Accepted Workshop Papers

Note: Papers are listed in no specific order.


Approach to harmonisation of technological solutions, operating procedures, preparedness and cross-sectorial collaboration opportunities for first aid response in cross-border mass-casualty incidents
Yantsislav Yanakiev (Bulgarian Defence Institute, Bulgaria), Sergio López Bernal (University of Murcia, Spain), Alberto Montarelo Navajo (TASSICA Emergency Training & Research Segovia, Spain), Nikolai Stoianov (Bulgarian Defence Institute, Bulgaria), Manuel Gil Pérez (University of Murcia, Spain) and Carmen Martín Curto (TASSICA Emergency Training & Research Segovia, Spain)

Automatic incident response solutions: a review of proposed solutions’ input and output
Henrik Karlzén and Teodor Sommestad (Swedish Defence Research Agency (FOI), Sweden)

Securing cloud-based military systems with Security Chaos Engineering and Artificial Intelligence
Martin Bedoya,  Sara Palacios (Universidad del Rosario, NTT Data, Colombia) Daniel Diaz-López (Universidad del Rosario, Colombia, New York University, United States), Pantaleone Nespoli (University of Murcia, Spain) Estefania Laverde, Sebastián Suárez (Universidad del Rosario, Colombia)

The fighting Age of machines: the use of cyber deception for Adversarial Artificial Intelligence in Cyber Defence
David Lopes Antunes and Salvador Llopis Sanchez (Universitat Politecnica de Valencia, Spain)

Towards the Definition Of Cognitive Warfare And Related Countermeasures: A Systematic Review
Frida Muñoz Plaza, Marco Antonio Sotelo Monge (Indra, Spain) and Héctor González Ordi (Universidad Complutense de Madrid, Spain)


How to hide your VM from the big bad wolf? Co-location resistance vs. resource utilisation in VM placement strategies
Jens Lindemann (Universität Hamburg, Germany)

Network Covert Channels in Routing Protocols
Michael Schneider (FernUniversität in Hagen, Germany), Daniel Spiekermann (Dortmund University of Applied Sciences and Arts, Germany) and Jörg Keller (FernUniversität in Hagen, Germany)

Real-world actor-based image steganalysis via classifier inconsistency detection
Daniel Lerch-Hostalot and David Megias (Universitat Oberta de Catalunya, Spain)

An Analysis of PhotoDNA
Martin Steinebach (Fraunhofer, Germany)

Proof-of-work based new encoding scheme for information hiding purposes
Pawel Rajba (University of Wroclaw, Poland), Jörg Keller (FernUniversität in Hagen, Germany) and Wojciech Mazurczyk (Warsaw University of Technology, Poland)


Confidential Quantum Computing
Barbora Hrdá and Sascha Wessel (Fraunhofer AISEC, Germany)

Modern NetFlow network dataset with labeled attacks and detection methods
Mikołaj Komisarek (ITTI Sp. z o.o., Poland), Marek Pawlicki (ITTI Sp. z o.o.;Bydgoszcz University of Science and Technology Institute of Telecommunications, Poland), Tomi Simič, David Kavčnik (Bydgoszcz University of Science and Technology Institute of Telecommunications;ITTI Sp. z o.o., Slovenia), Rafał Kozik and Michał Choraś (Institute of Telecommunications, Bydgoszcz University of Science and Technology, Poland)

ScasDK – A Development Kit for Security Assurance test in Multi-Network-Function 5G
Francesco Mancini and Giuseppe Bianchi (CNIT / University of Rome “Tor Vergata”, Italy)

CNIT / University of Rome “Tor Vergata”
Natan Orzechowski, Karol Rzepka, Przemysław Szary, Krzysztof Cabaj, Wojciech Mazurczyk (Warsaw University of Technology, Poland), Nelly Leligou (Netcompany-Intrasoft, Luxembourg), Marcin Przybyszewski (ITTI Sp. z o.o., Poland), Rafał Kozik and Michał Choraś (Bydgoszcz University of Science and Technology, ITTI Sp. z o.o., Poland)


Risk Assessments in Virtual Power Plants with NESCOR Criteria, Practical Application, Advantages and Disadvantages
Georgios Gkoktsis (Fraunhofer SIT, Germany), Hagen Lauer (Technische Hochschule Mittelhessen, Germany) and Lukas Jaeger (Fraunhofer SIT, Germany)

