Detailed Program

Keynote Sessions ARES EU Project Symposium ARES Conference Workshops CD-MAKE
Time

Tuesday, 29.08.2017

08:00 - 18:15

Registration

09:00 - 10:30

ARES and ARES EU Symposium Opening & Keynote Session
Andrea Servida, Head of Unit DG CONNECT – H4 “eGovernment and Trust”, European Commission, Belgium

Lecture Hall A
10:30 - 11:00

Coffee Break

11:00 - 12:30

ARES Full I
Best Paper

Session chair: Francesco Buccafurri, Università degli Studi Mediterranea di Reggio Calabria, Italy

Lecture Hall A

TAKEDOWN

Session chair: Andrea Tundis, Technical University Darmstadt, Germany

Lecture Hall B

CITE I

Session chair: Jon Shamah, EEMA, UK

Lecture Hall C

S-CI I
CyberSecurity and Critical Infrastructures

Session chair: Stefan Katzenbeisser, TU Darmstadt, Germany

Lecture Hall D

Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme David Bernhard, Oksana Kulyk and Melanie Volkamer

VMAttack: Deobfuscating Virtualization-Based Packed Binaries Anatoli Kalysch, Johannes Götzfried and Tilo Müller

A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets Jordi Soria-Comas and Josep Domingo-Ferrer

Identity and Trustworthy Ecosystem Jon Shamah

Introduction to ARIES Eduardo González

Introduction to LIGHTEST Heiko Roßnagel

The Aries Ecosystem Jorge Bernal

The LIGHTest reference architecture Sven Wagner

Rolling DICE – Lightweight Remote Attestation for COTS IoT Hardware Lukas Jäger, Richard Petri and Andreas Fuchs

ZONESEC: built-in cyber-security for wide area surveillance system Aljosa Pasic, Jose-Ramon Martinez-Salio and Susana Gonzalez Zarzosa

Protecting Future Maritime Communication Karin Bernsmed, Christian Frøystad and Per Håkon Meland

12:30 - 13:30

Lunch

13:30 - 15:00

ARES Full II
Applications

Session chair: Andrea Tundis, TU Darmstadt, Germany

Lecture Hall A

SECPID I

Session Chair: Erkuden Rios Valesco, Fundación Tecnalia Research & Innovation, Spain

Lecture Hall B

CITE II

Session chair: Elena González, Communication Manager Atos Research&Innovation, Spain

Lecture Hall C

S-CI II
Keynote Session

Session chair: Apostolos P. Fournaris, University of Patras, Greece

Lecture Hall D

Continuous Biometric Verification for Non-Repudiation of Remote Services Enrico Schiavone, Andrea Ceccarelli and Andrea Bondavalli

Artificial Ambient Environments for Proximity Critical Applications Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram and Keith Mayes

Using Markov Chains to Model Sensor Network Reliability Tom Arjannikov, Simon Diemert, Sudhakar Ganti, Chloe Lampman and Edward Wiebe

Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures Arne Bilzhause, Henrich C. Pöhls, and Kai Samelin

The Archistar Secret-Sharing Backup Proxy Andreas Happe, Florian Wohner, and Thomas Lorünser

Orchestrating Privacy Enhancing Technologies and Services with BPM Tools Nicolás Notario, Alberto Crespo, Eduardo González Real, Eleonora Ciceri, Ilio Catallo, and Sauro Vicini

Blockchain-based Smart Contracts for Accountable Data Usage Control Ricardo Neisse

DNS as the Foundation of the LIGHTest Infrastructure Martin Hoffmann

CREDENTIAL - Towards a Cloud-Based yet Privacy-Friendly Identity Provider Stephan Krenn

Wrap up and discussion

Known Unknowns in Cybersecurity research and transfer of results to the market Aljosa Pasic, Technology Transfer Director of ATOS R&I department (ARI)

