Wednesday 18.08.2021

Time (UTC +2)
Room A
Room B
Room C
Room D
Room E
Room F
10:30 - 18:30
Organizers available

Questions? Neep help? Contact us at Slack!

11:00 - 12:30
Hardware Security and Trusted Computing
Session Chair:
Abdelmalek Benzekri, University of Toulouse, France

Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs

Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Peter Cibik, Petr Dzurenda, Patrik Dobias (Brno University of Technology, Czech Republic)

Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting

Monica P. Arenas, Huseyin Demirci, Gabriele Lenzini (SnT/University of Luxembourg, Luxembourg)

TPM-Based Post-Quantum Cryptography: A Case Study on Quantum-Resistant and Mutually Authenticated TLS for IoT Environments

Sebastian Paul (Robert Bosch GmbH, Germany), Felix Schick, Jan Seedorf (HFT Stuttgart, Germany)

Remote Attestation Extended to the Analog Domain

Lukas Jäger, Dominik Lorych (Fraunhofer Institute for Secure Information Technology, Germany)


General & Puzzle
Session Chair:
Dr. Wissam Mallouli, Montimage, France

Welcome and general introduction by Wissam Mallouli, Montimage, France

General presentation of PUZZLE

Sophia Karagiorgou, UBITECH LTD, Greece

Classifying SMEs for Approaching Cybersecurity Competence and Awareness

Alireza Shojaifar (FHNW, Switzerland AND Utrecht University, Dept. of Information and Computing Sciences, Utrecht, Netherlands) and Heini Järvinen (, Belgium)

On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web

George Pantelis, Petros Petrou, Sophia Karagiorgou, Dimitrios Alexandrou (UBITECH LTD, Greece)

Session Chair:
Antonio Skarmeta, Universidad de Murcia, Spain

Opening – Welcome

Antonio Skarmeta, Universidad de Murcia, Spain

ERATOSTHENES: Secure management of IoT devices lifecycle through identities, trust and distributed ledgers

Konstantinos Loupos, Inlecom Innovation, Greece 

Determining the Robustness of Privacy Enhancing DeID Against the ReID Adversary: An Experimental Study

Ankur Chattopadhyay, Robert Ruska (Northern Kentucky University, USA), Levi Pfantz (University of Wisconsin, USA)

A web tool for analysing FIDO2/WebAuthn Requests and Responses

Athanasios Vasileios Grammatopoulos (SSL, University of Piraeus, Greece), Ilias Politis (InQbit Innovations SRL, Romania), Christos Xenakis (SSL, University of Piraeus, Greece)

Towards a standardized model for privacy-preserving Verifiable Credentials

Jesús Garcia-Rodriguez, Rafael Torres Moreno, Jorge Bernal Bernabé, Antonio Skarmeta (University of Murcia, Spain)

Session Chair:
Prof. Wojciech Mazurczyk, Warsaw University of Technology, Poland & FernUniversität in Hagen, Germany

Keynote: Stegomalware: what is it and what we can do?

Dr. Luca Caviglione, IMATI CNR, Italy 

Session Chair:
Ephraim Zimmer, Technical University of Darmstadt, Department of Computer Science, Telecooperation Lab, Germany

Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystems

Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos (University of Murcia, Spain)

Privacy in Times of COVID-19: A Pilot Study in the Republic of Ireland

Guodong Xie,  Pintu Lohar (ADAPT centre, Dublin City University, Ireland ), Claudia Florea (Dublin City University, Ireland), Malika Bendechache (ADAPT/Lero centre, School of Computing, Dublin City University, Ireland), Ramona Trestian (Middlesex University London, United Kingdom), Rob Brennan (ADAPT centre, School of Computing, Dublin City University, Ireland), Regina Connolly(ADAPT/Lero centre, School of Business, Dublin City University, Ireland) and Irina Tal (Lero centre, School of Computing, Dublin City University, Ireland)