ELECTRON: An Architectural Framework for Securing the Smart Electrical Grid with Federated Detection, Dynamic Risk Assessment and Self-Healing
Panagiotis Radoglou-Grammatikis, Athanasios Liatifis (University of Western Macedonia, Greece), Christos Dalamagkas, Alexios Lekidis (Innovation Hub of Public Power Corporation S.A., Greece), Konstantinos Voulgaridis, Thomas Lagkas (Department of Computer Science, International Hellenic University, Greece), Nikolaos Fotos, Sofia-Anna Menesidou, Thomas Krousarlis (UBITECH Limited, Cyprus), Pedro Ruzafa Alcazar, Juan Francisco Martinez, Antonio Skarmeta (Department of Information and Communications Engineering, University of Murcia, Spain), Alberto Molinuevo Martín, Inaki Angulo (TECNALIA, Basque Research and Technology Alliance (BRTA), Spain), Jesus Villalobos Nieto, Hristo Koshutanski, Rodrigo Diaz Rodriguez (ATOS Spain SA, Spain), Ilias Siniosoglou (MetaMind Innovations P.C., Greece), Orestis Mavropoulos (Exalens, United Kingdom), Konstantinos Kyranou, Theocharis Saoulidis (Sidroco Holdings Ltd, Cyprus), Allon Adir, Ramy Masalha (IBM Research, Israel), Emanuele Bellini (LOGOS, Italy), Nikolaos Kolokotronis (Department of Informatics and Telecommunications, University of Peloponnese, Greece), Stavros Shiaeles (University of Portsmouth, United Kingdom), Jose Garcia Franquelo (Isotrol, Spain), George Lalas, Andreas Zalonis (Netcompany-Intrasoft, Luxembourg), Antonis Voulgaridis, Angelina Bintoudi, Konstantinos Votis (Centre of Research & Technology Hellas, Greece), David Pampliega (Schneider Electric, Spain) and Panagiotis Sarigiannidis (University of Western Macedonia, Greece)

Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems
Dimitrios Christos Asimopoulos (MetaMind Innovations P.C., Greece), Panagiotis Radoglou-Grammatikis (University of Western Macedonia, Greece), Ioannis Makris (MetaMind Innovations P.C., Greece), Valeri Mladenov (Technical University of Sofia, Bulgaria), Konstantinos E. Psannis (University of Macedonia, Greece), Sotirios Goudos (Aristotle University of Thessaloniki, Greece) and Panagiotis Sarigiannidis (University of Western Macedonia, Greece)

Explainable AI-based Intrusion Detection in the Internet of Things
Marios Siganos (K3Y Ltd; Bulgaria), Panagiotis Radoglou-Grammatikis (K3Y Ltd, University of Western Macedonia, Bulgaria), Igor Kotsiuba (Durham University, United Kingdom), Evangelos Markakis (Hellenic Mediterranean University, Greece), Ioannis Moscholios (University of Peloponnese, Greece), Sotirios Goudos (Aristotle University of Thessaloniki, Greece) and Panagiotis Sarigiannidis (University of Western Macedonia, Greece)

EPIC-ARES (joint session with SSE and IWSECC)

Secure Multi-User Contract Certificate Management for ISO 15118-20 Using Hardware Identities
Christian Plappert, Lukas Jäger (Fraunhofer SIT | ATHENE, Germany), Alexander Irrgang and Chandrasekhar Potluri (Mercedes-Benz AG, Germany)

A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations
Stefan Tatschner (Fraunhofer AISEC; University of Limerick, Germany), Sebastian N. Peters, David Emeis (Fraunhofer AISEC, Germany), John Morris and Thomas Newe (University of Limerick, Ireland)

An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data Protection
Andreas Diepenbrock and Sabine Sachweh (Dortmund University of Applied Sciences and Arts, Germany)

Experiences with Secure Pipelines in Highly Regulated Environments
Jose Morales and Hasan Yasar (Carnegie Mellon University, United States)

Creating a Decryption Proof Verifier for the Estonian Internet Voting System
Jan Willemson (Cybernetica, Estonia)

Attack on “A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server”
Srinivas Vivek (International Institute of Information Technology Bangalore, India)

