Accepted Workshop Papers

5G-NS 2019


Towards a Security Architecture for Hybrid WMNs
Markus Theil (Technische Universitaet Ilmenau, Germany), Martin Backhaus (Technische Universitaet Ilmenau, Germany), Michael Rossberg (Technische Universitaet Ilmenau, Germany) and Guenter Schaefer (Technische Universitaet Ilmenau, Germany)

Securing Ethernet-based Optical Fronthaul for 5G Network
Joo Yeon Cho (ADVA Optical Networking SE, Germany), Andrew Sergeev (ADVA Optical Networking Israel Ltd., Israel) and Jim Zou (ADVA Optical Networking SE, Germany

Framework for Anticipatory Self-Protective 5G Environments
Marco Antonio Sotelo Monge (Universidad Complutense de Madrid, Spain) and Jorge Maestre Vidal (Universidad Complutense de Madrid, Spain)

Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches
Krzysztof Cabaj (Warsaw University of Technology, Poland), Marcin Gregorczyk (Warsaw University of Technology, Poland), Wojciech Mazurczyk (Warsaw University of Technology, Poland), Piotr Nowakowski (Warsaw University of Technology, Poland) and Piotr Żórawski (Warsaw University of Technology, Poland)

6G Network Needs to Support Embedded Trust
Raimo Kantola (Aalto University, Finland)

BASS 2019


Semantic Mediation for A Posteriori Log Analysis
Farah Dernaika (IMT Atlantique, France), Nora Cuppens-Boulahia (IMT Atlantique, France), Frédéric Cuppens (IMT Atlantique, France) and Olivier Raynaud (LIMOS, France)

Alexa’s Voice Recording Behavior: A Survey of User Understanding and Awareness
Yousra Javed (Illinois State University, United States), Shashank Sethi (Illinois State University, United States) and Akshay Jadoun (Illinois State University, United States)

Enhancing the Privacy and Computability of Location-Sensitive Data for Context Authentication
Pradip Mainali (OneSpan, Belgium), Carlton Shepherd (OneSpan, United Kingdom), and Fabien A. P. Petitcolas (OneSpan, Belgium),

Adversarial Communication Networks Modeling for Intrusion Detection Strengthened against Mimicry
Jorge Maestre Vidal (Universidad Complutense de Madrid, Spain) and Marco Antonio Sotelo Monge (Universidad Complutense de Madrid, Spain)

CUING 2019


Privacy and Robust Hashes
Martin Steinebach (Fraunhofer, Germany), Sebastian Lutz (Fraunhofer, Germany) and Huajian Liu (Fraunhofer, Germany)

Protocol-independent Detection of `Messaging Ordering’ Network Covert Channels
Steffen Wendzel (Worms University of Applied Sciences and Fraunhofer FKIE, Germany)

Detection and Analysis of Tor Onion Services
Martin Steinebach (Fraunhofer, Germany), Marcel Schäfer (Fraunhofer CESE, United States) and York Yannikos (Fraunhofer, Germany)

Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks
Tobias Schmidbauer (University of Hagen, Germany), Steffen Wendzel (Worms University of Applied Sciences and Fraunhofer FKIE, Germany), Aleksandra Mileva (University Goce Delcev, Macedonia) and Wojciech Mazurczyk (Warsaw University of Technology, Faculty of Electronics and Information Technology, Institute of Telecommunications, Poland)

Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability
Krzysztof Cabaj (Warsaw University of Technology, Poland), Wojciech Mazurczyk (Warsaw University of Technology, Poland), Piotr Nowakowski (Warsaw University of Technology, Poland) and Piotr Żórawski (Warsaw University of Technology, Poland)

Towards Reversible Storage Network Covert Channels
Wojciech Mazurczyk (Warsaw University of Technology, Poland), Przemysław Szary (Warsaw University of Technology, Poland), Steffen Wendzel (Worms University of Applied Sciences and Fraunhofer FKIE, Germany) and Luca Caviglione (CNR – IMATI, Italy)

Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research
Donatello Luna (Tribunale di Busto Arsizio, Italy), Luca Allodi (Eindhoven University of Technology, Netherlands) and Marco Cremonini (University of Milan, Italy)

SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation
Michal Choras (UTP Bydgoszcz, Poland), Marek Pawlicki (Uniwersytet Technologiczno-Przyrodniczy, Poland) and Rafal Kozik (Institute of Telecommunications, UTP Bydgoszcz, Poland)

CyberTIM 2019

Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems
Peter Amthor (Technische Universität Ilmenau, Germany), Daniel Fischer (Technische Universität Ilmenau, Germany), Winfried Kühnhauser (Technische Universität Ilmenau, Germany) and Dirk Stelzer (Technische Universität Ilmenau, Germany)

Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts
Christian Doll (Fraunhofer, Germany), Arnold Sykosch (University of Bonn, Fraunhofer FKIE, Germany), Marc Ohm (University of Bonn, Germany) and Michael Meier (University of Bonn, Fraunhofer FKIE, Germany)

A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources
Thomas Schaberreiter (University of Vienna, Austria), Veronika Kupfersberger (University of Vienna, Austria), Konstantinos Rantos (International Hellenic University, Kavala Greece ), Arnolnt Spyros (Innovative Secure Technologies, Greece) , Alexandros Papanikolaou (Innovative Secure Technologies, Greece), Christos Ilioudis (International Hellenic University, Thessaloniki, Greece) and Gerald Quirchmayr (University of Vienna, Austria)

NERD: Network Entity Reputation Database
Václav Bartoš (CESNET, Czechia)

AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts
Martin Husák (Masaryk University, Czechia) and Jaroslav Kašpar (Masaryk University, Czechia)

Cyber Threat Information Sharing: Perceived Benefits and Barriers
Adam Zibak (University of Oxford, United Kingdom) and Andrew Simpson (University of Oxford, United Kingdom)

FARES 2019


Managing the Overestimation of resilience
Thomas Clédel (IMT Atlantique, France), Frédéric Cuppens (TELECOM Bretagne, France) and Nora Cuppens-Boulahia (IMT Atlantique, France)

GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform
Martin Horák (Masaryk University, Czechia), Václav Stupka (Masaryk University, Czechia) and Martin Husák (Masaryk University, Czechia)

A Pattern for a Virtual Network Function (VNF)
Ahmed Alwakeel (Florida Atlantic University, United States), Abdulrahman Alnaim (Florida Atlantic University, United States) and Eduardo B. Fernandez (Florida Atlantic University, United States)

Near-optimal Evasion of Randomized Convex-inducing Classifiers in Adversarial Environments
Pooria Madani (York University, Canada) and Natalija Vlajic (York University, Canada)

AMON: an Automaton MONitor for Industrial Cyber-Physical Security
Giuseppe Bernieri (Department of Mathematics University of Padua, Italy), Mauro Conti (Department of Mathematics University of Padua, Italy) and Gabriele Pozzan (Department of Mathematics University of Padua, Italy)

Decision Support for Mission-Centric Cyber Defence
Michal Javorník (Masaryk University, Czechia), Jana Komárková (Masaryk University, Czechia) and Martin Husák (Masaryk University, Czechia)

Cyber Security Skill Set Analysis for Common Curricula Development
Muhammad Mudassar Yamin (Norwagian University of Science and Technology, Norway) and Basel Katt (Norwagian University of Science and Technology, Norway)

IoT-SECFOR 2019


Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation
Pradip Mainali (OneSpan, Belgium) and Carlton Shepherd (OneSpan, United Kingdom)

A Secure Publish/Subscribe Protocol for Internet of Things
Lukas Malina (Brno University of Technology, Czechia), Gautam Srivastava (Brandon University, Canada), Petr Dzurenda (Brno University of Technology, Czechia) and Jan Hajny (Brno University of Technology, Czechia)

Securing the Device Drivers of Your Embedded Systems: Framework and Prototype
Zhuohua Li (The Chinese University of Hong Kong, Hong Kong), Jincheng Wang (The Chinese University of Hong Kong, Hong Kong), Mingshen Sun (Baidu X-Lab, United States) and John C.S. Lui (The Chinese University of Hong Kong, Hong Kong)

