Time (UTC +2) | Room A | Room B | Room C | Room D | Room E |
---|---|---|---|---|---|
10:30 - 18:00 | Organizers available Questions? Neep help? Contact us at Slack! | ||||
11:00 - 12:30 | Detection of VSI-DDoS Attacks on the Edge:, A Sequential Modeling Approach Javad Forough, Monowar Bhuyan, Erik Elmroth (Umeå University, Sweden) Linking CVE's to MITRE ATT&CK Techniques Aditya Kuppa (University College Dublin Ireland, Tenable Corporation, Ireland), Lamine Aouad (Tenable Corporation, France), Nhien An LEKHAC (University College Dublin, Ireland) OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases Philipp Kuehn, Markus Bayer, Marc Wendelborn, Christian Reuter (Science and Technology for Peace and Security (PEASEC), Technical University of Darmstadt, Germany) V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems Thomas Rosenstatter, Tomas Olovsson, Magnus Almgren (Chalmers University of Technology, Sweden) | Best Practices for Notification Studies for Security and Privacy Issues on the Internet Max Maass (Technical University Darmstadt, Germany), Henning Pridöhl, Dominik Herrmann (Otto-Friedrich-Universität Bamberg, Germany), Matthias Hollick (Technical University Darmstadt, Germany) Practitioners’ Views on Cybersecurity Control Adoption and Effectiveness Louise Axon, Arnau Erola, Alastair Janse van Rensburg (University of Oxford, UK), Jason R. C. Nurse (University of Kent, UK), Michael Goldsmith, Sadie Creese (University of Oxford, UK) Crème de la Crème: Lessons from Papers in Top Publications Simon Vrhovec (University of Maribor, Slovenia), Luca Caviglione (National Research Council of Italy, Italy), Steffen Wendzel (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany) | Keynote: CTI Then and Now - A perspective from the H2020 project PROTECTIVE and life thereafter Brian Lee, Athlone Institute of Technology, Ireland From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Threat Intelligence Sharing Platforms Clemens Sauerwein (University of Innsbruck, Austria), Daniel Fischer (Technische Universität Ilmenau, Germany), Milena Rubsamen (Technische Universität Ilmenau, Germany), Guido Rosenberger (Technische Universität Ilmenau, Germany), Dirk Stelzer (Technische Universität Ilmenau, Germany) and Ruth Breu (University of Innsbruck, Austria). | Keynote: Future Crimes and Hybrid Warfare – technological challenges for law-enforcement and intelligence agencies Kacper Gradon, University College London, UK Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic Pascal Wichmann, Matthias Marx, Hannes Federrath (Universität Hamburg, Security in Distributed Systems, Germany), Mathias Fischer (Universität Hamburg, IT-Security and Security Management, Germany) Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG) Cassius Puodzius, Olivier Zendra (INRIA, France), Annelie Heuser (IRISA, France), Lamine Noureddine (INRIA, France) | Opening Jorge Maestre Vidal (Indra, Spain); Gregorio Martínez Perez (Universidad de Murcia, Spain); Marco Antonio Sotelo Monge (Indra, Spain) Keynote: Digitalization and Cybersecurity as key enablers for the EU Future Combat Air System (FCAS) Juan Román Martínez Arranz (FCAS Digital Area Managing Coordinator at Indra, Spain) Message-of-the-Day (MOTD) Banner Language Variations as an Adaptive Honeypot Deterrent of Unauthorized Access Filipo Sharevski and Samuel Jevitz (DePaul University, Chicago, USA) Understanding the Ethical and Regulatory boundaries of the Military Actuation on the Cyberspace Pedro José Ramón Y Cajal Ramo and Jorge Maestre Vidal (Indra, Spain) |
12:30 - 13:30 | Lunch Break | ||||
13:30 - 15:00 | ARES Full VII Machine Learning Session Chair: Federico Cabitza, University of Milano-Bicocca, Italy Secure Decision Forest Evaluation Slim Bettaieb, Loïc Bidoux (Worldline, France), Olivier Blazy (Université de Limoges, XLIM, France), Baptiste Cottier (Worldline, France; DIENS, École normale supérieure, CNRS, PSL University, Paris, France), David Pointcheval (DIENS, École normale supérieure, CNRS, PSL University, France; Inria, France) First Step Towards EXPLAINable DGA Multiclass Classification Arthur Drichel, Nils Faerber, Ulrike Meyer (RWTH Aachen University, Germany) Efficient Error Prediction for Differentially Private Algorithms Boel Nelson (Chalmers University of Technology, Sweden) Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks Aidmar Wainakh, Aleksej Strassheim, Tim Grube (Telecooperation Lab, Technical University of Darmstadt, Germany), Jörg Daubert (Mathematics and Computer Science, Philipps-Universität Marburg, Germany), Max Mühlhäuser (Telecooperation Lab, Technical University of Darmstadt, Germany) | Log Abstraction for Information Security: Heuristics and Reproducibility Rafael Copstein (Dalhousie University, Canada), Jeff Schwartzentruber (2Keys, Canada), Nur Zincir-Heywood, Malcolm I. Heywood (Dalhousie University, Canada) Chaotic Pseudo Random Number Generators: A Case Study on Replication Study Challenges Jörg Keller (FernUniversität in