Exploring NFT Validation through Digital Watermarking
Mila Dalla Preda and Francesco Masaia (University of Verona, Italy)

Simulated environment for multiparty quantum digital signature across the network
Daniel G. Aguado (Universidad Politécnica de Madrid Departamento de Arquitectura y Tecnología de Sistemas Informáticos, Spain), Marta Irene Garcia Cid (Indra Sistemas S.A.; Universidad Politécnica de Madrid Escuela Técnica Superior de Ingenieros Informáticos, Spain), Laura Ortiz Martín (Universidad Politécnica de Madrid Departamento de Arquitectura y Tecnología de Sistemas Informáticos, Spain) and Vicente Martín Ayuso (Universidad Politécnica de Madrid Lenguajes y Sistemas Informáticos e Ingeniería de Software, Spain)


IoT Security Seminar: Raising Awareness and Sharing Critical Knowledge
Victor Goeman, Dairo de Ruck, Ilse Bohé, Jorn Lapon and Vincent Naessens (imec-DistriNet, KU Leuven, Belgium)

Curricula Designer with Enhanced ECSF Analysis
Jan Hajny, Marek Sikora (Brno University of Technology, Czechia), Fabio Di Franco (ENISA, Greece) and Konstantinos Adamos (University of the Aegean, Greece)

The Curation Mechanism for the Czech National Qualifications Framework in Cybersecurity
František Kasl, Pavel Loutocký and Jakub Vostoupal (Masaryk University Centre for Education, Czechia)

DJM-CYBER: A Joint Master in Advanced Cybersecurity
Yianna Danidou (European University Cyprus, Cyprus), Sara Ricci (Brno University of Technology, Czechia), Antonio Skarmeta (Universidad de Murcia, Spain), Jiri Hosek (Brno University of Technology, Czechia), Stefano Zanero (Politecnico di Milano, Italy) and Imre Lendak (Eötvös Loránd University Faculty of Informatics;University of Novi Sad Faculty of Technical Sciences, Hungary)

Enhancing Cybersecurity Education in Europe: The REWIRE’s Course Selection Methodology
Alan Briones Delgado (La Salle – Ramon Llull University, Spain), Sara Ricci (Brno University of Technology, Czechia), Argyro Chatzopoulou (APIROPLUS Solutions Ltd., Cyprus), Jakub Čegan (Masaryk University, Czechia), Petr Dzurenda (Brno University of Technology, Czechia) and Ioannis Koutoudis (AKMI Internacional, Greece)

TASEP: A Collaborative Social Engineering Tabletop Role-Playing Game to Prevent Successful Social Engineering Attacks
Lukas Hafner, Florian Wutz, Daniela Pöhn and Wolfgang Hommel (Universität der Bundeswehr München, Germany)

A Study of Different Awareness Campaigns in a Company
Laura Gamisch (Ludwig-Maximilians-Universität München, Germany) and Daniela Pöhn (Universität der Bundeswehr München, Germany)

Interactive Environment for Effective Cybersecurity Teaching and Learning
Willi Lazarov, Tomas Stodulka (Brno University of Technology, Czechia), Tiina Schafeitel-Tähtinen, Marko Helenius (Tampere University, Finland) and Zdenek Martinasek (Brno University of Technology, Czechia)

Dynamic Cybersecurity Curriculum Optimization Method (DyCSCOM)
Marko Zivanovic, Imre Lendak and Ranko Popovic (Faculty of Technical Sciences, University of Novi Sad, Serbia)

Why Mary Can Hack: Effectively Introducing High School Girls to Cybersecurity
Gabriele Costa, Silvia De Francisci, Serenella Valiani (IMT School for Advanced Studies Lucca, Italy) and Paolo Prinetto (Politecnico di Torino, Italy)


Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name Notation
Vincent Drury, Jakob Drees and Ulrike Meyer (RWTH Aachen University, Germany)

CoSIS: A Secure, Scalability, Decentralized Blockchain via Complexity Theory
Hui Wang, Zhenyu Yang, Ming Li, Xiaowei Zhang, Yanlan Hu and Donghui Hu (Hefei University of Technology, China)

Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins
Jan-Phillip Makowski and Daniela Pöhn (Universität der Bundeswehr München, Germany)