15:00 - 15:30

Coffee Break

15:30 - 17:00

ARES Full III
Trust

Session chair: Max Mühlhäuser, TU Darmstadt, Germany

Lecture Hall A

SECPID II

Session Chair: Kai Samelin, IBM Research - Zurich and TU Darmstadt, Switzerland/Germany

Lecture Hall B

SC-SRA

Session Chair: Ralf Fiedler, Fraunhofer Center for Maritime Logistics and Services, Hamburg, Germany

Lecture Hall C

S-CI III
Critical Infrastructure Systems CyberSecurity Tools

Session chair: Stefan Katzenbeisser, TU Darmstadt, Germany

Lecture Hall D

Establishing Mutually Trusted Channels for Remote Sensing Devices Using Trusted Execution Environments Carlton Shepherd, Raja Naeem Akram and Konstantinos Markantonakis

Enabling Trust Assessement In Clouds-of-Clouds: A Similarity-Based Approach Reda Yaich, Nora Cuppens and Frédéric Cuppens

Reliable Behavioural Factors in the Information Security Context Peter Mayer, Alexandra Kunz and Melanie Volkamer

Towards the Adoption of Secure Cloud Identity Services Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, and Felix Hörandner

Towards a Model of User-centered Privacy Preservation Paul Grace and Mike Surridge

NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging Harry Halpin

MITIGATE at a glance Spyros Papastergiou

Cyber Attack Path Discovery in Maritime Supply Chains Michalis Pavlidis

Risk Mitigation Approach - Optimal Mitigation Strategy Stefan Schauer

R&D on Security issues for maritime critical infrastructures: SAURON project Rafa Company

Preserving your privacy and managing your personal data with OPERANDO Achilleas Papageorgiou

MITIGATE System for assessing cyber risks in ports' supply chains Armend Duzha, MAGGIOLI & Panagiotis Gouvas

Using Ciphers for Failure Recovery in ITS Systems Mustafa Ayoob, Wael Adi and Vassilis Prevelakis

Towards DDoS Attack Resilient Wide Area Monitoring Systems Kubilay Demir and Neeraj Suri

Anomaly Detection for Simulated IEC-60870-5-104 Traffic Ersi Hodo, Stepan Grebeniuk, Henri Ruotsalainen and Paul Tavolato

17:00 - 17:15

Room switch

17:15 - 18:15

ARES Full IV
Cryptography

Session chair: Roger Hallman, Space & Naval Warfare Systems Center Pacific, USA

Lecture Hall A

SECPID III

Session Chair: Stephan Krenn AIT Austrian Institute of Technology GmbH, Austria

Lecture Hall B

S-CI IV
Keynote Session

Session chair: Apostolos P. Fournaris, University of Patras, Greece

Lecture Hall D

Secure Enrollment of Certificates Using Short PINs Michael Rossberg and Markus Theil

Secure Matrix Multiplication with MapReduce Xavier Bultel, Radu Ciucanu, Matthieu Giraud and Pascal Lafourcade

Self-healing Multi-Cloud Application Modelling Erkuden Rios, Maria Carmen Palacios, and Eider Iturbe

Application of the holistic Data Privacy and Security Framework PaaSword Sebastian Thomas Schork, Antonia Schwichtenberg, Spiros Alexakis, and George Moldovan

Challenges in securing critical infrastructures of the railway domain Christian Schlehuber, Deutsche Bahn (DB)

19:00 - 21:30
Time

Wednesday, 30.08.2017

08:00 - 16:15

Registration

09:00 - 10:30

ARES Full V
Security Models and Data Accountability

Session chair: Michael Rossberg, Technische Universitaet Ilmenau, Germany

Lecture Hall A

WSDF I

Session chair: Virginia N. L. Franqueira, University of Derby, UK

Lecture Hall B

Keynote CD-MAKE
Marta Milo, University of Sheffield, UK
"Bring Mathematics into Biology: past, present and future impact on Heath"
Lecture Hall C

Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks Andrea Tundis, Alfredo Garro, Teresa Gallo, Domenico Sacca, Simona Citrigno, Sabrina Graziano and Max Mühlhäuser

