Accepted Workshop Papers

5G-NS 2020

Distributed Packet Inspection for Network Security Purposes in Software-Defined Networking Environments
Piotr Nowakowski, Piotr Żórawski, Krzysztof Cabaj, Marcin Gregorczyk, Maciej Purski and Wojciech Mazurczyk (Warsaw University of Technology, Poland)

A Device Identification Method Based on LED Fingerprint for Visible Light Communication System
Dayu Shi, Xun Zhang, Andrei Vladimirescu, Lina Shi, Yanqi Huang and Yourong Liu (Institut supérieur d’électronique de Paris, France)

INSPIRE-5Gplus : Intelligent Security and Pervasive Trust for 5G and Beyond Networks
Jordi Ortiz, Ramon Sanchez-Iborra, Jorge Bernal, Antonio Skarmeta Gomez (Universidad de Murcia, Spain), Chafika Benzaid, Tarik Taleb (University of Aalto, Finland), Pol Alemany, Raul Muñoz, Ricard Vilalta (Centre Tecnològic de Telecomunicacions de Catalunya (CTTC/CERCA), Spain), Chrystel Gaber, Jean-Philippe Wary (Orange, France), Dhouha Ayed, Pascal Bisson (Thales Group, France), Maria Christopoulou, George Xilouris (NCSR Demokritos, Greece), Edgardo Montes de Oca (Montimage, France), Gürkan Gür (Zhaw Zurich University of Applied Sciences, Switzerland), Gianni Santinelli, Vincent Lefebvre (Solidshild, France), Antonio Pastor and Diego Lopez (Telefonica, Spain)

Post-quantum MACsec Key Agreement for Ethernet Networks
Joo Yeon Cho (ADVA Optical Networking SE, Germany) and Andrew Sergeev (ADVA Optical Networking Israel Ltd., Israel)

CSA 2020

SoK: Linking Information Security Metrics to Management Success Factors
Rainer Diesch (fortiss GmbH, Germany) and Helmut Krcmar (Technical University of Munich, Germany)

CYSAS-S3: A novel dataset for validating cyber situational awareness related tool for supporting military operations
Roumen Daton Medenou (Universidad Internacional de La Rioja (UNIR), INDRA, Spain), Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo Castrillo, Francisco José González Garrido(INDRA, Spain), Alvaro Morais Fernandez (Universidad Politecnica de Madrid (UPM), INDRA, Spain), David Nevado Catalán (Universidad Carlos III de Madrid (UC3M), INDRA, Spain), Ao Hu (INDRA, Spain), David Sandoval Rodríguez-Bermejo (Universidad Carlos III de Madrid (UC3M), INDRA, Spain), Jorge Maestre Vidal, Gerardo Ramis Pasqual De Riquelme INDRA, Spain), Antonio Berardi, Paolo De Santis, Francesco Torelli (Leonardo-Finmeccanica, Italy) and Salvador Llopis Sanchez (European Defence Agency (EDA), Belgium)

Evaluation Methodology for Mission-Centric Cyber Situational Awareness capabilities
David Sandoval Rodríguez-Bermejo (Universidad Carlos III de Madrid / Indra, Spain), Roumen Daton Medenou (UNIR / Indra, Spain), Gerardo Ramis Pasqual de Riquelme, Jorge Maestre Vidal(Indra, Spain), Francesco Torelli (Leonardo-Finmeccanica, Italy) and Salvador Llopis Sánchez (Universidad Politécnica de Valencia / EDA, Spain)

Dynamic Risk Management Architecture Based on Heterogeneous Data Sources for Enhancing the Cyber Situational Awareness in Organizations
Xavier Larriva-Novo, Mario Vega-Barbas, Víctor A Villagrá, Diego Rivera, Mario Sanz and Manuel Álvarez-Campana (Universidat Politécnica de Madrid, Spain)

