Time (UTC +2) | Room A | Room B | Room C | Room D | Room E | Room F |
---|---|---|---|---|---|---|
10:30 - 18:30 | Organizers available Questions? Neep help? Contact us at Slack! | |||||
11:00 - 12:30 | ARES Full I Hardware Security and Trusted Computing Session Chair: Abdelmalek Benzekri, University of Toulouse, France Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Peter Cibik, Petr Dzurenda, Patrik Dobias (Brno University of Technology, Czech Republic) Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting Monica P. Arenas, Huseyin Demirci, Gabriele Lenzini (SnT/University of Luxembourg, Luxembourg) TPM-Based Post-Quantum Cryptography: A Case Study on Quantum-Resistant and Mutually Authenticated TLS for IoT Environments Sebastian Paul (Robert Bosch GmbH, Germany), Felix Schick, Jan Seedorf (HFT Stuttgart, Germany) Remote Attestation Extended to the Analog Domain Lukas Jäger, Dominik Lorych (Fraunhofer Institute for Secure Information Technology, Germany)
| Welcome and general introduction by Wissam Mallouli, Montimage, France General presentation of PUZZLE Sophia Karagiorgou, UBITECH LTD, Greece Classifying SMEs for Approaching Cybersecurity Competence and Awareness Alireza Shojaifar (FHNW, Switzerland AND Utrecht University, Dept. of Information and Computing Sciences, Utrecht, Netherlands) and Heini Järvinen (Tech.eu, Belgium) On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web George Pantelis, Petros Petrou, Sophia Karagiorgou, Dimitrios Alexandrou (UBITECH LTD, Greece) | Opening – Welcome Antonio Skarmeta, Universidad de Murcia, Spain ERATOSTHENES: Secure management of IoT devices lifecycle through identities, trust and distributed ledgers Konstantinos Loupos, Inlecom Innovation, Greece Determining the Robustness of Privacy Enhancing DeID Against the ReID Adversary: An Experimental Study Ankur Chattopadhyay, Robert Ruska (Northern Kentucky University, USA), Levi Pfantz (University of Wisconsin, USA) A web tool for analysing FIDO2/WebAuthn Requests and Responses Athanasios Vasileios Grammatopoulos (SSL, University of Piraeus, Greece), Ilias Politis (InQbit Innovations SRL, Romania), Christos Xenakis (SSL, University of Piraeus, Greece) Towards a standardized model for privacy-preserving Verifiable Credentials Jesús Garcia-Rodriguez, Rafael Torres Moreno, Jorge Bernal Bernabé, Antonio Skarmeta (University of Murcia, Spain) | CUING I Session Chair: Prof. Wojciech Mazurczyk, Warsaw University of Technology, Poland & FernUniversität in Hagen, Germany Keynote: Stegomalware: what is it and what we can do? Dr. Luca Caviglione, IMATI CNR, Italy | iPAT Session Chair: Ephraim Zimmer, Technical University of Darmstadt, Department of Computer Science, Telecooperation Lab, Germany Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystems Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos (University of Murcia, Spain) Privacy in Times of COVID-19: A Pilot Study in the Republic of Ireland Guodong Xie, Pintu Lohar (ADAPT centre, Dublin City University, Ireland ), Claudia Florea (Dublin City University, Ireland), Malika Bendechache (ADAPT/Lero centre, School of Computing, Dublin City University, Ireland), Ramona Trestian (Middlesex University London, United Kingdom), Rob Brennan (ADAPT centre, School of Computing, Dublin City University, Ireland), Regina Connolly(ADAPT/Lero centre, School of Business, Dublin City University, Ireland) and Irina Tal (Lero centre, School of Computing, Dublin City University, Ireland) Panel discussion on "Privacy and Trust in the Digital Workplace" with Prof. Dr. Hanna Krasnova (University of Potsdam, Chair of Busniness Informatics, Social Media and Data Science, Germany), Prof. Dr. Delphine Reinhardt (University of Göttingen, Institute of Computer Science, Computer Security and Privacy (CSP), Germany) and Katharina Miller (3C Compliance, Spain) | Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms Marcos A. O. Cavalcanti, Pedro R. M. Inácio, Mário M. Freire (Instituto de Telecomunicações and Universidade da Beira Interior, Portugal)
Managing Anonymous Keys in a Fog-Computing Platform Raphael Schermann and Ronald Toegl (Infineon Technologies Austria AG, Austria) A Threat Model Analysis of a Mobile Agent-based system on Raspberry Pi Ivan Garcia, Antonio Munoz (University of Malaga, Spain) |
12:30 - 13:00 | short Lunch Break | |||||
