Time (UTC +2) | Room A | Room B | Room C | Room D | Room E | Room F |
---|---|---|---|---|---|---|
10:00 - 18:30 | Organizers available Questions? Neep help? Contact us at Slack! | |||||
10:30 - 12:30 | ARES Short Session Chair: Henri Ruotsalainen, St. Pölten University of Applied Sciences, Austria Integer Overflow Detection with Delayed Runtime Test Zhen Huang, Xiaowei Yu (DePaul University, USA) VTDroid: Value-based Tracking for Overcoming Anti-Taint-Analysis Techniques in Android Apps Hiroki Inayoshi, Shohei Kakei (Nagoya Institute of Technology, Japan), Eiji Takimoto (Hiroshima Institute of Technology, Japan), Koichi Mouri (Ritsumeikan University, Japan), Shoichi Saito (Nagoya Institute of Technology, Japan) Grand Theft App: Digital Forensics of Vehicle Assistant Apps Simon Ebbers, Fabian Ising, Christoph Saatjohann, Sebastian Schinzel (Münster University of Applied Sciences, Germany) Self-Determined Reciprocal Recommender System with Strong Privacy Guarantees Saskia Nuñez von Voigt, Erik Daniel, Florian Tschorsch (TU Berlin, Germany) Florian Fenzl, Roland Rieke (Fraunhofer Institute for Secure Information Technology, Germany), Andreas Dominik (THM University of Applied Sciences, Germany) Adversarial Examples Against a BERT ABSA Model –Fooling Bert With L33T, Misspellign, and Punctuation Nora Hofer (DeepOpinion, Austria), Pascal Schöttle (Management Center Innsbruck - Digital Business & Software Engineering, Austria), Alexander Riezler, Sebastian Stabinger (DeepOpinion, Austria) | CD MAKE xAI Session Chair: Martin Pirker, St. Pölten University of Applied Sciences, Austria From Explainable to Reliable Artificial Intelligence Sara Narteni, Melissa Ferretti, Vanessa Orani, Ivan Vaccari, Enrico Cambiaso, Maurizio Mongelli (Consiglio Nazionale delle Ricerche - Institute of Electronics, Information Engineering and Telecommunications (CNR-IEIIT), Italy) Explanatory Pluralism in Explainable AI Yiheng Yao (Philosophy-Neuroscience-Psychology Program, Washington University in St. Louis, USA) On the Trustworthiness of Tree Ensemble Explainability Methods Angeline Yasodhara, Azin Asgarian, Diego Huang Parinaz Sobhani (Georgian, Canada) Human-in-the-loop model explanation via verbatim boundary identification in generated neighborhoods Xianlong Zeng, Fanghao Song, Zhongen Li, Krerkkiat Chusap, Chang Liu (Ohio University, Electrical Engineering and Computer Science, USA) MAIRE - A Model-Agnostic Interpretable Rule Extraction Procedure for Explaining Classifiers Rajat Sharma, Nikhil Reddy, Vidhya Kamakshi, Narayanan C Krishnan, Shweta Jain (Indian Institute of Technology Ropar, India) Transparent Ensembles for Covid-19 Prognosis Guido Bologna (University of Applied Sciences and Arts of Western Switzerland, Switzerland) | CUING IV Session Chair: Robert Luh, St. Pölten University of Applied Sciences, Austria 11:00-12:30 Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels Tobias Schmidbauer (FernUniversität in Hagen, Germany), Steffen Wendzel (Worms University of Applied Sciences, Germany) Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels Yulduz Khodjaeva, Dr. Nur Zincir-Heywood (Dalhousie University, Faculty of Computer Science, Canada) Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels Piotr Nowakowski, Piotr Żórawski, Krzysztof Cabaj, Wojciech Mazurczyk (Warsaw University of Technology, Poland)
| IoT-SECFOR I Session Chair: Aleksandra Mileva, Faculty of Computer Science, University Goce Delcev, Macedonia Welcome by Virginia Franqueira, University of Kent, UK Keynote: Internet-of-Forensics: A Decentralized Evidence Management System Rahul Saha, SPRITZ research group, University of Padova, Italy Two Truths and a Lie: Exploring Soft Moderation of COVID-19 Misinformation with Amazon Alexa Donald Gover, Filipo Sharevski (DePaul University, USA) Bloom Filter based Collective Remote Attestation for Dynamic Networks Salvatore Frontera, Riccardo Lazzeretti (Sapienza University of Rome, Italy) A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol Qi Liu, Hubert B. Keller, Veit Hagenmeyer (Karlsruhe Institute of Technology, Germany) DoS Attacks in Available MQTT Implementations - Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections Umberto Morelli (Fondazione Bruno Kessler, Italy), Ivan Vaccari (Consiglio Nazionale delle