10:00 - 18:30 | |
---|
10:30 - 12:30 | Integer Overflow Detection with Delayed Runtime Test
Zhen Huang, Xiaowei Yu (DePaul University, USA)
VTDroid: Value-based Tracking for Overcoming Anti-Taint-Analysis Techniques in Android Apps
Hiroki Inayoshi, Shohei Kakei (Nagoya Institute of Technology, Japan), Eiji Takimoto (Hiroshima Institute of Technology, Japan), Koichi Mouri (Ritsumeikan University, Japan), Shoichi Saito (Nagoya Institute of Technology, Japan)
Grand Theft App: Digital Forensics of Vehicle Assistant Apps
Simon Ebbers, Fabian Ising, Christoph Saatjohann, Sebastian Schinzel (Münster University of Applied Sciences, Germany)
Self-Determined Reciprocal Recommender System with Strong Privacy Guarantees
Saskia Nuñez von Voigt, Erik Daniel, Florian Tschorsch (TU Berlin, Germany) In-vehicle detection of targeted CAN bus attacks
Florian Fenzl, Roland Rieke (Fraunhofer Institute for Secure Information Technology, Germany), Andreas Dominik (THM University of Applied Sciences, Germany)
Adversarial Examples Against a BERT ABSA Model –Fooling Bert With L33T, Misspellign, and Punctuation
Nora Hofer (DeepOpinion, Austria), Pascal Schöttle (Management Center Innsbruck - Digital Business & Software Engineering, Austria), Alexander Riezler, Sebastian Stabinger (DeepOpinion, Austria) | From Explainable to Reliable Artificial Intelligence
Sara Narteni, Melissa Ferretti, Vanessa Orani, Ivan Vaccari, Enrico Cambiaso, Maurizio Mongelli (Consiglio Nazionale delle Ricerche - Institute of Electronics, Information Engineering and Telecommunications (CNR-IEIIT), Italy)
Explanatory Pluralism in Explainable AI
Yiheng Yao (Philosophy-Neuroscience-Psychology Program, Washington University in St. Louis, USA)
On the Trustworthiness of Tree Ensemble Explainability Methods
Angeline Yasodhara, Azin Asgarian, Diego Huang Parinaz Sobhani (Georgian, Canada)
Human-in-the-loop model explanation via verbatim boundary identification in generated neighborhoods
Xianlong Zeng, Fanghao Song, Zhongen Li, Krerkkiat Chusap, Chang Liu (Ohio University, Electrical Engineering and Computer Science, USA)
MAIRE - A Model-Agnostic Interpretable Rule Extraction Procedure for Explaining Classifiers
Rajat Sharma, Nikhil Reddy, Vidhya Kamakshi, Narayanan C Krishnan, Shweta Jain (Indian Institute of Technology Ropar, India)
Transparent Ensembles for Covid-19 Prognosis
Guido Bologna (University of Applied Sciences and Arts of Western Switzerland, Switzerland) | | Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels
Tobias Schmidbauer (FernUniversität in Hagen, Germany), Steffen Wendzel (Worms University of Applied Sciences, Germany)
Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels
Yulduz Khodjaeva, Dr. Nur Zincir-Heywood (Dalhousie University, Faculty of Computer Science, Canada)
Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels
Piotr Nowakowski, Piotr Żórawski, Krzysztof Cabaj, Wojciech Mazurczyk (Warsaw University of Technology, Poland)
| Welcome by Virginia Franqueira, University of Kent, UK
Keynote: Internet-of-Forensics: A Decentralized Evidence Management System
Rahul Saha, SPRITZ research group, University of Padova, Italy
Two Truths and a Lie: Exploring Soft Moderation of COVID-19 Misinformation with Amazon Alexa
Donald Gover, Filipo Sharevski (DePaul University, USA)
Bloom Filter based Collective Remote Attestation for Dynamic Networks
Salvatore Frontera, Riccardo Lazzeretti (Sapienza University of Rome, Italy)
A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol
Qi Liu, Hubert B. Keller, Veit Hagenmeyer (Karlsruhe Institute of Technology, Germany)
DoS Attacks in Available MQTT Implementations - Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections
Umberto Morelli (Fondazione Bruno Kessler, Italy), Ivan Vaccari (Consiglio Nazionale delle Ricerche, Italy), Silvio Ranise (Università degli Studi di Trento and Fondazione Bruno Kessler, Italy), Enrico Cambiaso (Consiglio Nazionale delle Ricerche, Italy)