A novel automatic discovery system of critical assets in cyberspace-oriented military missions
Alvaro Luis Martinez (Universidad Politécnica de Madrid and Indra, Spain) and Víctor A. Villagrá González (Universidad Politécnica de Madrid, Spain)

Denial of Sustainability on military Tactical Clouds
Jorge Maestre Vidal (Indra, Spain) and Marco Antonio Sotelo Monge (Universidad de Murcia, Spain)

RelaxationTime in Complex Network
Dmytro Lande (Institute for data recording NAS of Ukraine, Ukraine), Andrii Snarskii (National Technical University «Igor Sikorsky Kyiv Polytechnic Institute», Ukraine), Oleh Dmytrenko (Institute for data recording NAS of Ukraine, Ukraine) and Igor Subach (National Technical University «Igor Sikorsky Kyiv Polytechnic Institute», Ukraine)

CUING 2020

To Tweet or Not to Tweet: Covertly Manipulating a Twitter Debate on Vaccines Using Malware-Induced Misperceptions
Filipo Sharevski ((DePaul University, College of Computing and Digital Media, Divergent Design Lab, Chicago, IL, USA), Peter Jachim and Kevin Florek (DePaul University, Divergent Design Lab, Chicago, IL, USA)

Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries
Sean Rivera (University of Luxembourg, Luxembourg), Vijay Gurbani (Illinois Institute of Technology, United States), Sofiane Lagraa, Antonio Ken Iannillo and Radu State (University of Luxembourg, Luxembourg)

Critical Traffic Analysis on the Tor Network
Florian Platzer (Fraunhofer SIT, Germany), Marcel Schäfer (Frauhofer USA CESE, United States) and Martin Steinebach (Fraunhofer SIT, Germany)

Stegomalware Detection Through Structural Analysis of Media Files
Damian Puchalski (ITTI Sp. z o.o., Poland), Luca Caviglione (National Research Council of Italy, Italy), Rafal Kozik (ITTI Sp. z o.o., Poland), Adrian Marzecki, Slawomir Krawczyk (Orange Polska, Poland) and Michal Choras (FernUniversitat in Hagen, Germany & UTP Bydgoszcz, Poland)

Covert Storage Caches using the NTP Protocol
Tobias Schmidbauer (University of Hagen, Germany) and Steffen Wendzel (Worms University of Applied Sciences, Germany)

Exploiting Minification for Data Hiding Purposes
Pawel Rajba (University of Wroclaw, Poland) and Wojciech Mazurczyk (Warsaw University of Technology, Poland)

Mixed-code text analysis for the detection of online hidden propaganda
Andrea Tundis, Gaurav Mukherjee and Max Mühlhäuser (Technische Universität Darmstadt, Germany)

Design and Performance Evaluation of Reversible Network Covert Channels
Przemysław Szary, Wojciech Mazurczyk (Warsaw University of Technology, Poland), Luca Caviglione (CNR – IMATI, Italy) and Steffen Wendzel (Worms University of Applied Sciences and Fraunhofer FKIE, Germany)

Exploring Data Leakage in Encrypted Payload Using Supervised Machine Learning
Amir Khaleghi Moghaddam and Nur Zincir-Heywood (Dalhousie University, Canada)

Network Covert Channels Detection using Data Mining and Hierarchical Organisation of Frequent Sets: an Initial Study
Piotr Nowakowski, Piotr Żórawski, Krzysztof Cabaj and Wojciech Mazurczyk (Warsaw University of Technology, Poland)

An Investigation on the Feasibility of the Bluetooth Frequency Hopping Mechanism for the Use as a Covert Channel Technique
Daniel Vogel, Ulugbek Akhmedjanov, Marc Ohm (University of Bonn, Germany) and Michael Meier (University of Bonn, Fraunhofer FKIE, Germany)

Non-Blind Steganalysis
Niklas Bunzel, Martin Steinebach and Huajian Liu (Fraunhofer SIT, Germany)

