Thursday 19.08.2021

Time (UTC +2)
Room A
Room B
Room C
Room D
Room E
Room F
10:00 - 18:30
Organizers available
10:30 - 12:30
ARES Short
Session Chair:
Peter Kieseberg, Josef Ressel Center Blockchains, St. Pölten University of Applied Sciences, Austria

Integer Overflow Detection with Delayed Runtime Test

Zhen Huang, Xiaowei Yu (DePaul University, USA)

 VTDroid: Value-based Tracking for Overcoming Anti-Taint-Analysis Techniques in Android Apps

Hiroki Inayoshi, Shohei Kakei (Nagoya Institute of Technology, Japan), Eiji Takimoto (Hiroshima Institute of Technology, Japan), Koichi Mouri (Ritsumeikan University, Japan), Shoichi Saito (Nagoya Institute of Technology, Japan)

Grand Theft App: Digital Forensics of Vehicle Assistant Apps

Simon Ebbers, Fabian Ising, Christoph Saatjohann, Sebastian Schinzel (Münster University of Applied Sciences, Germany)

 Self-Determined Reciprocal Recommender System with Strong Privacy Guarantees

Saskia Nuñez von Voigt, Erik Daniel, Florian Tschorsch (TU Berlin, Germany)

In-vehicle detection of targeted CAN bus attacks

Florian Fenzl, Roland Rieke (Fraunhofer Institute for Secure Information Technology, Germany), Andreas Dominik (THM University of Applied Sciences, Germany)


Adversarial Examples Against a BERT ABSA Model –Fooling Bert With L33T, Misspellign, and Punctuation,

Nora Hofer (DeepOpinion, Austria), Pascal Schöttle (Management Center Innsbruck - Digital Business & Software Engineering, Austria), Alexander Riezler, Sebastian Stabinger (DeepOpinion, Austria)


From Explainable to Reliable Artificial Intelligence

Sara Narteni, Melissa Ferretti, Vanessa Orani, Ivan Vaccari, Enrico Cambiaso, Maurizio Mongelli (Consiglio Nazionale delle Ricerche - Institute of Electronics, Information Engineering and Telecommunications (CNR-IEIIT), Italy)


Explanatory Pluralism in Explainable AI

Yiheng Yao (Philosophy-Neuroscience-Psychology Program, Washington University in St. Louis, USA)


On the Trustworthiness of Tree Ensemble Explainability Methods

Angeline Yasodhara, Azin Asgarian, Diego Huang Parinaz Sobhani (Georgian, Canada)

Human-in-the-loop model explanation via verbatim boundary identification in generated neighborhoods     

Xianlong Zeng, Fanghao Song, Zhongen Li, Krerkkiat Chusap, Chang Liu (Ohio University, Electrical Engineering and Computer Science, USA)

MAIRE - A Model-Agnostic Interpretable Rule Extraction Procedure for Explaining Classifiers

Rajat Sharma, Nikhil Reddy, Vidhya Kamakshi, Narayanan C Krishnan, Shweta Jain (Indian Institute of Technology Ropar, India)  

Transparent Ensembles for Covid-19 Prognosis

Guido Bologna (University of Applied Sciences and Arts of Western Switzerland, Switzerland)

Session Chair:
Peter Kieseberg, Josef Ressel Center Blockchains, St. Pölten University of Applied Sciences, Austria

Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels

Tobias Schmidbauer (FernUniversität in Hagen, Germany), Steffen Wendzel (Worms University of Applied Sciences, Germany)

Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels

Yulduz Khodjaeva, Dr. Nur Zincir-Heywood (Dalhousie University, Faculty of Computer Science, Canada)

Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels

Piotr Nowakowski, Piotr Żórawski, Krzysztof Cabaj, Wojciech Mazurczyk (Warsaw University of Technology, Poland) 


Session Chair:
Aleksandra Mileva, Faculty of Computer Science, University Goce Delcev, Macedonia

Welcome: Virginia Franqueira, University of Kent, UK

Keynote: Internet-of-Forensics: A Decentralized Evidence Management System

Rahul Saha, SPRITZ research group, University of Padova, Italy

Two Truths and a Lie: Exploring Soft Moderation of COVID-19 Misinformation with Amazon Alexa

Donald Gover, Filipo Sharevski (DePaul University, USA) 


Bloom Filter based Collective Remote Attestation for Dynamic Networks

Salvatore Frontera, Riccardo Lazzeretti (Sapienza University of Rome, Italy)

A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol.