Attack Scenario Modeling for Smart Grids Assessment through Simulation Andrea Tundis, Rolf Egert and Max Mühlhäuser

A Blockchain-based Approach for Data Accountability and Provenance Tracking Ricardo Neisse, Gary Steri and Igor Nai-Fovino

Keynote: Richard Overill, King’s College London, UK Title: The Sky: a Neglected Source of Error in Digital Forensic Investigations

Forensic Image Inspection Assisted by Deep Learning Felix Mayer and Martin Steinebach

Abstract: Last decade has seen a massive increase of data production in science. Particularly in the biomedical field, data has grown exponentially thanks to the development of technologies like next generation sequencing and high-throughput quantitative assays. The information that this data contains is only partially uncovered to this date, but the impact that it has on human progression and well being is already very clear. Despite the ability to process large amount of data and to quantify fine details of biological processes, the costs, the time to perform such experiments and mainly the complexity of the systems remain in some cases still very prohibitive. For this reasons the use of mathematics to study complex systems in its entirety, looking at how they interacts, is having a great impact in current biology and healthcare. A variety of statistical, probabilistic and optimization techniques methods, like machine learning techniques, that allows to “learn” from the available data, to detect hidden patterns from large, noisy and complex datasets, is particularly suitable for application in medicine. In this talk I will present examples of using machine learning techniques for a variety datasets from medical and biological problems and what are the advantages and disadvantages of this approach. I will also give examples when these techniques enabled to discover informative knowledge from a large complex system in the presence of small number of samples. Finally I will discuss how we use Machine Learning today for analysis of single-cell sequencing data and how we can use it for future more complex datasets generated integrating data from different sources.
10:30 - 11:00

Coffee Break

11:00 - 12:30

ARES Full VI
Privacy I

Session chair: Mohamed Shehab, University of North Carolina Charlotte, USA

Lecture Hall A

WSDF II

Session chair: Richard Overill, King’s College London, UK

Lecture Hall B

IWCC I

Session Chair: Prof. Wojciech Mazurczyk, Warsaw University of Technology, Poland

Lecture Hall C

CD-MAKE I MAKE Topology

Session chair: Massimo Ferri, University of Bologna, Italy

Lecture Hall D

Measuring privacy in high dimensional microdata collections Spyros Boukoros and Stefan Katzenbeisser

Constrained PET Composition for Measuring Enforced Privacy Sebastian Funke, Alexander Wiesmaier and Jörg Daubert

A Holistic Approach for Privacy Protection in E-Government Konstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis, Mattia Salnitri, Paolo Giorgini and José R. Ruiz

On the Usefulness of Compression-Models for Authorship Verification Oren Halvani, Christian Winter and Lukas Graner

Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT) Tanveer Zia, Peng Liu and Weili Han

Forensic State Acquisition from Internet of Things (FSIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition Christopher Meffert, Devon Clark, Ibrahim Baggili and Frank Breitinger

Keynote: Dr. Martin Gilje Jaatun, SINTEF Digital, Norway Cyber Security in Critical Infrastructure Domains

Type Me the Truth! Detecting Deceitful Users via Keystroke Dynamics Merylin Monaro, Riccardo Spolaor, Qianqian Li, Mauro Conti, Luciano Gamberini and Giuseppe Sartori

Resource Hints in HTML5: A New Pandora’s Box of Security Nightmares Natalija Vlajic

On Distance Mapping from non-Euclidean Spaces to Euclidean Space Yoan Miche, Ian Oliver, Wei Ren, Silke Holtmanns, Kaj-Mikael Björk and Amaury Lendasse

Some Remarks on the Algebraic Properties of Group Invariant Operators in Persistent Homology Patrizio Frosini and Nicola Quercioli

Decentralized Computation of Homology in Wireless Sensor Networks Using Spanning Trees Domen Soberl, Primož Škraba and Neža Mramor Kosta

