08:15 - 18:00 | |
---|
08:30 - 10:00 | Precise Analysis of Purpose Limitation in Data Flow Diagrams
Hanaa Alshareef (Chalmers University of Technology, Sweden), Katja Tuma (Vrije Universiteit Amsterdam, The Netherlands), Sandro Stucki (Chalmers University of Technology, Sweden), Gerardo Schneider (University of Gothenburg, Sweden) and Riccardo Scandariato (Hamburg University of Technology, Germany)
Compiler-Aided Development of Trusted Enclaves with Rust
Felix Dreissig (noris network AG, Germany), Jonas Röckl (FAU Erlangen-Nürnberg, Germany) and Tilo Müller (Hof University of Applied Sciences, Germany)
Bridging the Gap Between Certification and Software Development
Claudio A. Ardagna (Department of Computer Science, Università degli Studi di Milano, Italy), Nicola Bena (Department of Computer Science, Università degli Studi di Milano, Italy) and Ramon Martín de Pozuelo (CaixaBank, Spain)
SMODIC: A Model Checker for Self-modifying Code
Tayssir Touili and Xin Ye (LIPN, CNRS, France) | An Evaluation Study of Intrinsic Motivation Techniques applied to Reinforcement Learning over Hard Exploration Environments
Alain Andres (TECNALIA, Basque Research & Technology Alliance (BRTA), University of the Basque Country (UPV/EHU), Spain), Esther Villar-Rodriguez (TECNALIA, Basque Research & Technology Alliance (BRTA), Spain) and Javier Del Ser (TECNALIA, Basque Research & Technology Alliance (BRTA), University of the Basque Country (UPV/EHU), Spain))
Towards Generating Financial Reports From Tabular Data Using Transformers
Clayton Leroy Chapman (University of Bonn, Germany), Lars Hillebrand (University of Bonn, Fraunhofer IAIS, Germany), Marc Robin Stenzel (Fraunhofer IAIS, Germany), Tobias Deußer (University of Bonn, Fraunhofer IAIS, Germany), David Biesner (University of Bonn, Fraunhofer IAIS, Germany), Christian Bauckhage (University of Bonn, Fraunhofer IAIS, Germany) and Rafet Sifa (Fraunhofer IAIS, Germany)
Evaluating the performance of SOBEK text mining keyword extraction algorithm
Eliseo Reategui (PGIE, UFRGS, Brazil), Marcio Bigolin (PGIE, UFRGS, IFRS, Brazil), Michel Carniato (PUCRS, Brazil), Rafael Antunes dos Santos (PGIE, UFRGS, Brazil)
Classification of Screenshot Image Captured in Online Meeting System
Minoru Kuribayashi, Kodai Kamakari and Nobuo Funabiki (Graduate School of Natural Science and Technology, Okayama University, Japan) | Cyber Security when IT meets OT
Sokratis K. Katsikas, Director of the Norwegian Centre for Cybersecurity in Critical Sectors Professor with the Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Norway
Abstract: The current trend of automation and data exchange in industry, through the development, use and integration of cyber-physical systems, the Internet of things, cloud computing, artificial intelligence and other enabling technologies is expected to bring tremendous benefits in the economy, including improved productivity and efficiency, better flexibility and agility, and increased profitability. However, it also comes with increased cybersecurity risks, primarily deriving from the integration of information technology and operational technology. Thus, as in all cases of a major shift in computing paradigms, a number of cybersecurity challenges arise, that cannot be addressed by simply porting solutions from other domains. In this talk a brief overview of such challenges, and current best practices for addressing them, as well as open issues will be provided.
