Friday 20.08.202

Time (UTC +2)
Room A
Room B
Room C
Room D
Room E
10:30 - 18:00
Organizers available

Questions? Neep help? Contact us at Slack!

11:00 - 12:30
ARES VI
Threat Detection
Session Chair:
Mathias Fischer, University of Hamburg, Germany

Detection of VSI-DDoS Attacks on the Edge:, A Sequential Modeling Approach

Javad Forough, Monowar Bhuyan, Erik Elmroth (Umeå University, Sweden)

Linking CVE's to MITRE ATT&CK Techniques

Aditya Kuppa (University College Dublin Ireland, Tenable Corporation, Ireland), Lamine Aouad (Tenable Corporation, France), Nhien An LEKHAC (University College Dublin, Ireland) 

OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases

Philipp Kuehn, Markus Bayer, Marc Wendelborn, Christian Reuter (Science and Technology for Peace and Security (PEASEC), Technical University of Darmstadt, Germany)

V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems

Thomas Rosenstatter, Tomas Olovsson, Magnus Almgren (Chalmers University of Technology, Sweden)

IWSMR I
Session Chair:
Steffen Wendzel, Worms University of Applied Sciences, Germany

Best Practices for Notification Studies for Security and Privacy Issues on the Internet

Max Maass (Technical University Darmstadt, Germany), Henning Pridöhl, Dominik Herrmann (Otto-Friedrich-Universität Bamberg, Germany), Matthias Hollick (Technical University Darmstadt, Germany)

Practitioners’ Views on Cybersecurity Control Adoption and Effectiveness

Louise Axon, Arnau Erola, Alastair Janse van Rensburg (University of Oxford, UK), Jason R. C. Nurse  (University of Kent, UK), Michael Goldsmith, Sadie Creese (University of Oxford, UK)

Crème de la Crème: Lessons from Papers in Top Publications

Simon Vrhovec (University of Maribor, Slovenia), Luca Caviglione (National Research Council of Italy, Italy), Steffen Wendzel (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany)

CyberTIM I
Session Chair:
Jassim Happa, Royal Holloway, University of London, UK

Keynote: CTI Then and Now - A perspective from the H2020 project PROTECTIVE and life thereafter

Brian Lee, Athlone Institute of Technology, Ireland

From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Threat Intelligence Sharing Platforms 

Clemens Sauerwein (University of Innsbruck, Austria), Daniel Fischer (Technische Universität Ilmenau, Germany), Milena Rubsamen (Technische Universität Ilmenau, Germany), Guido Rosenberger (Technische Universität Ilmenau, Germany), Dirk Stelzer (Technische Universität Ilmenau, Germany) and Ruth Breu (University of Innsbruck, Austria).

IWCC I
Session Chair:
Krzysztof Szczypiorski, Warsaw University of Technology, Poland

Keynote: Future Crimes and Hybrid Warfare – technological challenges for law-enforcement and intelligence agencies

Kacper Gradon, University College London, UK

Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic

Pascal Wichmann, Matthias Marx, Hannes Federrath (Universität Hamburg, Security in Distributed Systems, Germany), Mathias Fischer (Universität Hamburg, IT-Security and Security Management, Germany)

Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG)

Cassius Puodzius, Olivier Zendra (INRIA, France), Annelie Heuser (IRISA, France),  Lamine Noureddine (INRIA, France)

CSA I
Session Chair:
Jorge Maestre Vidal, Indra, Spain

Opening

Jorge Maestre Vidal (Indra, Spain); Gregorio Martínez Perez (Universidad de Murcia, Spain); Marco Antonio Sotelo Monge (Indra, Spain)

Keynote: Digitalization and Cybersecurity as key enablers for the EU Future Combat Air System (FCAS)

Juan Román Martínez Arranz (FCAS Digital Area Managing Coordinator at Indra, Spain)

Message-of-the-Day (MOTD) Banner Language Variations as an Adaptive Honeypot Deterrent of Unauthorized Access

Filipo Sharevski and Samuel Jevitz (DePaul University, Chicago, USA)  

Understanding the Ethical and Regulatory boundaries of the Military Actuation on the Cyberspace  

Pedro José Ramón Y Cajal Ramo and Jorge Maestre Vidal (Indra, Spain)  

12:30 - 13:30
Lunch Break
13:30 - 15:00
ARES Full VII
Machine Learning
Session Chair:
Federico Cabitza, University of Milano-Bicocca, Italy

Secure Decision Forest Evaluation

Slim Bettaieb, Loïc Bidoux (Worldline, France), Olivier Blazy (Université de Limoges, XLIM, France), Baptiste Cottier (Worldline, France; DIENS, École normale supérieure, CNRS, PSL University, Paris, France), David Pointcheval (DIENS, École normale supérieure, CNRS, PSL University, France; Inria, France)

First Step Towards EXPLAINable DGA Multiclass Classification

Arthur Drichel, Nils Faerber, Ulrike Meyer (RWTH Aachen University, Germany)

Efficient Error Prediction for Differentially Private Algorithms 

Boel Nelson (Chalmers University of Technology, Sweden)

Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks

Aidmar Wainakh, Aleksej Strassheim, Tim Grube (Telecooperation Lab, Technical University of Darmstadt, Germany), Jörg Daubert (Mathematics and Computer Science, Philipps-Universität Marburg, Germany), Max Mühlhäuser (Telecooperation Lab, Technical University of Darmstadt, Germany)

IWSMR II
Session Chair:
Aleksandra Mileva, University Goce Delcev, Macedonia

Log Abstraction for Information Security: Heuristics and Reproducibility

Rafael Copstein (Dalhousie University, Canada), Jeff Schwartzentruber (2Keys, Canada), Nur Zincir-Heywood, Malcolm I. Heywood (Dalhousie University, Canada)

