Wednesday 18.08.2021

Time (UTC +2)
Room A
Room B
Room C
Room D
Room E
Room F
10:30 - 18:30
Organizers available
11:00 - 12:30
ARES Full I
Hardware Security and Trusted Computing
Session Chair:
Abdelmalek Benzekri, University of Toulouse, France

Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs

Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Peter Cibik, Petr Dzurenda, Patrik Dobias (Brno University of Technology, Czech Republic)

Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting
Video

Monica P. Arenas, Huseyin Demirci, Gabriele Lenzini (SnT/University of Luxembourg, Luxembourg)

TPM-Based Post-Quantum Cryptography: A Case Study on Quantum-Resistant and Mutually Authenticated TLS for IoT Environments
Video

Sebastian Paul (Robert Bosch GmbH, Germany), Felix Schick, Jan Seedorf (HFT Stuttgart, Germany)

Remote Attestation Extended to the Analog Domain
Video

Lukas Jäger, Dominik Lorych (Fraunhofer Institute for Secure Information Technology, Germany)

 

SME-SP I
General & Puzzle
Session Chair:
Dr. Wissam Mallouli, Montimage, France

Welcome and general introduction by Wissam Mallouli, Montimage, France

General presentation of PUZZLE

Sophia Karagiorgou, UBITECH LTD, Greece

Classifying SMEs for Approaching Cybersecurity Competence and Awareness
Video

Alireza Shojaifar (FHNW, Switzerland AND Utrecht University, Dept. of Information and Computing Sciences, Utrecht, Netherlands) and Heini Järvinen (Tech.eu, Belgium)

On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web
Video

George Pantelis, Petros Petrou, Sophia Karagiorgou, Dimitrios Alexandrou (UBITECH LTD, Greece)

IWAPS I
Session Chair:
Antonio Skarmeta, Universidad de Murcia, Spain

Opening – Welcome

Antonio Skarmeta, Universidad de Murcia, Spain

ERATOSTHENES: Secure management of IoT devices lifecycle through identities, trust and distributed ledgers

Konstantinos Loupos, Inlecom Innovation, Greece 

Determining the Robustness of Privacy Enhancing DeID Against the ReID Adversary: An Experimental Study
Video

Ankur Chattopadhyay, Robert Ruska (Northern Kentucky University, USA), Levi Pfantz (University of Wisconsin, USA)

A web tool for analysing FIDO2/WebAuthn Requests and Responses
Video

Athanasios Vasileios Grammatopoulos (SSL, University of Piraeus, Greece), Ilias Politis (InQbit Innovations SRL, Romania), Christos Xenakis (SSL, University of Piraeus, Greece)

Towards a standardized model for privacy-preserving Verifiable Credentials
Video

Jesús Garcia-Rodriguez, Rafael Torres Moreno, Jorge Bernal Bernabé, Antonio Skarmeta (University of Murcia, Spain)

CUING I
Session Chair:
Prof. Wojciech Mazurczyk, Warsaw University of Technology, Poland & FernUniversität in Hagen, Germany

Keynote: Stegomalware: what is it and what we can do?

Dr. Luca Caviglione, IMATI CNR, Italy 

iPAT
Session Chair:
Ephraim Zimmer, Technical University of Darmstadt, Department of Computer Science, Telecooperation Lab, Germany

Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystems
Video

Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos (University of Murcia, Spain)

Privacy in Times of COVID-19: A Pilot Study in the Republic of Ireland
Video

Guodong Xie,  Pintu Lohar (ADAPT centre, Dublin City University, Ireland ), Claudia Florea (Dublin City University, Ireland), Malika Bendechache (ADAPT/Lero centre, School of Computing, Dublin City University, Ireland), Ramona Trestian (Middlesex University London, United Kingdom), Rob Brennan (ADAPT centre, School of Computing, Dublin City University, Ireland), Regina Connolly(ADAPT/Lero centre, School of Business, Dublin City University, Ireland) and Irina Tal (Lero centre, School of Computing, Dublin City University, Ireland)