STRIPED: A Threat Analysis Method for IoT Systems
Kamakshi Srikumar, Komal Kashish, Kolja Eggers, Nicolás E. Díaz Ferreyra, Julian Koch, Thorsten Schüppstuhl and Riccardo Scandariato (Hamburg University of Technology, Germany)
An Investigation of PSA Certified
Seonghan Shin, Tomoyuki Ogawa, Ryo Fujita, Mari Itoh and Hirotaka Yoshida (National Institute of Advanced Industrial Science and Technology (AIST), Japan)) | Limitations of Web Cryptojacking Detection: A Practical Evaluation
Pawel Rajba (University of Wroclaw, Poland) and Wojciech Mazurczyk (Warsaw University of Technology, Poland)
Data Acquisition on a large Darknet Marketplace
York Yannikos, Julian Heeger and Martin Steinebach (Fraunhofer SIT, Germany)
A synopsis of critical aspects for darknet research
Florian Platzer (Fraunhofer SIT, Germany) and Alexandra Lux (TU Darmstadt, Germany)
Towards Image Hashing Robust Against Cropping and Rotation
Martin Steinebach (Fraunhofer SIT, Germany), Tiberius Berwanger (TU Darmstadt, Germany) and Huajian Liu (Fraunhofer SIT, Germany)
| Trusted and Secure Self-Sovereign Identity framework
Vaios Bolgouras, Anna Angelogianni, Ilias Politis and Christos Xenakis (University of Piraeus, Greece)
Improving Security and Scalability in Smart Grids using Blockchain Technologies
Mandana Falahi (University POLITEHNICA of Bucharest, Romania), Andrei Vasilateanu (University POLITEHNICA of Bucharest, Romania), Nicolae Goga (University POLITEHNICA of Bucharest, Romania), George Suciu (BEIA Consult International, Romania), Mari-Anais Sachian (BEIA Consult International, Romania), Robert Florescu (University POLITEHNICA of Bucharest, Romania), Ștefan-Daniel Stanciu (University POLITEHNICA of Bucharest, Romania)
ConSenseIoT: A Consensus Algorithm for Secure and Scalable Blockchain in the IoT context
Harris Niavis and Konstantinos Loupos (Inlecom Innovation, Greece)
INCOGNITO: IdeNtity verifiCatiOn with privacy-preservinG credeNtIals for anonymous access To Online services
Vaios Bolgouras (University of Piraeus, Greece) |
---|
10:00 - 10:15 | |
---|
10:15 - 11:45 | FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks
Emilie Bout (Inria, France), Alessandro Brighente (University of Padova, Italy), Mauro Conti (University of Padova, Italy) and Valeria Loscri (Inria, France)
Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy
Samuel Šuľan (Faculty of Informatics, Masaryk University, Czech Republic) and Martin Husák (Institute of Computer Science, Masaryk University, Czech Republic)
Secure Services for Standard RISC-V Architectures
Davide Bove (Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany)
RIPEMB: A framework for assessing hardware-assisted software security schemes in embedded systems
Stefan Tauner (TU Wien, Austria) | A survey on the application of virtual reality in event-related potential research
Vladimir Marochko (The Artificial Intelligence and Cognitive Load research lab, the Applied Intelligence Research Center, School of Computer Science, Technological University Dublin, Ireland), Richard Reilly (School of Medicine, Institute of Neuroscience, Trinity College Dublin, The University of Dublin, Ireland), Rachel McDonnell (School of Computer Science and Statistics, The University of Dublin, Trinity College, Ireland) and Luca Longo (The Artificial Intelligence and Cognitive Load research lab, the Applied Intelligence Research Center, School of Computer Science, Technological University Dublin, Ireland)
Visualizing Large Collections of URLs Using the Hilbert Curve
Poornima Belavadi (Human-Computer Interaction Center, RWTH Aachen University, Germany), Johannes Nakayama (Human-Computer Interaction Center, RWTH Aachen University, Germany), and André Calero Valdez (Institute for Multimedia and Interactive Systems, University of Lübeck, Germany)
How to Reduce the Time Necessary for Evaluation of Tree-based Models
Viera Anderková and František Babič (Department of Cybernetics and Artificial Intelligence, Faculty of Electrical Engineering and Informatics, Technical University of Košice, Slovakia)
An Empirical Analysis of Synthetic-Data-based Anomaly Detection Majlinda Llugiqi (Vienna University of Technology, Austria) and Rudolf Mayer (SBA Research & Vienna University of Technology, Austria)
SECI Model in Data-Based Procedure for the Assessment of the Frailty State in Diabetic Patient
