Accepted Papers

ARES 2020 Full Research Papers (in no specific order):

A taxonomy for anomaly detection in wireless sensor networks focused on node-level techniques
Dominik Widhalm, Karl M. Goeschka (University of Applied Sciences Technikum Wien; Vienna, Austria) and Wolfgang Kastner (Automation Systems Group, Vienna University of Technology; Vienna, Austria)

Disposable Botnets: Examining the Anatomy of IoT Botnet Infrastructure
Rui Tanabe, Tatsuya Tamai (Yokohama National University, Japan), Akira Fujita, Ryoichi Isawa (National Institute of Information and Communications technology, Japan), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National University, Japan), Carlos Ganan and Michel Van Eeten (Delft University of Technology, Netherlands)

Analyzing the Real-World Applicability of DGA Classifiers
Arthur Drichel, Ulrike Meyer (RWTH Aachen University, Germany), Samuel Schüppen and Dominik Teubert (Siemens CERT, Germany)

Testing the Effectiveness of Tailored Phishing Techniques in Industry and Academia: a Field Experiment
Pavlo Burda, Tzouliano Chotza, Luca Allodi and Nicola Zannone (Eindhoven University of Technology, Netherlands)

Confiance: detecting vulnerabilities in Java Card applets
Léopold Ouairy (INRIA, France), Hélène Le Bouder (IMT-Atlantique, France) and Jean-Louis Lanet (INRIA, France)

Machine Learning for Tree Structures and Its Application to Detect Fake Sites
Taichi Ishikawa (Carnegie Mellon University, United States), Kilho Shin (Gakushuin University, Japan), Liu Yu-Lu (Rakuten, Inc., Japan) and David Shepard (Evidation Health, United States)

STALK: Security Analysis of Smartwatches for Kids
Christoph Saatjohann, Fabian Ising, Luise Krings and Sebastian Schinzel (Münster University of Applied Sciences, Germany)

Fighting N-Day Vulnerabilities with Automated CVSS Vector Prediction at Disclosure
Clément Elbaz (Univ Rennes, Inria, CNRS, IRISA, France), Louis Rilling (DGA, France) Christine Morin (Inria, France)

Integrating Digital Twin Security Simulations in the Security Operations Center
Marietheres Dietz, Manfred Vielberth and Günther Pernul (Department of Information Systems, University of Regensburg, Germany)

Distinguishability of Adversarial Examples
Yi Qin, Ryan Hunt and Chuan Yue (Colorado School of Mines, Golden, CO, USA)

A Case Study on the Representativeness of Public DoS Network Traffic Data for Cybersecurity Research
Marta Catillo (Università degli Studi del Sannio, Italy), Antonio Pecchia (Università degli Studi del Sannio, Italy), Massimiliano Rak (Università degli Studi della Campania Luigi Vanvitelli, Italy) and Umberto Villano (Università degli Studi del Sannio, Italy)

Cryptocurrency Networking: Context, State-of-the-Art, Challenges
Maya Dotan (The Hebrew University of Jerusalem, Israel), Yvonne-Anne Pignolet (DFINITY, Switzerland), Saar Tochner (The Hebrew University of Jerusalem, Israel), Stefan Schmid (Faculty of Computer Science, University of Vienna, Austria) and Aviv Zohar (The Hebrew University of Jerusalem, Israel)

MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Fabian Boemer (Intel AI, USA), Rosario Cammarota (Intel Labs, USA), Daniel Demmler (University of Hamburg, Germany), Thomas Schneider and Hossein Yalame (TU Darmstadt, Germany)

Concurrent Error Detection Revisited – Hardware Protection against Fault and Side-Channel Attacks
Jan Richter-Brockmann, Pascal Sasdrich, Florian Bache and Tim Güneysu (Ruhr-Universität Bochum, Horst-Görtz Institute for IT-Security, DFKI, Germany)

Formalising Fault Injection and Countermeasures
Thomas Given-Wilson and Axel Legay (Universite Catholique de Louvain, Belgium)

SCF-MSP: Static Detection of Side Channels in MSP430 Programs
Sepideh Pouyanrad, Jan Tobias Muehlberg and Wouter Joosen (imec-DistriNet, KU Leuven, Belgium)
Quantifying Autonomous System IP Churn using Attack Traffic of Botnets
Harm Griffioen and Christian Doerr (Hasso Plattner Institute, Germany)