Panel discussion on "Privacy and Trust in the Digital Workplace" 

with Prof. Dr. Hanna Krasnova (University of Potsdam, Chair of Busniness Informatics, Social Media and Data Science, Germany), Prof. Dr. Delphine Reinhardt (University of Göttingen, Institute of Computer Science, Computer Security and Privacy (CSP), Germany) and Katharina Miller (3C Compliance, Spain)

IWSECC
Session Chair:
Antonio Muñoz, University of Málaga, Spain

Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms
Video

Marcos A. O. Cavalcanti, Pedro R. M. Inácio, Mário M. Freire (Instituto de Telecomunicações and Universidade da Beira Interior, Portugal)

Managing Anonymous Keys in a Fog-Computing Platform
Video

Raphael Schermann and Ronald Toegl (Infineon Technologies Austria AG, Austria) 

A Threat Model Analysis of a Mobile Agent-based system on Raspberry Pi
Video

Ivan Garcia, Antonio Munoz (University of Malaga, Spain)

12:30 - 13:00
short Lunch Break
13:00 - 14:30
ARES Full II
SoK Papers
Session Chair:
Edgar Weippl, SBA Research, Austria & University of Vienna, Austria

SoK: Money Laundering in Cryptocurrencies
Video

Kartick Kolachala (New Mexico State University, USA), Ecem Simsek (Sam Houston State University,USA), Mohammed Ababneh, Roopa Vishwanathan, (New Mexico State University, USA)

SoK: Automatic Deobfuscation of Virtualization-protected Applications

Patrick Kochberger, Sebastian Schrittwieser (University of Vienna Research Group Security and Privacy, Austria), Stefan Schweighofer, Peter Kieseberg (St. Pölten University of Applied Sciences Institute of IT Security Research) Edgar Weippl (University of Vienna Research Group Security and Privacy)

SoK: Remote Power Analysis
Video

Macarena C. Martínez-Rodríguez (Instituto de Microelectrónica de Sevilla, CSIC/Universidad de Sevilla, Spain, Tampere University, Finland), Ignacio M. Delgado-Lozano, Billy Bob Brumley (Tampere University, Finland)

SME-SP II
GEIGER & Conclusion
Session Chair:
Dr. Sophia Karagiorgou, UBITECH LTD, Cyprus

General presentation of GEIGER

Samuel Fricker, University of Applied Sciences Northwestern Switzerland, Switzerland                

GEIGER: Solution for small businesses to protect themselves against cyber-threats

José Javier de Vicente Mohino (Atos, Spain), Wissam Mallouli (Montimag, France), José Francisco Ruiz (Atos, Spain), Max van Haastrecht (Utrecht University, The Netherlands)

A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME Needs
Video

Max van Haastrecht (Utrecht University, The Netherlands), Injy Sarhan (Utrecht University, The Netherlands and Arab Academy for Science, Technology and Maritime Transport (AASTMT), Egypt), Alireza Shojaifar and Louis Baumgartner (Fachhochschule Nordwestschweiz (FHNW), Switzerland), Wissam Mallouli (Montimage, France), Marco Spruit (Leiden University Medical Centre (LUMC) & Leiden University & Utrecht University, The Netherlands)

Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small Enterprises
Video

Bernd Remmele, Jessica Peichl (University of Education Freiburg, Germany)

Open discussion / Synergies / Conclusions 

IWAPS II
Session Chair:
Konstantinos Loupos, Inlecom Innovation, Greece

A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection
Video

Panagiotis Bountakas, Konstantinos Koutroumpouchos, Christos Xenakis (SSL, University of Piraeus, Greece)

Solving the cold start problem in Trust Management in IoT
Video

Michail Bampatsikos (National Centre for Scientific Research “Demokritos”, Institute of Informatics & Telecommunications, Greece), Ilias Politis (InQbit Innovations SRL, Romania), Christos Xenakis (SSL, University of Piraeus, Greece), Stelios, C. A. Thomopoulos (National Centre for Scientific Research Demokritos, Institute of Informatics & Telecommunications, Greece) 

