Thursday 25.08.2022 Detailed

Time (UTC +2)
HS 01
SR 03
SR 04
SR 05
SR 08
08:15 - 18:00
Organizers available
08:30 - 10:00
ARES V
Secure Software And Malware Detection
Session Chair:
Marc Ohm (University of Bonn, Germany)

Precise Analysis of Purpose Limitation in Data Flow Diagrams

Hanaa Alshareef (Chalmers University of Technology, Sweden), Katja Tuma (Vrije Universiteit Amsterdam, The Netherlands), Sandro Stucki (Chalmers University of Technology, Sweden), Gerardo Schneider (University of Gothenburg, Sweden) and Riccardo Scandariato (Hamburg University of Technology, Germany)

Compiler-Aided Development of Trusted Enclaves with Rust

Felix Dreissig (noris network AG, Germany), Jonas Röckl (FAU Erlangen-Nürnberg, Germany) and Tilo Müller (Hof University of Applied Sciences, Germany)

Bridging the Gap Between Certification and Software Development

Claudio A. Ardagna (Department of Computer Science, Università degli Studi di Milano, Italy), Nicola Bena (Department of Computer Science, Università degli Studi di Milano, Italy) and Ramon Martín de Pozuelo (CaixaBank, Spain)

SMODIC: A Model Checker for Self-modifying Code

Tayssir Touili and Xin Ye (LIPN, CNRS, France)

CD-MAKE IV
Learning
Session Chair:
Andre Carrington (University of Ottawa, Canada)

An Evaluation Study of Intrinsic Motivation Techniques applied to Reinforcement Learning over Hard Exploration Environments

Alain Andres (TECNALIA, Basque Research & Technology Alliance (BRTA), University of the Basque Country (UPV/EHU), Spain), Esther Villar-Rodriguez (TECNALIA, Basque Research & Technology Alliance (BRTA), Spain) and Javier Del Ser (TECNALIA, Basque Research & Technology Alliance (BRTA), University of the Basque Country (UPV/EHU), Spain))

Towards Generating Financial Reports From Tabular Data Using Transformers

Clayton Leroy Chapman (University of Bonn, Germany), Lars Hillebrand (University of Bonn, Fraunhofer IAIS, Germany), Marc Robin Stenzel (Fraunhofer IAIS, Germany), Tobias Deußer (University of Bonn, Fraunhofer IAIS, Germany), David Biesner (University of Bonn, Fraunhofer IAIS, Germany), Christian Bauckhage (University of Bonn, Fraunhofer IAIS, Germany) and Rafet Sifa (Fraunhofer IAIS, Germany)

Evaluating the performance of SOBEK text mining keyword extraction algorithm

Eliseo Reategui (PGIE, UFRGS, Brazil), Marcio Bigolin (PGIE, UFRGS, IFRS, Brazil), Michel Carniato (PUCRS, Brazil), Rafael Antunes dos Santos (PGIE, UFRGS, Brazil)

Classification of Screenshot Image Captured in Online Meeting System

Minoru Kuribayashi, Kodai Kamakari and Nobuo Funabiki (Graduate School of Natural Science and Technology, Okayama University, Japan)

IoT-SECFOR I
Security Assessment And Threat Analysis
Session Chair:
Virginia Franqueira (University of Kent, UK)

Cyber Security when IT meets OT

Sokratis K. KatsikasDirector of the Norwegian Centre for Cybersecurity in Critical Sectors Professor with the Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Norway

Abstract: The current trend of automation and data exchange in industry, through the development, use and integration of cyber-physical systems, the Internet of things, cloud computing, artificial intelligence and other enabling technologies is expected to bring tremendous benefits in the economy, including improved productivity and efficiency, better flexibility and agility, and increased profitability. However, it also comes with increased cybersecurity risks, primarily deriving from the integration of information technology and operational technology. Thus, as in all cases of a major shift in computing paradigms, a number of cybersecurity challenges arise, that cannot be addressed by simply porting solutions from other domains. In this talk a brief overview of such challenges, and current best practices for addressing them, as well as open issues will be provided.