IoT-HarPSecA: A Framework for Facilitating the Design and Development of Secure IoT Devices
Musa Samaila (Universidade da Beira Interior and Instituto de Telecomunicações, Covilhã, Portugal), Moser José (Universidade da Beira Interior and Instituto de Telecomunicações, Covilhã, Portugal), João Bernardo Sequeiros (Universidade da Beira Interior and Instituto de Telecomunicações, Covilhã, Portugal), Mario Freire (Universidade da Beira Interior and Instituto de Telecomunicações, Covilhã, Portugal) and Pedro Inácio (Universidade da Beira Interior and Instituto de Telecomunicações, Covilhã, Portugal)

Energy Attack in LoRaWAN: Experimental Validation
Konstantin Mikhaylov (University of Oulu, Finland), Radek Fujdiak (Brno University of Technology, Czechia), Ari Pouttu (University of Oulu, Finland), Miroslav Voznak (Technical University of Ostrava, Czechia), Lukas Malina (Brno University of Technology, Czech Republik) and Petr Mlynek (Brno University of Technology, Czechia)

IWCC 2019


HEHLKAPPE: Utilizing Deep Learning to Manipulate Surveillance Camera Footage in Real-Time
Alexander Aigner (University of Applied Sciences Upper Austria, Austria) and Rene Zeller (University of Applied Sciences Upper Austria, Austria)

Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs
Tobias Dam (FHSTP UAS, Austria), Lukas Daniel Klausner (FHSTP UAS, Austria), Damjan Buhov (Josef Ressel Center TARGET, Austria) and Sebastian Schrittwieser (SBA Research, Austria)

Realistically Fingerprinting Social Media Webpages in HTTPS Traffic
Mariano Di Martino (Hasselt University / Expertise Center For Digital Media, Belgium), Peter Quax (Hasselt University / Expertise Center For Digital Media, Belgium) and Wim Lamotte (Hasselt University / Expertise Center For Digital Media, Belgium)

Experiencing the detection of criminals on social media driven by users features and current limits
Andrea Tundis (TU Darmstadt, Germany), Leon Böck (Technische Universität Darmstadt (TUDA), Germany), Victoria Stanilescu (Siemens AG, Germany) and Max Mühlhäuser (TU Darmstadt, Germany)

An Analysis Framework for Product Prices and Supplies in Darknet Marketplaces
York Yannikos (Fraunhofer, Germany), Julian Heeger (Fraunhofer, Germany) and Maria Brockmeyer (TU Darmstadt, Germany)

Fake News Detection by Image Montage Recognition
Martin Steinebach (Fraunhofer, Germany), Huajian Liu (Fraunhofer, Germany) and Karol Gotkowski (Fraunhofer, Germany)

Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning
Felix Anda (University College Dublin, Ireland), David Lillis (University College Dublin, Ireland), Aikaterini Kanta (University College Dublin, Ireland), Brett Becker (University College Dublin, Ireland), Elias Bou-Harb (Cyber Threat Intelligence Lab, Florida Atlantic University, United States), Nhien An Le Khac (University College Dublin, Ireland) and Mark Scanlon (University College Dublin, Ireland)

Ontology of Metrics for Cyber Security Assessment
Elena Doynikova (St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, Russia), Andrey Fedorchenko (St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, Russia) and Igor Kotenko (St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, Russia)

IWSECC 2019


DTE Access Control Model for Integrated ICS Systems
Khaoula Es-Salhi (IMT atlantique -LabSTICC, France), David Espes (Université de Bretagne Occidentale (UBO), France) and Nora Cuppens (IMT atlantique -LabSTICC, France)

Preserving context security in AWS IoT Core
Luca Calderoni (University of Bologna, Italy)

Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey
Maxime Bélair (Orange Labs, France), Sylvie Laniepce (Orange Labs, France) and Jean-Marc Menaud (IMT Atlantique, INRIA, LS2N, France)

A Misuse Pattern for Compromising VMs via Virtual Machine Escape in NFV
Abdulrahman Alnaim (Florida Atlantic University, United States), Ahmed Alwakeel (Florida Atlantic University, United States) and Eduardo B. Fernandez (Florida Atlantic University, United States),