ABEBox: A data driven access control for securing public cloud storage with efficient key revocation
Video

Emanuele Raso, Lorenzo Bracciale, Pierpaolo Loreti, Giuseppe Bianchi (University of Rome Tor Vergata, Italy)

Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark – Usefulness, Barriers, and Recommendations
Video

Mads Schaarup Andersen (Alexandria Instituttet A/S, Denmark)

CUING II
Session Chair:
Prof. Angelo Consoli, Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland

Network Intrusion Detection in the Wild - the Orange use case in theSIMARGL project
Video

Mikolaj  Komisarek (UTP University of Science and Technology, Poland), Marek  Pawlicki (Uniwersytet Technologiczno-Przyrodniczy, Poland), Mikolaj  Kowalski, Adrian  Marzecki (Orange Polska, Poland), Rafal  Kozik (Institute of Telecommunications, UTP Bydgoszcz, Poland), Michal  Choras (ITTI Ltd., Poland)

DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning
Video

David Megias (Universitat Oberta de Catalunya, Spain), Minoru Kuribayashi (Okayama University, Japan), Andrea Rosales (Universitat Oberta de Catalunya, Spain), Wojciech Mazurczyk (Warsaw University of Technology, Poland)

SecHealth I
Cybersecurity
Session Chair:
Svetlana Boudko, Norwegian Computing Center, Norway

WELCOME by Workshop Chairs

Keynote: Cybersecurity in Healthcare 4.0: Trends, Challenges and Opportunities

Sandeep Pirbhulal, Norwegian University of Science and Technology, Norway

The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations
Video

Kitty Kioskli (University of Brighton, School of Computing, Engineering & Mathematics, Centre for Secure, Intelligent and Usable Systems (CSIUS), United Kingdom & Gruppo Maggioli, Research and Development Lab, Athens, Greece), Theo Fotis (University of Brighton, School of Health Sciences, Centre for Secure, Intelligent and Usable Systems (CSIUS), United Kingdom), Haralambos Mouratidis (University of Brighton, School of Computing, Engineering & Mathematics, Centre for Secure, Intelligent and Usable Systems (CSIUS), United Kingdom)  

Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia
Video

Muhammad Ali Fauzi, Prosper Yeng,  Bian Yang (Norwegian University of Science and Technology, Norway), Dita Rachmayani (Universitas Brawijaya, Indonesia)

Presentation of the Norwegian Center for Cybersecurity in Critical Sectors (NORCICS) 

Prof. Sokratis Katsikas (Norwegian University of Science and Technology, Norway)

FARES I
Networks, Detection, and Privacy
Session Chair:
Antonino Rullo, University of Calabria, Italy

A Hybrid CNN-LSTM Based Approach for Anomaly DetectionSystems in SDNs
Video

Mahmoud Said Elsayed, NhienAn LEKHAC , Hamed Z. Jahromi, Anca Delia Jurcut  (University College Dublin, Ireland)

Reliable Data Transmission using Low Power Wide Area Networks (LPWAN) for Agricultural Applications

Franz Kuntke, Marcel Sinn, Christian Reuter (Science and Technology for Peace and Security (PEASEC), Technical University of Darmstadt, Germany)

Strong Anonymity is not Enough: Introducing Fault Tolerance to Planet-Scale Anonymous Communication Systems
Video

Lennart Oldenburg (imec-COSIC KU Leuven, Belgium), Florian Tschorsch (Distributed Security Infrastructures, Technische Universität Berlin, Germany)

Irish Attitudes Toward COVID Tracker App & Privacy: Sentiment Analysis on Twitter and Survey Data
Video

Pintu Lohar, Guodong Xie (ADAPT centre, Dublin City University, Ireland) , Malika Bendechache (ADAPT/Lero centre, School of Computing, Dublin City University, Ireland), Rob Brennan (ADAPT centre, School of Computing, Dublin City University, Ireland), Edoardo Celeste (ADAPT centre, School of Law, Dublin City University, Ireland), Ramona Trestian (Middlesex University London, UK) and Irina Tal (Lero centre, School of Computing, Dublin City University, Ireland)