CyberTIM 2020

Making Use of NXt to Nothing: The Effect of Class Imbalances on DGA Detection Classifiers
Arthur Drichel, Ulrike Meyer (RWTH Aachen University, Germany), Samuel Schüppen and Dominik Teubert (Siemens CERT, Germany)

CyberWolf in Wall Street: Assessing Vulnerabilities of ICT-Intensive Financial Markets
Andrea Calesso (Aequo S.r.L., University of Padova, Italy) , Mauro Conti (Department of Mathematics, University of Padova, Italy) and Martino Grasselli (University of Padova – Department of Mathematics; Léonard de Vinci Pôle Universitaire, Research Center, Italy)

DoH Insight: Detecting DNS over HTTPS by Machine Learning
Dmitrii Vekshin (FIT CTU, Czechia), Karel Hynek (FIT CTU & CESNET a.l.e., Czechia) and Tomas Cejka (CESNET a.l.e., Czechia)


Cyber-Risk Identification for a Digital Substation
Athar Khodabakhsh, Sule Yildirim Yayilgan, Mohamed Abomhara (Norwegian University of Science and Technology, NTNU, Norway), Maren Istad (SINTEF Energy Research, Norway) and Nargis Hurzuk (Statnett, Norway)

Data Visualisation in Internet of Things: Tools, Methodologies, and Challenges
Antonis Protopsaltis, Panagiotis Sarigiannidis (University of Western Macedonia, Greece), Dimitrios Margounakis and Anastasios Lytos (Sidroco Holdings Ltd, Cyprus)

Threat Landscape for Smart Grid Systems
Christos-Minas Mathas, Konstantinos-Panagiotis Grammatikakis, Costas Vassilakis, Nicholas Kolokotronis (University of the Peloponnese, Greece), Vasiliki-Georgia Bilali and Dimitris Kavallieros (KEMEA Center for Security Studies, Greece)

Building a testing environment for SDN networks analysis for electrical grid applications
Toni Cantero-Gubert, Alba Colet, Pol Paradell and J. L. Domínguez-García (IREC, Spain)

Advanced Metering Infrastructures: Security Risks and Mitigations
Gueltoum Bendiab (University of Portsmouth, UK), Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis (University of the Peloponnese, Greece) & Stavros Shiaeles (University of Portsmouth, UK)

On the Importance of cyber-security training for multi-vector energy distribution system operators
Dimitrios Vozikis (University of Strathclyde, UK), Eleni Darra (KEMEA-Center for Security Studies Athens, Greece), Tanel Kuusk (CybExer Technologies Tallinn, Estonia), Dimitris Kavallieros (Center for Security Studies Athens & University of the Peloponnese, Greece), Aare Reintam (CybExer Technologies Tallinn, Estonia) & Xavier Bellekens (University of Strathclyde, UK)

DIDEROT: An Intrusion Detection and Prevention System for DNP3-based SCADA Systems
Panagiotis Radoglou-Grammatikis, Panagiotis Sarigiannidis (University of Western Macedonia, Greece), George Efstathopoulos (0infinity Limited, UK), Paris-Alexandros Karypidis & Antonios Sarigiannidis (SIDROCO HOLDINGS Ltd, Cyprus)

Factors affecting the market adoption of cyber-security products in Energy and Electrical systems: The case of SPEAR
Theodoros Rokkas, Ioannis Neokosmidis (inCITES Consulting, Luxembourg)

FARES 2020

Investigation into the Security and Privacy of iOS VPN Applications
Jack Wilson, David McLuskie and Ethan Bayne (Abertay University, UK)

Negative Filtering of CCTV Content -Forensic Video Analysis Framework
Franck Jeveme Panta, André Péninou and Florence Sedes (Université Toulouse III – Paul Sabatier, France)