Qi Liu, Hubert B. Keller, Veit Hagenmeyer (Karlsruhe Institute of Technology, Germany)


DoS Attacks in Available MQTT Implementations - Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections

Umberto Morelli (Fondazione Bruno Kessler, Italy), Ivan Vaccari (Consiglio Nazionale delle Ricerche, Italy), Silvio Ranise (Università degli Studi di Trento and Fondazione Bruno Kessler, Italy), Enrico Cambiaso (Consiglio Nazionale delle Ricerche, Italy)


Announcement of best paper award & final remarks (Virginia Franqueira, University of Kent, UK)

Session Chair:
Peter Kieseberg, Josef Ressel Center Blockchains, St. Pölten University of Applied Sciences, Austria

SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications

Rosangela Casolare (University of Molise, Pesche (IS) - Italy), Giovanni Ciaramella (IIT-CNR & University of Molise, Pisa - Italy), Fabio Martinelli (IIT-CNR, Pisa - Italy), Francesco Mercaldo (University of Molise & IIT-CNR, Campobasso - Italy), Antonella Santone (University of Molise, Campobasso - Italy)

Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs

Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi and Sihem Guemara El Fatmi (Digital Security Research Laboratory, Higher School of Communication of Tunis (SUP’COM), University of Carthage, Tunisia)

 Multi-View Learning for Repackaged Malware Detection

Shirish Singh (Columbia University, USA), Kushagra Chaturvedy (The LNMIIT, India), Bharavi Mishra (The LNMIIT, India)

Formal Validation of a Security Mechanism against the RSU Compromise Attack

Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss and Sihem Guemara El Fatmi (Digital Security Research Laboratory, Higher School of Communication of Tunis (SUP’COM), University of Carthage, Tunisia)

An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case

Christian Wolschke (Fraunhofer IESE Kaiserslautern, Germany), Stefan Marksteiner (AVL List GmbH Graz, Austria), Tobias Braun (Fraunhofer IESE Kaiserslautern, Germany), Markus Wolf (AVL List GmbH Graz, Austria)

12:30 - 13:00
short Lunch Break
13:00 - 14:30
Session Chair:
Delphine Reinhardt, University of Göttingen, Germany
Room A

Keynote: Secure and Privacy-Conscious Federated Analytics

Jean-Pierre Hubaux, Head of Laboratory for Data Security (LDS), EPFL – Station 14, Switzerland

Abstract: In this talk, we address the problem of privacy-preserving training and evaluation of neural networks in an N-party, federated learning setting. We propose a novel system, POSEIDON, the first of its kind in the regime of privacy-preserving neural network training. It employs multiparty lattice-based cryptography to preserve the confidentiality of the training data, the model, and the evaluation data, under a passive-adversary model and collusions between up to N−1 parties. To efficiently execute the secure backpropagation algorithm for training neural networks, we provide a generic packing approach that enables Single Instruction, Multiple Data (SIMD) operations on encrypted data. We also introduce arbitrary linear transformations within the cryptographic bootstrapping operation, optimizing the costly cryptographic computations over the parties, and we define a constrained optimization problem for choosing the cryptographic parameters. We will also mention Lattigo, our open-source cryptographic library on which POSEIDON is based. Our experimental results show that POSEIDON achieves accuracy similar to centralized or decentralized non-private approaches and that its computation and communication overhead scales linearly with the number of parties. We will then explain how we are using this technique for the federated analysis of medical data, in particular for genome-wide association studies.

14:30 - 15:00
Coffee Break
15:00 - 16:30
Anonymity, Privacy, and Fake News
Session Chair:
Shujun Li, University of Kent, United Kingdom

Optimizing Packet Scheduling and Path Selection for Anonymous Voice Calls

David Schatz, Michael Rossberg, Guenter Schaefer (Technische Universität Ilmenau, Germany)

How Lightning’s Routing Diminishes its Anonymity

Satwik Prabhu Kumble, Dick Epema, Stefanie Roos (TU Delft, Netherlands)


How Private is Android's Private DNS Setting? Identifying Apps by Encrypted DNS Traffic

Michael Mühlhauser, Henning Pridöhl, Dominik Herrmann (University of Bamberg, Germany)

FADE: Detecting Fake News Articles on the Web

Bahruz Jabiyev (Northeastern University, Boston, MA, USA), Sinan Pehlivanoglu (Brown University, USA), Kaan Onarlioglu (Akamai Technologies, USA), Engin Kirda (Northeastern University, USA)


Rice seed image-to-image translation using Generative Adversarial Networks to improve weedy rice image classification

Atthakorn Petchsod, Tanasai Sucontphunt (National Institute of Development Administration, Bangkok, Thailand)