Fighting organized crime by automatically detecting  money laundering-related  financial transactions

Andrea Tundis, Soujanya Nemalikanti, Max Mühlhäuser, (Technische Universität Darmstadt, Germany)

An exploratory analysis on the impact of Shodan scanning tool on the network attacks

Andrea Tundis, Eric Marc Modo Nga, Max Mühlhäuser (Technische Universität Darmstadt, Germany)

14:30 - 15:00
Coffe Break
15:00 - 16:30
Keynote
Session Chair:
Delphine Reinhardt, University of Göttingen, Germany
Room A

Keynote: When humans and security or privacy technology interact
Video

Sonia Chiasson, Canada Research Chair in User Centric Cybersecurity, Carleton University, Canada

Abstract: Early influential research in usable security and privacy highlighted why Johnny can’t encrypt, how users are not the enemy, and why users should rationally reject security advice.  However, many novice and expert users alike still find themselves with too many passwords, at risk of being tricked by social engineering, unwittingly engaging in privacy-compromising behaviours, and with an ever-growing list of advice to follow.  Why is designing and deploying practical security and privacy so challenging?  In this retrospective talk, we will look back on two decades of research on the usable cybersecurity and privacy.  Through examples and reflection, we will consider areas where we have made progress, discuss open challenges, and explore practical principles for designing security and privacy technology that works for humans.

16:30 - 17:00
Coffee Break
17:00 - 18:30
ARES Full III
Best Paper Session
Session Chair:
Tilo Müller, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany

Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Video

Daniel Zelle (Fraunhofer Institute for Secure Information Technology, Germany), Timm Lauser, Dustin Kern, Christoph Krauß (Hochschule Darmstadt University of Applied Sciences, Germany)

Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput
Video

Steven Engler (Georgetown University, USA), Ian Goldberg (University of Waterloo, Canada)

Listen to Your Heart: Evaluation of the Cardiologic Ecosystem
Video

Endres Puschner (Max Planck Institute for Security and Privacy, Germany), Christoph Saatjohann (Münster University of Applied Sciences, Germany), Markus Willing (University of Münster, Germany), Christian Dresen (Münster University of Applied Sciences, Germany), Julia Köbe, Benjamin Rath (University of Münster, Germany), Christof Paar (Max Planck Institute for Security and Privacy, Germany), Lars Eckardt, Uwe Haverkamp (University of Münster, Germany), Sebastian Schinzel (Münster University of Applied Sciences, Germany)

Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet
Video

Max Maass, Marc-Pascal Clement, Matthias Hollick (Secure Mobile Networking Lab, TU Darmstadt, Germany)

CD MAKE II
Session Chair:
Peter Kieseberg, St. Pölten University of Applied Sciences, Austria

Automated Short Answer Grading using Deep Learning : A Survey
Sridevi Bonthu (Vishnu Institute of Technology, Bhimavaram, Andhra Pradesh, India),  S Rama Sree
(Aditya Engineering College, Surampalem, Andhra Pradesh, India), Krishna Prasad MHM (Jawaharlal Nehru Technological University, Kakinada, Andhra Pradesh, India)

 

Fair and Adequate Explanations
Video

Nicholas Asher (CNRS, IRIT, Université Paul Sabatier, France), Soumya Paul (Telindus, Luxembourg), Chris Russell (Amazon Research, Germany)

Mining Causal Hypotheses in Categorical Time Series by Iterating on Binary Correlations

Dirk Saller , Bora I. Kumova (Departement of Applied Computer Science, Baden-Württemberg Cooperative State University, Mosbach, Germany)

Active Finite Reward Automaton Inference and Reinforcement Learning Using Queries and Counterexamples
Video

Zhe Xu (Arizona State University, Arizona, USA), Bo Wu (University of Texas at Austin, USA), Aditya Ojha (University of Texas at Austin, USA), Daniel Neider (Max Planck Institute for Software Systems, Germany), Ufuk Topcu (University of Texas at Austin, USA)

