Accepted Workshop Papers

5G-NS 2018

Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments
Jorge Maestre Vidal, Marco Antonio Sotelo Monge and Luis Javier García Villalba (Universidad Complutense de Madrid, Spain)

SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System
Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski and Piotr Żórawski (Warsaw University of Technology, Poland)

A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation
Marco Antonio Sotelo Monge, Jorge Maestre Vidal and Luis Javier García Villalba (Universidad Complutense de Madrid, Spain)

Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service
Gregory Blanc (Institut Mines-Télécom, Télécom SudParis, France), Nizar Kheir (Thales Group, France), Dhouha Ayed (Thales Group, France), Vincent Lefebvre (Tages SAS, France), Edgardo Montes de Oca (Montimage, France) and Pascal Bisson (Thales Group, France)

To Trust or Not to Trust: Data Origin Authentication for Group Communication in 5G Networks
Robert Annessi, Joachim Fabini and Tanja Zseby (Vienna University of Technology, Austria)

Enhancing NFV Orchestration with Security Policies
Christian Banse and Florian Wendland (Fraunhofer, Germany)

Framework for Security Event Management in 5G
Iris Adam (Nokia Bell Labs, Germany) and Jing Ping (Nokia Software, China)

Identity and Access Control for micro-services based 5G NFV platforms
Daniel Guija and Muhammad Shuaib Siddiqui (i2CAT, Spain)

Universal Trusted Execution Environments
Vincent Lefebvre (tages sas, France), Gianni Santinelli (tages sas, Italy), Tilo MÜller (FAU Erlangen-Nürnberg, Germany) and Johannes Götzfried (FAU Erlangen-Nürnberg, Germany)

CUING 2018

Enhanced Electromagnetic Side-channel Eavesdropping Attacks on Computer Monitors
Asanka Sayakkara, Nhien An Le Khac and Mark Scanlon (University College Dublin, Ireland)

Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach
Wojciech Mazurczyk (Warsaw University of Technology, Poland), Steffen Wendzel (Worms University of Applied Sciences and Fraunhofer FKIE, Germany) and Krzysztof Cabaj (Warsaw University of Technology, Poland)

Towards Utilization of Covert Channels as a Green Networking Technique
Daniel Geisler (FernUniversitaet in Hagen, Germany), Wojciech Mazurczyk (Warsaw University of Technology, Poland) and Joerg Keller (FernUniversitaet in Hagen, Germany)

Steganography by synthesis – Can commonplace image manipulations like face morphing create plausible steganographic channels?
Christian Kraetzer and Jana Dittmann (Dept. of Computer Science, Otto-von-Guericke University Magdeburg, Germany)

Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach
Krzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski and Piotr Żórawski (Warsaw University of Technology, Poland)

Get Me Cited, Scotty! Analysis of Academic Publications in Covert Channel Research
Steffen Wendzel (Fraunhofer FKIE / Worms University of Applied Sciences, Germany)

Channel Steganalysis
Martin Steinebach (Fraunhofer, Germany)

CyberTIM 2018

Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments
Nikolaos Tsinganos, George Sakellariou, Panagiotis Fouliras and Ioannis Mavridis (University of Macedonia, Greece)

Evaluation of Apache Spot’s machine learning capabilities in an SDN/NFV enabled environment
Christos M. Mathas (University of Peloponnese, Greece), Olga E. Segou (Orion Innovations PC, Greece), Georgios Xylouris (Orion Innovations PC, Greece), Dimitris Christinakis (Orion Innovations PC, Greece), Michail – Alexandros Kourtis (Institute of Informatics and Telecommunications National Centre for Scientific Research “Demokritos”, Greece), Costas Vassilakis (University of Peloponnese, Greece) and Anastasios Kourtis (Institute of Informatics and Telecommunications National Centre for Scientific Research “Demokritos”, Greece)

Augmented DDoS Mitigation with Reputation Scores
Tomáš Jánský (Faculty of Information Technology, CTU in Prague, Czech Republic), Tomáš Čejka (Faculty of Information Technology, CTU in Prague, Czech Republic), Martin Žádník (CESNET a.l.e., Czech Republic) and Václav Bartoš (CESNET a.l.e., Czech Republic)