Announcement of best paper award & final remarks by Virginia Franqueira, University of Kent, UK | SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications
Rosangela Casolare (University of Molise, Pesche (IS) - Italy), Giovanni Ciaramella (IIT-CNR & University of Molise, Pisa - Italy), Fabio Martinelli (IIT-CNR, Pisa - Italy), Francesco Mercaldo (University of Molise & IIT-CNR, Campobasso - Italy), Antonella Santone (University of Molise, Campobasso - Italy)
Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs
Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi and Sihem Guemara El Fatmi (Digital Security Research Laboratory, Higher School of Communication of Tunis (SUP’COM), University of Carthage, Tunisia)
Multi-View Learning for Repackaged Malware Detection
Shirish Singh (Columbia University, USA), Kushagra Chaturvedy (The LNMIIT, India), Bharavi Mishra (The LNMIIT, India)
Formal Validation of a Security Mechanism against the RSU Compromise Attack
Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss and Sihem Guemara El Fatmi (Digital Security Research Laboratory, Higher School of Communication of Tunis (SUP’COM), University of Carthage, Tunisia)
An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case
Christian Wolschke (Fraunhofer IESE Kaiserslautern, Germany), Stefan Marksteiner (AVL List GmbH Graz, Austria), Tobias Braun (Fraunhofer IESE Kaiserslautern, Germany), Markus Wolf (AVL List GmbH Graz, Austria) |
---|
12:30 - 13:00 | |
---|
13:00 - 14:30 | Keynote: Secure and Privacy-Conscious Federated Analytics
Jean-Pierre Hubaux, Head of Laboratory for Data Security (LDS), EPFL – Station 14, Switzerland
Abstract: In this talk, we address the problem of privacy-preserving training and evaluation of neural networks in an N-party, federated learning setting. We propose a novel system, POSEIDON, the first of its kind in the regime of privacy-preserving neural network training. It employs multiparty lattice-based cryptography to preserve the confidentiality of the training data, the model, and the evaluation data, under a passive-adversary model and collusions between up to N−1 parties. To efficiently execute the secure backpropagation algorithm for training neural networks, we provide a generic packing approach that enables Single Instruction, Multiple Data (SIMD) operations on encrypted data. We also introduce arbitrary linear transformations within the cryptographic bootstrapping operation, optimizing the costly cryptographic computations over the parties, and we define a constrained optimization problem for choosing the cryptographic parameters. We will also mention Lattigo, our open-source cryptographic library on which POSEIDON is based. Our experimental results show that POSEIDON achieves accuracy similar to centralized or decentralized non-private approaches and that its computation and communication overhead scales linearly with the number of parties. We will then explain how we are using this technique for the federated analysis of medical data, in particular for genome-wide association studies. |
---|
14:30 - 15:00 | |
---|
15:00 - 16:30 | Optimizing Packet Scheduling and Path Selection for Anonymous Voice Calls
David Schatz, Michael Rossberg, Guenter Schaefer (Technische Universität Ilmenau, Germany)
How Lightning’s Routing Diminishes its Anonymity
Satwik Prabhu Kumble, Dick Epema, Stefanie Roos (TU Delft, Netherlands)
How Private is Android's Private DNS Setting? Identifying Apps by Encrypted DNS Traffic
Michael Mühlhauser, Henning Pridöhl, Dominik Herrmann (University of Bamberg, Germany)
FADE: Detecting Fake News Articles on the Web
Bahruz Jabiyev (Northeastern University, Boston, MA, USA), Sinan Pehlivanoglu (Brown University, USA), Kaan Onarlioglu (Akamai Technologies, USA), Engin Kirda (Northeastern University, USA) | Rice seed image-to-image translation using Generative Adversarial Networks to improve weedy rice image classification
Atthakorn Petchsod, Tanasai Sucontphunt (National Institute of Development Administration, Bangkok, Thailand)
