Accepted Papers

ARES 2021 Full Research Papers (in no specific order):

Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks
Aidmar Wainakh, Aleksej Strassheim, Tim Grube (Telecooperation Lab, Technical University of Darmstadt, Germany), Jörg Daubert (Mathematics and Computer Science, Philipps-Universität Marburg, Germany), Max Mühlhäuser (Telecooperation Lab, Technical University of Darmstadt, Germany)

How Lightning’s Routing Diminishes its Anonymity
Satwik Prabhu Kumble, Dick Epema, Stefanie Roos (TU Delft, Netherlands)

Remote Attestation Extended to the Analog Domain
Lukas Jäger, Dominik Lorych (Fraunhofer Institute for Secure Information Technology, Germany)

Efficient Error Prediction for Differentially Private Algorithms                                                                                                                                       
Boel Nelson (Chalmers University of Technology, Sweden)

Optimizing Packet Scheduling and Path Selection for Anonymous Voice Calls
David Schatz, Michael Rossberg, Guenter Schaefer (Technische Universität Ilmenau, Germany)

Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs
Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Peter Cibik, Petr Dzurenda, Patrik Dobias (Department of Telecommunications, Brno University of Technology, Czech Republic)

Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet
Max Maass, Marc-Pascal Clement, Matthias Hollick (Secure Mobile Networking Lab, TU Darmstadt, Germany)

First Step Towards EXPLAINable DGA Multiclass Classification
Arthur Drichel, Nils Faerber, Ulrike Meyer (RWTH Aachen University, Germany)

Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting
Monica P. Arenas, Huseyin Demirci, Gabriele Lenzini (SnT/University of Luxembourg, Luxembourg)

V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems
Thomas Rosenstatter, Tomas Olovsson, Magnus Almgren (Chalmers University of Technology, Sweden)

Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Daniel Zelle (Fraunhofer Institute for Secure Information Technology, Germany), Timm Lauser, Dustin Kern, Christoph Krauß (Hochschule Darmstadt University of Applied Sciences, Germany)

TPM-Based Post-Quantum Cryptography: A Case Study on Quantum-Resistant and Mutually Authenticated TLS for IoT Environments
Sebastian Paul (Robert Bosch GmbH, Germany), Felix Schick, Jan Seedorf (HFT Stuttgart, Germany)

MESH: A Memory-Efficient Safe Heap for C/C++
Emanuel Q. Vintila, Philipp Zieris, Julian Horsch (Fraunhofer AISEC, Germany)

FADE: Detecting Fake News Articles on the Web
Bahruz Jabiyev (Northeastern University, Boston, MA, USA), Sinan Pehlivanoglu (Brown University, Providence, RI, USA), Kaan Onarlioglu (Akamai Technologies, Cambridge, MA, USA), Engin Kirda (Northeastern University, Boston, MA, USA)

Listen to Your Heart: Evaluation of the Cardiologic Ecosystem
Endres Puschner (Max Planck Institute for Security and Privacy, Germany), Christoph Saatjohann (Münster University of Applied Sciences, Germany), Markus Willing (University of Münster, Germany), Christian Dresen (Münster University of Applied Sciences, Germany), Julia Köbe, Benjamin Rath (University of Münster, Germany), Christof Paar (Max Planck Institute for Security and Privacy, Germany), Lars Eckardt, Uwe Haverkamp (University of Münster, Germany), Sebastian Schinzel (Münster University of Applied Sciences, Germany)

Detection of VSI-DDoS Attacks on the Edge:, A Sequential Modeling Approach
Javad Forough, Monowar Bhuyan, Erik Elmroth (Umeå University, Sweden)

Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput
Steven Engler (Georgetown University, USA), Ian Goldberg (University of Waterloo, Canada)

Secure Decision Forest Evaluation
Slim Bettaieb, Loïc Bidoux (Worldline, France), Olivier Blazy (Université de Limoges, XLIM, Limoges, France), Baptiste Cottier (Worldline, France ; DIENS, École normale supérieure, CNRS, PSL University, Inria, Paris, France), David Pointcheval (DIENS, École normale supérieure, CNRS, PSL University, Paris, France ; Inria, Paris, France)

