Accepted Papers

All accepted Papers at ARES 2024: Full Papers, Short Papers, System of Knowledge


ARES

  • Implementation Evaluation of Software-based Countermeasure against TEE Bypassing Fault Attack
    Shoei Nashimoto (Mitsubishi Electric Corporation, Japan) , Rei Ueno (Tohoku University, Japan) , Naofumi Homma (Tohoku University, Japan) ,
    Full Paper
  • A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web
    Stephan Wiefling (swiefling.de, Germany) , Marian Hönscheid (H-BRS University of Applied Sciences, Germany) , Luigi Lo Iacono (H-BRS University of Applied Sciences, Germany)
    Full Paper
  • Hardware Trust Anchor Authentication for Updatable IoT Devices
    Dominik Lorych (Fraunhofer SIT | ATHENE, Germany) , Christian Plappert (Fraunhofer SIT | ATHENE, Germany)
    Full Paper
  • Extracting Randomness from Nucleotide Sequencers for use in a Decentralised Randomness Beacon
    Darren Hurley-Smith (Royal Holloway University of London, United Kingdom) , Alastair Droop (University of York, United Kingdom) , Remy Lyon (Veiovia Ltd., United Kingdom) , Roxana Teodor (Veiovia Ltd., United Kingdom)
    Full Paper
  • Continuous Authentication Leveraging Matrix Profile
    Luis Ibanez-Lissen (Universidad Carlos III de Madrid, Spain) , Jose Maria de Fuentes (Universidad Carlos III de Madrid, Spain) , Lorena González Manzano (Universidad Carlos III de Madrid, Spain) , Nicolas Anciaux (Inria, France)
    Full Paper
  • Sybil Attack Strikes Again: Denying Content Access in IPFS with a Single Computer
    Thibault Cholez (University of Lorraine, CNRS, Inria, LORIA, France) , Claudia Ignat (University of Lorraine, CNRS, Inria, LORIA, France)
    Short Paper
  • Towards Reducing Business-Risk of Data Theft Implementing Automated Simulation Procedures of Evil Data Exfiltration
    Michael Mundt (Esri Deutschland GmbH, Germany) , Harald Baier (Universität der Bundeswehr München, Research Instiute CODE, Germany) , Antje Raab-Düsterhöft (Hochschule Wismar, Germany)
    Full Paper
  • SoK: A Comparison of Autonomous Penetration Testing Agents
    Raphael Simon (Royal Military Academy, Belgium) , Wim Mees (Royal Military Academy, Belgium)
    Sok Paper
  • Provably Secure Communication Protocols for Remote Attestation
    Johannes Wilson (Sectra Communications; Linköping University, Sweden) , Mikael Asplund (Linköping University, Sweden) , Niklas Johansson (Sectra Communications; Linköping University, Sweden) , Felipe Boeira (Linköping University, Sweden)
    Full Paper
  • A Large-Scale Study on the Prevalence and Usage of TEE-based Features on Android
    Davide Bove (Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany)
    Full Paper
  • Security Analysis of a Decentralized, Revocable and Verifiable Attribute‑Based Encryption Scheme
    Thomas Prantl (Julius-Maximilians-Universität Würzburg, Germany) , Marco Lauer (Julius-Maximilians-Universität Würzburg, Germany) , Lukas Horn (Julius-Maximilians-Universität Würzburg, Germany) , Simon Engel (Julius-Maximilians-Universität Würzburg, Germany) , David Dingel (Julius-Maximilians-Universität Würzburg, Germany) , André Bauer (University Chicago, United States) , Christian Krupitzer (University of Hohenheim, Germany) , Samuel Kounev (Julius-Maximilians-Universität Würzburg, Germany)
    Full Paper
  • Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Stragglers
    Riccardo Taiello (Inria Sophia Antipolis - EURECOM - University Cote d’Azur, France) , Melek Önen (EURECOM, France) , Clémentine Gritti (EURECOM, France) , Marco Lorenzi (Inria Sophia Antipolis - University Cote d’Azur, France)
    Full Paper
  • Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledge
    Kevin De Boeck (KU Leuven - DistriNet, Belgium) , Jenno Verdonck (KU Leuven - DistriNet, Belgium) , Michiel Willocx (KU Leuven - DistriNet, Belgium) , Jorn Lapon (KU Leuven - DistriNet, Belgium) , Vincent Naessens (KU Leuven - DistriNet, Belgium)
    Full Paper
  • Secure Noise Sampling for DP in MPC with Finite Precision
    Hannah Keller (Aarhus University, Denmark) , Helen Möllering (McKinsey & Company, Germany) , Thomas Schneider (Technical University of Darmstadt, Germany) , Oleksandr Tkachenko (DFINITY Foundation, Germany) , Liang Zhao (Technical University of Darmstadt, Germany)
    Full Paper
  • Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification
    Ádám Ruman (Masaryk University, Czechia) , Martin Drašar (Masaryk University, Czechia) , Lukáš Sadlek (Masaryk University, Czechia) , Shanchieh Jay Yang (Rochester Institute of Technology, United States) , Pavel Čeleda (Masaryk University, Czechia)
    Full Paper
  • HeMate: Enhancing Heap Security through Isolating Primitive Types with Arm Memory Tagging Extension
    Yu-Chang Chen (National Taiwan University, Taiwan) , Shih-Wei Li (National Taiwan University, Taiwan)
    Full Paper
  • Investigating HTTP Covert Channels Through Fuzz Testing
    Kai Hölk (FernUniversität in Hagen, Germany) , Wojciech Mazurczyk (Warsaw University of Technology, Poland) , Marco Zuppelli (Institute for Applied Mathematics and Information Technologies, Italy) , Luca Caviglione (CNR - IMATI, Italy)
    Full Paper
  • Prov2vec: Learning Provenance Graph Representation for Anomaly Detection in Computer Systems
    Bibek Bhattarai (Intel, United States) , H. Howie Huang (George Washington University, Washington DC, USA, United States)
    Full Paper
  • Combinatorial Testing Methods for Reverse Engineering Undocumented CAN Bus Functionality
    Christoph Wech (SBA Research, Austria) , Reinhard Kugler (SBA Research, Austria) , Manuel Leithner (SBA Research, Austria) , Dimitris E. Simos (SBA Research, Austria)
    Short Paper
  • Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11
    Patricio Domingues (Polytechnic Institute of Leiria, Portugal) , Miguel Frade (Polytechnic Institute of Leiria, Portugal) , Miguel Negrao (Polytechnic Institute of Leiria, Portugal)
    Full Paper
  • On the effectiveness of Large Language Models for GitHub Workflows
    Xinyu Zhang (Purdue University, United States) , Siddharth Muralee (Purdue University, United States) , Sourag Cherupattamoolayil (Purdue University, United States) , Aravind Machiry (Purdue University, United States)
    Full Paper
  • Graph-Based Spectral Analysis for Detecting Cyber Attacks
    Majed Jaber (Laboratory of research of EPITA (LRE), France) , Nicolas Boutry (EPITA Research Laboratory (LRE), Le Kremlin-Bicêtre, France., France) , Pierre Parrend (EPITA Strasbourg, France)
    Full Paper
  • SoK: Federated Learning based Network Intrusion Detection in 5G: Context, state of the art and challenges
    Sara Chennoufi (SAMOVAR, Télécom SudParis, Institut Polytechnique de Paris, Palaiseau, France., France) , Gregory Blanc (SAMOVAR, Télécom SudParis, Institut Polytechnique de Paris, Palaiseau, France., France) , Houda Jmila (Institute LIST, CEA, Paris-Saclay University, Palaiseau, France, France) , Christophe Kiennert (SAMOVAR, Télécom SudParis, Institut Polytechnique de Paris, Palaiseau, France., France)
    Sok Paper
  • Increasing the Confidence in Security Assurance Cases using Game Theory
    Antonia Welzel (Chalmers | University of Gothenburg, Sweden) , Rebekka Wohlrab (Chalmers | University of Gothenburg, Sweden) , Mazen Mohamad (Chalmers | University of Gothenburg, Sweden)
    Full Paper
  • Confidence-Aware Fault Trees
    Alexander Günther (Rheinland-Pfälzische Technische UniversitätKaiserslautern-Landau, Germany) , Peter Liggesmeyer (Technical University of Kaiserslautern, Germany) , Sebastian Vollmer (Technical University of Kaiserslautern, Germany)