Refining the evaluation of the degree of security of a system built using security patterns
Olga Villagran-Velasco (Universidad Nac. Autonoma de Mexico,Mexico), Eduardo B. Fernandez (Florida Atlantic University, USA )and Jorge Ortega-Arjona (Universidad Nac. Autonoma de Mexico, Mexico)

Adversarial Machine Learning for Spam Filters
Bhargav Kuchipudi, Ravi Teja Nannapaneni and Qi Liao (Central Michigan University, United States)

An Empirical Study on the Impact of GDPR and Right to be Forgotten on Data Privacy
Vincenzo Mangini, Irina Tal and Arghir-Nicolae Moldovan (School of Computing, National College of Ireland, Dublin, Ireland)

Automated Modelling of Security Incidents to represent Logging Requirements in Software Systems
Fanny Rivera-Ortiz and Liliana Pasquale (University College Dublin & Lero, Dublin, Ireland)


An IoT Bricking Ransomware Proof of Concept
Calvin Brierley, Jamie Pont, Budi Arief, David Barnes and Julio Hernandez-Castro (School of Computing, University of Kent, UK)

Taxonomy and Challenges in Machine Learning-based Approaches to Detect Attacks in the Internet of Things
Omair Faraj, David Megías-Jiménez (Universitat Oberta de Catalunya, CYBERCAT-Center for Cybersecurity Research of Catalonia, Spain), Abdel Mehsen-Ahmad (Lebanese International University (LIU), The International University of Beirut (BIU), Lebanon) and Joaquin Garcia-Alfaro (Institut Polytechnique de Paris, SAMOVAR, Telecom SudPar”, France)

Privacy threats in low-cost people counting devices
Niccolò Maltoni, Antonio Magnani and Luca Calderoni (University of Bologna, Italy)

Clust-IT: Clustering-Based Intrusion Detection in IoT Environments
Robert Markiewicz and Daniele Sgandurra (Royal Holloway, University of London (S3Lab, Information Security Group, United Kingdom)

iPAT 2020

A Silver Bullet? A Comparison of Accountants and Developers Mental Models in the Raise of Blockchain
Rose Esmander (École Supérieure de Commerce de Paris (ESCP) & Be-Studys, Be-Ys group, France), Pascal Lafourcade (Université Clermont Auvergne, LIMOS, France), Marius Lombard-Platet (DIENS, École normale supérieure, CNRS, PSL Research University,& Be-Studys, Be-Ys group, France) and Claudia Negri Ribalta (CRI, Université Paris-1 Pantheon-Sorbonn & Be-Studys, Be-Ys group, France)

Balancing Trust and Privacy in Computer-Mediated Introduction
Angela Borchert, Nicolás Emilio Díaz Ferreyra and Maritta Heisel (University of Duisburg-Essen, Germany)

IWCC 2020

A comparison of stream mining algorithms on botnet detection
Guilherme Henrique Ribeiro Elaine Ribeiro de Faria and Rodrigo Sanches Miani (Federal University of Uberlândia, Brazil)

Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors – cybersecurity researchers’ perspective
Pawlicka Aleksandra (ITTI Sp. z o.o. Poznań, Poland), Michal Choras (UTP University of Science and Technology Bydgoszcz Poland, FernUniversität in Hagen, Germany) and Marek Pawlicki (UTP University of Science and Technology Bydgoszcz, ITTI Sp. z o.o. Poznań, Poland)

A privacy-aware digital forensics investigation in enterprises
Ludwig Englbrecht (Department of Information Systems, University of Regensburg, Germany) and Günther Pernul (Department of Information Systems, University of Regensburg, Germany)

Real-Time Stream Processing Tool for Detecting Suspicious Network Patterns Using Machine Learning
Mikolaj Komisarek (UTP University of Science and Technology Bydgoszcz, ITTI Sp. z o.o. Poznań, Poland), Michal Choras (FernUniversitat in Hagen, Germany & UTP Bydgoszcz, Poland), Rafal Kozik) and Marek Pawlicki (UTP University of Science and Technology Bydgoszcz, ITTI Sp. z o.o. Poznań, Poland)