STRIPED: A Threat Analysis Method for IoT Systems

Kamakshi Srikumar, Komal Kashish, Kolja Eggers, Nicolás E. Díaz Ferreyra, Julian Koch, Thorsten Schüppstuhl and Riccardo Scandariato (Hamburg University of Technology, Germany)

An Investigation of PSA Certified

Seonghan Shin, Tomoyuki Ogawa, Ryo Fujita, Mari Itoh and Hirotaka Yoshida (National Institute of Advanced Industrial Science and Technology (AIST), Japan))

CUING IV
Session Chair:
Prof. Joerg Keller (FernUniversitaet in Hagen, Germany)

Limitations of Web Cryptojacking Detection: A Practical Evaluation

Pawel Rajba (University of Wroclaw, Poland) and Wojciech Mazurczyk (Warsaw University of Technology, Poland)

Data Acquisition on a large Darknet Marketplace

York Yannikos, Julian Heeger and Martin Steinebach (Fraunhofer SIT, Germany)

A synopsis of critical aspects for darknet research

Florian Platzer (Fraunhofer SIT, Germany) and Alexandra Lux (TU Darmstadt, Germany)

Towards Image Hashing Robust Against Cropping and Rotation

Martin Steinebach (Fraunhofer SIT, Germany), Tiberius Berwanger (TU Darmstadt, Germany) and Huajian Liu (Fraunhofer SIT, Germany)

 

IWAPS I
Blockchain Security Applications
Session Chair:
Christos Xenakis (University of Piraeus, Greece)

Trusted and Secure Self-Sovereign Identity framework

Vaios Bolgouras, Anna Angelogianni, Ilias Politis and Christos Xenakis (University of Piraeus, Greece)

Improving Security and Scalability in Smart Grids using Blockchain Technologies

Mandana Falahi (University POLITEHNICA of Bucharest, Romania), Andrei Vasilateanu (University POLITEHNICA of Bucharest, Romania), Nicolae Goga (University POLITEHNICA of Bucharest, Romania), George Suciu (BEIA Consult International, Romania), Mari-Anais Sachian (BEIA Consult International, Romania), Robert Florescu (University POLITEHNICA of Bucharest, Romania), Ștefan-Daniel Stanciu (University POLITEHNICA of Bucharest, Romania)

ConSenseIoT: A Consensus Algorithm for Secure and Scalable Blockchain in the IoT context

Harris Niavis and Konstantinos Loupos (Inlecom Innovation, Greece)

INCOGNITO: IdeNtity verifiCatiOn with privacy-preservinG credeNtIals for anonymous access To Online services

Vaios Bolgouras  (University of Piraeus, Greece)

10:00 - 10:15
Short Coffee Break
10:15 - 11:45
ARES VI
Network And Hardware Security

FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

Emilie Bout (Inria, France), Alessandro Brighente (University of Padova, Italy), Mauro Conti (University of Padova, Italy) and Valeria Loscri (Inria, France)

Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy

Samuel Šuľan (Faculty of Informatics, Masaryk University, Czech Republic) and Martin Husák (Institute of Computer Science, Masaryk University, Czech Republic)

Secure Services for Standard RISC-V Architectures

Davide Bove (Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany)

RIPEMB: A framework for assessing hardware-assisted software security schemes in embedded systems

Stefan Tauner (TU Wien, Austria)

CD-MAKE V
Analytics, Explanation and Applications 1
Session Chair:
André Calero Valdez (University of Lübeck, Germany)

A survey on the application of virtual reality in event-related potential research

Vladimir Marochko (The Artificial Intelligence and Cognitive Load research lab, the Applied Intelligence Research Center, School of Computer Science, Technological University Dublin, Ireland), Richard Reilly (School of Medicine, Institute of Neuroscience, Trinity College Dublin, The University of Dublin, Ireland), Rachel McDonnell (School of Computer Science and Statistics, The University of Dublin, Trinity College, Ireland) and Luca Longo (The Artificial Intelligence and Cognitive Load research lab, the Applied Intelligence Research Center, School of Computer Science, Technological University Dublin, Ireland)

