Friday 28.08.2020

Time (UTC +2)
Zoom Room A
Zoom Room B
Zoom Room C
Zoom Room D
11:00 - 18:00
Organizers available
11:30 - 13:30
ARES Short
Session Chair:
Oksana Kulyk (IT University of Copenhagen, Denmark)
Zoom Room A

Towards using differentially private synthetic data for Machine Learning in collaborative data science projects
Michael Holmes and George Theodorakopoulos (Cardiff University, United Kingdom)

Security Assurance Cases for Road Vehicles: an Industry Perspective
Mazen Mohamad (University of Gothenburg, Sweden), Alexander Åström (Volvo Cars, Sweden), Örjan Askerdal (AB Volvo, Sweden), Jörgen Borg (Volvo Cars, Sweden) and Riccardo Scandariato (University of Gothenburg, Sweden)

IoT Dataset Generation Framework for Evaluating Anomaly Detection Mechanisms
Andreas Meyer-Berg, Rolf Egert, Leon Böck and Max Mühlhäuser (TU Darmstadt, Germany)

Feasibility Study of a Camera-based PUF in a Realistic Scenar
Kazuihde Fukushima (KDDI Research, Inc., Japan), Thomas Perianin (Secure-IC, Japan), Victor Dyseryn (Secure-IC, France), Shinsaku Kiyomoto (KDDI Research, Inc. Japan), Sylvain Guilley (Secure-IC, France) and Adrien Facon (Département d'informatique/École normale supérieure/CNRS/PSL Research University, France)

Template-based Android Inter Process Communication Fuzzing
Anatoli Kalysch, Mark Deutel and Tilo Müller (Friedrich-Alexander University Erlangen-Nürnberg, Germany)

HIP: HSM-based Identities for Plug-and-Charge
Andreas Fuchs , Dustin Kern, Christoph Krauß and Maria Zhdanova (Fraunhofer SIT, Germany)

SoK: Why Johnny Can't Fix PGP Standardization
Harry Halpin (Inria, France)

Session Chair:
Grégoire Montavon (TU Berlin)
Zoom Room B

Applying AI in Practice: Key Challenges and Lessons Learned
Lukas Fischer (Software Competence Center Hagenberg GmbH (SCCH), Austria), Lisa Ehrlinger (Software Competence Center Hagenberg GmbH (SCCH), Austria; Johannes Kepler University, Linz, Austria), Verena Geist, Rudolf Ramler, Florian Sobieczky, Werner Zellinger and Bernhard Moser (Software Competence Center Hagenberg GmbH (SCCH), Austria)

Function Space Pooling For Graph Convolutional Networks
Padraig Corcoran (Cardiff University, Wales, United Kingdom)

Analysis of optical brain signals using connectivity graph networks
Marco A. Pinto-Orellana (Department of Mechanical, Electronics and Chemical Engineering, Faculty of Technology, Art and Design, Oslo Metropolitan University, Oslo, Norway) and Hugo L. Hammer (Department of Information Technology, Faculty of Technology, Art and Design, Oslo Metropolitan University, Oslo, Norway, Simula Metropolitan Center, Oslo Metropolitan University, Oslo, Norway)

Property-Based Testing for Parameter Learning of Probabilistic Graphical Models
Anna Saranti, Behnam Taraghi, Martin Ebner and Andreas Holzinger (Medical University of Graz, Austria)

An Ensemble Interpretable Machine Learning Scheme for Securing Data Quality at the Edge
Anna Karanika, Panagiotis Oikonomou, Kostas Kolomvatsos (University of Thessaly, Greece) and Christos Anagnostopoulos (University of Glasgow, United Kingdom)

Inter-Space Machine Learning in Smart Environments
Amin Anjomshoaa, Edward Curry (Lero – the Irish Software Research Centre, National University of Ireland, Ireland)

Session Chair:
Sheikh Mahbub Habib, Continental AG, Germany
Zoom Room C

Keynote: Machine learning for intelligent sensors
Simin Nadjm-Tehrani (Linköping University)

Making Use of NXt to Nothing: The Effect of Class Imbalances on DGA Detection Classifiers
Arthur Drichel, Ulrike Meyer (RWTH Aachen University, Germany), Samuel Schüppen and Dominik Teubert (Siemens CERT, Germany)

CyberWolf in Wall Street: Assessing Vulnerabilities of ICT-Intensive Financial Markets
Andrea Calesso (Aequo S.r.L., University of Padova, Italy) , Mauro Conti (Department of Mathematics, University of Padova, Italy) and Martino Grasselli (University of Padova - Department of Mathematics; Léonard de Vinci Pôle Universitaire, Research Center, Italy)

DoH Insight: Detecting DNS over HTTPS by Machine Learning
Dmitrii Vekshin (FIT CTU, Czechia), Karel Hynek (FIT CTU & CESNET a.l.e., Czechia) and Tomas Cejka (CESNET a.l.e., Czechia)

Session Chair:
Roberto Nardone, University of Reggio Calabria, Italy
Zoom Room D

Investigation into the Security and Privacy of iOS VPN Applications
Jack Wilson, David McLuskie and Ethan Bayne (Abertay University, UK)

Refining the evaluation of the degree of security of a system built using security patterns
Olga Villagran-Velasco (Universidad Nac. Autonoma de Mexico,Mexico), Eduardo B. Fernandez (Florida Atlantic University, USA )and Jorge Ortega-Arjona (Universidad Nac. Autonoma de Mexico, Mexico)