Panel discussion on "Privacy and Trust in the Digital Workplace" 

with Prof. Dr. Hanna Krasnova (University of Potsdam, Chair of Busniness Informatics, Social Media and Data Science, Germany), Prof. Dr. Delphine Reinhardt (University of Göttingen, Institute of Computer Science, Computer Security and Privacy (CSP), Germany) and Katharina Miller (3C Compliance, Spain)

Session Chair:
Antonio Muñoz, University of Málaga, Spain

Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms

Marcos A. O. Cavalcanti, Pedro R. M. Inácio, Mário M. Freire (Instituto de Telecomunicações and Universidade da Beira Interior, Portugal)


Managing Anonymous Keys in a Fog-Computing Platform

Raphael Schermann and Ronald Toegl (Infineon Technologies Austria AG, Austria) 

A Threat Model Analysis of a Mobile Agent-based system on Raspberry Pi

Ivan Garcia, Antonio Munoz (University of Malaga, Spain)

12:30 - 13:00
short Lunch Break
13:00 - 14:30
SoK Papers
Session Chair:
Edgar Weippl, SBA Research, Austria & University of Vienna, Austria

SoK: Money Laundering in Cryptocurrencies

Kartick Kolachala (New Mexico State University, USA), Ecem Simsek (Sam Houston State University,USA), Mohammed Ababneh, Roopa Vishwanathan, (New Mexico State University, USA)

SoK: Automatic Deobfuscation of Virtualization-protected Applications

Patrick Kochberger, Sebastian Schrittwieser (University of Vienna Research Group Security and Privacy, Austria), Stefan Schweighofer, Peter Kieseberg (St. Pölten University of Applied Sciences Institute of IT Security Research) Edgar Weippl (University of Vienna Research Group Security and Privacy)

SoK: Remote Power Analysis

Macarena C. Martínez-Rodríguez (Instituto de Microelectrónica de Sevilla, CSIC/Universidad de Sevilla, Spain, Tampere University, Finland), Ignacio M. Delgado-Lozano, Billy Bob Brumley (Tampere University, Finland)

GEIGER & Conclusion
Session Chair:
Dr. Sophia Karagiorgou, UBITECH LTD, Cyprus

General presentation of GEIGER

Samuel Fricker, University of Applied Sciences Northwestern Switzerland, Switzerland                

GEIGER: Solution for small businesses to protect themselves against cyber-threats

José Javier de Vicente Mohino (Atos, Spain), Wissam Mallouli (Montimag, France), José Francisco Ruiz (Atos, Spain), Max van Haastrecht (Utrecht University, The Netherlands)

A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME Needs

Max van Haastrecht (Utrecht University, The Netherlands), Injy Sarhan (Utrecht University, The Netherlands and Arab Academy for Science, Technology and Maritime Transport (AASTMT), Egypt), Alireza Shojaifar and Louis Baumgartner (Fachhochschule Nordwestschweiz (FHNW), Switzerland), Wissam Mallouli (Montimage, France), Marco Spruit (Leiden University Medical Centre (LUMC) & Leiden University & Utrecht University, The Netherlands)

Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small Enterprises

Bernd Remmele, Jessica Peichl (University of Education Freiburg, Germany)

Open discussion / Synergies / Conclusions 

Session Chair:
Konstantinos Loupos, Inlecom Innovation, Greece

A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection

Panagiotis Bountakas, Konstantinos Koutroumpouchos, Christos Xenakis (SSL, University of Piraeus, Greece)

Solving the cold start problem in Trust Management in IoT

Michail Bampatsikos (National Centre for Scientific Research “Demokritos”, Institute of Informatics & Telecommunications, Greece), Ilias Politis (InQbit Innovations SRL, Romania), Christos Xenakis (SSL, University of Piraeus, Greece), Stelios, C. A. Thomopoulos (National Centre for Scientific Research Demokritos, Institute of Informatics & Telecommunications, Greece) 