František Babič (Department of Cybernetics and Artificial Intelligence, Faculty of Electrical Engineering and Informatics, Technical University of Košice, Slovakia), Viera Anderková (Department of Cybernetics and Artificial Intelligence, Faculty of Electrical Engineering and Informatics, Technical University of Košice, Slovakia), Zvonimir Bosnić (Department of Family Medicine, Faculty of Medicine, Josip Juraj Strossmayer University of Osijek, Croatia), Mile Volarić (Faculty of Medicine, Josip Juraj Strossmayer University of Osijek, Croatia), Ljiljana Trtica Majnarić (Department of Family Medicine, Faculty of Medicine, Josip Juraj Strossmayer University of Osijek, Croatia) | Reactive Jamming Detection for LoRaWAN Based on Meta-Data Differencing
Henri Ruotsalainen (Institute of IT Security Research / St. Pölten University of Applied Sciences, Austria)
MalRec: A Blockchain-based Malware Recovery Framework for Internet of Things
Ahmed Lekssays, Giorgia Sirigu, Barbara Carminati and Elena Ferrari (Università degli Studi dell’Insubria, Italy)
A Resilient Network Node for the Industrial Internet of Things
Lukas Jäger, Dominik Lorych and Michael Eckel (Fraunhofer Institute SIT | ATHENE, Germany)
Announcement of best paper award & final remarks | SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes
Amir Sharif (Fondazione Bruno Kessler, Italy), Matteo Ranzi (University of Trento, Italy), Roberto Carbone (Fondazione Bruno Kessler, Italy), Giada Sciarretta (Fondazione Bruno Kessler, Italy), Silvio Ranise (Fondazione Bruno Kessler,University of Trento, Italy)
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness Tahir Ahmad (Fondazione Bruno Kessler (FBK), Italy), Umberto Morelli (Fondazione Bruno Kessler (FBK), Italy), Silvio Ranise (Fondazione Bruno Kessler (FBK), University of Trento, Italy)
Applying a cryptographic metric to post-quantum lattice-based signature algorithms
Markus Rautell (VTT Technical Research Centre of Finland, Finland), Outi-Marja Latvala (VTT Technical Research Centre of Finland, Finland), Visa Vallivaara (VTT Technical Research Centre of Finland, Finland), Kimmo Halunen (University of Oulu and National Defence University of Finland, Finland)
Introducing Quantum Computing in Mobile Malware Detection
Giovanni Ciaramella (Institute for Informatics and Telematics, National Research Council of Italy (CNR), Italy), Giacomo Iadarola (Institute for Informatics and Telematics, National Research Council of Italy (CNR), Italy), Francesco Mercaldo (University of Molise, Institute for Informatics and Telematics, National Research Council of Italy (CNR), Italy), Marco Storto (University of Molise), Antonella Santone (University of Molise, Italy), Fabio Martinelli (Institute for Informatics and Telematics, National Research Council of Italy (CNR), Italy) | Secure Agents on Trusted Embedded Boards: A Proof of Concept based on TPM-enabled Raspberry Boards
Antonio Muñoz (University of Malaga, Spain)
Secret sharing a key in a distributed way, Lagrange vs Newton
Anastassios Voudouris, Ilias Politis and Christos Xenakis (University of Piraeus, Greece)
Fraudulent Activities in the Cyber Realm: DEFRAUDify Project
Razvan-Alexandru Bratulescu, Robert-Ionut Vatasoiu, Sorina-Andreea Mitroi, George Suciu, Mari-Anais Sachian, Daniel-Marian Dutu and Serban-Emanuel Calescu (Beia Consult International, Romania)
SealedGRID: Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID
Christos Fakitsas (University of Piraeus, Greece) |
---|
11:45 - 12:45 | |
---|
12:45 - 14:00 | Reinforcement Learning in the Real World: Challenges and Opportunities for Human-Agent Interaction
Matthew E. Taylor (Director, Intelligent Robot Learning Lab, Associate Professor & Graduate Admissions Chair, Computing Science; Fellow and Fellow-in-Residence, Alberta Machine Intelligence Institute Canada and CIFAR AI Chair, Amii, Canada)
Abstract: While reinforcement learning (RL) has had many successes in video games and toy domains, recent success in high-impact problems shows that this mature technology can be useful in the real world. This talk will highlight some of these successes, with an emphasis on how RL is making an impact in commercial settings, as well as what problems remain before it can become plug-and-play like many supervised learning technologies. Further, we will argue that RL, like all current AI technology, is fundamentally a human-in-the-loop paradigm. This framing will help motivate why additional fundamental research at the interaction of humans and RL agents is critical to helping RL move out of the lab and into the hands of non-academic practitioners. |