Ransomware 2.0: To sell, or not to sell. A Game-theoretical Model of Data-selling Ransomware
Zhen Li (Albion College, United States) and Qi Liao (Central Michigan University, United States)

Detection and classification of Slow DoS Attacks targeting network servers
Enrico Cambiaso, Maurizio Aiello and Ivan Vaccari (Consiglio Nazionale delle Ricerche (CNR), Italy)

Locality Sensitive Hashing for Tampering Detection in Automotive Systems
Roland Bolboacă, Teri Lenard, Bela Genge and Piroska Haller (University of Medicine, Pharmacy, Science and Technology of Targu Mures, Romania)

Privacy-Enhanced Robust Image Hashing with Bloom Filters
Uwe Breidenbach (Technische Universität Darmstadt, Germany), Martin Steinebach and Huajian Liu (Fraunhofer Institute for Secure Information Technology SIT, Germany)

IWSMA 2020

Towards the performance evaluation of a Clustering and Trust based Security mechanism for VANET
Amira Kchaou, Ryma Abassi and Sihem Guemara (Higher school of communications of Tunis, Tunisia)

Memory Corruption Attacks within Android TEEs: A Case Study Based on OP-TEE
Fabian Fleischer, Marcel Busch and Phillip Kuhrt (IT Security Infrastructures Lab, Department of Computer Science Friedrich-Alexander University Erlangen-Nürnberg (FAU), Germany)

VisualDroid: Automatic Triage and Detection of Android Repackaged Applications
Rosangela Casolare (University of Molise, Italy), Francesco Mercaldo (University of Molise & IIT-CNR, Italy), Carlo De Dominicis(University of Molise, Italy), Fabio Martinelli (IIT-CNR, Italy), Antonella Santone(University of Molise, Italy)

ASAINT: A Spy App Identification System based on Network Traffic
Mauro Conti (University of Padua, Italy), Giulio Rigoni (University of Florence, Italy) and Flavio Toffalini (Singapore University of Technology and Design,

A hardware implementation of the Device Identifier Composition Engine
Lukas Jäger and Richard Petri (Fraunhofer Institute for Secure Information Technology, Germany)

IWSMR 2020

An Overview of Limitations and Approaches in Identity Management
Daniela Pöhn (Universität der Bundeswehr München, Research Institute CODE, Germany) and Wolfgang Hommel (Universität der Bundeswehr München, Research Institute CODE, Germany)

A Framework for Automated Evaluation of Security Metrics
Matthew Zaber and Suku Nair (SMU AT&T Center for Virtualization, United States)

Generalizing the Phishing Principle – Analyzing User Behavior in Response to Controlled Stimuli for IT Security Awareness Assessment
Arnold Sykosch (University of Bonn, Germany), Christian Doll (Fraunhofer FKIE, Germany), Matthias Wübbeling and Michael Meier (University of Bonn, Germany)

LPW 2020

Anonymization of geosocial network data by the (k,l)-degree method with location entropy edge selection
Jana Medková (Faculty of Informatics and Management, University of Hradec Kralove, Czechia)

A note on blind contact tracing at scale with applications to the COVID-19 pandemic
Jack Fitzsimons (Oblivious Software Ltd, Ireland), Atul Mantri (University of Maryland, United States), Robert Pisarczyk (University of Oxford, United Kingdom & National University of Singapore, Singapore), Tom Rainforth (University of Oxford, United Kingdom) and Zhikuan Zhao (ETH Zurich, Switzerland)

SSE 2020

AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware
Michael P. Heinl, Alexander Giehl (Fraunhofer AISEC, Germany) and Lukas Graif (Technical University of Munich & Fraunhofer AISEC, Germany)