Ricerche, Italy), Silvio Ranise (Università degli Studi di Trento and Fondazione Bruno Kessler, Italy), Enrico Cambiaso (Consiglio Nazionale delle Ricerche, Italy) Announcement of best paper award & final remarks by Virginia Franqueira, University of Kent, UK | IWSMA I Session Chair: Peter Kieseberg, Josef Ressel Center Blockchains, St. Pölten University of Applied Sciences, Austria SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications Rosangela Casolare (University of Molise, Pesche (IS) - Italy), Giovanni Ciaramella (IIT-CNR & University of Molise, Pisa - Italy), Fabio Martinelli (IIT-CNR, Pisa - Italy), Francesco Mercaldo (University of Molise & IIT-CNR, Campobasso - Italy), Antonella Santone (University of Molise, Campobasso - Italy) Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi and Sihem Guemara El Fatmi (Digital Security Research Laboratory, Higher School of Communication of Tunis (SUP’COM), University of Carthage, Tunisia) Multi-View Learning for Repackaged Malware Detection Shirish Singh (Columbia University, USA), Kushagra Chaturvedy (The LNMIIT, India), Bharavi Mishra (The LNMIIT, India) Formal Validation of a Security Mechanism against the RSU Compromise Attack Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss and Sihem Guemara El Fatmi (Digital Security Research Laboratory, Higher School of Communication of Tunis (SUP’COM), University of Carthage, Tunisia) An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case Christian Wolschke (Fraunhofer IESE Kaiserslautern, Germany), Stefan Marksteiner (AVL List GmbH Graz, Austria), Tobias Braun (Fraunhofer IESE Kaiserslautern, Germany), Markus Wolf (AVL List GmbH Graz, Austria) | |
12:30 - 13:00 | short Lunch Break | |||||
13:00 - 14:30 | Keynote: Secure and Privacy-Conscious Federated Analytics Jean-Pierre Hubaux, Head of Laboratory for Data Security (LDS), EPFL – Station 14, Switzerland Abstract: In this talk, we address the problem of privacy-preserving training and evaluation of neural networks in an N-party, federated learning setting. We propose a novel system, POSEIDON, the first of its kind in the regime of privacy-preserving neural network training. It employs multiparty lattice-based cryptography to preserve the confidentiality of the training data, the model, and the evaluation data, under a passive-adversary model and collusions between up to N−1 parties. To efficiently execute the secure backpropagation algorithm for training neural networks, we provide a generic packing approach that enables Single Instruction, Multiple Data (SIMD) operations on encrypted data. We also introduce arbitrary linear transformations within the cryptographic bootstrapping operation, optimizing the costly cryptographic computations over the parties, and we define a constrained optimization problem for choosing the cryptographic parameters. We will also mention Lattigo, our open-source cryptographic library on which POSEIDON is based. Our experimental results show that POSEIDON achieves accuracy similar to centralized or decentralized non-private approaches and that its computation and communication overhead scales linearly with the number of parties. We will then explain how we are using this technique for the federated analysis of medical data, in particular for genome-wide association studies. | |||||
14:30 - 15:00 | Coffee Break | |||||
15:00 - 16:30 | ARES Full IV Anonymity, Privacy, and Fake News Session Chair: Shujun Li, University of Kent, United Kingdom Optimizing Packet Scheduling and Path Selection for Anonymous Voice Calls David Schatz, Michael Rossberg, Guenter Schaefer (Technische Universität Ilmenau, Germany) How Lightning’s Routing Diminishes its Anonymity Satwik Prabhu Kumble, Dick Epema, Stefanie Roos (TU Delft, Netherlands) How Private is Android's Private DNS Setting? Identifying Apps by Encrypted DNS Traffic Michael Mühlhauser, Henning Pridöhl, Dominik Herrmann (University of Bamberg, Germany) FADE: Detecting Fake News Articles on the Web Bahruz Jabiyev (Northeastern University, Boston, MA, USA), Sinan Pehlivanoglu (Brown University, USA), Kaan Onarlioglu (Akamai Technologies, USA), Engin Kirda (Northeastern University, USA) | CD MAKE III Session Chair: Martin Pirker, St. Pölten University of Applied Sciences, Austria Rice seed image-to-image translation using