RapidVMI: Fast and multi-core aware active virtual machine introspection
Thomas Dangl, Benjamin Taubmann, Hans P. Reiser (University of Passau, Germany)

I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts
Enrico Bacis, Dario Facchinetti (Università degli Studi di Bergamo, Italy), Marco Guarnieri (IMDEA Software Institute, Spain), Marco Rosa (SAP Security Research, France), Matthew Rossi, Stefano Paraboschi (Università degli Studi di Bergamo, Italy)

OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases
Philipp Kuehn, Markus Bayer, Marc Wendelborn, Christian Reuter (Science and Technology for Peace and Security (PEASEC), Technical University of Darmstadt, Germany)

How Private is Android’s Private DNS Setting? Identifying Apps by Encrypted DNS Traffic
Michael Mühlhauser, Henning Pridöhl, Dominik Herrmann (University of Bamberg, Germany)

Linking CVE’s to MITRE ATT&CK Techniques
Aditya Kuppa (University College Dublin Ireland, Tenable Corporation, Ireland), Lamine Aouad (Tenable Corporation, France), Nhien An LEKHAC (University College Dublin, Ireland)

Virtual Knowledge Graphs for Federated Log Analysis
Kabul Kurniawan (Vienna University of Economics and Business, Austria), Andreas Ekelhart (Secure Business Austria, Austria), Elmar Kiesling (Vienna University of Economics and Business, Austria), Dietmar Winkler (Vienna University of Technology, Austria), Gerald Quirchmayr (University of Vienna, Austria), A Min Tjoa (Vienna University of Technology, Austria)

ARES 2021 Short Research papers (in no specific order):

VTDroid: Value-based Tracking for Overcoming Anti-Taint-Analysis Techniques in Android Apps

Hiroki Inayoshi, Shohei Kakei (Nagoya Institute of Technology, Japan), Eiji Takimoto (Hiroshima Institute of Technology, Japan), Koichi Mouri (Ritsumeikan University, Japan), Shoichi Saito (Nagoya Institute of Technology, Japan)

Integer Overflow Detection with Delayed Runtime Test
Zhen Huang, Xiaowei Yu (DePaul University, U.S.A .)

Grand Theft App: Digital Forensics of Vehicle Assistant Apps
Simon Ebbers, Fabian Ising, Christoph Saatjohann, Sebastian Schinzel (Münster University of Applied Sciences, Germany)

Self-Determined Reciprocal Recommender System with Strong Privacy Guarantees
Saskia Nuñez von Voigt, Erik Daniel, Florian Tschorsch (TU Berlin, Germany)

In-vehicle detection of targeted CAN bus attacks
Florian Fenzl, Roland Rieke (Fraunhofer Institute for Secure Information Technology, Germany), Andreas Dominik (THM University of Applied Sciences, Germany)

Adversarial Examples Against a BERT ABSA Model –Fooling Bert With L33T, Misspellign, and Punctuation,
Nora Hofer (DeepOpinion, Austria), Pascal Schöttle (Management Center Innsbruck – Digital Business & Software Engineering, Austria), Alexander Riezler, Sebastian Stabinger (DeepOpinion, Austria)

ARES 2021 Sok papers (in no specific order):

SoK: Remote Power Analysis
Macarena C. Martínez-Rodríguez (Instituto de Microelectrónica de Sevilla, CSIC/Universidad de Sevilla, Sevilla, Spain, Tampere University, Tampere, Finland), Ignacio M. Delgado-Lozano, Billy Bob Brumley (Tampere University, Tampere, Finland)

SoK: Money Laundering in Cryptocurrencies
Kartick Kolachala (New Mexico State University, U.S.A), Ecem Simsek (Sam Houston State University,U.S.A), Mohammed Ababneh, Roopa Vishwanathan, (New Mexico State University, U.S.A)

SoK: Automatic Deobfuscation of Virtualization-protected Applications
Patrick Kochberger, Sebastian Schrittwieser (University of Vienna Research Group Security and Privacy), Stefan Schweighofer, Peter Kieseberg (St. Pölten University of Applied Sciences Institute of IT Security Research) Edgar Weippl (University of Vienna Research Group Security and Privacy)