A case study with CICIDS2017 on the robustness of machine learning against adversarial attacks in intrusion detection
Marta Catillo, Andrea Del Vecchio, Antonio Pecchia and Umberto Villano (Università degli Studi del Sannio, Italy)

Mitigate Data Poisoning Attack by Partially Federated Learning
Khanh Huu The Dam and Axel Legay (UCLouvain, Belgium)

Fairness of AI in Predicting the Risk of Recidivism: Review and Phase Mapping of AI Fairness Techniques
Michael Farayola, Irina Tal (School of Computing, Dublin City University, Ireland), Bendechache Malika, Takfarinas Saber (School of Computer Science, University of Galway, Ireland) and Regina Connolly (Business School, Dublin City University, Ireland)

Program Characterization for Software Exploitation Detection
Ayman Youssef, Mohamed Abdelrazek and Chandan Kumar Karmakar (Deakin University, Australia)

JITScanner: Just-in-Time Executable Page Check in the Linux Operating System
Pasquale Caporaso, Giuseppe Bianchi and Francesco Quaglia (Università degli studi di Roma Tor Vergata, Italy)

Obfuscated Mobile Malware Detection by means of Dynamic Analysis and Explainable Deep Learning
Francesco Mercaldo (University of Molise & IIT-CNR, Italy), Giovanni Ciaramella (IIT-CNR, Italy), Antonella Santone (University of Molise, Italy) and Fabio Martinelli (IIT-CNR, Italy)

Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids
Luigi Coppolino, Roberto Nardone, Alfredo Petruolo, Luigi Romano (University of Naples “Parthenope”, Italy) and Andrej Souvent (Operato d.o.o., Slovenia)

A Survey of Steganography Tools at Layers 2-4 and HTTP
Stefano Bistarelli (Università di Perugia, Italy), Michele Ceccarelli, Chiara Luchini, Ivan Mercanti (Università degli Studi di Perugia, Italy) and Francesco Santini (Dipartimento di Matematica e Informatica, Università di Perugia, Italy)

Towards Grammatical Tagging for the Legal Language of Cybersecurity
Gianpietro Castiglione, Giampaolo Bella and Daniele Francesco Santamaria (University of Catania, Italy)


Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems
Lionel Tailhardat (Orange, France), Raphaël Troncy (EURECOM, France) and Yoan Chabot (Orange, France)

IoT Network Attack Detection: Leveraging Graph Learning for Enhanced Security
Mohamed-Lamine Messai (Univ Lyon, Univ Lyon 2, UR ERIC, France) and Hamida Seba (University Lyon 1, France)

Investigating Impact of Fake-Type Content Poisoning Attack on NDN
Noriaki Kamiyama (Ritsumeikan University, Japan) and Takuto Kudo (Fukuoka University, Japan)

Graph-Based Android Malware Detection and Categorization through BERT Transformer
Marco Simoni and Andrea Saracino (Consiglio Nazionale delle Ricerche, Italy)


Security Analysis of the KNX Smart Building Protocol KNX Security
Malte Küppers, Marko Schuba, Georg Neugebauer, Tim Hoener and Sacha Hack (FH Aachen University of Applied Sciences, Germany)

FISMOS – An FPGA Implementation of a Security Module as Open Source
Philipp Schubaur, Peter Knauer and Dominik Merli (Technical University of Applied Sciences Augsburg, Germany)

Securing Federated GANs: Enabling Synthetic Data for Health Registries Consortium
Narasimha Raghavan Veeraragavan and Jan Franz Nygård (The Cancer Registry of Norway, Norway)

A Generic IoT Quantum-Safe Watchdog Timer Protocol
Michael Eckel, Tanja Gutsche (Fraunhofer SIT | ATHENE, Germany), Hagen Lauer and André Rein (University of Applied Sciences Mittelhessen | THM, Germany)


Needle in the Haystack: Analyzing the Right of Access According to GDPR Article 15 Five Years after the Implementation
Daniela Pöhn, Niklas Mörsdorf and Wolfgang Hommel (Universität der Bundeswehr München, Germany)

A BYOD security awareness survey among professionals
George Petihakis, Dimitrios Kiritsis, Aristeidis Farao, Panagiotis Bountakas, Aggeliki Panou and Christos Xenakis (University of Piraeus, Greece)

Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles
Sakshyam Panda, Emmanouil Panaousis, George Loukas (University of Greenwich, United Kingdom) and Konstantinos Kentrotis (EXUS, Greece)

Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT
Michail Bampatsikos, Vaios Bolgouras (University of Piraeus, Greece), Ilias Politis (ISI / “Athena” RC, Greece) and Christos Xenakis (University of Piraeus, Greece)

Enabling Qualified Anonymity for Enhanced  User Privacy in the Digital Era
Vaios Bolgouras (University of Piraeus, Greece), Konstantinos Papadamou (Cyprus University of Technology, Cyprus), Ioana Stroinea (certSIGN, Romania), Michail Papadakis (LSTech ESPANA, Spain), George Gugulea (certSIGN, Romania), Michael Sirivianos (Cyprus University of Technology, Cyprus) and Christos Xenakis (University of Piraeus, Greece)

AI/ML-based real-time classification of Software Defined Networking traffic
Alexandru Vulpe, Cosmin Dobrin, Apostol Stefan and Alexandru Caranica (University Politehnica of Bucharest, Romania)

A Comprehensive Study on Third-Party User Tracking in Mobile Applications
Federica Paci, Jacopo Pizzoli (University of Verona, Italy) and Nicola Zannone (Eindhoven University of Technology, Netherlands)

An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management
Konstantinos Loupos, Harris Niavis, Fotis Michalopoulos, George Misiakoulis (INLECOM, Greece), Antonio Skarmeta, Jesús García (Universidad De Murcia, Spain), Angel Palomares (ATOS It Solutions And Services Iberia Sl, Spain), Hui Song, Rustem Dautov (SINTEF AS, Norway), Francesca Giampaolo, Rosella Mancilla, Francesca Costantino (Engineering – Ingegneria Informatica SPA, Italy), Dimitri Landuyt, Sam Michiels (Katholieke Universiteit Leuven, Belgium), Stefan More (Graz University of Technology and Secure Information Technology Center, Belgium), Christos Xenakis, Michail Bampatsikos, Ilias Politis (University Of Piraeus Research Center, Greece), Konstantinos Krilakis and Dimitris Syvridis (Eulambia Advanced Technologies, Greece)

A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles
Meriem Benyahya, Teri Lenard, Anastasija Collen and Niels Nijdam (Geneva School of Economics and Management Université de Genève, Switzerland)

Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic
Vasileios Pantelakis, Panagiotis Bountakas, Aristeidis Farao and Christos Xenakis (University of Piraeus, Greece)

A Qualitative Analysis of Illicit Arms Trafficking on Darknet Marketplaces
Pantelitsa Leonidou, Nikos Salamanos (Cyprus University of Technology, Cyprus), Aristeidis Farao (University of Piraeus, Greece), Maria Aspri (LSTech LTD, Spain) and Michael Sirivianos (Cyprus University of Technology, Cyprus)

Exploring Federated Learning for Speech-based Parkinson’s Disease Detection
Athanasios Sarlas, Alexandros Kalafatelis (Department of Ports Management and Shipping, National & Kapodistrian University of Athens, Greece), Georgios Alexandridis (Department of Digital Industry Technologies, National & Kapodistrian University of Athens, Greece), Michail-Alexandros Kourtis (Institute of Informatics and Telecommunications, National Centre for Scientific Research “DEMOKRITOS” (NCSRD), Greece) and Panagiotis Trakadas (Department of Ports Management and Shipping, National & Kapodistrian University of Athens, Greece)

Securing the Flow: Security and Privacy Tools for Flow-based Programming
Thodoris Ioannidis, Vaios Bolgouras, Christos Xenakis and Ilias Politis (University of Piraeus, Greece)

Parameterizing poisoning attacks in federated learning-based intrusion detection
Mohamed Amine Merzouk, Frédéric Cuppens, Nora Cuppens-Boulahia (Polytechnique Montréal, Canada) and Reda Yaich (IRT SystemX, France)


Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators
Alpesh Bhudia (Royal Holloway, University of London, United Kingdom), Anna Cartwright (Oxford Brookes University, United Kingdom), Edward Cartwright (De Montfort University, United Kingdom), Darren Hurley-Smith (Royal Holloway University of London, United Kingdom) and Julio Hernandez (University of Kent, United Kingdom)