Adversarial Machine Learning for Spam Filters
Bhargav Kuchipudi, Ravi Teja Nannapaneni and Qi Liao (Central Michigan University, United States)

An Empirical Study on the Impact of GDPR and Right to be Forgotten on Data Privacy
Vincenzo Mangini, Irina Tal and Arghir-Nicolae Moldovan (School of Computing, National College of Ireland, Dublin, Ireland)

Automated Modelling of Security Incidents to represent Logging Requirements in Software Systems
Fanny Rivera-Ortiz and Liliana Pasquale (University College Dublin & Lero, Dublin, Ireland)

13:30 - 14:30
Lunch Break
14:30 - 15:30
Closing Keynote: CD-MAKE
Session Chair:
Andreas Holzinger (Human-Centered AI Lab (Holzinger Group), Medical University Graz, Austria)
Zoom Room A

Keynote: Explaining the Decisions of Deep Neural Networks and Beyond
Grégoire Montavon, Research Associate TU Berlin, Germany

15:30 - 16:00
Coffe Break
16:00 - 18:00
Zoom Room A

Keynote: An Overview of Research Directions for Protecting Privacy of Location Data
Gabriel Ghinita (University of Massachusetts Boston, USA)

Anonymization of geosocial network data by the (k,l)-degree method with location entropy edge selection
Jana Medková (Faculty of Informatics and Management, University of Hradec Kralove, Czechia)

A note on blind contact tracing at scale with applications to the COVID-19 pandemic
Jack Fitzsimons (Oblivious Software Ltd, Ireland), Atul Mantri (University of Maryland, United States), Robert Pisarczyk (University of Oxford, United Kingdom & National University of Singapore, Singapore), Tom Rainforth (University of Oxford, United Kingdom) and Zhikuan Zhao (ETH Zurich, Switzerland)

Session Chair:
Stefan Jaksic, AIT Austrian Institute of Technology, Austria
Zoom Room B

A Semi-Supervised Approach for Network Intrusion Detection
Radoslava Švihrová and Christian Lettner (Software Competence Center Hagenberg, Austria)

AndroPRINT: Analysing the Fingerprintability of the Android API
Gerald Palfinger (Secure Information Technology Center – Austria (A-SIT), Austria)
and Bernd Prünster (Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria)

RESCURE: A security solution for IoT life cycle
Georgios Selimis, Rui Wang, Roel Maes, Geert-Jan Schrijen (Intrinsic ID, Eindhoven Netherlands), Mario Munzer, Stefan Ilic (Technikon, Villach Austria9, Frans Willems and Lieneke Kusters (Technical University Eindhoven, Netherlands)

Improving security in Industry 4.0 by extending OPC-UA with Usage Control
Oleksii Osliak, Andrea Saracino, Fabio Martinelli and Paolo Mori (Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Italy)

Automated Security Test Generation for MQTT Using Attack Patterns
Hannes Sochor, Flavio Ferrarotti and Rudolf Ramler (Software Competence Center Hagenberg, Austria)

Session Chair:
Peter Kieseberg (St. Pölten University of Applied Sciences, Austria)
Zoom Room C
16:00 - 18:00

VisualDroid: Automatic Triage and Detection of Android Repackaged Applications
Rosangela Casolare (University of Molise, Italy), Francesco Mercaldo (University of Molise & IIT-CNR, Italy),  Carlo De Dominicis(University of Molise, Italy), Fabio Martinelli (IIT-CNR, Italy), Antonella Santone(University of Molise, Italy)

ASAINT: A Spy App Identification System based on Network Traffic
Mauro Conti (University of Padua, Italy), Giulio Rigoni (University of Florence, Italy) and Flavio Toffalini (Singapore University of Technology and Design, Singapore)

Towards the performance evaluation of a Clustering and Trust based Security mechanism for VANET
Amira Kchaou, Ryma Abassi and Sihem Guemara (Higher school of communications of Tunis, Tunisia)

Memory Corruption Attacks within Android TEEs: A Case Study Based on OP-TEE
Fabian Fleischer, Marcel Busch and Phillip Kuhrt (IT Security Infrastructures Lab, Department of Computer Science Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany)

A hardware implementation of the Device Identifier Composition Engine
Lukas Jäger and Richard Petri (Fraunhofer Institute for Secure Information Technology, Germany)

Session Chair:
Aidmar Wainakh, TU Darmstadt, Germany
Zoom Room D

A Silver Bullet? A Comparison of Accountants and Developers Mental Models in the Raise of Blockchain
Rose Esmander (École Supérieure de Commerce de Paris (ESCP) & Be-Studys, Be-Ys group, France), Pascal Lafourcade (Université Clermont Auvergne, LIMOS, France), Marius Lombard-Platet (DIENS, École normale supérieure, CNRS, PSL Research University,& Be-Studys, Be-Ys group, France) and Claudia Negri Ribalta (CRI, Université Paris-1 Pantheon-Sorbonn & Be-Studys, Be-Ys group, France)

Balancing Trust and Privacy in Computer-Mediated Introduction
Angela Borchert, Nicolás Emilio Díaz Ferreyra and Maritta Heisel (University of Duisburg-Essen, Germany)

Panel Discussion

Ass. Prof. Ben Wagner (Vienna University of Economics and Business)

Ass. Prof. Stephen Marsh (Ontario Techn University)

Dr. Stefan Schiffner (University of Luxembourg)