The challenge of detecting sophisticated attacks: Insights from SOC Analysts
Olusola Akinrolabu, Ioannis Agrafiotis and Arnau Erola (University of Oxford, United Kingdom)

Mission-Centric Risk Assessment to Improve Cyber Situational Awareness
Franklin Silva and Paul Jacob (Athlone IT, Ireland)

Hunting Observable Objects for Indication of Compromise
Arnold Sykosch, Michael Meier and Marc Ohm (University of Bonn, Germany)

The Mouseworld, a security traffic analysis lab based on NFV/SDN
Antonio Pastor (Telefonica I+D, Spain), Alberto Mozo Velasco (Universidad Politécnica de Madrid, Spain), Diego R. Lopez (Telefonica I+D, Spain), Jesús Luis Folgueira (Telefonica I+D, Spain) and Georgios Gardikis (Space Hellas S.A., Greece)

Risks of Sharing Cyber Incident Information
Adham Albakri (University of Kent, United Kingdom), Eerke Boiten (De Montfort University, United Kingdom) and Rogério de Lemos (University of Kent, United Kingdom)

FARES 2018

Attack Difficulty Metric for Assessment of Network Security
Preetam Mukherjee and Chandan Mazumdar (Jadavpur University, India)

Evaluating the degree of security of a system built using security patterns
Eduardo B. Fernandez (Florida Atlantic University, United States), Nobukazu Yoshioka (National Institute of Informatics, Japan) and Hironori Washizaki (Waseda University, Japan)

Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set
Simon Duque Anton, Suneetha Kanoor, Daniel Fraunholz and Hans Dieter Schotten (Deutsches Forschungszentrum für Künstliche Intelligenz GmbH, Germany)

New authentication concept using certificates for big data analytic tools
Paul Velthuis (Fraunhofer-Institute-for-Secure-Information-Technology-SIT, Netherlands), Marcel Schäfer and Martin Steinebach (Fraunhofer-Institute-for-Secure-Information-Technology-SIT, Germany)

Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers
Omid Mir, Rene Mayrhofer, Michael Hölzl and Thanh-Binh Nguyen (Institute of Networks and Security, Johannes Kepler University, Austria)

Reputation-Based Security System For Edge Computing
Francis Nwebonyi (University of Porto, Portugal), Rolando Martins (University of Porto, Portugal) and Manuel E. Correia (CRACS/INESC TEC; DCC/FCUP, Portugal)

Robustness Estimation of Infrastructure Networks: On the Usage of Degree Centrality
Sebastian Wandelt and Xiaoqian Sun (Beihand University, China)

X.509 Certificate Error Testing
David Mcluskie and Xavier Bellekens (Abertay University, United Kingdom)


Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot
Alberto Giaretta (Örebro Universitet, Sweden), Michele De Donno (Technical University of Denmark, Denmark) and Nicola Dragoni (Technical University of Denmark, Denmark)

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device
Owen Lo (Edinburgh Napier University, United Kingdom), Bill Buchanan (Edinburgh Napier University, United Kingdom) and Douglas Carson (Keysight Technologies, United Kingdom)

Denial-of-Service Attacks on LoRaWAN
Eef van Es, Harald Vranken and Arjen Hommersom (Open University of the Netherlands, Netherlands)

Improved RNS-Based PRNGs
Alan Michaels (Virginia Tech, United States)

On Track of Sigfox Confidentiality with End-to-End Encryption
Radek Fujdiak (Brno University of Technology, Czech Republic), Petr Petr (Brno University of Technology, Czech Republic), Konstantin Mikhaylov (University of Oulu, Finland), Lukas Malina (Brno University of Technology, Czech Republic), Petr Mlynek (Brno University of Technology, Czech Republic), Jiri Misurec (Brno University of Technology, Czech Republic) and Vojtech Blazek (Brno University of Technology, Czech Republic)

Security Threats and Possible Countermeasures in Applications Covering Different Industry Domains
Musa Samaila, João Sequeiros, Mário Freire and Pedro Inácio (Instituto de Telecomunicações and Department of Computer Science, Universidade da Beira Interior, Covilhã, Portugal)