---|
14:00 - 14:30 | |
---|
14:30 - 16:00 | SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response
Martin Husák and Milan Čermák (Institute of Computer Science, Masaryk University, Czech Republic)
Model-Based Incident Response Playbooks
Avi Shaked, Yulia Cherdantseva and Pete Burnap (School of Computer Science and Informatics, Cardiff University, United Kingdom)
BISCUIT - Blockchain Security Incident Reporting based on Human Observations
Benedikt Putz, Manfred Vielberth and Günther Pernul (University of Regensburg, Germany))
SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools
Emmanouil Samanis, Joseph Gardiner and Awais Rashid (Bristol Cyber Security Group, University of Bristol, United Kingdom) | Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the Literature Sanaz Adel Alipour, Rita Orji and Nur Zincir-Heywood (Faculty of Computer Science, Dalhousie University, Canada)
TaxIdMA: Towards a Taxonomy for Attacks related to Identities Daniela Pöhn and Wolfgang Hommel (Universität der Bundeswehr München, Germany)
Cyber-Security Culture Assessment in Academia: A COVID-19 Study Anna Georgiadou, Ariadni Michalitsi-Psarrou and Dimitris Askounis (Decision Support Systems Laboratory, School of Electrical & Computer Engineering, National Technical University of Athens, Greece) | IoT security for smart health and smart assisted living
Reijo M. Savola, University of Jyväskylä, Finland
Abstract: IoT solutions are in the core of effective and efficient smart health and smart assisted living solutions. Considerable increase in well-being and cost savings can be achieved by them. During the last years, IoT cybersecurity threat landscape has become wider, due to the rapidly increasing use of IoT in smart services, and the scarce computational resources available in IoT devices. This increases the risk of compromising reliable and secure use of them. Systematic proactive assistance of IoT-based smart services with cybersecurity services is essential. Cybersecurity should be designed in the services and the technologies used in a seamless way, and automation is needed. In this talk, a brief overview of challenges in IoT security for smart health and smart assisted living is will be provided, with current practices to overcome them, as well as directions for further research.
Authentication for Operators of Critical Medical Devices: A Contribution to Analysis of Design Trade-offs
Marwa Gadala (Aston University, City, University of London, United Kingdom), Lorenzo Strigini (City, University of London, United Kingdom), Radek Fujdiak (Brno University of Technology, Czech Republic)
| Scenarios for Process-Aware Insider Attack Detection in Manufacturing Martin Macak (Masaryk University, Faculty of Informatics, Czech Republic), Radek Vaclavek (Masaryk University, Faculty of Informatics, Czech Republic), Dasa Kusnirakova (Masaryk University, Faculty of Informatics, Czech Republic), Raimundas Matulevičius (Institute of Computer Science, University of Tartu, Estonia), Barbora Buhnova (Masaryk University, Faculty of Informatics, Czech Republic)
Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding Marta Catillo, Antonio Pecchia and Umberto Villano (Università degli Studi del Sannio, Italy)
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations
Lukáš Sadlek(Masaryk University), Pavel Čeleda(Masaryk University), Daniel Tovarňák(Masaryk University)
An Early Detection of Android Malware Using System Calls based Machine Learning Model
Xinrun Zhang (Purdue University Northwest, United States), Akshay Mathur (The University of Toledo, United States), Lei Zhao (Purdue University Northwest, United States), Safia Rahmat (The University of Toledo, United States), Quamar Niyaz (Purdue University Northwest, United States), Ahmad Javaid (The University of Toledo, United States), Xiaoli Yang (Purdue University Northwest, United States) | MITRE ATT&CK-driven Cyber Risk Assessment
Mohamed G Ahmed (University of Greenwich, United Kingdom), Sakshyam Panda (University of Greenwich, United Kingdom), Christos Xenakis (University of Piraeus, Greece), Emmanouil Panaousis (University of Greenwich, United Kingdom)
Analyzing Coverages of Cyber Insurance Policies Using Ontology
Markos Charalambous (Cyprus University of Technology, Cyprus), Aristeidis Farao (University of Piraeus, Greece), George Kalantzantonakis (LSTech ESPANA, Spain), Panagiotis Kanakakis (LSTech ESPANA, Spain), Nikos Salamanos (Cyprus University of Technology, Cyprus), Evangelos Kotsifakos (LSTech ESPANA, Spain), Evangellos Froudakis (University of Piraeus, Greece)