ABEBox: A data driven access control for securing public cloud storage with efficient key revocation

Emanuele Raso, Lorenzo Bracciale, Pierpaolo Loreti, Giuseppe Bianchi (University of Rome Tor Vergata, Italy)

Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark – Usefulness, Barriers, and Recommendations

Mads Schaarup Andersen (Alexandria Instituttet A/S, Denmark)

Session Chair:
Prof. Angelo Consoli, Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland

Network Intrusion Detection in the Wild - the Orange use case in theSIMARGL project

Mikolaj  Komisarek (UTP University of Science and Technology, Poland), Marek  Pawlicki (Uniwersytet Technologiczno-Przyrodniczy, Poland), Mikolaj  Kowalski, Adrian  Marzecki (Orange Polska, Poland), Rafal  Kozik (Institute of Telecommunications, UTP Bydgoszcz, Poland), Michal  Choras (ITTI Ltd., Poland)

DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning

David Megias (Universitat Oberta de Catalunya, Spain), Minoru Kuribayashi (Okayama University, Japan), Andrea Rosales (Universitat Oberta de Catalunya, Spain), Wojciech Mazurczyk (Warsaw University of Technology, Poland)

SecHealth I
Session Chair:
Svetlana Boudko, Norwegian Computing Center, Norway

WELCOME by Workshop Chairs

Keynote: Cybersecurity in Healthcare 4.0: Trends, Challenges and Opportunities

Sandeep Pirbhulal, Norwegian University of Science and Technology, Norway

The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations

Kitty Kioskli (University of Brighton, School of Computing, Engineering & Mathematics, Centre for Secure, Intelligent and Usable Systems (CSIUS), United Kingdom & Gruppo Maggioli, Research and Development Lab, Athens, Greece), Theo Fotis (University of Brighton, School of Health Sciences, Centre for Secure, Intelligent and Usable Systems (CSIUS), United Kingdom), Haralambos Mouratidis (University of Brighton, School of Computing, Engineering & Mathematics, Centre for Secure, Intelligent and Usable Systems (CSIUS), United Kingdom)  

Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia

Muhammad Ali Fauzi, Prosper Yeng,  Bian Yang (Norwegian University of Science and Technology, Norway), Dita Rachmayani (Universitas Brawijaya, Indonesia)

Presentation of the Norwegian Center for Cybersecurity in Critical Sectors (NORCICS) 

Prof. Sokratis Katsikas (Norwegian University of Science and Technology, Norway)

Networks, Detection, and Privacy
Session Chair:
Antonino Rullo, University of Calabria, Italy

A Hybrid CNN-LSTM Based Approach for Anomaly DetectionSystems in SDNs

Mahmoud Said Elsayed, NhienAn LEKHAC , Hamed Z. Jahromi, Anca Delia Jurcut  (University College Dublin, Ireland)

Reliable Data Transmission using Low Power Wide Area Networks (LPWAN) for Agricultural Applications

Franz Kuntke, Marcel Sinn, Christian Reuter (Science and Technology for Peace and Security (PEASEC), Technical University of Darmstadt, Germany)

Strong Anonymity is not Enough: Introducing Fault Tolerance to Planet-Scale Anonymous Communication Systems

Lennart Oldenburg (imec-COSIC KU Leuven, Belgium), Florian Tschorsch (Distributed Security Infrastructures, Technische Universität Berlin, Germany)

Irish Attitudes Toward COVID Tracker App & Privacy: Sentiment Analysis on Twitter and Survey Data

Pintu Lohar, Guodong Xie (ADAPT centre, Dublin City University, Ireland) , Malika Bendechache (ADAPT/Lero centre, School of Computing, Dublin City University, Ireland), Rob Brennan (ADAPT centre, School of Computing, Dublin City University, Ireland), Edoardo Celeste (ADAPT centre, School of Law, Dublin City University, Ireland), Ramona Trestian (Middlesex University London, UK) and Irina Tal (Lero centre, School of Computing, Dublin City University, Ireland)