IWSMA 2019


Analyzing Android’s File-Based Encryption: Information Leakage through Unencrypted Metadata
Tobias Groß (Friedrich-Alexander University, Germany), Matanat Ahmadova (University of Bonn, Germany) and Tilo Müller (Friedrich-Alexander University, Germany)

The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms based on a Brazilian case study
Marcus Botacin (Federal University of Brazil, Brazil), Anatoli Kalysch (Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany), Tilo Mueller (Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany) and Andre Gregio (UFPR, Brazil)

Post-Quantum Cryptography in Embedded Systems
Soundes Marzougui (TU Darmstadt, Germany) and Juliane Krämer (TU Darmstadt, Germany)

IWSMR 2019


Examining and Constructing Attacker Categorisations – an Experimental Typology for Digital Banking
Moeckel Caroline (Royal Holloway, University of London, United Kingdom)

The power of interpretation: Qualitative methods in cybersecurity research
Damjan Fujs (University of Maribor, Slovenia), Anže Mihelič (University of Maribor, Slovenia) and Simon Vrhovec (University of Maribor, Slovenia)

Analysis of User Evaluations in Security Research
Peter Hamm (Goethe University Frankfurt, Germany), David Harborth (Goethe University Frankfurt, Germany) and Sebastian Pape (Goethe University Frankfurt, Germany)

LPW 2019


DEMISe: Interpretable Deep Extraction and Mutual Information Selection Techniques for IoT Intrusion Detection
Paul Yoo (Birkbeck, University of London, United Kingdom), Luke Parker (Ministry of Defence, United Kingdom), Taufiq Asyhari (Coverntry University, United Kingdom, Yoonchan Jhi (Samsung Electronics, South Korea), Kamal Taha (Khalifa University, United Arab Emirates) and Lounis Chermak (Cranfield University, United Kingdom)

eBook Readers, Location Surveillance and the Threat to Freedom of Association
Stephen Wicker (Cornell University, United States)

A Location Privacy Analysis of Bluetooth Mesh
Matthias Caesar (Fraunhofer SIT, Fraunhofer Institute for Secure Information Technology SIT, Germany) and Jan Steffan (Fraunhofer SIT, Fraunhofer Institute for Secure Information Technology SIT, Germany)

Location Tracking Using Smartphone Accelerometer and Magnetometer Traces
Khuong An Nguyen (Department of Computer Science, Royal Holloway, University of London, United Kingdom), Raja Naeem Akram (ISG-Smart Card Centre, Royal Holloway, University of London, United Kingdom), Konstantinos Markantonakis (ISG-Smart Card Centre, Royal Holloway, University of London, United Kingdom), Zhiyuan Luo (Royal Holloway, University of London, United Kingdom) and Chris Watkins (Royal Holloway, University of London, United Kingdom

Securing V2X Communications for the Future – Can PKI Systems offer the answer?
Thanassis Giannetsos (Technical University of Denmark, Denmark) and Ioannis Krontiris (European Research Center, Huawei Technologies, Germany)

SSE 2019


Applying Security Testing Techniques to Automotive Engineering
Irdin Pekaric (University of Innsbruck, Austria), Clemens Sauerwein (University of Innsbruck, Austria) and Michael Felderer (University of Innsbruck, Austria)

Learning Software Security in Context: An Evaluation in Open Source Software Development Environment
Shao-Fang Wen (Norwegian University of Science and Technology, Norway) and Basel Katt (Norwegian University of Science and Technology, Norway)

The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects
Inger Anne Tøndel (Norwegian University of Science and Technology, Norway), Daniela S. Cruzes (SINTEF Digital, Norway), Martin Gilje Jaatun (SINTEF Digital, Norway) and Kalle Rindell (SINTEF Digital, Norway)

Managing Security in Software Or: How I Learned to Stop Worrying and Manage the Security Technical Debt
Kalle Rindell (SINTEF Digital, Norway), Martin Gilje Jaatun (SINTEF Digital, Norway) and Karin Bernsmed (SINTEF Digital, Norway)

Model Driven Security in a Mobile Banking Application Context
Serafettin Senturk (Gebze Technical University, Turkey), Hasan Yasar (Software Engineering Institute, Carnegie Mellon University, United States) and Ibrahim Sogukpinar (Gebze Technical University, Turkey)