Cheaper than you thought? A dive into the darkweb market of cyber-crime products
Dimitrios Georgoulias (Aalborg University, Denmark), Ricardo Yaben and Emmanouil Vasilomanolakis (Technical University of Denmark, Denmark)

Tactics, Techniques and Procedures of Cybercrime: A Methodology and Tool for Cybercrime Investigation Process
Gargi Sarkar, Hardeep Singh (Indian Institute of Technology, India), Subodh Kumar (Microsoft India, India) and Sandeep K. Shukla (Indian Institute of Technology, India)

Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access
Juha Nurmi (Tampere University, Finland), Mikko Niemelä (Cyber Intelligence House, Portugal) and Billy Brumley (Tampere University, Finland)


Detecting a Complex Attack Scenario in an Airport: The PRAETORIAN Framework
Stefan Schauer (AIT Austrian Institute of Technology GmbH, Austria), Tamara Hadjina (KONCAR Digital, Croatia), Melita Damjanović (Zagreb Airport, Austria), Eva María Muñoz Navarro, Juan José Hernández Montesinos (ETRA I+D, Spain), Javier Hingant Gómez (Universitat Politècnica de València, Spain) and Lazaros Papadopoulos (School of Electrical and Computer Engineering, National Technical University of Athens, Greece)

A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures
Tim H. Stelkens-Kobsch, Hilke Boumann, Florian Piekert, Meilin Schaper and Nils Carstengerdes (German Aerospace Center (DLR), Germany)

Identification and Evaluation of Cyber-Physical Threats on Interdependent Critical Infrastructures
Sandra König, Abdelkader Magdy Shaaban (AIT Austrian Institute of Technology GmbH, Austria), Tamara Hadjina (Koncar, Croatia), Klemen Gregorc and Albert Kutej (KABEG, Austria)

PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats
Lazaros Papadopoulos, Antonios Karteris, Dimitrios Soudris (School of Electrical and Computer Engineering, National Technical University of Athens, Greece), Eva Muñoz-Navarro, Juan José Hernández-Montesinos (ETRA Investigación y Desarrollo, Spain), Stephane Paul, Nicolas Museux (THALES Research and Technology, France), Sandra König, Manuel Egger, Stefan Schauer (AIT Austrian Institute of Technology GmbH, Austria), Alfonso Climente, Javier Hingant Gómez, Israel Pérez-Llopis (Universitat Politècnica de València, Spain) and Tamara Hadjina (Koncar Digital, Croatia)


HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems
Marco Lucchese (University of Verona, Italy), Francesco Lupia, Massimo Merro, Federica Paci (University of Verona, Italy) and Nicola Zannone (Eindhoven University of Technology, Netherlands), Angelo Furfaro (University of Calabria, Italy)

ICSvertase: A Framework for Purpose-based Design and Classification of ICS Honeypots
Stash Kempinski (Eindhoven University of Technology, Netherlands), Shuaib Ichaarine (University of Technology Eindhoven, Netherlands), Savio Sciancalepore and Emmanuele Zambon (Eindhoven University of Technology, Netherlands)

A Forensic I/O Recorder for Industrial Control Systems Using PLCs and OPC UA
Alexios Karagiozidis ( GmbH, Germany) and Martin Gergeleit (University of Applied Sciences RheinMain, Germany)

OpenScope-sec: An ADS-B Simulator to Support the Security Research
Riccardo Cestaro, Mauro Conti, Elonora Mancini and Federico Turrin (University of Padova, Italy)

PLC Logic-Based Cybersecurity Risks Identification for ICS
Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon (CEA/LETI, France) and Stéphane Mocanu (INRIA, France)

Automated ICS template for STRIDE Microsoft Threat Modeling Tool
Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon (CEA/LETI, France), Stéphane Mocanu and Nelson Nkawa (INRIA, France)

Survey on Digital Twins: from concepts to applications
Jessica B. Heluany and Vasileios Gkioulos (NTNU, France)

Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AI
Fadhila Tlili (University of technology of Troyes LIST3N;National School of Electronics and Telecoms of Sfax SMARTS, France), Samiha Ayed (University of technology of Troyes, France) and Lamia Chaari Fourati (University of Sfax, France)

Towards Obfuscation of Programmable Logic Controllers
Vittoria Cozza, Mila Dalla Preda, Marco Lucchese, Massimo Merro (University of Verona, Italy) and Nicola Zannone (Eindhoven University of Technology, Netherlands)