Generative Adversarial Networks to improve weedy rice image classification Atthakorn Petchsod, Tanasai Sucontphunt (National Institute of Development Administration, Bangkok, Thailand) Reliable AI through SVDD and rule extraction Alberto Carlevaro (University of Genoa, Italy), Maurizio Mongelli (CNR-IEIIT, Italy) Airbnb Price Prediction Using Machine Learning and Sentiment Analysis Pouya Rezazadeh Kalehbasti (Stanford University, USA), Liubov Nikolenko and Hoormazd Rezaei (Stanford University, USA) Towards Financial Sentiment Analysis in a South African Landscape Michelle Terblanche, Vukosi Marivate (Department of Computer Science, University of Pretoria, South Africa) | Continuous User Authentication for Human-Robot Collaboration Shurook S. Almohamade, John A. Clark, James Law (The university of Sheffield , UK) | Risks and Opportunities for Information Hiding in DICOM Standard Aleksandra Mileva (Faculty of Computer Science, University Goce Delcev, Macedonia), Luca Caviglione (National Research Council of Italy, Italy), Aleksandar Velinov (Faculty of Computer Science, University Goce Delcev, Stip, N. Macedonia), Steffen Wendzel (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany) and Vesna Dimitrova (Faculty of Computer Science and Engineering, Ss Cyril and Methodius University Skopje, Macedonia) Data Hiding Using Code Obfuscation Pawel Rajba (University of Wroclaw, Poland), Wojciech Mazurczyk (Warsaw University of Technology, Poland) Discovery of Single-Vendor Marketplace Operators in the Tor-Network Fabian Brenner, Florian Platzer, Martin Steinebach (Fraunhofer SIT, Germany) exHide: Hiding Data within the exFAT File System Julian Heeger, York Yannikos, Martin Steinebach (Fraunhofer SIT, Germany) Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures Alexander Hartl, Joachim Fabini (TU Wien, Austria), Christoph Roschger (Technologisches Gewerbemuseum, Austria), Peter Eder-Neuhauser, Marco Petrovic, Roman Tobler (Wiener Netze GmbH, Austria), Tanja Zseby (TU Wien, Austria) | Keynote: Towards the use of AI in digital investigation Hans Henseler, Netherlands Forensic Institute, Netherlands Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts Tyler Balon, Krikor Herlopian, Ibrahim Baggili, Cinthya Grajeda-Mendez (University of New Haven, USA) Time for Truth: Forensic Analysis of NTFS Timestamps Michael Galhuber (St. Pölten University of Applied Sciences, Austria), Robert Luh (University of Vienna, Austria & St. Pölten University of Applied Sciences, Austria) User action representation and automated reasoning for the forensic analysis of mobile devices Cosimo Anglano, Massimo Canonico, Laura Giordano, Marco Guazzone and Daniele Theseider Dupré (DISIT, Università del Piemonte Orientale, Italy) | CS-EDU I Project Coltrane and Methodology Session Chair: Gregor Langner, AIT Austrian Institute of Technology GmbH, Austria Project Coltrane and Methodology
Jerry Andriessen (Wise&Munro, The Netherlands), Gerald Quirchmayr (University of Vienna, Austria), Vittorio Scarano (University of Salerno, Italy) |
16:30 - 17:00 | Coffee Break | |||||
17:00 - 18:30 | ARES Full V Software Security, Blockchain and Digital Forensics Session Chair: Shujun Li, University of Kent, United Kingdom MESH: A Memory-Efficient Safe Heap for C/C++ Emanuel Q. Vintila, Philipp Zieris, Julian Horsch (Fraunhofer AISEC, Germany)
I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts Enrico Bacis, Dario Facchinetti (Università degli Studi di Bergamo, Italy), Marco Guarnieri (IMDEA Software Institute, Spain), Marco Rosa (SAP Security Research, France), Matthew Rossi, Stefano Paraboschi (Università degli Studi di Bergamo, Italy)
Virtual Knowledge Graphs for Federated Log Analysis Kabul Kurniawan (Vienna University of Economics and Business, Austria), Andreas Ekelhart (SBA Research, Austria), Elmar Kiesling (Vienna University of Economics and Business, Austria), Dietmar Winkler (Vienna University of Technology, Austria), Gerald Quirchmayr (University of Vienna, Austria), A Min Tjoa (Vienna University of Technology, Austria) RapidVMI: Fast and multi-core aware active virtual machine introspection Thomas Dangl, Benjamin Taubmann, Hans P. Reiser (University of Passau, Germany) | Invited Talk: Threat modeling of cyber-physical systems in practice Lotfi ben Othmane, Iowa State