security in the Cloud
Martin Gilje Jaatun, Daniela Soares Cruzes, and Jesus Luna
Implementing Secure DevOps assessment for highly regulated environments.
Hasan Yasar
Keynote: Andrea Bondavalli, University of Florence, Italy
Title: Anomaly Detection for Complex Dynamic System
Integrating Reactive Cloud Applications in SERECA
Christof Fetzer, Giovanni Mazzeo, John Oliver, Luigi Romano and Martijn Verburg
Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems
Philipp Kreimel, Oliver Eigner and Paul Tavolato
Decision Tree Rule Induction for Detecting Covert Timing Channels in TCP/IP Traffic
Felix Iglesias, Valentin Bernhardt, Robert Annessi and Tanja Zseby
Practical Estimation of Mutual Information on Non-Euclidean Spaces
Yoan Miche, Ian Oliver, Silke Holtmanns, Wei Ren, Anton Akusok and Amaury Lendasse
IntelliAV: Toward the Feasibility of Building Intelligent Anti-Malware on Android Devices
Mansour Ahmadi, Angelo Sotgiu and Giorgio Giacinto
DO NOT DISTURB ? Classifier Behavior on Perturbed Datasets
Bernd Malle, Peter Kieseberg and Andreas Holzinger
A Short-term Forecast Approach of Public Buildings’ Power Demands upon Multi–source Data
Shubing Shan and Buyang Cao
13:00 - 14:30
Lunch
14:30 - 16:00
ARES Short I
Cryptography
Session chair:
Stefan Katzenbeisser, TU Darmstadt, Germany
Lecture Hall A
CUING II
Session chair:
Peter Kieseberg, SBA Research, Austria
Lecture Hall B
SSE II
Agile Secure Software Development
Session Chair:
Juha Röning, University of Oulu, Finland
Lecture Hall C
FARES II
Identity Management and Access Control
Session Chair:
Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
Lecture Hall D
CD-MAKE IV
MAKE VIS
Session chair:
Cagatay Turkay, City University London, UK
Lecture Hall E
Searchable Encryption with Access Control
Nils Löken
One-Message Unilateral Entity Authentication Schemes
Alfredo De Santis, Manuela Flores and Barbara Masucci
Overcoming Limits of Blockchain for IoT Applications
Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo and Antonino Nocera
C'MON : Monitoring the Compliance of Cloud Services to Contracted Properties
Soha Albaghdady, Stefan Winter, Ahmed Taha, Heng Zhang and Neeraj Suri
Are Covert Timing Channels Statistical Anomalies?
Félix Iglesias Vázquez and Tanja Zseby
FROST – Anti-Forensics Digital-Dead-DROp Inofrmation Hiding RobuST to Detection & Data Loss with Fault-tolerance
Avinash Srinivasan, Hunter Dong and Angelos Stavrou.
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression
Sabine Schmidt, Wojciech Mazurczyk, Joerg Keller and Luca Caviglione
DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer
Pal-Stefan Murvay, and Bogdan Groza
Source Code Patterns of SQL Injection Vulnerabilities
Felix Schuckert Basel Katt, and Hanno Langweg
Towards a Secure SCRUM Process for Agile Web Application Development
Patrik Maier, Zhendong Ma, and Roderick Bloem
Busting a Myth: Review of Agile Security Engineering Methods
Kalle Rindell, Sami Hyrynsalmi, and Ville Leppänen
Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control
Tetsuji Takada
Insider Misuse Attribution using Biometrics
Abdulrahman Alruban, Nathan Clarke, Fudong Li and Steven Furnell
k-rAC – a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables
Olga Kieselmann, Arno Wacker and Gregor Schiele
Efficient ID-based Designated Verifier Signature
Olivier Blazy, Emmanuel Conchon, Paul Germouty and Amandine Jambert
On the Challenges and Opportunities in Visualization for Machine Learning & Knowledge Extraction: A Mini-Research Agenda
Cagatay Turkay, Robert Laramee and Andreas Holzinger
Quantitative Externalization of Visual Data Analysis Results using Local Regression Models
Kresimir Matkovic, Hrvoje Abraham, Mario Jelovic and Helwig Hauser
Analysis of Online User Behaviour for Art and Culture Events
Tahereh Arabghalizi, Marco Brambilla and Behnam Rahdari
On Joint Representational Learning of Network Structure and Document Content
Jörg Schlötterer, Christin Seifert and Michael Granitzer
16:00 - 16:30
Coffee Break
16:30 - 18:00
ARES Short II
IoT and Security Engineering
Session chair:
Sudhakar Ganti, University of Victoria, Canada
Lecture Hall A
CUING III
Session chair:
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Lecture Hall B
SSE III
Experiences with Secure DevOps
Session Chair:
Juha Röning, University of Oulu, Finland
Lecture Hall C
FARES III
Code Security and Privacy
Session Chair:
Corrado Aaron Visaggio, University of Sannio, Italy
Lecture Hall D
CD-MAKE V
MAKE AAL
Session Chair:
Andreas Stainer-Hochgatterer, AIT Austrian Institute of Technology, Austria
Lecture Hall E
A Trust-based Resilient Routing Mechanism for the Internet of Things
Zeeshan Ali Khan, Johanna Ullrich, Artemios Voyiatzis and Peter Herrmann
M2M-REP: Reputation of Machines in the Internet of Things
Muhammad Azad, Samiran Bag and Feng Hao
Which Security Requirements Engineering Methodology Should I Choose? Towards a Requirements Engineering-based Evaluation Approach
Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, Francois Barrere and Abdelmalek Benzekri
A Low-Cost UAV-Based Secure Location Verification Method
Marco Rasori, Pericle Perazzo and Gianluca Dini
REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks
Mauro Conti, Pallavi Kaliyar and Chhagan Lal