CACS: a cloud privacy-preserving attribute management system
Aivo Kalu, Burak Can Kus, Peeter Laud, Kin Long Leung, Nikita Snetkov and Jelizaveta Vakarjuk (Cybernetica AS, Estonia)

RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving Privacy
Stephan Krenn (AIT Austrian Institute of Technology GmbH, Austria), Jan Orlicky (IMA s.r.o., Czechia), Daniel Slamanig (AIT Austrian Institute of Technology GmbH, Austria) and Tomáš Trpišovský (IMA s.r.o., Czechia)

Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes
Stefan More (Graz University of Technology and Secure Information Technology Center Austria, Austria)

Quantum-resistant End-to-End Secure Messaging and Email Communication
Sebastian Ramacher (AIT Austrian Institute of Technology, Austria), Christoph Döberl, Wolfgang Eibner (X-Net Services GmbH, Austria), Simon Gärtner (University of Applied Sciences Upper Austria, Austria), Manuela Kos and Florian Kutschera (AIT Austrian Institute of Technology, Austria)

Key Management Systems for Large-Scale Quantum Key Distribution Networks
Paul James, Stephan Laschet, Luca Torresetti, Sebastian Ramacher (AIT Austrian Institute of Technology, Austria)


On Efficiency and Usability of Group Signatures on Smartphone and Single-board Platforms
Patrik Dobias, Lukas Malina, Petr Ilgner and Petr Dzurenda (Brno University of Technology, Czechia)

A Decentralised Public Key Infrastructure for X-Road
Mariia Bakhtina, Kin Long Leung, Raimundas Matulevičius, Ahmed Awad (University of Tartu, Estonia) and Petr Švenda (Masaryk University, Czechia)

Securing Data Exchange in the Convergence of Metaverse and IoT Applications
Rizwan Patan and Reza M. Parizi (Kennesaw State University, United States)

Data Loss Prevention Solution for Linux Endpoint Devices
Lukas Daubner and Adam Považanec (Masaryk University, Czechia)

On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures
Lukas Malina, Patrik Dobias, Jan Hajny (Brno University of Technology, Czechia) and Kim-Kwang Raymond Choo (University of Texas at San Antonio, United States)

Security level evaluation with F4SLE
Mari Seeba (University of Tartu, Computer Science Institute & Estonian Information System Authority, Estonia), Tarmo Oja, Maria Pibilota Murumaa (University of Tartu Computer Science Institute & Cybernetica AS, Estonia) and Vaclav Stupka Stupka (Masaryk University & CyberSecurity Hub, z.u., Czechia)


Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework
Eider Iturbe, Erkuden Rios, Angel Rego (TECNALIA Research Innovation, Basque Research and Technology Alliance (BRTA), Spain) and Nerea Toledo (University of the Basque Country, Spain)

A deep learning anomaly detection framework with explainability and robustness
Manh-Dung Nguyen, Anis Bouaziz, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli and Edgardo Montes de Oca (Montimage, France)

VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices
Eduard Paul Enoiu (Mälardalen University, Sweden), Dragos Truscan (ABO Akademi, Finland), Andrey Sadovykh (SOFTEAM, France) and Wissam Mallouli (Montimage, France)

The DYNABIC approach to resilience of critical infrastructures
Erkuden Rios, Eider Iturbe, Angel Rego (TECNALIA Research Innovation, Basque Research and Technology Alliance (BRTA), Spain), Nicolas Ferry, Jean-Yves Tigli, Stéphane Lavirotte, Gérald Rocher (Université Côte d’Azur, France), Phu Nguyen, Hui Song, Rustem Dautov (SINTEF, Norway), Wissam Mallouli and Ana Rosa Cavalli (Montimage EURL, France)

Automatic Test Generation to Improve Scrum for Safety Agile Methodology
Mario Barbareschi, Salvatore Barone (Università degli Studi di Napoli Federico II, Italy), Valentina Casola (University of Naples Federico II, Italy), Salvatore Della Torca and Daniele Lombardi (Università degli Studi di Napoli Federico II, Italy)

HTTP/2 Attacks Generation using 5Greplay
Francesco G. Caccavale, Huu-Nghia Nguyen, Ana Cavalli, Edgardo Montes de Oca and Wissam Mallouli (Montimage, France)


