Accepted papers ARES

ARES 2017 Full Research papers:

A Blockchain-based Approach for Data Accountability and Provenance Tracking
Ricardo Neisse, Gary Steri and Igor Nai-Fovino (European Commission Joint Research Centre (JRC), Italy)

A Holistic Approach for Privacy Protection in E-Government
Konstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis (University of Brighton, United Kingdom), Mattia Salnitri, Paolo Giorgini (University of Trento, Italy) and José R. Ruiz (Atos, Spain)

A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets
Jordi Soria-Comas and Josep Domingo-Ferrer (Universitat Rovira i Virgili, Spain)

Artificial Ambient Environments for Proximity Critical Applications
Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram and Keith Mayes (Royal Holloway, University of London, United Kingdom)

Attack Scenario Modeling for Smart Grids Assessment through Simulation
Andrea Tundis, Rolf Egert, Max Mühlhäuser (Technische Universität Darmstadt)

Constrained PET Composition for Measuring Enforced Privacy
Sebastian Funke, Alexander Wiesmaier (AGT International, Germany) and Jörg Daubert (TU Darmstadt, Germany)

Continuous Biometric Verification for Non-Repudiation of Remote Services
Enrico Schiavone, Andrea Ceccarelli and Andrea Bondavalli (University of Florence, Italy)

Enabling Trust Assessement In Clouds-of-Clouds: A Similarity-Based Approach
Reda Yaich, Nora Cuppens and Frédéric Cuppens (IMT Atlantique, France)

Establishing Bi-directional Trusted Channels for Remote Sensing Devices Using Trusted Execution Environments
Carlton Shepherd, Raja Naeem Akram and Konstantinos Markantonakis (Royal Holloway, University of London, United Kingdom)

Lightweight Address Hopping for Defending the IPv6 IoT
Aljosha Judmayer, Johanna Ullrich, Georg Merzdovnik, Artemios Voyiatzis and Edgar Weippl (SBA Research, Austria)

Measuring privacy in high dimensional microdata collections
Spyros Boukoros and Stefan Katzenbeisser (TU Darmstadt, Germany)

Memory carving can finally unveil your embedded personal data
Thomas Gougeon, Morgan Barbier, Patrick Lacharme (ENSICAEN – GREYC, France), Gildas Avoine (INSA Rennes France, UCL Belgium) and Christophe Rosenberger (ENSICAEN – GREYC, France)

Modeling Sensor Network Reliability Using Markov Chains
Tom Arjannikov, Simon Diemert, Sudhakar Ganti, Chloe Lampman and Edward Wiebe (University of Victoria, Canada)

On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts
Martin Husák, Jaroslav Kašpar (Masaryk University Czech Republic), Elias Bou-Harb (Florida Atlantic University, USA) and Pavel Čeleda (Masaryk University, Czech Republic)

PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices
Saeed Ibrahim Saeed Alqahtani and Shujun Li (University of Surrey, United Kingdom)

Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter
Norbert Blenn, Vincent Ghiette and Christian Doerr (TU Delft, Netherlands)

Reliable Behavioural Factors in the Information Security Context
Peter Mayer, Alexandra Kunz and Melanie Volkamer (TU Darmstadt, Germany)

Secure Enrollment of Certificates Using Short PINs
Michael Rossberg and Markus Theil (Technische Universitaet Ilmenau, Germany)

Secure Matrix Multiplication with MapReduce
Xavier Bultel, Radu Ciucanu, Matthieu Giraud and Pascal Lafourcade (LIMOS, Université Clermont Auvergne, France)

Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme
David Bernhard (University of Bristol, United Kingdom), Oksana Kulyk and Melanie Volkamer (TU Darmstadt, Germany)

SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream
Quentin Le Sceller, Elmouatez Billah Karbab, Mourad Debbabi (Concordia University, Canada) and Farkhund Iqbalb (Zayed University, United Arab Emirates)

Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks
Andrea Tundis (TU Darmstadt, Germany), Alfredo Garro, Teresa Gallo, Domenico Sacca (University of Calabria, Italy), Simona Citrigno, Sabrina Graziano (Centro di Competenza ICT-SUD, Italy) and Max Mühlhäuser (TU Darmstadt, Germany)

VMAttack: Deobfuscating Virtualization-Based Packed Binaries
Anatoli Kalysch, Johannes Götzfried and Tilo Müller (Friedrich-Alexander University Erlangen-Nuremberg, Germany)

ARES 2017 Short Research papers:

A Cloud-Based Compilation and Hardening Platform for Android Apps
Marcel Busch, Mykola Protsenko and Tilo Müller (Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany)

A Low-Cost UAV-Based Secure Location Verification Method
Marco Rasori, Pericle Perazzo and Gianluca Dini (University of Pisa, Italy)

A Trust-based Resilient Routing Mechanism for the Internet of Things
Zeeshan Ali Khan (IIK, NTNU, Norway), Johanna Ullrich, Artemios Voyiatzis (SBA Research, Austria) and Peter Herrmann (IIK, NTNU, Norway)

Attack Potential in Impact and Complexity
Luca Allodi (Eindhoven University of Technology, Netherlands) and Fabio Massacci (University of Trento, Italy)

C’MON : Monitoring the Compliance of Cloud Services to Contracted Properties
Soha Albaghdady, Stefan Winter, Ahmed Taha, Heng Zhang and Neeraj Suri (TU Darmstadt, Germany)

Go with the -Bitcoin- Flow, with Visual Analytics
Stefano Bistarelli and Francesco Santini (Università di Perugia, Italy)

Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data
Markus Wurzenberger, Florian Skopik, Roman Fiedler, Max Landauer, Philipp Greitbauer (AIT Austrian Institute of Technology, Austria) and Wolfgang Kastner (TU Vienna, Austria)

Investigating User Comprehension and Risk Perception of Apple’s Touch ID Technology
Yousra Javed, Mohamed Shehab and Emmanuel Bello Ogunu (University of North Carolina Charlotte, USA)

M2M-REP: Reputation of Machines in a IoT-based Network
Muhammad Azad, Samiran Bag and Feng Hao (Newcastle University, United Kingdom)

One-Message Unilateral Entity Authentication Schemes
Alfredo De Santis, Manuela Flores and Barbara Masucci (University of Salerno, Italy)

Overcoming Limits of Blockchain for IoT Applications
Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo and Antonino Nocera (Universita’ Mediterranea di Reggio Calabria, Italy)

Searchable Encryption with Access Control
Nils Löken (Paderborn University, Germany)

SensorBuster: On Identifying Sensor Nodes in P2P Botnets
Shankar Karuppayah (Universiti Sains Malaysia, Malaysia), Leon Böck, Tim Grube (TU Darmstadt, Germany), Selvakumar Manickam (Universiti Sains Malaysia, Malaysia), Max Mühlhäuser (TU Darmstadt, Germany) and Mathias Fischer (Universität Hamburg, Germany)

Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS
Sebastian Neuner, Artemios Voyiatzis, Martin Schmiedecker and Edgar Weippl (SBA Research, Austria)

Which Security Requirements Engineering Methodology Should I Choose? Towards a Requirements Engineering-based Evaluation Approach
Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, Francois Barrere and Abdelmalek Benzekri (IRIT/SIERA, France)