University, USA Software Development Processes for ADs, SMCs and OSCssupporting Usability, Security, and Privacy Goals – an Overview Tim Bender, Rolf Huesmann, Prof. Dr. Andreas Heinemann (Hochschule Darmstadt, Germany) Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity Challenges Tiago Espinha Gasiba (Siemens AG Munich, Germany), Iosif Andrei-Cristian (Technische Universität München, Siemens AG Munich, Germany), Ulrike Lechner (Universität der Bundeswehr München Neubiberg, Germany), Maria Pinto-Albuquerque (Instituto Universitário de Lisboa (ISCTE-IUL), ISTAR Lisboa, Portugal) A Serious Game Design Framework for Software Developers to Put GDPR into Practice Abdulrahman Alhazmi (The Department of Computer Science and IT, School of Engineering and Mathematical Sciences at La Trobe University, Australia), Nalin Asanka Gamagedara Arachchilage (The School of Computer Science, The University of Auckland, New Zealand and The Department of Computer Science and IT, School of Engineering and Mathematical Sciences, La Trobe University, Australia) | Modeling of Personalized Privacy Disclosure Behavior: A Formal Method Approach A K M Nuhil Mehdy and, Hoda Mehrpouyan (Boise State University, USA) Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments Andraž Krašovec (European Comission, Joint Research Centre (JRC), Italy, and University of Ljubljana, Faculty of Computer and Information Science, Slovenia), Gianmarco Baldini (European Comission, Joint Research Centre (JRC), Italy), Veljko Pejović (University of Ljubljana, Faculty of Computer and Information Science, Slovenia) A Medium-Interaction Emulation and Monitoring System for Operational Technology Stefano Bistarelli, Emanuele Bosimini, Francesco Santini (University of Perugia, Italy) A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection Stefano Petrocchi (Department of Information Engineering, University of Pisa, Italy), Giacomo Giorgi (Institute for Informatics and Telematics, National Research Council of Italy, Italy), Mario G. C. A. Cimino (Department of Information Engineering, University of Pisa, Italy) | Keynote: The Impact of AI on Location Privacy Prof. Stephen B. Wicker, Cornell University, USA Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets Antoine Boutet (Univ Lyon, INSA Lyon, Inria, CITI, France), Sonia Ben Mokhtar (Univ Lyon, INSA Lyon, LIRIS, France ) A clustering approach to anonymize locations during dataset de-identification Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens (imec-DistriNet, Belgium) Template Protected Authentication based on Location History and b-Bit MinHash Masakazu Fujio, Kenta Takahashi, Yosuke Kaga, Wataru Nakamura, Yoshiko Yasumura (Research and Development Group, Hitachi, Ltd., Japan) Rie Shigetomi Yamaguchi (Social ICT Research Center, University of Tokyo, Japan) | JPEG File Fragmentation Point Detection using Huffman Code and Quantization Array Validation Vincent van der Meer (Zuyd University of Applied Sciences, The Netherlands), Jeroen van den Bos (Netherlands Forensic Institute, The Netherlands) POSNoise: An Effective Countermeasure Against Topic Biases in Authorship Analysis Oren Halvani, Lukas Graner (Fraunhofer Institute for Secure Information Technology SIT, Germany) Risk-Oriented Design Approach For Forensic-Ready Software Systems Lukas Daubner (Faculty of Informatics, Masaryk University, Czech Republic), Raimundas Matulevičius (University of Tartu, Estonia) What should we pay attention to when classifying violent videos? Marcos Teixeira, Institute of Computing and Sandra Avila (Institute of Computing, University of Campinas, Brazil) Forensicast: A Nonintrusive Approach \& Tool For Logical Forensic Acquisition \& Analysis of The Google Chromecast TV Alex Sitterer, Nicholas Dubois, Ibrahim Baggili (Connecticut Institute of Technology, University of New Haven, USA) Announcement of best paper award by Virginia Franqueira, University of Kent, UK | CS-EDU II Requirements and needs for cyber security teaching Session Chair: Gregor Langner, AIT Austrian Institute of Technology GmbH, Austria Requirements and needs for cyber security teaching
Steven Furnell (University of Nottingham, United Kingdom), Teemu Tokola (Oulun Yliopisto, Finland) |
19:00 - 20:00 | Social Get2Gether Award Ceremony, Raffle, ARES Signature Drink |