Detecting and Ranking API Usage Pattern in Large Source Code Repository: A LFM based Approach Jitong Zhao and Yan Liu

12:30 - 14:00

Lunch

14:00 - 15:00

Keynote CD-MAKE
Neil D. Lawrence, University of Sheffield and Amazon, UK
"Cloaking Functions: Differential Privacy with Gaussian Processes"

Lecture Hall A
15:00 - 15:15

Short Coffee Break

15:15 - 16:15

ARES Full VII
Privacy II

Session chair: Edgar Weippl, SBA Research, Austria

Lecture Hall A

IWSMA

Session chair: Peter Kieseberg, SBA Research, Austria

Lecture Hall B

IWCC II

Session Chair: Prof. Wojciech Mazurczyk, Warsaw University of Technology, Poland

Lecture Hall C

CD-MAKE II MAKE Smart Factory

Session chair: Carsten Röcker, Fraunhofer IOSB-INA and Ostwestfalen-Lippe University of Applied Sciences, Germany

Lecture Hall D

Memory carving can finally unveil your embedded personal data Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine and Christophe Rosenberger

PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices Saeed Ibrahim Saeed Alqahtani and Shujun Li

The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model Abeer Aljarrah, Mohamed Shehab

Quantitative Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps Ayman Youssef, Ahmed F. Shosha

Learning Android Malware Khanh-Huu-The Dam, Tayssir Touili

A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols Orhan Ermis, Serif Bahtiyar, Emin Anarim and Mehmet Ufuk Caglayan

Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme Alberto Trombetta and Masoomeh Sepheri

Towards a Framework for Assistance Systems to Support Work Processes in Smart Factories Michael Fellmann, Sebastian Robert, Sebastian Büttner, Henrik Mucha and Carsten Röcker

Managing Complexity: Towards Intelligent Error-Handling Assistance Trough Interactive Alarm Flood Reduction Sebastian Büttner, Paul Wunderlich, Oliver Niggemann and Carsten Röcker

Online Self-disclosure: From Users' Regrets to Instructional Awareness Nicolás Emilio Díaz Ferreyra, Rene Meis and Maritta Heisel

16:15 - 19:30
19:30 - 23:00
Time

Thursday, 31.08.2017

08:00 - 18:00

Registration

09:30 - 10:30

Keynote tba

10:30 - 11:00

Coffee Break

11:00 - 13:00

Ares Full VIII
Network Security and Intrusion Detection

Session chair: Mathias Fischer, Universität Hamburg, Germany

Lecture Hall A

CUING I
Keynote Session

Session chair: Wojciech Mazurczyk, Warsaw University of Technology, Poland

Lecture Hall B

SSE I
DevSecOps and Cloud Computing

Session Chair: Lotfi ben Othmane, Iowa State University, USA

Lecture Hall C

FARES I
Critical Infrastuctures and Cyber2Physical

Session chair: Antonino Nocera, University of Reggio Calabria, Italy

Lecture Hall D

CD-MAKE III MAKE Privacy

Session chair: Peter Kieseberg, SBA Research, Austria

Lecture Hall E

Lightweight Address Hopping for Defending the IPv6 IoT Aljosha Judmayer, Johanna Ullrich, Georg Merzdovnik, Artemios Voyiatzis and Edgar Weippl

Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter Norbert Blenn, Vincent Ghiette and Christian Doerr

On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts Martin Husák, Jaroslav Kašpar, Elias Bou-Harb and Pavel Čeleda

SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream Quentin Le Sceller, Elmouatez Billah Karbab, Mourad Debbabi and Farkhund Iqbalb

Keynote I: Prof. Wojciech Mazurczyk, Warsaw University of Technology Criminal Use of Information Hiding (CUIng) initiative: past, present and future

Keynote II: Dr. Shujun Li, University of Surrey A new paradigm of information hiding? Hiding in activities of the cyber-physical-social world

Invited Speaker: Shannon Lietz, DevSecOps Lead, Intuit Title: Illuminating Cloud Security with DevSecOps