    Short Paper
  • Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting Rules
    Tamir Tassa (The Open University of Israel, Israel) , Lihi Dery (Ariel University, Israel)
    Full Paper
  • BenchIMP: A Benchmark for Quantitative Evaluation of the Incident Management Process Assessment
    Alessandro Palma (Sapienza University of Rome, Italy) , Nicola Bartoloni (Sapienza University of Rome, Italy) , Marco Angelini (Link Campus University of Rome, Italy)
    Full Paper
  • SECL: A Zero-Day Attack Detector and Classifier based on Contrastive Learning and Strong Regularization
    Robin Duraz (Chaire of Naval Cyberdefense, Lab-STICC, France) , David Espes (University of Brest, Lab-STICC, France) , Julien Francq (Naval Group (Naval Cyber Laboratory, NCL), France) , Sandrine Vaton (IMT Atlantique, Lab-STICC, France)
    Full Paper
  • Mealy Verifier: An Automated, Exhaustive, and Explainable Methodology for Analyzing State Machines in Protocol Implementations
    Arthur Tran Van (Télécom SudParis, France) , Olivier Levillain (Télécom SudParis, France) , Herve Debar (Télécom SudParis, France)
    Full Paper
  • SoK: A Unified Data Model for Smart Contract Vulnerability Taxonomies
    Claudia Ruggiero (Sapienza Università di Roma, Italy) , Pietro Mazzini (Sapienza Università di Roma, Italy) , Emilio Coppa (LUISS University, Italy) , Simone Lenti (Sapienza Università di Roma, Italy) , Silvia Bonomi (Sapienza Università di Roma, Italy)
    Sok Paper
  • A Metalanguage for Dynamic Attack Graphs and Lazy Generation
    Viktor Engström (KTH Royal Institute of Technology, Sweden) , Giuseppe Nebbione (KTH Royal Institute of Technology, Sweden) , Mathias Ekstedt (KTH Royal Institute of Technology, Sweden)
    Full Paper
  • Unveiling Vulnerabilities in Bitcoin’s Misbehavior-Score Mechanism: Attack and Defense
    Yuwen Zou (Xi'an Jiaotong-Liverpool University, China) , Wenjun Fan (Xi'an Jiaotong-Liverpool University, China) , Zhen Ma (Xi'an Jiaotong-Liverpool University, China)
    Full Paper
  • SoK: How Artificial-Intelligence Incidents Can Jeopardize Safety and Security
    Richard May (Harz University of Applied Sciences, Germany) , Jacob Krüger (Eindhoven University of Technology, Netherlands) , Thomas Leich (Harz University of Applied Sciences, Germany)
    Sok Paper
  • Reverse Engineered MiniFS File System
    Dmitrii Belimov (Technology Innovation Institute, United Arab Emirates) , Evgenii Vinogradov (Technology Innovation Institute, United Arab Emirates)
    Short Paper
  • Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains
    Dustin Kern (Darmstadt University of Applied Sciences, Germany) , Christoph Krauß (Darmstadt University of Applied Sciences, Germany) , Matthias Hollick (TU Darmstadt, Germany)
    Full Paper
  • SECURA: Unified Reference Architecture for Advanced Security and Trust in Safety Critical Infrastructures
    Michael Eckel (Fraunhofer SIT | ATHENE, Germany) , Sigrid Gürgens (Fraunhofer SIT | ATHENE, Germany)
    Full Paper
  • SoK: Visualization-based Malware Detection Techniques
    Matteo Brosolo (University of Padua, Italy, Italy) , Vinod Puthuvath (University of Padua, Italy, Italy) , Asmitha Ka (Cochin University of Science and Technology, Kochi, Kerala, India, India) , Rafidha Rehiman (Cochin University of Science and Technology, Kochi, Kerala, India, India) , Mauro Conti (University of Padua, Italy, Italy)
    Sok Paper
  • GNN-IDS: Graph Neural Network based Intrusion Detection System
    Zhenlu Sun (Department of Information Technology, Uppsala University, Sweden) , André Teixeira (Department of Information Technology, Uppsala University, Sweden) , Salman Toor (Department of Information Technology, Uppsala University, Sweden)
    Full Paper