13:00 - 14:30 | ARES Full II SoK Papers Session Chair: Edgar Weippl, SBA Research, Austria & University of Vienna, Austria SoK: Money Laundering in Cryptocurrencies Kartick Kolachala (New Mexico State University, USA), Ecem Simsek (Sam Houston State University,USA), Mohammed Ababneh, Roopa Vishwanathan, (New Mexico State University, USA) SoK: Automatic Deobfuscation of Virtualization-protected Applications Patrick Kochberger, Sebastian Schrittwieser (University of Vienna Research Group Security and Privacy, Austria), Stefan Schweighofer, Peter Kieseberg (St. Pölten University of Applied Sciences Institute of IT Security Research) Edgar Weippl (University of Vienna Research Group Security and Privacy) SoK: Remote Power Analysis Macarena C. Martínez-Rodríguez (Instituto de Microelectrónica de Sevilla, CSIC/Universidad de Sevilla, Spain, Tampere University, Finland), Ignacio M. Delgado-Lozano, Billy Bob Brumley (Tampere University, Finland) | General presentation of GEIGER Samuel Fricker, University of Applied Sciences Northwestern Switzerland, Switzerland GEIGER: Solution for small businesses to protect themselves against cyber-threats José Javier de Vicente Mohino (Atos, Spain), Wissam Mallouli (Montimag, France), José Francisco Ruiz (Atos, Spain), Max van Haastrecht (Utrecht University, The Netherlands) A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME Needs Max van Haastrecht (Utrecht University, The Netherlands), Injy Sarhan (Utrecht University, The Netherlands and Arab Academy for Science, Technology and Maritime Transport (AASTMT), Egypt), Alireza Shojaifar and Louis Baumgartner (Fachhochschule Nordwestschweiz (FHNW), Switzerland), Wissam Mallouli (Montimage, France), Marco Spruit (Leiden University Medical Centre (LUMC) & Leiden University & Utrecht University, The Netherlands) Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small Enterprises Bernd Remmele, Jessica Peichl (University of Education Freiburg, Germany) Open discussion / Synergies / Conclusions | A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection Panagiotis Bountakas, Konstantinos Koutroumpouchos, Christos Xenakis (SSL, University of Piraeus, Greece) Solving the cold start problem in Trust Management in IoT Michail Bampatsikos (National Centre for Scientific Research “Demokritos”, Institute of Informatics & Telecommunications, Greece), Ilias Politis (InQbit Innovations SRL, Romania), Christos Xenakis (SSL, University of Piraeus, Greece), Stelios, C. A. Thomopoulos (National Centre for Scientific Research Demokritos, Institute of Informatics & Telecommunications, Greece) ABEBox: A data driven access control for securing public cloud storage with efficient key revocation Emanuele Raso, Lorenzo Bracciale, Pierpaolo Loreti, Giuseppe Bianchi (University of Rome Tor Vergata, Italy) Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark – Usefulness, Barriers, and Recommendations Mads Schaarup Andersen (Alexandria Instituttet A/S, Denmark) | CUING II Session Chair: Prof. Angelo Consoli, Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland Network Intrusion Detection in the Wild - the Orange use case in theSIMARGL project Mikolaj Komisarek (UTP University of Science and Technology, Poland), Marek Pawlicki (Uniwersytet Technologiczno-Przyrodniczy, Poland), Mikolaj Kowalski, Adrian Marzecki (Orange Polska, Poland), Rafal Kozik (Institute of Telecommunications, UTP Bydgoszcz, Poland), Michal Choras (ITTI Ltd., Poland) DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning David Megias (Universitat Oberta de Catalunya, Spain), Minoru Kuribayashi (Okayama University, Japan), Andrea Rosales (Universitat Oberta de Catalunya, Spain), Wojciech Mazurczyk (Warsaw University of Technology, Poland) | SecHealth I Cybersecurity Session Chair: Svetlana Boudko, Norwegian Computing Center, Norway WELCOME by Workshop Chairs Keynote: Cybersecurity in Healthcare 4.0: Trends, Challenges and Opportunities Sandeep Pirbhulal, Norwegian University of Science and Technology, Norway The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations Kitty Kioskli (University of Brighton, School of Computing, Engineering & Mathematics, Centre for Secure, Intelligent and Usable Systems (CSIUS), United Kingdom & Gruppo Maggioli, Research and Development Lab, Athens, Greece), Theo Fotis (University of Brighton, School of Health Sciences, Centre for Secure, Intelligent and Usable Systems (CSIUS), United Kingdom), Haralambos Mouratidis (University of Brighton, School of Computing, Engineering & Mathematics, Centre for Secure, Intelligent and Usable Systems (CSIUS), United Kingdom) Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia Muhammad Ali Fauzi, Prosper Yeng, Bian Yang (Norwegian University of Science and Technology, Norway), Dita Rachmayani (Universitas Brawijaya, Indonesia) Presentation of the Norwegian Center for Cybersecurity in Critical Sectors (NORCICS) Prof. Sokratis Katsikas (Norwegian University of Science and Technology, Norway) | FARES I Networks, Detection, and Privacy Session Chair: Antonino Rullo, University of Calabria, Italy A Hybrid CNN-LSTM Based Approach for Anomaly DetectionSystems in SDNs Mahmoud Said Elsayed, NhienAn LEKHAC , Hamed Z. Jahromi, Anca Delia Jurcut (University College Dublin, Ireland) Reliable Data Transmission using Low Power Wide Area Networks (LPWAN) for Agricultural Applications Franz Kuntke, Marcel Sinn, Christian Reuter (Science and Technology for Peace and Security (PEASEC), Technical University of Darmstadt, Germany) Strong Anonymity is not Enough: Introducing Fault Tolerance to Planet-Scale Anonymous Communication Systems Lennart Oldenburg (imec-COSIC KU Leuven, Belgium), Florian Tschorsch (Distributed Security Infrastructures, Technische Universität Berlin, Germany) Irish Attitudes Toward COVID Tracker App & Privacy: Sentiment Analysis on Twitter and Survey Data Pintu Lohar, Guodong Xie (ADAPT centre, Dublin City University, Ireland) , Malika Bendechache (ADAPT/Lero centre, School of Computing, Dublin City University, Ireland), Rob Brennan (ADAPT centre, School of Computing, Dublin City University, Ireland), Edoardo Celeste (ADAPT centre, School of Law, Dublin City University, Ireland), Ramona Trestian (Middlesex University London, UK) and Irina Tal (Lero centre, School of Computing, Dublin City University, Ireland) Fighting organized crime by automatically detecting money laundering-related financial transactions Andrea Tundis, Soujanya Nemalikanti, Max Mühlhäuser, (Technische Universität Darmstadt, Germany) An exploratory analysis on the impact of Shodan scanning tool on the network attacks Andrea Tundis, Eric Marc Modo Nga, Max Mühlhäuser (Technische Universität Darmstadt, Germany) |
14:30 - 15:00 | Coffe Break | |||||
15:00 - 16:30 | Keynote: When humans and security or privacy technology interact Sonia Chiasson, Canada Research Chair in User Centric Cybersecurity, Carleton University, Canada Abstract: Early influential research in usable security and privacy highlighted why Johnny can’t encrypt, how users are not the enemy, and why users should rationally reject security advice. However, many novice and expert users alike still find themselves with too many passwords, at risk of being tricked by social engineering, unwittingly engaging in privacy-compromising behaviours, and with an ever-growing list of advice to follow. Why is designing and deploying practical security and privacy so challenging? In this retrospective talk, we will look back on two decades of research on the usable cybersecurity and privacy. Through examples and reflection, we will consider areas where we have made progress, discuss open challenges, and explore practical principles for designing security and privacy technology that works for humans. | |||||
16:30 - 17:00 | Coffee Break | |||||
17:00 - 18:30 | ARES Full III Best Paper Session Session Chair: Tilo Müller, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods Daniel Zelle (Fraunhofer Institute for Secure Information Technology, Germany), Timm Lauser, Dustin Kern, Christoph Krauß (Hochschule Darmstadt University of Applied Sciences, Germany) Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput Steven Engler (Georgetown University, USA), Ian Goldberg (University of Waterloo, Canada) Listen to Your Heart: Evaluation of the Cardiologic Ecosystem Endres Puschner (Max Planck Institute for Security and Privacy, Germany), Christoph Saatjohann (Münster University of Applied Sciences, Germany), Markus Willing (University of Münster, Germany), Christian Dresen (Münster University of Applied Sciences, Germany), Julia Köbe, Benjamin Rath (University of Münster, Germany), Christof Paar (Max Planck Institute for Security and Privacy, Germany), Lars Eckardt, Uwe Haverkamp (University of Münster, Germany), Sebastian Schinzel (Münster University of Applied Sciences, Germany) Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet Max Maass, Marc-Pascal Clement, Matthias Hollick (Secure Mobile Networking Lab, TU Darmstadt, Germany) | CD MAKE II Session Chair: Peter Kieseberg, St. Pölten University of Applied Sciences, Austria Automated Short Answer Grading using Deep Learning : A Survey