Identification of Dependency-based Attacks on Node.js Brian Pfretzschner and Lotfi ben Othmane

DevOps for Better Software Security in the Cloud Martin Gilje Jaatun, Daniela Soares Cruzes, and Jesus Luna

Implementing Secure DevOps assessment for highly regulated environments. Hasan Yasar

Keynote: Andrea Bondavalli, University of Florence, Italy Title: Anomaly Detection for Complex Dynamic System

Integrating Reactive Cloud Applications in SERECA Christof Fetzer, Giovanni Mazzeo, John Oliver, Luigi Romano and Martijn Verburg

Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems Philipp Kreimel, Oliver Eigner and Paul Tavolato

Decision Tree Rule Induction for Detecting Covert Timing Channels in TCP/IP Traffic Felix Iglesias, Valentin Bernhardt, Robert Annessi and Tanja Zseby

Practical Estimation of Mutual Information on Non-Euclidean Spaces Yoan Miche, Ian Oliver, Silke Holtmanns, Wei Ren, Anton Akusok and Amaury Lendasse

IntelliAV: Toward the Feasibility of Building Intelligent Anti-Malware on Android Devices Mansour Ahmadi, Angelo Sotgiu and Giorgio Giacinto

DO NOT DISTURB ? Classifier Behavior on Perturbed Datasets Bernd Malle, Peter Kieseberg and Andreas Holzinger

A Short-term Forecast Approach of Public Buildings’ Power Demands upon Multi–source Data Shubing Shan and Buyang Cao

13:00 - 14:30

Lunch

14:30 - 16:00

ARES Short I
Cryptography

Session chair: Stefan Katzenbeisser, TU Darmstadt, Germany

Lecture Hall A

CUING II

Session chair: Peter Kieseberg, SBA Research, Austria

Lecture Hall B

SSE II
Agile Secure Software Development

Session Chair: Juha Röning, University of Oulu, Finland

Lecture Hall C

FARES II
Identity Management and Access Control

Session Chair: Stefan Katzenbeisser, Technische Universität Darmstadt, Germany

Lecture Hall D

CD-MAKE IV MAKE VIS

Session chair: Cagatay Turkay, City University London, UK

Lecture Hall E

Searchable Encryption with Access Control Nils Löken

One-Message Unilateral Entity Authentication Schemes Alfredo De Santis, Manuela Flores and Barbara Masucci

Overcoming Limits of Blockchain for IoT Applications Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo and Antonino Nocera

C'MON : Monitoring the Compliance of Cloud Services to Contracted Properties Soha Albaghdady, Stefan Winter, Ahmed Taha, Heng Zhang and Neeraj Suri

Are Covert Timing Channels Statistical Anomalies? Félix Iglesias Vázquez and Tanja Zseby

FROST – Anti-Forensics Digital-Dead-DROp Inofrmation Hiding RobuST to Detection & Data Loss with Fault-tolerance Avinash Srinivasan, Hunter Dong and Angelos Stavrou.

A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression Sabine Schmidt, Wojciech Mazurczyk, Joerg Keller and Luca Caviglione

DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer Pal-Stefan Murvay, and Bogdan Groza

Source Code Patterns of SQL Injection Vulnerabilities Felix Schuckert Basel Katt, and Hanno Langweg

Towards a Secure SCRUM Process for Agile Web Application Development Patrik Maier, Zhendong Ma, and Roderick Bloem

Busting a Myth: Review of Agile Security Engineering Methods Kalle Rindell, Sami Hyrynsalmi, and Ville Leppänen

Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control Tetsuji Takada

Insider Misuse Attribution using Biometrics Abdulrahman Alruban, Nathan Clarke, Fudong Li and Steven Furnell

k-rAC – a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables Olga Kieselmann, Arno Wacker and Gregor Schiele

Efficient ID-based Designated Verifier Signature Olivier Blazy, Emmanuel Conchon, Paul Germouty and Amandine Jambert