IWAPS III
Session Chair:
Christos Xenakis, University Pireus, Greece

Towards Secure Evaluation of Online Functionalities
Video

Andreas Klinger and Ulrike Meyer (RWTH Aachen University, Germany)

Approaching the Data Protection Impact Assessment as a legal methodology to evaluate the degree of privacy by design achieved in technological proposals. A special reference to Identity Management systems
Video

Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos (University of Murcia, Spain)

A Holistic Approach to Enhanced Security and Privacy in Digital Health Passports
Video

Tore Frederiksen (The Alexandra Institute, Denmark) 

Round table organized by the OLYMPUS, CyberSec4Europe and INCOGNITO project:  Open discussion on the new emerging concepts and technologies for Privacy-Preserving.

CUING III
Session Chair:
Prof. Joerg Keller, FernUniversitaet in Hagen, Germany

A Revised Taxonomy of Steganography Embedding Patterns
Video

Steffen Wendzel (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany), Luca Caviglione (National Research Council of Italy, Italy), Wojciech Mazurczyk (FernUniversität in Hagen, Germany / Warsaw University of Technology, Poland), Aleksandra Mileva (University Goce Delcev, North Macedonia), Jana Dittmann, Christian Krätzer, Kevin Lamshöft (University of Magdeburg, Germany), Claus Vielhauer (TH Brandenburg, Germany / University of Magdeburg, Germany), Laura Hartmann (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany), Jörg Keller (FernUniversität in Hagen, Germany), Tom Neubert (TH Brandenburg, Germany / University of Magdeburg, Germany)

bccstego: A Framework for Investigating Network Covert Channels
Video

Matteo Repetto, Luca Caviglione, Marco Zuppelli (National Research Council of Italy, Italy)

A Systematic Analysis of Covert Channels in the Network Time Protocol

Jonas  Hielscher, Kevin  Lamshoeft, Christian  Kraetzer (Multimedia and Security Group, Otto-von-Guericke University Magdeburg, Germany), Jana  Dittmann (Multimedia and Security Group, Otto-von-Guericke University Magdeburg, Germany)

Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks

Tom Neubert (Brandenburg University of Applied Sciences and University of Magdeburg, Germany), Christian Kraetzer (University of Magdeburg, Germany), Claus Vielhauer (Brandenburg University of Applied Sciences, Germany)

SecHealth II
Integrity and Privacy
Session Chair:
Svetlana Boudko, Norwegian Computing Center, Norway

Userspace Software Integrity Measurement
Video

Michael Eckel and Tim Riemann (Fraunhofer SIT, Germany)

Towards Interoperable Vaccination Certificate Services
Video

Andreea Ancuta Corici  (Fraunhofer FOKUS  Berlin, Germany), Tina Hühnlein and Detlef Hühnlein (ecsec GmbH Michelau, Germany), Olaf Rode (Fraunhofer FOKUS  Berlin, Germany)

DeCanSec: A Decentralized Architecture for Secure Statistical Computations on Distributed Health Registry Data
Video

Narasimha Raghavan Veeraragavan, Jan Franz Nygård (Department of Registry Informatics, Cancer Registry of Norway, Norway)

CLOSING

FARES II
Blockchain and Distributed Ledger Technologies
Session Chair:
Lorenzo Musarella, University Mediterranea of Reggio Calabria, Italy

Single-Use Delegatable Signatures Based on Smart Contracts

Stephan Krenn and Thomas Lorünser (AIT Austrian Institute of Technology, Austria)

PUF-based Smart Tags for Supply Chain Management

Alberto Falcone, Carmelo Felicetti, Alfredo Garro, Antonino Rullo, Domenico Saccà (University of Calabria, Italy)

Obstacles and Challenges in Transforming Applications for Distributed Data Ledger Integration

Martin Pirker and Ernst Piller (Institute of IT Security Research, St.Pölten University of Applied Sciences, Austria)