Mitigating Privilege Misuse in Access Control through Anomaly Detection
Gelareh Hasel Mehri, Inez Wester (Eindhoven University of Technology, Netherlands), Federica Paci (University of Verona, Italy) and Nicola Zannone (Eindhoven University of Technology, Netherlands)

Fingerprint forgery training: Easy to learn, hard to perform
Agata Kruzikova and Vashek Matyas (Masaryk University, Czechia)

Mitigating undesired interactions between liveness detection components in biometric authentication
Emma Lavens, Davy Preuveneers and Wouter Joosen (imec – DistriNet, KU Leuven, Belgium)

An Improved Honeypot Model for Attack Detection and Analysis
Marwan Abbas-Escribano and Hervé Debar (Telecom Sud Paris, France)

Implementing Data Sovereignty: Requirements & Challenges from Practice
Malte Hellmeier, Julia Pampus, Haydar Qarawlus (Fraunhofer ISST, Germany) and Falk Howar (TU Dortmund, Fraunhofer ISST, Germany)

Application of Secure Two-Party Computation in a Privacy-Preserving Android App
Marco De Vincenzi, Ilaria Matteucci, Fabio Martinelli (IIT-CNR, Italy) and Stefano Sebastio (Collins Aerospace – Applied Research & Technology, Ireland)

TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework
Sarwar Sayeed, Nikolaos Pitropakis, William J Buchanan (Edinburgh Napier University, United Kingdom), Evangelos Markakis, Dimitra Papatsaroucha (Hellenic Mediterranean University Research Center, Greece) and Ilias Politis (InQbit/Industrial Systems Institute ATHENA RC, Romania)

Effect of Group Based Synchronization on User Anonymity in Mix Networks
Alperen Aksoy (Friedrich-Alexander University of Erlangen-Nuremberg, Germany) and Dogan Kesdogan (University of Regensburg, Germany)

New Identity-Based Identification and Signature Schemes in the Standard Model
Syh-Yuan Tan (Newcastle University, United Kingdom) and Swee-Huay Heng (Multimedia University, Malaysia)

Cookiescanner: An Automated Tool for Detecting and Evaluating GDPR Consent Notices on Websites
Ralf Gundelach and Dominik Herrmann (Otto-Friedrich-Universität Bamberg, Germany)

User Acceptance Criteria for Privacy Preserving Machine Learning Techniques
Sascha Löbner, Sebastian Pape (Goethe University Frankfurt, Germany) and Vanessa Bracamonte (KDDI Research, Inc., Japan)

Bypassing antivirus detection: old-school malware, new tricks
Efstratios Chatzoglou (University of the Aegen, Greece), Georgios Karopoulos (European Commission, Joint Research Centre (JRC), Italy), Georgios Kambourakis and Zisis Tsiatsikas (University of the Aegean, Greece)

Smartphones in a Microwave: Formal and Experimental Feasibility Study on Fingerprinting the Corona-Warn-App
Henrik Graßhoff (University of Münster, Germany), Florian Adamsky (Hof University of Applied Sciences, Germany), Stefan Schiffner (BHH University of Applied Sciences, Germany)


Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) Controller
Abdullah Alshaya, Adam Kardorff, Christian Facundus, Ibrahim Baggili and Golden Richard III (Louisiana State University, United States)

Digital Forensics Triage App for Android
Jannik Neth, Marko Schuba (FH Aachen University of Applied Sciencess, Germany), Karsten Brodkorb (State Office of Criminal Investigation North-Rhine Westphalia, Germany), Tim Hoener, Sacha Hack and Georg Neugebauer (FH Aachen University of Applied Sciencess, Germany)

Reconstructing Timelines: From NTFS Timestamps to File Histories
Jelle Bouma, Hugo Jonker (Open University of the Netherlands, Netherlands), Vincent van der Meer (Zuyd University of Applied Science, Open University of the Netherlands, Netherlands) and Eddy van den Aker (Zuyd University of Applied Science, Netherlands)

Enabling the forensic study of application-level encrypted data in Android via a Frida-based decryption framework
Cosimo Anglano, Massimo Canonico, Andrea Cepollina, Davide Freggiaro, Alderico Gallo and Marco Guazzone (University of Piemonte Orientale, Italy)