On the Challenges and Opportunities in Visualization for Machine Learning & Knowledge Extraction: A Mini-Research Agenda Cagatay Turkay, Robert Laramee and Andreas Holzinger

Quantitative Externalization of Visual Data Analysis Results using Local Regression Models Kresimir Matkovic, Hrvoje Abraham, Mario Jelovic and Helwig Hauser

Analysis of Online User Behaviour for Art and Culture Events Tahereh Arabghalizi, Marco Brambilla and Behnam Rahdari

On Joint Representational Learning of Network Structure and Document Content Jörg Schlötterer, Christin Seifert and Michael Granitzer

16:00 - 16:30

Coffee Break

16:30 - 18:00

ARES Short II
IoT and Security Engineering

Session chair: Sudhakar Ganti, University of Victoria, Canada

Lecture Hall A

CUING III

Session chair: Wojciech Mazurczyk, Warsaw University of Technology, Poland

Lecture Hall B

SSE III
Experiences with Secure DevOps

Session Chair: Juha Röning, University of Oulu, Finland

Lecture Hall C

FARES III
Code Security and Privacy

Session Chair: Corrado Aaron Visaggio, University of Sannio, Italy

Lecture Hall D

CD-MAKE V MAKE AAL

Session Chair: Johannes Kropf, AIT Austrian Institute of Technology, Austria

Lecture Hall E

A Trust-based Resilient Routing Mechanism for the Internet of Things Zeeshan Ali Khan, Johanna Ullrich, Artemios Voyiatzis and Peter Herrmann

M2M-REP: Reputation of Machines in the Internet of Things Muhammad Azad, Samiran Bag and Feng Hao

Which Security Requirements Engineering Methodology Should I Choose? Towards a Requirements Engineering-based Evaluation Approach Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, Francois Barrere and Abdelmalek Benzekri

A Low-Cost UAV-Based Secure Location Verification Method Marco Rasori, Pericle Perazzo and Gianluca Dini

REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks Mauro Conti, Pallavi Kaliyar and Chhagan Lal

Machine Learning Approach for Detection of nonTor Traffic Elike Hodo, Xavier Bellekens, Ephraim Iorkyase, Andrew Hamilton, Christos Tachtatzis and Robert Atkinson

Investigating the darknet: Legal limitations Anze Mihelic, Blaž Markelj, Igor Bernik and Sabina Zgaga

Invited Speaker: Fabian Rodriguez, IBM, Germany Title: DevOps in business critical environments

Panel: Barriers and Enablers on developing a secure application throughout DevOps lifecycle Moderator: Hasan Yasar

bin2llvm: Analysis of Binary Programs Using LLVM Intermediate Representation Kevin Kirchner and Stefan Rosenthaler

Security Analysis of Cordova Applications in Google Play Michiel Willocx, Jan Vossaert and Vincent Naessens

Security and Privacy Implications of NFC-enabled Contactless Payment Systems Nicholas Akinyokun and Vanessa Teague

Microblogging in a Privacy-Preserving way Nikolaos Karvelas, Marius Senftleben and Stefan Katzenbeisser

Ambient Assisted Living Technologies from the Perspectives of oOder People and Professionals Deepika Singh, Sten Hanke, Johannes Kropf and Andreas Holzinger

Human Activity Recognition using Recurrent Neural Networks Deepika Singh, Erinc Merdivan, Ismini Psychoula, Sten Hanke, Johannes Kropf, Matthieu Geist and Andreas Holzinger

Modeling Golf Player Skill using Machine Learning Rikard König, Ulf Johansson, Maria Riveiro and Peter Brattberg

Predicting Chronic Heart Failure using Diagnoses Graphs Saurabh Nagrecha, Keith Feldman, Pamela Bilo Thomas and Nitesh V. Chawla