WCTI 2019


Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures
Hamid Reza Ghaeini (Singapore University of Technology and Design, Singapore), Nils Ole Tippenhauer (CISPA, Germany) and Jianying Zhou (Singapore University of Technology and Design, Singapore)

WISI 2019


Using Temporal and Topological Features for Intrusion Detection in Operational Networks
Simon Duque Anton (Deutsches Forschungszentrum für Künstliche Intelligenz GmbH, Germany), Daniel Fraunholz (Deutsches Forschungszentrum für Künstliche Intelligenz GmbH, Germany) and Hans Dieter Schotten (Deutsches Forschungszentrum für Künstliche Intelligenz GmbH, Germany)

Performance Evaluation of Elliptic-Curve Libraries on Automotive-Grade Microcontrollers
Lucian Popa (Politehnica University of Timisoara, Romania), Bogdan Groza (Politehnica University of Timisoara, Romania) and Pal-Stefan Murvay (Politehnica University of Timisoara, Romania)

Applicability of the IEC 62443 standard in Industry 4.0 / IIoT
Björn Leander (Mälardalen University & ABB, Sweden), Aida Causevic (Mälardalen University, Sweden) and Hans Hansson (Mälardalen University, Sweden)

Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing
Ralph Ankele (JOANNEUM RESEARCH Forschungsgesellschaft mbH, Austria), Stefan Marksteiner (AVL List GmbH, Austria), Kai Nahrgang (JOANNEUM RESEARCH Forschungsgesellschaft mbH, Austria) and Heribert Vallant (JOANNEUM RESEARCH Forschungsgesellschaft mbH, Austria)

Federated Identity Management and Interoperability for Heterogeneous Cloud Platform Ecosystems
Nirojan Selvanathan (Salzburg Research, Austria), Dileepa Jayakody (Salzburg Research, Austria) and Violeta Damjanovic-Behrendt (Salzburg Research, Austria)

WSDF 2019


Deep Learning-based Facial Detection and Recognition in Still Images for Digital Forensics
Patricio Domingues (ESTG – Leiria, Portugal) and Alexandre Frazão Rosário (IT, Portugal)

IoT Ignorance is Digital Forensics Research Bliss: A Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions
Tina Wu (University of Oxford, United Kingdom), Frank Breitinger (University of New Haven, United States) and Ibrahim Baggili (University of New Haven, United States)

A Study of Network Forensic Investigation in Docker Environments
Daniel Spiekermann (FernUniversität in Hagen, Germany), Tobias Eggendorfer (HS Weingarten, Germany) and Jörg Keller (FernUniversität in Hagen, Germany)

Assessing the Applicability of Authorship Verification Methods
Oren Halvani (The Fraunhofer Institute for Secure Information Technology SIT, Germany), Christian Winter (The Fraunhofer Institute for Secure Information Technology SIT, Germany) and Lukas Graner (The Fraunhofer Institute for Secure Information Technology SIT, Germany)

IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systems
Ahmad Atamli (Alan Turing Institute, University of Cambridge, United Kingdom), Giuseppe Petracca (The Pennsylvania State University, USA) and Jon Crowcroft (Alan Turing Institute, University of Cambridge, United Kingdom)

Map My Murder! A Digital Forensic Study of Mobile Health andFitness Applications
Courtney Hassenfeldt (University of New Haven, United States), Shabana Baig (University of New Haven, United States), Ibrahim Baggili (University of New Haven, United States) and Xiaolu Zhang (University of Texas at San Antonio, United States)

Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts
Xiaoyu Du (University College Dublin, Ireland) and Mark Scanlon (University College Dublin, Ireland)

Data Hiding Techniques for Apple File System
Thomas Göbel (University of Applied Sciences Darmstadt, Germany), Jan Türr (University of Applied Sciences Darmstadt, Germany) and Harald Baier (University of Applied Sciences Darmstadt, Germany)

Improved Manipulation Detection with Convolutional Neural Network for JPEG Images
Huajian Liu (Fraunhofer, Germany), Martin Steinebach (Fraunhofer, Germany) and Kathrin Schölei (Fraunhofer, Germany)