Visualizing Large Collections of URLs Using the Hilbert Curve

Poornima Belavadi (Human-Computer Interaction Center, RWTH Aachen University, Germany), Johannes Nakayama (Human-Computer Interaction Center, RWTH Aachen University, Germany), and André Calero Valdez (Institute for Multimedia and Interactive Systems, University of Lübeck, Germany)

How to Reduce the Time Necessary for Evaluation of Tree-based Models

Viera Anderková and František Babič (Department of Cybernetics and Artificial Intelligence, Faculty of Electrical Engineering and Informatics, Technical University of Košice, Slovakia)

An Empirical Analysis of Synthetic-Data-based Anomaly Detection
Majlinda Llugiqi (Vienna University of Technology, Austria) and Rudolf Mayer (SBA Research & Vienna University of Technology, Austria)

SECI Model in Data-Based Procedure for the Assessment of the Frailty State in Diabetic Patient

František Babič (Department of Cybernetics and Artificial Intelligence, Faculty of Electrical Engineering and
Informatics, Technical University of Košice, Slovakia), Viera Anderková (Department of Cybernetics and Artificial Intelligence, Faculty of Electrical Engineering and Informatics, Technical University of Košice, Slovakia), Zvonimir Bosnić (Department of Family Medicine, Faculty of Medicine, Josip Juraj Strossmayer University of Osijek, Croatia), Mile Volarić (Faculty of Medicine, Josip Juraj Strossmayer University of Osijek, Croatia), Ljiljana Trtica Majnarić (Department of Family Medicine, Faculty of Medicine, Josip Juraj Strossmayer University of Osijek, Croatia)

IoT-SECFOR II
Security Attacks And Solutions
Session Chair:
Virginia Franqueira (University of Kent, UK)

Reactive Jamming Detection for LoRaWAN Based on Meta-Data Differencing

Henri Ruotsalainen (Institute of IT Security Research / St. Pölten University of Applied Sciences, Austria)

MalRec: A Blockchain-based Malware Recovery Framework for Internet of Things

Ahmed Lekssays, Giorgia Sirigu, Barbara Carminati and Elena Ferrari (Università degli Studi dell’Insubria, Italy)

A Resilient Network Node for the Industrial Internet of Things

Lukas Jäger, Dominik Lorych and Michael Eckel (Fraunhofer Institute SIT | ATHENE, Germany)

Announcement of best paper award & final remarks

FARES I
Post-Quantum, Digital Identity, & Access Control
Session Chair:
Lorenzo Musarella (Università Mediterranea di Reggio Calabria, Italy)

SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes

Amir Sharif (Fondazione Bruno Kessler, Italy), Matteo Ranzi (University of Trento, Italy), Roberto Carbone (Fondazione Bruno Kessler, Italy), Giada Sciarretta (Fondazione Bruno Kessler, Italy), Silvio Ranise (Fondazione Bruno Kessler,University of Trento, Italy)

Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness
Tahir Ahmad (Fondazione Bruno Kessler (FBK), Italy), Umberto Morelli (Fondazione Bruno Kessler (FBK), Italy), Silvio Ranise (Fondazione Bruno Kessler (FBK), University of Trento, Italy)

Applying a cryptographic metric to post-quantum lattice-based signature algorithms

Markus Rautell (VTT Technical Research Centre of Finland, Finland), Outi-Marja Latvala (VTT Technical Research Centre of Finland, Finland), Visa Vallivaara (VTT Technical Research Centre of Finland, Finland), Kimmo Halunen (University of Oulu and National Defence University of Finland, Finland)

Introducing Quantum Computing in Mobile Malware Detection

Giovanni Ciaramella (Institute for Informatics and Telematics, National Research Council of Italy (CNR), Italy), Giacomo Iadarola (Institute for Informatics and Telematics, National Research Council of Italy (CNR), Italy), Francesco Mercaldo (University of Molise, Institute for Informatics and Telematics, National Research Council of Italy (CNR), Italy), Marco Storto (University of Molise), Antonella Santone (University of Molise, Italy), Fabio Martinelli (Institute for Informatics and Telematics, National Research Council of Italy (CNR), Italy)