Time

Friday, 01.09.2017

08:00 - 12:30

Registration

09:00 - 10:30

ARES Short III
Security Monitoring and Analysis

Session chair: Edgar Weippl, SBA Research, Austria

Lecture Hall A

FARES IV
Security Models and Methods

Session Chair: Gianluca Lax, University of Reggio Calabria, Italy

Lecture Hall B

WMA I
Malware Detection

Session Chair: Corrado Aaron Visaggio, University of Sannio, Italy

Lecture Hall C

CD-MAKE VI MAKE Semantics

Session Chair: Andreas Holzinger, Med. University and TU Graz, Austria

Lecture Hall D

Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data Markus Wurzenberger, Florian Skopik, Roman Fiedler, Max Landauer, Philipp Greitbauer and Wolfgang Kastner

Attack Potential in Impact and Complexity Luca Allodi and Fabio Massacci

Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS Sebastian Neuner, Artemios Voyiatzis, Martin Schmiedecker and Edgar Weippl

SensorBuster: On Identifying Sensor Nodes in P2P Botnets Shankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam, Max Mühlhäuser and Mathias Fischer

Provisioning Software with Hardware-Software Binding Robert Lee, Konstantinos Markantonakis and Raja Naeem Akram

Victim Communication Stack: A flexible model to select the Human Attack Vector Enrico Frumento, Angelo Consoli, Federica Freschi and Davide Andreoletti

Fully threshold broadcast encryption Sigurd Eskeland

Adaptive Resource Management Enabling Deception (ARMED) Partha Pal, Nate Soule, Nate Lageman, Shane Clark, Marco Carvalho, Adrian Granados and Anthony Alves

An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods Joseph Divita and Roger Hallman

Malware and Formal Methods Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone and Antonella Santone

End-node Fingerprinting for Malware Detection on HTTPS Data Tomáš Komárek and Petr Somol

Text Classification Through Automatic Translation: Preliminary Results Roberto Boselli, Mirko Cesarini, Fabio Mercorio and Mario Mezzanzanica

A Declarative Semantics for P2P Systems Luciano Caroprese and Ester Zumpano

Improving Language-Dependent Named Entity Detection Gerald Petz, Werner Wetzlinger and Dietmar Nedbal

Towards the Nutritional Incompatibility Detection based on Recipe Titles Nadia Clairet and Mathieu Lafourcade

The more the merrier - Federated learning from Local Sphere Recommendations Bernd Malle, Nicola Giuliani, Andreas Holzinger and Peter Kieseberg

10:30 - 11:00

Coffee Break

11:00 - 12:30

ARES Short IV
Applications

Session chair: Jörg Daubert, Technische Universität Darmstadt, Germany

Lecture Hall A

SAW

Session Chair: Jungwoo Ryoo, Pennsylvania State University, USA

Lecture Hall B

WMA II
Defensive Technologies

Session Chair: Corrado Aaron Visaggio, University of Sannio, Italy

Lecture Hall C

Investigating User Comprehension and Risk Perception of Apple’s Touch ID Technology Yousra Javed, Mohamed Shehab and Emmanuel Bello Ogunu

A Cloud-Based Compilation and Hardening Platform for Android Apps Marcel Busch, Mykola Protsenko and Tilo Müller

Go with the -Bitcoin- Flow, with Visual Analytics Stefano Bistarelli and Francesco Santini

Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance Dorottya Papp, Levente Buttyán and Zhendong Ma

Protection of personal data in security alert sharing platforms Václav Stupka, Martin Horák and Martin Husák

SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis Sam Procter, Eugene Vasserman and John Hatcliff

On Using TLS to Secure In-Vehicle Networks Daniel Zelle, Christoph Krauß, Hubert Strauß and Karsten Schmidt

How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews, Wayne E. King, Gabe Guss and Yuval Elovici

Popularity-based Detection of Domain Generation Algorithms Jasper Abbink and Christian Doerr

JSDES - An Automated De-Obfuscation System for Malicious JavaScript Moataz Abdel Khalek and Ahmed Shosha

12:30 - 14:00

Lunch