NetPhish: Antiphishing Project
Panagiotis Bountakas (University of Piraeus, Greece)
SECONDO: A Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 netwOrking era
Aristeidis Farao (University of Piraeus, Greece) |
---|
16:00 - 16:30 | |
---|
16:30 - 18:00 | Detecting Unknown DGAs without Context Information
Arthur Drichel, Justus von Brandt and Ulrike Meyer (RWTH Aachen University, Germany)
HybridDAD: Detecting DDoS Flooding Attack using Machine Learning with Programmable Switches
Mostafa Roshani (ACM Member, Iran) and Mehdi Nobakht (University of New South Wales (UNSW), Australia)
Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks
Mohamed Amine Merzouk (Polytechnique Montréal, Canada and IRT SystemX, France), Joséphine Delas (Polytechnique Montréal, Canada and IRT SystemX, France), Christopher Neal (Polytechnique Montréal, Canada and IRT SystemX, France), Nora Boulahia-Cuppens (Polytechnique Montréal, Canada), Frédéric Cuppens (Polytechnique Montréal, Canada) and Reda Yaich (IRT SystemX, France)
A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale
Joseph Khoury (The University of Texas at San Antonio, United States), Morteza Safaei Pour (San Diego State University, United States) and Elias Bou-Harb (The University of Texas at San Antonio, United States) | On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages
Marc Ohm (Rheinische Friedrich-Wilhelms-Universität Bonn, Germany), Felix Boes (Rheinische Friedrich-Wilhelms-Universität Bonn, Germany), Christian Bungartz (Rheinische Friedrich-Wilhelms-Universität Bonn, Germany), Michael Meier (Rheinische Friedrich-Wilhelms-Universität Bonn, Fraunhofer FKIE, Germany)
SoK: Combating threats in the digital supply chain
Arne Roar Nygård and Sokratis Katsikas (Norwegian University of Science and Technology, Norway)
Federated learning based IDS approach for the IoV
Amal Hbaieb (University of Technology of Troyes, France), Samiha Ayed (University of Technology of Troyes, France), Lamia Chaari (CRNS-SM@RTS (Laboratory of Signals, systeMs, aRtificial Intelligence and neTworkS) Sfax, Tunesia) | Round table discussion: IoT Security for eHealth
Panel moderator: Virginia Franqueira (University of Kent, United Kingdom)
Panellists: Sokratis Katsikas (Norwegian University of Science and Technology, Norway), Bian Yang (Norwegian University of Science and Technology, Norway), Reijo Savola (University of Jyväskylä, Finland)
A Critique of EU Digital COVID-19 Certificates: Do Vaccine Passports endanger privacy?
Harry Halpin (KU Leuven, Belgium)
Modelling privacy harms of compromised personal medical data – beyond data breach
Samuel Wairimu (Karlstad University, Sweden) and Lothar Fritsch (Oslo Metropolitan University, Norway) | SASP: a Semantic web-based Approach for management of Sharable cyber security Playbooks Mehdi Akbari Gurabi (Fraunhofer FIT,RWTH Aachen University, Germany), Avikarsha Mandal (Fraunhofer FIT, Germany), Jan Popanda (Fraunhofer FIT, Germany), Robert Rapp (University of Stuttgart, Germany), Stefan Decker (Fraunhofer FIT, RWTH Aachen University, Germany)
Deep Reinforcement Learning-Based Defense Strategy Selection
Axel Charpentier (Polytechnique Montréal, IRT SystemX, Canada), Nora Boulahia Cuppens (Polytechnique Montréal, France), Frédéric Cuppens (Polytechnique Montréal, France), Reda Yaich (IRT SystemX, France)
Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms
Bethany Sumner, Gokila Dorai and John Heslen (Augusta University, United States) Shedding Light on the Targeted Victim Profiles of Malicious Downloaders
François Labrèche (École Polytechnique de Montréal, Canada), Enrico Mariconti (University College London, United Kingdom), Gianluca Stringhini (Boston University, United States) | PHYSICS: Optimized hybrid space-time service continuum in FAAS
Ilias Politis (InQbit, Romania)
EVOLVED-5G: Experimentation and Validation Openness for Long-term evolution of VErtical inDustries in 5G era and beyond
Ilias Politis (InQbit, Romania)
ERATOSTHENES: Secure management of IoT devices lifecycle through identities, trust and distributed ledgers
Harris Niavis (INLECOM, Greece)
CyberSane: Cyber Security Incident Handling, Warning and Response System for the European Critical Infrastructures
Christoforos Dadoyan (Ionian University, Greece) |
---|
18:00 - 21:00 | |
---|