IWAPS II
Next Generation Security Applications
Session Chair:
Angeliki Panou (University of Piraeus, Greece)

Secure Agents on Trusted Embedded Boards: A Proof of Concept based on TPM-enabled Raspberry Boards

Antonio Muñoz (University of Malaga, Spain)

Secret sharing a key in a distributed way, Lagrange vs Newton

Anastassios Voudouris, Ilias Politis and Christos Xenakis (University of Piraeus, Greece)

Fraudulent Activities in the Cyber Realm: DEFRAUDify Project

Razvan-Alexandru Bratulescu, Robert-Ionut Vatasoiu, Sorina-Andreea Mitroi, George Suciu, Mari-Anais Sachian, Daniel-Marian Dutu and Serban-Emanuel Calescu (Beia Consult International, Romania)

SealedGRID: Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID

Christos Fakitsas (University of Piraeus, Greece)

11:45 - 12:45
Lunch Break
12:45 - 14:00
CD-MAKE Keynote
Matthew Taylor
HS 01

Reinforcement Learning in the Real World: Challenges and Opportunities for Human-Agent Interaction

Matthew E. Taylor (Director, Intelligent Robot Learning Lab, Associate Professor & Graduate Admissions Chair, Computing Science; Fellow and Fellow-in-Residence, Alberta Machine Intelligence Institute Canada and CIFAR AI Chair, Amii, Canada)

Abstract: While reinforcement learning (RL) has had many successes in video games and toy domains, recent success in high-impact problems shows that this mature technology can be useful in the real world. This talk will highlight some of these successes, with an emphasis on how RL is making an impact in commercial settings, as well as what problems remain before it can become plug-and-play like many supervised learning technologies. Further, we will argue that RL, like all current AI technology, is fundamentally a human-in-the-loop paradigm. This framing will help motivate why additional fundamental research at the interaction of humans and RL agents is critical to helping RL move out of the lab and into the hands of non-academic practitioners.

14:00 - 14:30
Coffee Break
14:30 - 16:00
ARES VII
Awareness And Incident Response

SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response

Martin Husák and Milan Čermák (Institute of Computer Science, Masaryk University, Czech Republic)

Model-Based Incident Response Playbooks

Avi Shaked, Yulia Cherdantseva and Pete Burnap (School of Computer Science and Informatics, Cardiff University, United Kingdom)

BISCUIT - Blockchain Security Incident Reporting based on Human Observations

Benedikt Putz, Manfred Vielberth and Günther Pernul (University of Regensburg, Germany))

SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools

Emmanouil Samanis, Joseph Gardiner and Awais Rashid (Bristol Cyber Security Group, University of Bristol, United Kingdom)

IWSMR
Session Chair:
Steffen Wendzel (Worms University of Applied Sciences, Germany)

Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the Literature
Sanaz Adel Alipour, Rita Orji and Nur Zincir-Heywood (Faculty of Computer Science, Dalhousie University, Canada)

TaxIdMA: Towards a Taxonomy for Attacks related to Identities
Daniela Pöhn and Wolfgang Hommel (Universität der Bundeswehr München, Germany)

Cyber-Security Culture Assessment in Academia: A COVID-19 Study
Anna Georgiadou, Ariadni Michalitsi-Psarrou and Dimitris Askounis (Decision Support Systems Laboratory, School of Electrical & Computer Engineering, National Technical University of Athens, Greece)

SecHealth I
Session Chair:
Svetlana Boudko (Norwegian Computing Center, Norway)

IoT security for smart health and smart assisted living

Reijo M. SavolaUniversity of Jyväskylä, Finland

Abstract: IoT solutions are in the core of effective and efficient smart health and smart assisted living solutions. Considerable increase in well-being and cost savings can be achieved by them. During the last years, IoT cybersecurity threat landscape has become wider, due to the rapidly increasing use of IoT in smart services, and the scarce computational resources available in IoT devices. This increases the risk of compromising reliable and secure use of them. Systematic proactive assistance of IoT-based smart services with cybersecurity services is essential. Cybersecurity should be designed in the services and the technologies used in a seamless way, and automation is needed. In this talk, a brief overview of challenges in IoT security for smart health and smart assisted living is will be provided, with current practices to overcome them, as well as directions for further research.

