ARES 2022 |
ARES 2022 Keynote SpeakerThe strange world of the password Usable Privacy: Retrospective and Challenges ahead Best Paper SessionVMIFresh: Efficient and Fresh Caches for Virtual Machine Introspection Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence Distance-based Techniques for Personal Microbiome Identification SOAR4IoT: Securing IoT Assets with Digital Twins |
ARES 2021 |
ARES 2021 Keynote SpeakerWhen humans and security or privacy technology interact Secure and Privacy-Conscious Federated Analytics Best Paper SessionAnalyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods Listen to Your Heart: Evaluation of the Cardiologic Ecosystem Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet |
ARES 2020 |
ARES 2020 Keynote SpeakerChildren need Cyber Security Education too Security, the Elusive Goal of Privacy, and the Surprising Difficulties around Corona Tracing Best Paper SessionJit Fault Detection: Increasing Availability in 1oo2 Systems Just-In-Time How do App Vendors Respond to Subject Access Requests? A Longitudinal Privacy Study on iOS and Android Apps Vector Packet Encapsulation: The Case for a Scalable IPsec Encryption Protocol |
ARES 2019 |
ARES 2019 Keynote SpeakerSecuring Our Future: The Importance of Academia in Closing the Cybersecurity Talent Gap Why strong foundations matter: Lessons from developing CyBOK, the Cyber Security Body of Knowledge Best Paper SessionThieves in the Browser: Web-based Cryptojacking in the Wild Behavior-Aware Network Segmentation using IP Flows Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild |
ARES 2018 |
ARES 2018 Keynote SpeakerA Next-generation Secure Internet for the 21st Century Innovations in permutation-based crypto Best Paper SessionSecure Equality Testing Protocols in the Two-Party Setting Android authorship attribution through string analysis Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services |
ARES 2017 |
ARES 2017 Keynote SpeakerAndrea Servida, Head of Unit DG CONNECT – H4 “eGovernment and Trust”, European Commission, Belgium Bring Mathematics into Biology: past, present and future impact on Health Cloaking Functions: Differential Privacy with Gaussian Processes Cyber security in manufacturing industrial control systems and preparing for the Factory of the Future Best Paper SessionSecurity Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme VMAttack: Deobfuscating Virtualization-Based Packed Binaries A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets |
ARES 2016 |
ARES 2016 Keynote SpeakerInternational Judicial Cooperation in the Fight against Cybercrime Toward Causal Machine Learning Data Analytic in Anonymized Networks: Is There Hope for Privacy? Cyber-Legislation, Standardisation and Pan-European Cooperation as strategic drivers to strengthen Cybersecurity across Europe Best Paper SessionA recommender-based system for assisting non-technical users in managing Android permissions No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large (BEST PAPER ARES 2016) Revisiting a Watermark-based Detection Scheme to Handle Cyber-Physical Attacks |
ARES 2015 |
ARES 2015 Keynote SpeakerLet’s Encrypt: Deploying free, secure, and automated HTTPS certificates for the entire Web In blocks we trust: the case of crypto-currencies Data Security and Privacy in the Cloud The European Strategic Agenda for Research and Innovation in Cybersecurity Best Paper SessionA Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting Optimizing IT Service Costs With Respect to the Availability Service Level Objective Structural Weaknesses in the Open Smart Grid Protocol (BEST PAPER ARES 2015) |
ARES 2014 |
ARES 2014 Keynote SpeakerMass surveillance and cryptology Monitoring Threats and Vulnerabilities in Complex IT Landscapes Change, Innovation, and Resilience in the DNS Ecosystem: a Verisign Labs Perspective Best Paper SessionA New Access Control Scheme for Facebook-Style Social Networks (BEST PAPER ARES 2014) No Smurfs: Revealing Fraud Chains in Mobile Money Transfers BitTorrent Sync: Network Investigation Methodology |
ARES 2013 |
ARES 2013 Keynote SpeakerData Protection in Social Networks: Going Beyond Access Control (>>Interview & Video<<) Six Research Challenges for the Security and Privacy of Health Information Technology (>>Interview & Video<<) Opening & Best Paper Session (>> Interviews & Video<<)Laribus: Privacy-Preserving Detection of Fake SSL Certificates with a Social P2P Notary Network Reliability Prediction for Component-Based Software Systems with Architectural-Level Fault Tolerance Mechanisms A Statistical Approach for Fingerprinting Probing Activities ARES 2013 PanelThreats & Risk Management – Bridging the Gap between Industry needs and Research Moderator: Martin Gilje Jaatun, SINTEF ICT, Norway ARES 2013 TutorialsBug Parades, Zombies, and the BSIMM: A Decade of Software Security (extended dance version) Tutorial on DNS Security Tutorial on Secure Enterprise – wide Identity Management and Role Modeling Tutorial on Challenges in Data Protection – Privacy by Design |
ARES 2012 |
ARES 2012 Keynote SpeakerDesigning Software Systems that Comply with Privacy and Security Regulations Declarative Security ARES 2012 PanelRaising the Bar: Performing More Effective Cyber Security Studies Moderator: Shari Lawrence Pfleeger |
ARES 2011 |
ARES 2011 Keynote SpeakerSoftware Security and the BSIMM (>>Video low quality<<) (>>Video medium quality<<) Keeping the Human in the Loop (>>Video low quality<<) (>>Video medium quality<<) ARES 2011 Invited TalkSome Thoughts on Cyber Security & Privacy (>>Video low quality<<) (>>Video medium quality<<) |
ARES 2010 |
ARES 2010 Keynote SpeakerInformation security – where computer science, economics and psychology meet (Video Part 1, Video Part 2, Video Part 3, Video Part 4, Video Part 5) Thinking outside the box (Video Part 1, Video Part 2, Video Part 3, Video Part 4) CISIS 2010 Keynote SpeakerUsing Next Generation Grid Technologies for Advancing Virtual Organizations (Video Part 1, Video Part 2, Video Part 3) Scheduling in Grid Systems (Video Part1, Video Part 2, Video Part 3, Video Part 4) |
ARES 2009 |
ARES 2009 Keynote SpeakerDigital Identity Protection – Concepts and Issues Topoligical Analysis of Network Attack Vulnerability Pairing based cryptography – theory, implementations and applications ARES 2009 Invited TalkIntegrative security approach as a key success factor of dependability |
ARES 2008 |
ARES 2008 Keynote SpeakerSecurity and Privacy Challenges in Location Based Service Environments Infrastructure Support for Authorization, Access Control and Privilege Management ASCAA Principles for Next-Generation Role-Based Access Control |
ARES 2007 |
ARES 2007 Keynote SpeakerSecurity principles for the Austrian eGovernment Data Mining, Security and Privacy: Developments and Directions |
ARES 2006 |
ARES 2006 Keynote SpeakerDr. Louis Marinos, ENISA Security Competence Department, Risk Management, Greece |