  • Let the Users Choose: Low Latency or Strong Anonymity? Investigating Mix Nodes with Paired Mixing Techniques
    Sarah Abdelwahab Gaballah (Ruhr University Bochum, Germany) , Lamya Abdullah (Technical University of Darmstadt, Germany) , Max Mühlhäuser (Technical University of Darmstadt, Germany) , Karola Marky (Ruhr University Bochum, Germany)
    Full Paper
  • Subjective Logic-based Decentralized Federated Learning for Non-IID Data
    Agnideven Palanisamy Sundar (Indiana University - Purdue University - Indianapolis, United States) , Feng Li (IUPUI, United States) , Xukai Zou (Indiana University Purdue University Indianapolis, United States) , Tianchong Gao (Southeast University, China)
    Full Paper
  • Dealing with Bad Apples: Organizational Awareness and Protection for Bit-flip and Typo-Squatting Attacks
    Huancheng Hu (Hasso Plattner Institute & University of Potsdam, Germany) , Afshin Zivi (Hasso Plattner Institute & University of Potsdam, Germany) , Christian Doerr (Hasso Plattner Institute & University of Potsdam, Germany)
    Full Paper
  • Privacy Preserving Release of Mobile Sensor Data
    Rahat Masood (UNSW Sydney, Australia) , Wing Yan Cheng (UNSW Sydney, Australia) , Dinusha Vatsalan (Macquarie University, Australia) , Deepak Mishra (UNSW Sydney, Australia) , Hassan Jameel Asghar (Macquarie University, Australia) , Dali Kaafar (Macquarie University, Australia)
    Full Paper
  • From Code to EM Signals: A Generative Approach to Side Channel Analysis-based Anomaly Detection
    Kurt A. Vedros (University of Idaho, United States) , Constantinos Kolias (University of Idaho, United States) , Daniel Barbara (George Mason University, United States) , Robert Ivans (Idaho National Laboratory, United States)
    Full Paper
  • Monitor-based Testing of Network Protocol Implementations Using Symbolic Execution
    Hooman Asadian (Uppsala University, Sweden) , Paul Fiterau-Brostean (Uppsala University, Sweden) , Bengt Jonsson (Uppsala University, Sweden) , Konstantinos Sagonas (Uppsala University & NTUA, Sweden)
    Full Paper

IWAPS

  • Developing a Call Detail Record Generator for Cultural Heritage Preservation and Theft Mitigation: Applications and Implications
    Robert Vatasoiu (Beia Consult International, Romania) , Alexandru Vulpe (Beia Consult International, Romania) , Robert Florescu (Beia Consult International, Romania)
    Full Paper
  • Advanced methods for generalizing time and duration during dataset anonymization
    Jenno Verdonck (DistriNet, KU Leuven, Belgium) , Kevin De Boeck (DistriNet, KU Leuven, Belgium) , Michiel Willocx (DistriNet, KU Leuven, Belgium) , Vincent Naessens (DistriNet, KU Leuven, Belgium)
    Full Paper
  • Open V2X Management Platform Cyber-Resilience and Data Privacy Mechanisms
    Alexios Lekidis (University of Thessaly, Greece) , Hugo Morais (Universidade de Lisboa, Portugal)
    Full Paper
  • Immutability and non-repudiation in the exchange of key messages within the EU IoT-Edge-Cloud Continuum
    Salvador Cuñat (Universitat Politècnica de València, Spain) , Raúl Reinosa (Universitat Politècnica de València, Spain) , Ignacio Lacalle (Universitat Politècnica de València, Spain) , Carlos E. Palau (Universitat Politècnica de València, Spain)
    Full Paper
  • NITRO: an Interconnected 5G-IoT Cyber Range
    Aristeidis Farao (University of Piraeus, Greece) , Christoforos Ntantogian (Ionian University - Department of Informatics, Greece) , Stylianos Karagiannis (Ionian University - Department of Informatics, Greece) , Emmanouil Magkos (Ionian University - Department of Informatics, Greece) , Alexandra Dritsa (University of Piraeus, Greece) , Christos Xenakis (University of Piraeus, Greece)
    Full Paper
  • AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks
    Georgios Petihakis (University of Piraeus, Greece) , Aristeidis Farao (University of Piraeus, Greece) , Panagiotis Bountakas (University of Piraeus, Greece) , Athanasia Sabazioti (Department of Tourism Studies, University of Piraeus, Greece) , John Polley (School of Communication, University of Southern California, Greece) , Christos Xenakis (University of Piraeus, Greece)
    Full Paper
  • Integrating Hyperledger Fabric with Satellite Communications: A Revolutionary Approach for Enhanced Security and Decentralization in Space Networks
    Anastassios Voudouris (University of Piraeus, Greece) , Aristeidis Farao (University of Piraeus, Greece) , Aggeliki Panou (University of Piraeus, Greece) , John Polley (School of Communication, University of Southern California, United States) , Christos Xenakis (University of Piraeus, Greece)
    Full Paper
  • Entity Recognition on Border Security
    Kejsi Koci (Beia Consult Int, Romania) , Grigor Parangoni (Beia Consult Int, Romania) , Mari-Anais Sachian (Beia Consult Int, Romania) , George Suciu (Beia Consult Int, Romania) , Razvan Bratulescu (Beia Consult Int, Romania)
    Full Paper
  • Towards 5G Advanced network slice assurance through isolation mechanisms
    Alexios Lekidis (University of Thessaly, Greece)
    Full Paper
  • SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities
    Panagiotis Bountakas (Sphynx Technology Solutions, Switzerland) , Konstantinos Fysarakis (Sphynx Technology Solutions, Switzerland) , Thomas Kyriakakis (Dienekes SI IKE, Greece) , Panagiotis Karafotis (Dienekes SI IKE, Greece) , Sotiropoulos Aristeidis (AEGIS IT RESEARCH GmbH, Germany) , Maria Tasouli (Insuretics Limited, Cyprus) , Cristina Alcaraz (University of Malaga, Spain) , George Alexandris (Nodalpoint Systems, Greece) , Vassiliki Andronikou (Nodalpoint Systems, Greece) , Tzortzia Koutsouri (Cyberalytics Limited, Cyprus) , Romarick Yatagha (Framatome, Germany) , George Spanoudakis (Sphynx Technology Solutions, Switzerland) , Sotiris Ioannidis (Dienekes SI IKE, Greece) , Fabio Martinelli (Consiglio Nazionale delle Ricerche, Italy) , Oleg Illiashenko (Consiglio Nazionale delle Ricerche, Italy)
    Full Paper
  • PAKA: Pseudonymous Authenticated Key Agreement without bilinear cryptography
    Raphael Schermann (Institute of Technical Informatics, Graz University of Technology, Austria) , Simone Bussa (Department of Control and Computer Engineering, Politecnico di Torino, Italy) , Rainer Urian (Infineon Technologies AG, Augsburg, Germany) , Roland Toegl (Infineon Technologies Austria AG, Austria) , Christian Steger (Institute of Technical Informatics, Graz University of Technology, Austria)
    Full Paper
  • Just Rewrite It Again: A Post-Processing Method for Enhanced Semantic Similarity and Privacy Preservation of Differentially Private Rewritten Text
    Stephen Meisenbacher (Technical University of Munich, Germany) , Florian Matthes (Technical University of Munich, Germany)
    Full Paper
  • Multimodal Security Mechanisms for Critical Time Systems using blockchain in Chriss project
    Mari-Anais Sachian (BEIA CONSULT INTERNATIONAL, Romania) , George Suciu (University POLITEHNICA of Bucharest, Romania) , Maria Niculae (BEIA CONSULT INTERNATIONAL, Romania) , Adrian Paun (BEIA CONSULT INTERNATIONAL, Romania) , Petrica Ciotirnae (BEIA CONSULT INTERNATIONAL, Romania) , Ivan Horatiu (BEIA CONSULT INTERNATIONAL, Romania) , Cristina Tudor (BEIA CONSULT INTERNATIONAL, Romania)
    Full Paper
  • ARGAN-IDS: Adversarial Resistant Intrusion Detection Systems using Generative Adversarial Networks
    Carlos Ribeiro (Universidade de Lisboa, Portugal) , Filipe Apolinário (INOV INESC Inovação, Portugal) , João Costa (INOV INESC Inovação, Portugal)
    Full Paper
Submit your paper here!
Your academic contribution for ARES 2024.