Authentication for Operators of Critical Medical Devices: A Contribution to Analysis of Design Trade-offs

Marwa Gadala (Aston University, City, University of London, United Kingdom), Lorenzo Strigini (City, University of London, United Kingdom), Radek Fujdiak (Brno University of Technology, Czech Republic)

FARES II
Threat Intelligence And Detection
Session Chair:
Vincenzo De Angelis (Università Mediterranea di Reggio Calabria, Italy)

Scenarios for Process-Aware Insider Attack Detection in Manufacturing
Martin Macak (Masaryk University, Faculty of Informatics, Czech Republic), Radek Vaclavek (Masaryk University, Faculty of Informatics, Czech Republic), Dasa Kusnirakova (Masaryk University, Faculty of Informatics, Czech Republic), Raimundas Matulevičius (Institute of Computer Science, University of Tartu, Estonia), Barbora Buhnova (Masaryk University, Faculty of Informatics, Czech Republic)

Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding
Marta Catillo, Antonio Pecchia and Umberto Villano (Università degli Studi del Sannio, Italy)

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations

Lukáš Sadlek(Masaryk University), Pavel Čeleda(Masaryk University), Daniel Tovarňák(Masaryk University)

An Early Detection of Android Malware Using System Calls based Machine Learning Model

Xinrun Zhang (Purdue University Northwest, United States), Akshay Mathur (The University of Toledo, United States), Lei Zhao (Purdue University Northwest, United States), Safia Rahmat (The University of Toledo, United States), Quamar Niyaz (Purdue University Northwest, United States), Ahmad Javaid (The University of Toledo, United States), Xiaoli Yang (Purdue University Northwest, United States)

IWAPS III
Cyber Insurance Applications
Session Chair:
Angeliki Panou (University of Piraeus, Greece)

MITRE ATT&CK-driven Cyber Risk Assessment

Mohamed G Ahmed (University of Greenwich, United Kingdom), Sakshyam Panda (University of Greenwich, United Kingdom), Christos Xenakis (University of Piraeus, Greece), Emmanouil Panaousis (University of Greenwich, United Kingdom)

Analyzing Coverages of Cyber Insurance Policies Using Ontology

Markos Charalambous (Cyprus University of Technology, Cyprus), Aristeidis Farao (University of Piraeus, Greece), George Kalantzantonakis (LSTech ESPANA, Spain), Panagiotis Kanakakis (LSTech ESPANA, Spain), Nikos Salamanos (Cyprus University of Technology, Cyprus), Evangelos Kotsifakos (LSTech ESPANA, Spain), Evangellos Froudakis (University of Piraeus, Greece)

NetPhish: Antiphishing Project

Panagiotis Bountakas (University of Piraeus, Greece)

SECONDO: A Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 netwOrking era

Aristeidis Farao (University of Piraeus, Greece)

16:00 - 16:30
Coffee Break
16:30 - 18:00
ARES VIII
Threat Intelligence And Intrusion Detection
Session Chair:
Martin Steinebach (Fraunhofer SIT | ATHENE, Germany)

Detecting Unknown DGAs without Context Information

Arthur Drichel, Justus von Brandt and Ulrike Meyer (RWTH Aachen University, Germany)

HybridDAD: Detecting DDoS Flooding Attack using Machine Learning with Programmable Switches

Mostafa Roshani (ACM Member, Iran) and Mehdi Nobakht (University of New South Wales (UNSW), Australia)

Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks

Mohamed Amine Merzouk (Polytechnique Montréal, Canada and IRT SystemX, France), Joséphine Delas (Polytechnique Montréal, Canada and IRT SystemX, France), Christopher Neal (Polytechnique Montréal, Canada and IRT SystemX, France), Nora Boulahia-Cuppens (Polytechnique Montréal, Canada), Frédéric Cuppens (Polytechnique Montréal, Canada) and Reda Yaich (IRT SystemX, France)

A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale

Joseph Khoury (The University of Texas at San Antonio, United States), Morteza Safaei Pour (San Diego State University, United States) and Elias Bou-Harb (The University of Texas at San Antonio, United States)

IWSMA/IWSRSC
Session Chair:
Peter Kieseberg (St. Pölten University of Applied Sciences, Austria)

On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages

Marc Ohm (Rheinische Friedrich-Wilhelms-Universität Bonn, Germany), Felix Boes (Rheinische Friedrich-Wilhelms-Universität Bonn, Germany), Christian Bungartz (Rheinische Friedrich-Wilhelms-Universität Bonn, Germany), Michael Meier (Rheinische Friedrich-Wilhelms-Universität Bonn, Fraunhofer FKIE, Germany)

SoK: Combating threats in the digital supply chain

Arne Roar Nygård and Sokratis Katsikas (Norwegian University of Science and Technology, Norway)

Federated learning based IDS approach for the IoV

Amal Hbaieb (University of Technology of Troyes, France), Samiha Ayed (University of Technology of Troyes, France), Lamia Chaari (CRNS-SM@RTS (Laboratory of Signals, systeMs, aRtificial Intelligence and neTworkS) Sfax, Tunesia)

SecHealth II
Session Chair:
Svetlana Boudko (Norwegian Computing Center, Norway)

A Critique of EU Digital COVID-19 Certificates: Do Vaccine Passports endanger privacy?

Harry Halpin (KU Leuven, Belgium)

Modelling privacy harms of compromised personal medical data – beyond data breach

Samuel Wairimu (Karlstad University, Sweden) and Lothar Fritsch (Oslo Metropolitan University, Norway)

IWCC
Session Chair:
Steffen Wendzel (Worms University of Applied Sciences, Germany)

SASP: a Semantic web-based Approach for management of Sharable cyber security Playbooks
Mehdi Akbari Gurabi (Fraunhofer FIT,RWTH Aachen University, Germany), Avikarsha Mandal (Fraunhofer FIT, Germany), Jan Popanda (Fraunhofer FIT, Germany), Robert Rapp (University of Stuttgart, Germany), Stefan Decker (Fraunhofer FIT, RWTH Aachen University, Germany)

Deep Reinforcement Learning-Based Defense Strategy Selection

Axel Charpentier (Polytechnique Montréal, IRT SystemX, Canada), Nora Boulahia Cuppens (Polytechnique Montréal, France), Frédéric Cuppens (Polytechnique Montréal, France), Reda Yaich (IRT SystemX, France)

Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms

Bethany Sumner, Gokila Dorai and John Heslen (Augusta University, United States)

Shedding Light on the Targeted Victim Profiles of Malicious Downloaders

François Labrèche (École Polytechnique de Montréal, Canada), Enrico Mariconti (University College London, United Kingdom), Gianluca Stringhini (Boston University, United States)

IWAPS IV
EU-funded Projects
Session Chair:
Christos Xenakis (University of Piraeus, Greece)

PHYSICS: Optimized hybrid space-time service continuum in FAAS

Ilias Politis (InQbit, Romania)

EVOLVED-5G: Experimentation and Validation Openness for Long-term evolution of VErtical inDustries in 5G era and beyond

Ilias Politis (InQbit, Romania)

ERATOSTHENES: Secure management of IoT devices lifecycle through identities, trust and distributed ledgers

Harris Niavis (INLECOM, Greece)

CyberSane: Cyber Security Incident Handling, Warning and Response System for the European Critical Infrastructures

Christoforos Dadoyan (Ionian University, Greece)

18:00 - 21:00
Traditional Viennese Dinner