Fair and Adequate Explanations Mining Causal Hypotheses in Categorical Time Series by Iterating on Binary Correlations Dirk Saller , Bora I. Kumova (Departement of Applied Computer Science, Baden-Württemberg Cooperative State University, Mosbach, Germany) Active Finite Reward Automaton Inference and Reinforcement Learning Using Queries and Counterexamples Zhe Xu (Arizona State University, Arizona, USA), Bo Wu (University of Texas at Austin, USA), Aditya Ojha (University of Texas at Austin, USA), Daniel Neider (Max Planck Institute for Software Systems, Germany), Ufuk Topcu (University of Texas at Austin, USA) | Towards Secure Evaluation of Online Functionalities Andreas Klinger and Ulrike Meyer (RWTH Aachen University, Germany) Approaching the Data Protection Impact Assessment as a legal methodology to evaluate the degree of privacy by design achieved in technological proposals. A special reference to Identity Management systems Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos (University of Murcia, Spain) A Holistic Approach to Enhanced Security and Privacy in Digital Health Passports Tore Frederiksen (The Alexandra Institute, Denmark) Round table organized by the OLYMPUS, CyberSec4Europe and INCOGNITO project: Open discussion on the new emerging concepts and technologies for Privacy-Preserving. | A Revised Taxonomy of Steganography Embedding Patterns Steffen Wendzel (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany), Luca Caviglione (National Research Council of Italy, Italy), Wojciech Mazurczyk (FernUniversität in Hagen, Germany / Warsaw University of Technology, Poland), Aleksandra Mileva (University Goce Delcev, North Macedonia), Jana Dittmann, Christian Krätzer, Kevin Lamshöft (University of Magdeburg, Germany), Claus Vielhauer (TH Brandenburg, Germany / University of Magdeburg, Germany), Laura Hartmann (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany), Jörg Keller (FernUniversität in Hagen, Germany), Tom Neubert (TH Brandenburg, Germany / University of Magdeburg, Germany) bccstego: A Framework for Investigating Network Covert Channels Matteo Repetto, Luca Caviglione, Marco Zuppelli (National Research Council of Italy, Italy) A Systematic Analysis of Covert Channels in the Network Time Protocol Jonas Hielscher, Kevin Lamshoeft, Christian Kraetzer (Multimedia and Security Group, Otto-von-Guericke University Magdeburg, Germany), Jana Dittmann (Multimedia and Security Group, Otto-von-Guericke University Magdeburg, Germany) Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks Tom Neubert (Brandenburg University of Applied Sciences and University of Magdeburg, Germany), Christian Kraetzer (University of Magdeburg, Germany), Claus Vielhauer (Brandenburg University of Applied Sciences, Germany) | SecHealth II Integrity and Privacy Session Chair: Svetlana Boudko, Norwegian Computing Center, Norway Userspace Software Integrity Measurement Michael Eckel and Tim Riemann (Fraunhofer SIT, Germany) Towards Interoperable Vaccination Certificate Services Andreea Ancuta Corici (Fraunhofer FOKUS Berlin, Germany), Tina Hühnlein and Detlef Hühnlein (ecsec GmbH Michelau, Germany), Olaf Rode (Fraunhofer FOKUS Berlin, Germany) DeCanSec: A Decentralized Architecture for Secure Statistical Computations on Distributed Health Registry Data Narasimha Raghavan Veeraragavan, Jan Franz Nygård (Department of Registry Informatics, Cancer Registry of Norway, Norway) CLOSING | FARES II Blockchain and Distributed Ledger Technologies Session Chair: Lorenzo Musarella, University Mediterranea of Reggio Calabria, Italy Single-Use Delegatable Signatures Based on Smart Contracts Stephan Krenn and Thomas Lorünser (AIT Austrian Institute of Technology, Austria) PUF-based Smart Tags for Supply Chain Management Alberto Falcone, Carmelo Felicetti, Alfredo Garro, Antonino Rullo, Domenico Saccà (University of Calabria, Italy) Obstacles and Challenges in Transforming Applications for Distributed Data Ledger Integration Martin Pirker and Ernst Piller (Institute of IT Security Research, St.Pölten University of Applied Sciences, Austria) |