Reliable AI through SVDD and rule extraction

Alberto Carlevaro (University of Genoa, Italy), Maurizio Mongelli (CNR-IEIIT, Italy)

Airbnb Price Prediction Using Machine Learning and Sentiment Analysis

Pouya Rezazadeh Kalehbasti (Stanford University, USA), Liubov Nikolenko and Hoormazd Rezaei (Stanford University, USA)


Towards Financial Sentiment Analysis in a South African Landscape

Michelle Terblanche, Vukosi Marivate (Department of Computer Science, University of Pretoria, South Africa)


Keynote (tba)

Continuous User Authentication for Human-Robot Collaboration

Shurook S. Almohamade, John A. Clark, James Law (The university of Sheffield , UK)

Session Chair:
Jart Armin, Stichting CUlng Foundation, The Netherlands

Risks and Opportunities for Information Hiding in DICOM Standard

Aleksandra Mileva (Faculty of Computer Science, University Goce Delcev, Macedonia), Luca Caviglione (National Research Council of Italy, Italy), Aleksandar Velinov (Faculty of Computer Science, University Goce Delcev, Stip, N. Macedonia), Steffen Wendzel (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany)  and Vesna Dimitrova (Faculty of Computer Science and Engineering, Ss Cyril and Methodius University Skopje, Macedonia)

Data Hiding Using Code Obfuscation
Pawel Rajba (University of Wroclaw, Poland), Wojciech Mazurczyk (Warsaw University of Technology, Poland)

Discovery of Single-Vendor Marketplace Operators in the Tor-Network

Fabian Brenner, Florian Platzer, Martin Steinebach (Fraunhofer SIT, Germany)

exHide: Hiding Data within the exFAT File System

Julian Heeger, York Yannikos, Martin Steinebach (Fraunhofer SIT, Germany)

Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures

Alexander Hartl, Joachim Fabini (TU Wien, Austria), Christoph Roschger (Technologisches Gewerbemuseum, Austria), Peter Eder-Neuhauser, Marco Petrovic, Roman Tobler (Wiener Netze GmbH, Austria), Tanja Zseby (TU Wien, Austria)


Session Chair:
Virginia Franqueira, University of Kent, United Kingdom

Keynote: Towards the use of AI in digital investigation by Hans Henseler, Netherlands Forensic Institute, Netherlands


Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts

Tyler Balon, Krikor Herlopian, Ibrahim Baggili, Cinthya Grajeda-Mendez (University of New Haven, USA)


Time for Truth: Forensic Analysis of NTFS Timestamps

Michael Galhuber (St. Pölten University of Applied Sciences, Austria), Robert Luh (University of Vienna, Austria & St. Pölten University of Applied Sciences, Austria)


User action representation and automated reasoning for the forensic analysis of mobile devices

Cosimo Anglano, Massimo Canonico, Laura Giordano, Marco Guazzone and Daniele Theseider Dupré

(DISIT, Università del Piemonte Orientale, Italy)

Projekt Coltrane and Methodology
Session Chair:
Gregor Langner, AIT Austrian Institute of Technology GmbH, Austria

Projekt Coltrane  and Methodology

Jerry Andriesen, Wise&Munroe, The Netherlands

Gerald Quirchmayr, University of Vienna, Austria

Vittorio Scarano, University of Salerno, Italy

16:30 - 17:00
Coffee Break
17:00 - 18:30
Software Security, Blockchain and Digital Forensics
Session Chair:
Shujun Li, University of Kent, United Kingdom

MESH: A Memory-Efficient Safe Heap for C/C++

Emanuel Q. Vintila, Philipp Zieris, Julian Horsch (Fraunhofer AISEC, Germany)


I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts

Enrico Bacis, Dario Facchinetti (Università degli Studi di Bergamo, Italy), Marco Guarnieri (IMDEA Software Institute, Spain), Marco Rosa (SAP Security Research, France), Matthew Rossi, Stefano Paraboschi (Università degli Studi di Bergamo, Italy)


Virtual Knowledge Graphs for Federated Log Analysis

Kabul Kurniawan (Vienna University of Economics and Business, Austria), Andreas Ekelhart (SBA Research, Austria), Elmar Kiesling (Vienna University of Economics and Business, Austria), Dietmar Winkler (Vienna University of Technology, Austria),  Gerald Quirchmayr (University of Vienna, Austria), A Min Tjoa (Vienna University of Technology, Austria) 

RapidVMI: Fast and multi-core aware active virtual machine introspection

Thomas Dangl, Benjamin Taubmann, Hans P. Reiser (University of Passau, Germany)