Chaotic Pseudo Random Number Generators: A Case Study on Replication Study Challenges

Jörg Keller (FernUniversität in Hagen, Germany)

pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert Channels

Marco Zuppelli, Luca Caviglione (National Research Council of Italy, Italy)

CyberTIM II
Session Chair:
Jassim Happa, Royal Holloway, University of London, UK

Evaluating the Data Inconsistency of Open-Source Vulnerability Repositories

Yuning Jiang, Manfred Jeusfeld, Jianguo Ding (University of Skövde, Sweden)

Control Effectiveness: a Capture-the-Flag Study

Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith (Cybersecurity Centre, Department of Computer Science, University of Oxford, United Kingdom)  Sadie Creese (University of Oxford, United Kingdom)

Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence

Yazid Merah, Tayeb Kenaza (Ecole Militaire Polytechnique, Algeria)

Towards Improving Identity and Access Management with the IdMSecMan Process Framework

Daniela Pöhn, Sebastian Seeber (Universität der Bundeswehr München, Research Institute CODE, Munich, Germany), Tanja Hanauer (Cancom GmbH, Germany), Jule Ziegler, David Schmitz (Leibniz Supercomputing Centre,  Germany)

IWCC II
Session Chair:
Krzysztof Szczypiorski, Warsaw University of Technology, Poland

RansomClave: Ransomware Key Management using SGX

Alpesh Bhudia, Daniel O’Keeffe, Daniele Sgandurra, Darren Hurley-Smith (Royal Holloway, University of London, Information Security Group, United Kingdom)

Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs

Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer (RWTH Aachen University, Germany)

Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection

Bram van Dooremaal, Pavlo Burda, Luca Allodi and Nicola Zannone (Eindhoven University of Technology, Netherlands)

A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis

Salatiel Ezennaya-Gomez, Stefan Kiltz, Christian Kraetzer, Jana Dittmann (Otto-von-Guericke University Magdeburg, Germany)

CSA II
Session Chair:
Marco Antonio Sotelo Monge, Indra, Spain

The Stress as Adversarial Factor for Cyber Decision Making 

David Sandoval Rodríguez-Bermejo (Tarlogic, Spain), Jorge Maestre Vidal (Indra, Spain) and Juan Estévez Tapiador (Universidad Carlos III de Madrid, Spain)  

Madrid Quantum Networks: A first step to quantum internet  

Marta Irene García Cid (Indra, Spain), Laura Ortiz Martín (Universidad Politécnica de Madrid, Spain) and Vicente Martín Ayuso (Universidad Politécnica de Madrid, Spain)  

AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm

Pantaleone Nespoli (University of Murcia, Spain), Felix Gomez Marmol (University of Murcia, Spain) and Georgios Kambourakis (University of the Aegean, Greece)

Adaptive Mitigation of Tactical Denial of Sustainability 

Marco Antonio Sotelo Monge (Indra, Spain), Jorge Maestre Vidal (Indra, Spain) and Roumen Daton Medenou (Indra, Spain)  

CSA 2021 Closure and wrap-up

Jorge Maestre Vidal (Indra, Spain).  

15:00 - 15:15
Coffee Break
15:15 - 16:45
Closing & Keynote
Session Chair:
Prof. Randy Goebel, Head of the xAI Lab, University of Alberta, Edmonton, Canada

Keynote: Almost Matching Exactly

Cynthia Rudin, Professor of Computer Science, Electrical and Computer Engineering and Statistical Science at Duke University, US

Abstract: I will present a matching framework for causal inference in the potential outcomes setting called Almost Matching Exactly. This framework has several important elements: (1) Its algorithms create matched groups that are interpretable. The goal is to match treatment and control units on as many covariates as possible, or “almost exactly.” (2) Its algorithms create accurate estimates of individual treatment effects. This is because we use machine learning on a separate training set to learn which features are important for matching. The key constraint is that units are always matched on a set of covariates that together can predict the outcome well. (3) Our methods are fast and scalable. In summary, these methods rival black box machine learning methods in their estimation accuracy but have the benefit of being interpretable and easier to troubleshoot. Our lab website is here: https://almost-matching-exactly.github.io                                                            

16:45 - 17:00
short Coffee Break
17:00 - 18:30
CD-MAKE IV
Session Chair:
Peter Kieseberg, St. Pölten University of Applied Sciences, Austria

Weighted Utility: a utility metric based on the case-wise raters' perception

Andrea Campagner, Enrico Conte, Federico Cabitza (University of Milano-Bicocca, Italy)

Deep Convolutional Neural Network(CNN) design for pathology detection of COVID-19 in chest X-Ray Images

Narayana Darapaneni (Great Learning/Northwestern University, USA), Anwesh Reddy Paduri, Anindya Sil, Balaji Kagiti, Krishna Kumar S, Ramanathan NB, VasanthaKumara SB and Abdul Manuf (Great Learning, India)

Anomaly detection for skin lesion images using replicator neural networks

Fabrizio Nunnari, Hasan Md Tusfiqur Alam (German Research Center for Artificial Intelligence (DFKI), Germany), Daniel Sonntag (German Research Center for Artificial Intelligence (DFKI), Germany and Oldenburg University, Germany)

On the overlap between Grad-CAM saliency maps and explainable visual features in skin cancer images

Fabrizio Nunnari, Md. Abdul Kadir (German Research Center for Artificial Intelligence (DFKI), Germany), Daniel Sonntag (German Research Center for Artificial Intelligence (DFKI), Germany and Oldenburg University, Germany)