Towards In-Network Security for Smart Homes
Martin Serror (RWTH Aachen University, Germany), Martin Henze (RWTH Aachen University, Germany), Sacha Hack (FH Aachen University of Applied Sciences, Germany), Marko Schuba (FH Aachen University of Applied Sciences, Germany) and Klaus Wehrle (RWTH Aachen University, Germany)

Towards Wireless Secret key Agreement with LoRa Physical Layer
Henri Ruotsalainen (St. Pölten University of Applied Sciences, Austria) and Stepan Grebeniuk (VACE Systemtechnik GmbH, Austria)

iPAT 2018

Critical Analysis of LPL according to Articles 12 – 14 of the GDPR
Armin Gerl and Dirk Pohl (Universität Passau, Germany)

Privacy and DRM Requirements for Collaborative Development of AI Applications
Vida Ahmadi Mehri, Dragos Ilie and Kurt Tutschku (Blekinge Institute of Technology, Sweden)

The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation
Jonas Walter (TU Darmstadt, Germany), Bettina Abendroth (TU Darmstadt, Germany), Thilo von Pape (Université de Franche-Comté, France), Christian Plappert (Fraunhofer, Germany), Daniel Zelle (Fraunhofer, Germany), Christoph Krauß (Fraunhofer, Germany), Gundula Gagzow (Unabhängiges Landeszentrum für Datenschutz, Germany) and Hendrik Decke (Volkswagen, Germany)

User privacy attitudes regarding proximity sensing
Håkan Jonsson (Lund University, Sweden) and Carl Magnus Olsson (Malmö University, Sweden)

IWCC 2018

A New Classification of Attacks against the Cyber-Physical Security of Smart Grids
Ghada Elbez, Hubert B. Keller and Veit Hagenmeyer (Karlsruhe Institute of Technology, Germany)

IoT Forensic: identification and classification of evidence in criminal investigations
François Bouchaud (IRCGN, France), Gilles Grimaud (IRCICA – CRIStAL, France) and Thomas Vantroys (IRCICA – CRIStAL, France)

Monitoring Product Sales in Darknet Shops
York Yannikos (Fraunhofer, Germany), Annika Schäfer (TU Darmstadt, Germany) and Martin Steinebach (Fraunhofer, Germany)

Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain
Marek Pawlicki (UTP Bydgoszcz, Poland), Michal Choras (ITTI Ltd., Poland) and Rafal Kozik (Institute of Telecommunications, UTP Bydgoszcz, Poland)

Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection
Elena Doynikova, Andrey Fedorchenko and Igor Kotenko (St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS), Russia)


Conceptualizing the digital TAKEDOWN platforms for supporting first-line-practitioners and law enforcement agencies
Florian Huber (SYNYO GmbH, Austria)

The AWID and TAKEDOWN prevention approach. The generation of a holistic good practice model for prevention of radicalization in youth work
Karin Rainer, Mario Springnagel and Diana Silvestru (Agency for European Integration and Economic Development, Austria)

A review of network vulnerabilities scanning tools: types, capabilities and functioning
Andrea Tundis (TU Darmstadt, Germany), Wojciech Mazurczyk (Warsaw University of Technology, Faculty of Electronics and Information Technology, Institute of Telecommunications, Poland) and Max Mühlhäuser (TU Darmstadt, Germany)

Cybercrime and Organized Crime
Václav Jirovský and Andrej Pastorek (Czech Technical University, Czech Republic)

Enhancing Cyber-Security by Safeguarding Information Privacy: the European Union and the Implementation of the “Data Protection by Design” Approach
Matteo E. Bonfanti (ETH Center for Security Studies, Switzerland)

Challenges of Cryptocurrencies Forensics – A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals
Syed Naqvi (Birmingham City University, United Kingdom)


Security Wrapper Orchestration in Cloud
Aapo Kalliola (Nokia Bell Labs, Finland), Shankar Lal (Aalto University,Finland), Kimmo Ahola (VTT Technical Research Centre of Finland, Finland), Ian Oliver (Nokia Bell Labs, Finland), Yoan Miche (Nokia Bell Labs, Finland) and Tuomas Aura (Aalto University, Finland)

A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures
Stefan Rass (Universität Klagenfurt, Austria), Thomas Grafenauer (Universität Klagenfurt, Austria), Sandra König (Austrian Institute of Technology, Austria) and Stefan Schauer (Austrian Institute of Technology, Austria)