Session Chair:
Juha Röning, University of Oulu, Finland

Software Development Processes for ADs, SMCs and OSCssupporting Usability, Security, and Privacy Goals – an Overview

Tim Bender, Rolf Huesmann, Prof. Dr. Andreas Heinemann (Hochschule Darmstadt, Germany)

Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity Challenges

Tiago Espinha Gasiba (Siemens AG Munich, Germany), Iosif Andrei-Cristian (Technische Universität München, Siemens AG Munich, Germany), Ulrike Lechner (Universität der Bundeswehr München Neubiberg, Germany), Maria Pinto-Albuquerque (Instituto Universitário de Lisboa (ISCTE-IUL), ISTAR Lisboa, Portugal)

A Serious Game Design Framework for Software Developers to Put GDPR into Practice

Abdulrahman Alhazmi (The Department of Computer Science and IT, School of Engineering and Mathematical Sciences at La Trobe University, Australia), Nalin Asanka Gamagedara Arachchilage (The School of Computer Science, The University of Auckland, New Zealand and The Department of Computer Science and IT, School of Engineering and Mathematical Sciences, La Trobe University, Australia)

Invited Talk: Threat modeling of cyber-physical systems in practice

Lotfi Othman, Iowa State University, USA


Modeling of Personalized Privacy Disclosure Behavior: A Formal Method Approach

A K M Nuhil Mehdy and, Hoda Mehrpouyan (Boise State University, USA)

Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments

Andraž Krašovec (European Comission, Joint Research Centre (JRC), Italy, and University of Ljubljana, Faculty of Computer and Information Science, Slovenia), Gianmarco Baldini (European Comission, Joint Research Centre (JRC), Italy), Veljko Pejović (University of Ljubljana, Faculty of Computer and Information Science, Slovenia)


A Medium-Interaction Emulation and Monitoring System for Operational Technology

Stefano Bistarelli, Emanuele Bosimini, Francesco Santini (University of Perugia, Italy)

A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection

Stefano Petrocchi (Department of Information Engineering, University of Pisa, Italy), Giacomo Giorgi (Institute for Informatics and Telematics, National Research Council of Italy, Italy), Mario G. C. A. Cimino (Department of Information Engineering, University of Pisa, Italy)

Session Chair:
Luca Calderoni, Università di Bologna, Italy

Keynote: The Impact of AI on Location Privacy by Prof. Stephen B. Wicker, Cornell University, USA

Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets

Antoine Boutet (Univ Lyon, INSA Lyon, Inria, CITI, France), Sonia Ben Mokhtar (Univ Lyon, INSA Lyon, LIRIS, France )

A clustering approach to anonymize locations during dataset de-identification
Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens (imec-DistriNet, Belgium)


Template Protected Authentication based on Location History and b-Bit MinHash

Masakazu Fujio, Kenta Takahashi, Yosuke Kaga, Wataru Nakamura, Yoshiko Yasumura (Research and Development Group, Hitachi, Ltd., Japan) Rie Shigetomi Yamaguchi (Social ICT Research Center, University of Tokyo, Japan)

Session Chair:
Andrew Marrington, Zayed University, UAE

JPEG File Fragmentation Point Detection using Huffman Code and Quantization Array Validation

Vincent van der Meer (Zuyd University of Applied Sciences, The Netherlands), Jeroen van den Bos (Netherlands Forensic Institute, The Netherlands)

POSNoise: An Effective Countermeasure Against Topic Biases in Authorship Analysis

Oren Halvani, Lukas Graner (Fraunhofer Institute for Secure Information Technology SIT, Germany)


Risk-Oriented Design Approach For Forensic-Ready Software Systems

Lukas Daubner (Faculty of Informatics, Masaryk University, Czech Republic), Raimundas Matulevičius (University of Tartu, Estonia)


What should we pay attention to when classifying violent videos?

Marcos Teixeira, Institute of Computing and Sandra Avila (Institute of Computing, University of Campinas, Brazil)


Forensicast: A Nonintrusive Approach \& Tool For Logical Forensic Acquisition \& Analysis of The Google Chromecast TV

Alex Sitterer, Nicholas Dubois, Ibrahim Baggili (Connecticut Institute of Technology, University of New Haven, USA) 

Announcement of best paper award (Virginia Franqueira, University of Kent, UK)

Requirements and needs for cyber security teaching
Session Chair:
Gregor Langner, AIT Austrian Institute of Technology GmbH, Austria

Steven Furnell, University of Nottingham, United Kingdom

Teemu Tokola, Oulun Yliopisto, Finland

19:00 - 20:00
Social Get2Gether

Award Ceremony, Tombula, ARES Signature Drink