Reliable AI through SVDD and rule extraction
Alberto Carlevaro (University of Genoa, Italy), Maurizio Mongelli (CNR-IEIIT, Italy)
Airbnb Price Prediction Using Machine Learning and Sentiment Analysis
Pouya Rezazadeh Kalehbasti (Stanford University, USA), Liubov Nikolenko and Hoormazd Rezaei (Stanford University, USA)
Towards Financial Sentiment Analysis in a South African Landscape
Michelle Terblanche, Vukosi Marivate (Department of Computer Science, University of Pretoria, South Africa) | Continuous User Authentication for Human-Robot Collaboration
Shurook S. Almohamade, John A. Clark, James Law (The university of Sheffield , UK) | Risks and Opportunities for Information Hiding in DICOM Standard
Aleksandra Mileva (Faculty of Computer Science, University Goce Delcev, Macedonia), Luca Caviglione (National Research Council of Italy, Italy), Aleksandar Velinov (Faculty of Computer Science, University Goce Delcev, Stip, N. Macedonia), Steffen Wendzel (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany) and Vesna Dimitrova (Faculty of Computer Science and Engineering, Ss Cyril and Methodius University Skopje, Macedonia)
Data Hiding Using Code Obfuscation
Pawel Rajba (University of Wroclaw, Poland), Wojciech Mazurczyk (Warsaw University of Technology, Poland)
Discovery of Single-Vendor Marketplace Operators in the Tor-Network
Fabian Brenner, Florian Platzer, Martin Steinebach (Fraunhofer SIT, Germany)
exHide: Hiding Data within the exFAT File System
Julian Heeger, York Yannikos, Martin Steinebach (Fraunhofer SIT, Germany)
Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures
Alexander Hartl, Joachim Fabini (TU Wien, Austria), Christoph Roschger (Technologisches Gewerbemuseum, Austria), Peter Eder-Neuhauser, Marco Petrovic, Roman Tobler (Wiener Netze GmbH, Austria), Tanja Zseby (TU Wien, Austria) | Keynote: Towards the use of AI in digital investigation
Hans Henseler, Netherlands Forensic Institute, Netherlands
Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts
Tyler Balon, Krikor Herlopian, Ibrahim Baggili, Cinthya Grajeda-Mendez (University of New Haven, USA)
Time for Truth: Forensic Analysis of NTFS Timestamps
Michael Galhuber (St. Pölten University of Applied Sciences, Austria), Robert Luh (University of Vienna, Austria & St. Pölten University of Applied Sciences, Austria)
User action representation and automated reasoning for the forensic analysis of mobile devices
Cosimo Anglano, Massimo Canonico, Laura Giordano, Marco Guazzone and Daniele Theseider Dupré (DISIT, Università del Piemonte Orientale, Italy) | Project Coltrane and Methodology
Jerry Andriessen (Wise&Munro, The Netherlands), Gerald Quirchmayr (University of Vienna, Austria), Vittorio Scarano (University of Salerno, Italy) |
---|
16:30 - 17:00 | |
---|
17:00 - 18:30 | MESH: A Memory-Efficient Safe Heap for C/C++
Emanuel Q. Vintila, Philipp Zieris, Julian Horsch (Fraunhofer AISEC, Germany)
I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts
Enrico Bacis, Dario Facchinetti (Università degli Studi di Bergamo, Italy), Marco Guarnieri (IMDEA Software Institute, Spain), Marco Rosa (SAP Security Research, France), Matthew Rossi, Stefano Paraboschi (Università degli Studi di Bergamo, Italy)
Virtual Knowledge Graphs for Federated Log Analysis
Kabul Kurniawan (Vienna University of Economics and Business, Austria), Andreas Ekelhart (SBA Research, Austria), Elmar Kiesling (Vienna University of Economics and Business, Austria), Dietmar Winkler (Vienna University of Technology, Austria), Gerald Quirchmayr (University of Vienna, Austria), A Min Tjoa (Vienna University of Technology, Austria)
RapidVMI: Fast and multi-core aware active virtual machine introspection
Thomas Dangl, Benjamin Taubmann, Hans P. Reiser (University of Passau, Germany) | Invited Talk: Threat modeling of cyber-physical systems in practice
Lotfi ben Othmane, Iowa State University, USA
Software Development Processes for ADs, SMCs and OSCssupporting Usability, Security, and Privacy Goals – an Overview