Hagen, Germany) pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert Channels Marco Zuppelli, Luca Caviglione (National Research Council of Italy, Italy) | Evaluating the Data Inconsistency of Open-Source Vulnerability Repositories Yuning Jiang, Manfred Jeusfeld, Jianguo Ding (University of Skövde, Sweden) Control Effectiveness: a Capture-the-Flag Study Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith (Cybersecurity Centre, Department of Computer Science, University of Oxford, United Kingdom) Sadie Creese (University of Oxford, United Kingdom) Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence Yazid Merah, Tayeb Kenaza (Ecole Militaire Polytechnique, Algeria) Towards Improving Identity and Access Management with the IdMSecMan Process Framework Daniela Pöhn, Sebastian Seeber (Universität der Bundeswehr München, Research Institute CODE, Munich, Germany), Tanja Hanauer (Cancom GmbH, Germany), Jule Ziegler, David Schmitz (Leibniz Supercomputing Centre, Germany) | RansomClave: Ransomware Key Management using SGX Alpesh Bhudia, Daniel O’Keeffe, Daniele Sgandurra, Darren Hurley-Smith (Royal Holloway, University of London, Information Security Group, United Kingdom) Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer (RWTH Aachen University, Germany) Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection Bram van Dooremaal, Pavlo Burda, Luca Allodi and Nicola Zannone (Eindhoven University of Technology, Netherlands) A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis Salatiel Ezennaya-Gomez, Stefan Kiltz, Christian Kraetzer, Jana Dittmann (Otto-von-Guericke University Magdeburg, Germany) | The Stress as Adversarial Factor for Cyber Decision Making David Sandoval Rodríguez-Bermejo (Tarlogic, Spain), Jorge Maestre Vidal (Indra, Spain) and Juan Estévez Tapiador (Universidad Carlos III de Madrid, Spain) Madrid Quantum Networks: A first step to quantum internet Marta Irene García Cid (Indra, Spain), Laura Ortiz Martín (Universidad Politécnica de Madrid, Spain) and Vicente Martín Ayuso (Universidad Politécnica de Madrid, Spain) AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm Pantaleone Nespoli (University of Murcia, Spain), Felix Gomez Marmol (University of Murcia, Spain) and Georgios Kambourakis (University of the Aegean, Greece) Adaptive Mitigation of Tactical Denial of Sustainability Marco Antonio Sotelo Monge (Indra, Spain), Jorge Maestre Vidal (Indra, Spain) and Roumen Daton Medenou (Indra, Spain) CSA 2021 Closure and wrap-up Jorge Maestre Vidal (Indra, Spain). |
15:00 - 15:15 | Coffee Break | ||||
15:15 - 16:45 | Closing & Keynote Session Chair: Prof. Randy Goebel, Head of the xAI Lab, University of Alberta, Edmonton, Canada Keynote: Almost Matching Exactly Cynthia Rudin, Professor of Computer Science, Electrical and Computer Engineering and Statistical Science at Duke University, US Abstract: I will present a matching framework for causal inference in the potential outcomes setting called Almost Matching Exactly. This framework has several important elements: (1) Its algorithms create matched groups that are interpretable. The goal is to match treatment and control units on as many covariates as possible, or “almost exactly.” (2) Its algorithms create accurate estimates of individual treatment effects. This is because we use machine learning on a separate training set to learn which features are important for matching. The key constraint is that units are always matched on a set of covariates that together can predict the outcome well. (3) Our methods are fast and scalable. In summary, these methods rival black box machine learning methods in their estimation accuracy but have the benefit of being interpretable and easier to troubleshoot. Our lab website is here: https://almost-matching-exactly.github.io | ||||
16:45 - 17:00 | short Coffee Break | ||||
17:00 - 18:30 | CD-MAKE IV Session Chair: Peter Kieseberg, St. Pölten University of Applied Sciences, Austria Weighted Utility: a utility metric based on the case-wise raters' perception Andrea Campagner, Enrico Conte, Federico Cabitza (University of Milano-Bicocca, Italy) Deep Convolutional Neural Network(CNN) design for pathology detection of COVID-19 in chest X-Ray Images Narayana Darapaneni (Great Learning/Northwestern University, USA), Anwesh Reddy Paduri, Anindya Sil, Balaji Kagiti, Krishna Kumar S, Ramanathan NB, VasanthaKumara SB and Abdul Manuf (Great Learning, India) Anomaly detection for skin lesion images using replicator neural networks Fabrizio Nunnari, Hasan Md Tusfiqur Alam (German Research Center for Artificial Intelligence (DFKI), Germany), Daniel Sonntag (German Research Center for Artificial Intelligence (DFKI), Germany and Oldenburg University, Germany) On the overlap between Grad-CAM saliency maps and explainable visual features in skin cancer images Fabrizio Nunnari, Md. Abdul Kadir (German Research Center for Artificial Intelligence (DFKI), Germany), Daniel Sonntag (German Research Center for Artificial Intelligence (DFKI), Germany and Oldenburg University, Germany) |