Towards Detection of Software Supply Chain Attacks by Forensic Artifacts
Marc Ohm (University of Bonn, Germany), Arnold Sykosch and Michael Meier (University of Bonn, Fraunhofer FKIE, Germany)

Contract-based design patterns: A Design by Contract Approach to Specify Security Patterns
Caine Silva, Sylvain Guérin, Raul Mazo and Joel Champeau (ENSTA Bretagne, France)

Security Impacts of Sub-Optimal DevSecOps Implementations in a Highly Regulated Environment
Jose Morales, Thomas Scanlon, Aaron Volkmann, Joseph Yankel and Hasan Yasar (Carnegie Mellon University, United States)

WISI 2020

AndroPRINT: Analysing the Fingerprintability of the Android API
Gerald Palfinger (Secure Information Technology Center – Austria (A-SIT), Austria)
and Bernd Prünster (Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria)

A Semi-Supervised Approach for Network Intrusion Detection
Radoslava Švihrová and Christian Lettner (Software Competence Center Hagenberg, Austria)

RESCURE: A security solution for IoT life cycle
Georgios Selimis, Rui Wang, Roel Maes, Geert-Jan Schrijen (Intrinsic ID, Eindhoven Netherlands), Mario Munzer, Stefan Ilic (Technikon, Villach Austria9, Frans Willems and Lieneke Kusters (Technical University Eindhoven, Netherlands)

Improving security in Industry 4.0 by extending OPC-UA with Usage Control
Oleksii Osliak, Andrea Saracino, Fabio Martinelli and Paolo Mori (Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche, Italy)

Automated Security Test Generation for MQTT Using Attack Patterns
Hannes Sochor, Flavio Ferrarotti and Rudolf Ramler (Software Competence Center Hagenberg, Austria)

WSDF 2020

DFS3: Automated Distributed File System Storage State Reconstruction
Edward Harshany, Ryan Benton, David Bourrie, Michael Black (University of South Alabama, US) and William Glisson (Sam Houston State University, US)

SoK: Exploring the State of the Art and the Future Potential of Artificial Intelligence in Digital Forensic Investigation
Xiaoyu Du (University College Dublin, Ireland), Chris Hargreaves (University of Oxford, United Kingdom), John Sheppard (Waterford Institute of Technology, Ireland), Felix Anda, Asanka Sayakkara, Nhien An Le Khac and Mark Scanlon (University College Dublin, Ireland)

Cosmic Rays: a Neglected Potential Threat to Evidential Integrity in Digital Forensic Investigations?
Richard E Overill (King’s College London, United Kingdom)

TAVeer – An Interpretable Topic-Agnostic Authorship Verification Method
Oren Halvani, Lukas Graner and Roey Regev (Fraunhofer Institute for Secure Information Technology, Germany)

Blockchain-based Chain of Custody: Towards Real-time Tamper-proof Evidence Management
Liza Ahmad, Salam Khanji, Farkhund Iqbal (Zayed University, United Arab Emirates) and Faouzi Kamoun (ESPRIT School of Engineering, Tunisia)

Detecting Double Compression and Splicing using Benfords First Digit Law
Raphael Antonius Frick, Huajian Liu and Martin Steinebach (Fraunhofer Institute for Secure Information Technology SIT Darmstadt, Germany)

SysGen: System State Corpus Generator
Ben Lenard, Alexander Rasin DePaul University, United States), James Wagner (University of New Orleans, United States) and Jonathan Grier (Grier Forensics, United States)

Post-mortem digital forensic artifacts of TikTok Android App
Patricio Domingues, Ruben Nogueira, José Carlos Francisco and Miguel Frade (ESTG – Polytechnic of Leiriad, Portugal)

4P Based Forensics Investigation Framework for Smart Connected Toys
Benjamin Yankson (University at Albany – SUNY, United Stated), Farkhund Iqbal (Zayed University, United Arab Emirates) and Patrick C. K. Hung (OntarioTech University, Canada)