Tim Bender, Rolf Huesmann, Prof. Dr. Andreas Heinemann (Hochschule Darmstadt, Germany)
Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity Challenges
Tiago Espinha Gasiba (Siemens AG Munich, Germany), Iosif Andrei-Cristian (Technische Universität München, Siemens AG Munich, Germany), Ulrike Lechner (Universität der Bundeswehr München Neubiberg, Germany), Maria Pinto-Albuquerque (Instituto Universitário de Lisboa (ISCTE-IUL), ISTAR Lisboa, Portugal)
A Serious Game Design Framework for Software Developers to Put GDPR into Practice
Abdulrahman Alhazmi (The Department of Computer Science and IT, School of Engineering and Mathematical Sciences at La Trobe University, Australia), Nalin Asanka Gamagedara Arachchilage (The School of Computer Science, The University of Auckland, New Zealand and The Department of Computer Science and IT, School of Engineering and Mathematical Sciences, La Trobe University, Australia)
| Modeling of Personalized Privacy Disclosure Behavior: A Formal Method Approach
A K M Nuhil Mehdy and, Hoda Mehrpouyan (Boise State University, USA)
Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments
Andraž Krašovec (European Comission, Joint Research Centre (JRC), Italy, and University of Ljubljana, Faculty of Computer and Information Science, Slovenia), Gianmarco Baldini (European Comission, Joint Research Centre (JRC), Italy), Veljko Pejović (University of Ljubljana, Faculty of Computer and Information Science, Slovenia)
A Medium-Interaction Emulation and Monitoring System for Operational Technology
Stefano Bistarelli, Emanuele Bosimini, Francesco Santini (University of Perugia, Italy)
A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection
Stefano Petrocchi (Department of Information Engineering, University of Pisa, Italy), Giacomo Giorgi (Institute for Informatics and Telematics, National Research Council of Italy, Italy), Mario G. C. A. Cimino (Department of Information Engineering, University of Pisa, Italy) | Keynote: The Impact of AI on Location Privacy
Prof. Stephen B. Wicker, Cornell University, USA
Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets
Antoine Boutet (Univ Lyon, INSA Lyon, Inria, CITI, France), Sonia Ben Mokhtar (Univ Lyon, INSA Lyon, LIRIS, France )
A clustering approach to anonymize locations during dataset de-identification
Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens (imec-DistriNet, Belgium)
Template Protected Authentication based on Location History and b-Bit MinHash
Masakazu Fujio, Kenta Takahashi, Yosuke Kaga, Wataru Nakamura, Yoshiko Yasumura (Research and Development Group, Hitachi, Ltd., Japan) Rie Shigetomi Yamaguchi (Social ICT Research Center, University of Tokyo, Japan) | JPEG File Fragmentation Point Detection using Huffman Code and Quantization Array Validation
Vincent van der Meer (Zuyd University of Applied Sciences, The Netherlands), Jeroen van den Bos (Netherlands Forensic Institute, The Netherlands)
POSNoise: An Effective Countermeasure Against Topic Biases in Authorship Analysis
Oren Halvani, Lukas Graner (Fraunhofer Institute for Secure Information Technology SIT, Germany)
Risk-Oriented Design Approach For Forensic-Ready Software Systems
Lukas Daubner (Faculty of Informatics, Masaryk University, Czech Republic), Raimundas Matulevičius (University of Tartu, Estonia)
What should we pay attention to when classifying violent videos?
Marcos Teixeira, Institute of Computing and Sandra Avila (Institute of Computing, University of Campinas, Brazil)
Forensicast: A Nonintrusive Approach \& Tool For Logical Forensic Acquisition \& Analysis of The Google Chromecast TV
Alex Sitterer, Nicholas Dubois, Ibrahim Baggili (Connecticut Institute of Technology, University of New Haven, USA)
Announcement of best paper award by Virginia Franqueira, University of Kent, UK | Requirements and needs for cyber security teaching
Steven Furnell (University of Nottingham, United Kingdom), Teemu Tokola (Oulun Yliopisto, Finland) |
---|
19:00 - 20:00 | Award Ceremony, Raffle, ARES Signature Drink |
---|