A reference architecture for the container ecosystem
Madiha Syed and Eduardo B. Fernandez (Florida Atlantic University, United States)

A Process Framework for Stakeholder-specific Visualization of Security Metrics
Tanja Hanauer (Leibniz-Rechenzentrum der BAdW, Germany), Wolfgang Hommel (Universität der Bundeswehr München, Germany), Stefan Metzger (Leibniz-Rechenzentrum der BAdW, Germany) and Daniela Pöhn (Fraunhofer-Institut für Angewandte und Integrierte Sicherheit, Germany)

Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications
Jamal Toutouh (University of Malaga, Spain), Antonio Muñoz (University of Malaga, Spain) and Sergio Nesmachnow (Universidad de la Républica – Engineering Faculty, Uruguay)

IWSMA 2018

Detection of Obfuscation Techniques in Android Applications
Alessandro Bacci (Dipartimento di Ingegneria e Architettura – Università degli Studi di Trieste, Italy), Alberto Bartoli (Dipartimento di Ingegneria e Architettura – Università degli Studi di Trieste, Italy), Fabio Martinelli (Istituto di Informatica e Telematica – Consiglio Nazionale delle Ricerche, Pisa, Italy), Eric Medvet (Dipartimento di Ingegneria e Architettura – Università degli Studi di Trieste, Italy) and Francesco Mercaldo (Istituto di Informatica e Telematica – Consiglio Nazionale delle Ricerche, Pisa, Italy)

Practical Precise Taint-flow Static Analysis for Android App Sets
William Klieber, Lori Flynn, William Snavely and Michael Zheng (Carnegie Mellon Univ, Software Engineering Institute, United States)

Tackling Android’s Native Library Malware with Robust, Efficient and Accurate Similarity Measures
Anatoli Kalysch, Mykolai Protsenko, Oskar Milisterfer and Tilo Müller (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Germany)

There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting
David Berend (Nanyang Technological University, Singapore, University of Applied Sciences Wiesbaden, Rüsselsheim, Germany), Bernhard Jungk (Temasek Laboratories at Nanyang Technological University, Singapore) and Shivam Bhasin (Temasek Labs@NTU, Singapore)

Toward a Distributed Trust Management scheme for VANET
Amira Kchaou (SUPCOM, Tunisia), Ryma Abassi (SUPCOM, Tunisia) and Sihem Guemara El Fatmi (High School of Communication, Sup’Com, Tunisia)

Towards a Privacy Preserving and Flexible Scheme for Assessing the Credibility and the Accuracy of Safety Messages Exchanged in VANETs
Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi and Sihem Guemara El Fatmi (Higher School of Communication, Sup’Com, Tunisia)

SAW 2018

Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems
Priya Anand and Jungwoo Ryoo (The Pennsylvania State University, United States)

A GDPR compliance module for supporting the exchange of information between CERTs
Otto Hellwig (SBA-Research, Austria), Gerald Quirchmayr (University of Vienna, Austria), Walter Hötzendorfer (Research Institute AG & Co KG, Austria), Christof Tschohl (Research Institute AG & Co KG, Austria), Edith Huber (Danube University Krems, Austria), Franz Vock (Federal Chancellery, Austria), Florian Nentwich (IKARUS Security Software, Austria), Bettina Pospisil (Danube University Krems, Austria), Matthias Gusenbauer (SBA-Research, Austria) and Gregor Langner (University of Vienna, Austria)

CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle
Thomas Lorünser (AIT Austrian Institute of Technology, Austria), Thomas Länger (University of Lausanne, Austria), Henrich C. Pöhls (University of Passau, Germany) and Leon Sell (University of Passau, Germany)

Mission-Centric Automated Cyber Red Teaming
Suneel Randhawa (Defence Science and Technology, Department of Defence, Australia), Benjamin Turnbull (The University of New South Wales, Australia), Joseph Yuen (The University of New South Wales, Australia) and Jonathan Dean (Defence Science and Technology, Department of Defence, Australia)

Ransomware’s early mitigation mechanisms
Ruta Mussaileb (IMT-Atlantique, France), Nora Cuppens (IMT-Atlantique, France), Jean Louis Lanet (INRIA, France), Helene Bouder (IMT-Atlantique, France), Benjamin Bouget (DGA, France) and Aurelien Palisse (INRIA, France)


Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood
Farzaneh Karegar, John Sören Pettersson and Simone Fischer-Hübner (Karlstad University, Sweden)

Definitions for Plaintext-Existence Hiding in Cloud Storage
Colin Boyd (Norwegian University of Science and Technology, Norway), Gareth T. Davies (Norwegian University of Science and Technology, Norway), Kristian Gjøsteen (Norwegian University of Science and Technology, Norway), Håvard Raddum (Simula Research Laboratories, Norway) and Mohsen Toorani (University of Bergen, Norway)

Fully-Featured Anonymous Credentials with Reputation System
Kai Bemmann, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilling, Michael Schlichtig and Marcel Stienemeier (Paderborn University, Germany)

Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials
Arseny Kurnikov (Aalto University, Finland), Andrew Paverd (Aalto University, Finland), Mohammad Mannan (Concordia University, Canada) and N. Asokan (Aalto University, Finland)

SPEBD 2018

Evidence Identification in Heterogeneous Data Using Clustering
Hussam Mohammed, Nathan Clarke and Fudong Li (University of Plymouth, United Kingdom)

Secure Fixed-point Division for Homomorphically Encrypted Operands
Chibuike Ugwuoke, Zekeriya Erkin and Reginald Lagendijk (Delft University of Technology, Netherlands)

Attribute Based Content Security and Caching in Information Centric IoT
Nurefsan Sertbas (Bogazici University, Turkey), Samet Aytac (Bogazici University, Turkey), Orhan Ermis (Bogazici University, Turkey), Gurkan Gur (ZHAW Zurich University of Applied Sciences, Switherlands) and Fatih Alagoz (Bogazici University, Turkey)

SSE 2018

Surveying Secure Software Development Practices in Finland
Kalle Rindell (University of Turku, Finland), Jukka Ruohonen (University of Turku, Finland) and Sami Hyrynsalmi (Tampere University of Technology, Finland)

Software Security Activities that Support Incident Management in Secure DevOps
Martin Gilje Jaatun (SINTEF Digital, Norway)

Challenges and mitigation approaches for getting secured applications in a big company
Pawel Rajba (University of Wroclaw, Poland)

WCTI 2018

CRUSOE: Data Model for Cyber Situation Awareness
Jana Komárková, Martin Husák, Martin Laštovička and Daniel Tovarňák (Masaryk University, Czech Republic). 

Integrating Threat Intelligence to Enhance an Organization’s Information Security Management
Mathias Gschwandtner (Leopold-Franzens University Innsbruck, Austria), Lukas Demetz (University of Applied Sciences Kufstein, Austria), Matthias Gander (Leopold-Franzens University Innsbruck, Austria) and Ronald Maier (Department of Information Systems, Production and Logistics Management, Austria) 

MAL (the Meta Attack Language): A Language for Domain-Specific Probabilistic Threat Modeling and Attack Simulation
Pontus Johnson, Robert Lagerström and Mathias Ekstedt (KTH Royal Institute of Technology, Sweden)

WSDF 2018

Breaking down violence: A deep-learning strategy to model and classify violence in videos
Bruno Malveira Peixoto, Sandra Avila, Zanoni Dias and Anderson Rocha (Universidade Estadual de Campinas – Unicamp, Brazil)

Digital Forensics in the Next Five Years
Laoise Luciano, Mateusz Topor, Ibrahim Baggili and Frank Breitinger (University of New Haven, United States)

Digitally Signed and Permission Restricted PDF Files: a Case Study on Digital Forensics
Patricio Domingues and Miguel Frade (Instituto Politécnico de Leiria, Portugal)

Forensic APFS File Recovery
Jonas Plum (Siemens AG, Germany) and Andreas Dewald (ERNW Research GmbH, Germany)

I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out
Gokila Dorai (Florida State University, United States), Shiva Houshmand (Southern Illinois University, United States) and Ibrahim Baggili (University of New Haven, United States)

Investigating the Use of Online Open Source Information as Evidence in European Courts
Yi-Ching Liao (Noroff University College, Norway)

Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits
Jacob Taylor, Benjamin Turnbull and Gideon Creech (The University of New South Wales, Australia)