A Real World Study on Employees’ Susceptibility to Phishing Attacks
Marco De Bona and Federica Paci (University of Verona, Italy)

Jit Fault Detection: Increasing Availability in 1oo2 Systems Just-In-Time
Leo Botler (Graz University of Technology, Austria), Konrad Diwold (Graz University of Technology and Pro2Future, Austria), Nermin Kajtazovic (Siemens Austria, Austria), and Kay Römer (Graz University of Technology, Austria)

How do App Vendors Respond to Subject Access Requests? A Longitudinal Privacy Study on iOS and Android Apps
Jacob Leon Kröger (Technical University of Berlin, Germany / Weizenbaum Institute, Berlin, Germany), Jens Lindemann and Dominik Herrmann (University of Bamberg, Germany)

Subverting Linux’ Integrity Measurement Architecture
Felix Bohling (Uni Hamburg, Germany), Tobias Mueller (Uni Hamburg, Germany), Michael Eckel (Fraunhofer SIT, Germany )and Jens Lindemann (Uni Hamburg, Germany)

Vector Packet Encapsulation: The Case for a Scalable IPsec Encryption Protocol
Michael Pfeiffer), Michael Rossberg, Franz Girlich and Guenter Schaefer (Technische Universität Ilmenau, Germany)

SoK: Engineering privacy-aware high-tech systems
Giovanni Maria Riva (ABOUTYOU GmbH, Germany), Alexandr Vasenev (ESI-TNO, The Netherlands), Nicola Zannone (Eindhoven University of Technology, The Netherlands)

SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security
Martin Husák, Tomáš Jirsík (Masaryk University, Czech Republic) and Shanchieh Jay Yang (Rochester Institute of Technology, USA)

AVRS: Emulating AVR Microcontrollers for Reverse Engineering and Security Testing
Michael Pucher, Christian Kudera and Georg Merzdovnik (SBA Research, Austria)

Attacker-Centric Thinking in Security — Perspectives from Financial Services Practitioners
Caroline Moeckel (Royal Holloway, University of London, United Kingdom)

Enhanced Performance for the encrypted Web through TLS Resumption across Hostnames
Erik Sy , Moritz Mönnich, Tobias Mueller (University of Hamburg, Germany), Hannes Federrath (Uni Hamburg, Germany), and Mathias Fischer (Uni Hamburg, Germany)

ARES 2020 Short Research papers (in no specific order):

Towards using differentially private synthetic data for Machine Learning in collaborative data science projects
Michael Holmes and George Theodorakopoulos (Cardiff University, United Kingdom)

Security Assurance Cases for Road Vehicles: an Industry Perspective
Mazen Mohamad (University of Gothenburg, Sweden), Alexander Åström (Volvo Cars, Sweden), Örjan Askerdal (AB Volvo, Sweden), Jörgen Borg (Volvo Cars, Sweden) and Riccardo Scandariato (University of Gothenburg, Sweden)

IoT Dataset Generation Framework for Evaluating Anomaly Detection Mechanisms
Andreas Meyer-Berg, Rolf Egert, Leon Böck and Max Mühlhäuser (TU Darmstadt, Germany)

Feasibility Study of a Camera-based PUF in a Realistic Scenar
Kazuihde Fukushima (KDDI Research, Inc., Japan), Thomas Perianin (Secure-IC, Japan), Victor Dyseryn (Secure-IC, France), Shinsaku Kiyomoto (KDDI Research, Inc. Japan), Sylvain Guilley (Secure-IC, France) and Adrien Facon (Département d’informatique/École normale supérieure/CNRS/PSL Research University, France)

Template-based Android Inter Process Communication Fuzzing
Anatoli Kalysch, Mark Deutel and Tilo Müller (Friedrich-Alexander University Erlangen-Nürnberg, Germany)

HIP: HSM-based Identities for Plug-and-Charge
Andreas Fuchs , Dustin Kern, Christoph Krauß and Maria Zhdanova (Fraunhofer SIT, Germany)

SoK: Why Johnny Can’t Fix PGP Standardization
Harry Halpin (Inria, France)