Fighting organized crime by automatically detecting  money laundering-related  financial transactions

Andrea Tundis, Soujanya Nemalikanti, Max Mühlhäuser, (Technische Universität Darmstadt, Germany)

An exploratory analysis on the impact of Shodan scanning tool on the network attacks

Andrea Tundis, Eric Marc Modo Nga, Max Mühlhäuser (Technische Universität Darmstadt, Germany)

14:30 - 15:00
Coffe Break
15:00 - 16:30
Session Chair:
Delphine Reinhardt, University of Göttingen, Germany

Keynote: When humans and security or privacy technology interact

Sonia Chiasson, Canada Research Chair in User Centric Cybersecurity, Carleton University, Canada

Abstract: Early influential research in usable security and privacy highlighted why Johnny can’t encrypt, how users are not the enemy, and why users should rationally reject security advice.  However, many novice and expert users alike still find themselves with too many passwords, at risk of being tricked by social engineering, unwittingly engaging in privacy-compromising behaviours, and with an ever-growing list of advice to follow.  Why is designing and deploying practical security and privacy so challenging?  In this retrospective talk, we will look back on two decades of research on the usable cybersecurity and privacy.  Through examples and reflection, we will consider areas where we have made progress, discuss open challenges, and explore practical principles for designing security and privacy technology that works for humans.

16:30 - 17:00
Coffee Break
17:00 - 18:30
Best Paper Session
Session Chair:
Tilo Müller, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany

Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods

Daniel Zelle (Fraunhofer Institute for Secure Information Technology, Germany), Timm Lauser, Dustin Kern, Christoph Krauß (Hochschule Darmstadt University of Applied Sciences, Germany)

Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput

Steven Engler (Georgetown University, USA), Ian Goldberg (University of Waterloo, Canada)

Listen to Your Heart: Evaluation of the Cardiologic Ecosystem

Endres Puschner (Max Planck Institute for Security and Privacy, Germany), Christoph Saatjohann (Münster University of Applied Sciences, Germany), Markus Willing (University of Münster, Germany), Christian Dresen (Münster University of Applied Sciences, Germany), Julia Köbe, Benjamin Rath (University of Münster, Germany), Christof Paar (Max Planck Institute for Security and Privacy, Germany), Lars Eckardt, Uwe Haverkamp (University of Münster, Germany), Sebastian Schinzel (Münster University of Applied Sciences, Germany)

Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet

Max Maass, Marc-Pascal Clement, Matthias Hollick (Secure Mobile Networking Lab, TU Darmstadt, Germany)

Session Chair:
Peter Kieseberg, St. Pölten University of Applied Sciences, Austria

Automated Short Answer Grading using Deep Learning : A Survey
Sridevi Bonthu (Vishnu Institute of Technology, Bhimavaram, Andhra Pradesh, India),  S Rama Sree
(Aditya Engineering College, Surampalem, Andhra Pradesh, India), Krishna Prasad MHM (Jawaharlal Nehru Technological University, Kakinada, Andhra Pradesh, India)


Fair and Adequate Explanations
Nicholas Asher (CNRS, IRIT, Université Paul Sabatier, France), Soumya Paul (Telindus, Luxembourg), Chris Russell (Amazon Research, Germany)

Mining Causal Hypotheses in Categorical Time Series by Iterating on Binary Correlations

Dirk Saller , Bora I. Kumova (Departement of Applied Computer Science, Baden-Württemberg Cooperative State University, Mosbach, Germany)

Active Finite Reward Automaton Inference and Reinforcement Learning Using Queries and Counterexamples

Zhe Xu (Arizona State University, Arizona, USA), Bo Wu (University of Texas at Austin, USA), Aditya Ojha (University of Texas at Austin, USA), Daniel Neider (Max Planck Institute for Software Systems, Germany), Ufuk Topcu (University of Texas at Austin, USA)