Machine Learning Approach for Detection of nonTor Traffic
Elike Hodo, Xavier Bellekens, Ephraim Iorkyase, Andrew Hamilton, Christos Tachtatzis and Robert Atkinson
Investigating the darknet: Legal limitations
Anze Mihelic, Blaž Markelj, Igor Bernik and Sabina Zgaga
Panel: Barriers and Enablers on developing a secure application throughout DevOps lifecycle
Moderator: Hasan Yasar
bin2llvm: Analysis of Binary Programs Using LLVM Intermediate Representation
Kevin Kirchner and Stefan Rosenthaler
Security Analysis of Cordova Applications in Google Play
Michiel Willocx, Jan Vossaert and Vincent Naessens
Security and Privacy Implications of NFC-enabled Contactless Payment Systems
Nicholas Akinyokun and Vanessa Teague
Microblogging in a Privacy-Preserving way
Nikolaos Karvelas, Marius Senftleben and Stefan Katzenbeisser
Ambient Assisted Living Technologies from the Perspectives of oOder People and Professionals
Deepika Singh, Sten Hanke, Johannes Kropf and Andreas Holzinger
Human Activity Recognition using Recurrent Neural Networks
Deepika Singh, Erinc Merdivan, Ismini Psychoula, Sten Hanke, Johannes Kropf, Matthieu Geist and Andreas Holzinger
Modeling Golf Player Skill using Machine Learning
Rikard König, Ulf Johansson, Maria Riveiro and Peter Brattberg
Time
Friday, 01.09.2017
08:00 - 12:30
Registration
09:00 - 10:30
ARES Short III
Security Monitoring and Analysis
Session chair:
Edgar Weippl, SBA Research, Austria
Lecture Hall A
FARES IV
Security Models and Methods
Session Chair:
Gianluca Lax, University of Reggio Calabria, Italy
Lecture Hall B
WMA I
Malware Detection
Session Chair:
Corrado Aaron Visaggio, University of Sannio, Italy
Lecture Hall C
CD-MAKE VI
MAKE Semantics
Session Chair:
Andreas Holzinger, Med. University and TU Graz, Austria
Lecture Hall D
Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data
Markus Wurzenberger, Florian Skopik, Roman Fiedler, Max Landauer, Philipp Greitbauer and Wolfgang Kastner
Attack Potential in Impact and Complexity
Luca Allodi and Fabio Massacci
Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS
Sebastian Neuner, Artemios Voyiatzis, Martin Schmiedecker and Edgar Weippl
SensorBuster: On Identifying Sensor Nodes in P2P Botnets
Shankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam, Max Mühlhäuser and Mathias Fischer
Provisioning Software with Hardware-Software Binding
Robert Lee, Konstantinos Markantonakis and Raja Naeem Akram
Victim Communication Stack: A flexible model to select the Human Attack Vector
Enrico Frumento, Angelo Consoli, Federica Freschi and Davide Andreoletti
Adaptive Resource Management Enabling Deception (ARMED)
Partha Pal, Nate Soule, Nate Lageman, Shane Clark, Marco Carvalho, Adrian Granados and Anthony Alves
An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods
Joseph Divita and Roger Hallman
Malware and Formal Methods
Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone and Antonella Santone
End-node Fingerprinting for Malware Detection on HTTPS Data
Tomáš Komárek and Petr Somol
Text Classification Through Automatic Translation: Preliminary Results
Roberto Boselli, Mirko Cesarini, Fabio Mercorio and Mario Mezzanzanica
A Declarative Semantics for P2P Systems
Luciano Caroprese and Ester Zumpano
Improving Language-Dependent Named Entity Detection
Gerald Petz, Werner Wetzlinger and Dietmar Nedbal
Towards the Nutritional Incompatibility Detection based on Recipe Titles
Nadia Clairet and Mathieu Lafourcade
The more the merrier - Federated learning from Local Sphere Recommendations
Bernd Malle, Nicola Giuliani, Andreas Holzinger and Peter Kieseberg
10:30 - 11:00
Coffee Break
11:00 - 12:30
ARES Short IV
Applications
Session chair: Jörg Daubert, Technische Universität Darmstadt, Germany
Lecture Hall A
SAW
Session Chair:
Jungwoo Ryoo, Pennsylvania State University, USA
Lecture Hall B
WMA II
Defensive Technologies
Session Chair:
Corrado Aaron Visaggio, University of Sannio, Italy
Lecture Hall C
Investigating User Comprehension and Risk Perception of Apple’s Touch ID Technology
Yousra Javed, Mohamed Shehab and Emmanuel Bello Ogunu
A Cloud-Based Compilation and Hardening Platform for Android Apps
Marcel Busch, Mykola Protsenko and Tilo Müller
Go with the -Bitcoin- Flow, with Visual Analytics
Stefano Bistarelli and Francesco Santini
Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance
Dorottya Papp, Levente Buttyán and Zhendong Ma
Protection of personal data in security alert sharing platforms
Václav Stupka, Martin Horák and Martin Husák
SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis
Sam Procter, Eugene Vasserman and John Hatcliff
On Using TLS to Secure In-Vehicle Networks
Daniel Zelle, Christoph Krauß, Hubert Strauß and Karsten Schmidt
How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective
Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews, Wayne E. King, Gabe Guss and Yuval Elovici
Popularity-based Detection of Domain Generation Algorithms
Jasper Abbink and Christian Doerr
JSDES - An Automated De-Obfuscation System for Malicious JavaScript
Moataz Abdel Khalek and Ahmed Shosha
12:30 - 14:00
Lunch
By continuing to use the site, you agree to the use of cookies.
more information
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.