Session Chair:
Christos Xenakis, University Pireus, Greece

Towards Secure Evaluation of Online Functionalities

Andreas Klinger and Ulrike Meyer (RWTH Aachen University, Germany)

Approaching the Data Protection Impact Assessment as a legal methodology to evaluate the degree of privacy by design achieved in technological proposals. A special reference to Identity Management systems

Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos (University of Murcia, Spain)

A Holistic Approach to Enhanced Security and Privacy in Digital Health Passports

Tore Frederiksen (The Alexandra Institute, Denmark) 

Round table organized by the OLYMPUS, CyberSec4Europe and INCOGNITO project:  Open discussion on the new emerging concepts and technologies for Privacy-Preserving.

Session Chair:
Prof. Joerg Keller, FernUniversitaet in Hagen, Germany

A Revised Taxonomy of Steganography Embedding Patterns

Steffen Wendzel (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany), Luca Caviglione (National Research Council of Italy, Italy), Wojciech Mazurczyk (FernUniversität in Hagen, Germany / Warsaw University of Technology, Poland), Aleksandra Mileva (University Goce Delcev, North Macedonia), Jana Dittmann, Christian Krätzer, Kevin Lamshöft (University of Magdeburg, Germany), Claus Vielhauer (TH Brandenburg, Germany / University of Magdeburg, Germany), Laura Hartmann (Worms University of Applied Sciences, Germany / FernUniversität in Hagen, Germany), Jörg Keller (FernUniversität in Hagen, Germany), Tom Neubert (TH Brandenburg, Germany / University of Magdeburg, Germany)

bccstego: A Framework for Investigating Network Covert Channels

Matteo Repetto, Luca Caviglione, Marco Zuppelli (National Research Council of Italy, Italy)

A Systematic Analysis of Covert Channels in the Network Time Protocol

Jonas  Hielscher, Kevin  Lamshoeft, Christian  Kraetzer (Multimedia and Security Group, Otto-von-Guericke University Magdeburg, Germany), Jana  Dittmann (Multimedia and Security Group, Otto-von-Guericke University Magdeburg, Germany)

Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks

Tom Neubert (Brandenburg University of Applied Sciences and University of Magdeburg, Germany), Christian Kraetzer (University of Magdeburg, Germany), Claus Vielhauer (Brandenburg University of Applied Sciences, Germany)

SecHealth II
Integrity and Privacy
Session Chair:
Svetlana Boudko, Norwegian Computing Center, Norway

Userspace Software Integrity Measurement

Michael Eckel and Tim Riemann (Fraunhofer SIT, Germany)

Towards Interoperable Vaccination Certificate Services

Andreea Ancuta Corici  (Fraunhofer FOKUS  Berlin, Germany), Tina Hühnlein and Detlef Hühnlein (ecsec GmbH Michelau, Germany), Olaf Rode (Fraunhofer FOKUS  Berlin, Germany)

DeCanSec: A Decentralized Architecture for Secure Statistical Computations on Distributed Health Registry Data

Narasimha Raghavan Veeraragavan, Jan Franz Nygård (Department of Registry Informatics, Cancer Registry of Norway, Norway)


Blockchain and Distributed Ledger Technologies
Session Chair:
Lorenzo Musarella, University Mediterranea of Reggio Calabria, Italy

Single-Use Delegatable Signatures Based on Smart Contracts

Stephan Krenn and Thomas Lorünser (AIT Austrian Institute of Technology, Austria)

PUF-based Smart Tags for Supply Chain Management

Alberto Falcone, Carmelo Felicetti, Alfredo Garro, Antonino Rullo, Domenico Saccà (University of Calabria, Italy)

Obstacles and Challenges in Transforming Applications for Distributed Data Ledger Integration

Martin Pirker and Ernst Piller (Institute of IT Security Research, St.Pölten University of Applied Sciences, Austria)