


default search action
17th ARES 2022: Vienna, Austria
- ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022. ACM 2022, ISBN 978-1-4503-9670-7

ARES I - Best Papers
- Thomas Dangl, Stewart Sentanoe, Hans P. Reiser:

VMIFresh: Efficient and Fresh Caches for Virtual Machine Introspection. 1:1-1:9 - Davy Preuveneers, Wouter Joosen:

Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence. 2:1-2:11 - Markus Hittmeir

, Rudolf Mayer, Andreas Ekelhart
:
Distance-based Techniques for Personal Microbiome Identification✱. 3:1-3:13 - Philip Empl, Daniel Schlette, Daniel Zupfer, Günther Pernul:

SOAR4IoT: Securing IoT Assets with Digital Twins. 4:1-4:10
ARES II - Privacy
- Simin Ghesmati, Walid Fdhila

, Edgar R. Weippl
:
SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy Techniques. 5:1-5:14 - Gonzalo Munilla Garrido, Johannes Sedlmeir

, Matthias Babel
:
Towards Verifiable Differentially-Private Polling. 6:1-6:11 - Sascha Sven Zmiewski

, Jan Laufer
, Zoltán Ádám Mann:
Automatic online quantification and prioritization of data protection risks. 7:1-7:10 - Kevin De Boeck

, Jenno Verdonck
, Michiel Willocx
, Jorn Lapon, Vincent Naessens:
Reviewing review platforms: a privacy perspective. 8:1-8:10
ARES III - Cloud Security and Web Privacy
- Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra

, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl:
SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices. 9:1-9:10 - Angeliki Aktypi, Dimitris Karnikis, Nikos Vasilakis, Kasper Rasmussen:

Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing. 10:1-10:11 - Timi Heino, Robin Carlsson, Sampsa Rauti, Ville Leppänen

:
Assessing discrepancies between network traffic and privacy policies of public sector web services. 11:1-11:6 - Benjamin Maximilian Berens

, Heike Dietmann, Chiara Krisam
, Oksana Kulyk, Melanie Volkamer:
Cookie Disclaimers: Impact of Design and Users' Attitude. 12:1-12:20
ARES IV - Web Security
- Pascal Wichmann

, Maximilian Blochberger, Hannes Federrath:
Web Cryptography API: Prevalence and Possible Developer Mistakes. 13:1-13:10 - Vincent Drury, Luisa Lux, Ulrike Meyer:

Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns. 14:1-14:11 - Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika

, Vasilios Katos, Stefanos Vrochidis, Ioannis Kompatsiaris:
Web Bot Detection Evasion Using Deep Reinforcement Learning. 15:1-15:10 - Christian Oliva, Ignacio Palacio Marín, Luis Fernando Lago-Fernández, David Arroyo:

Rumor and clickbait detection by combining information divergence measures and deep learning techniques. 16:1-16:6
ARES V - Secure Software and Malware Detection
- Felix Dreissig, Jonas Röckl, Tilo Müller:

Compiler-Aided Development of Trusted Enclaves with Rust. 18:1-18:10 - Claudio A. Ardagna

, Nicola Bena
, Ramon Martín de Pozuelo:
Bridging the Gap Between Certification and Software Development. 19:1-19:10 - Tayssir Touili, Xin Ye:

SMODIC: A Model Checker for Self-modifying Code. 20:1-20:6
ARES VI - Network and Hardware Security
- Emilie Bout, Alessandro Brighente, Mauro Conti

, Valeria Loscrì:
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks. 21:1-21:10 - Samuel Sulan, Martin Husák:

Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy. 22:1-22:6 - Davide Bove

:
Secure Services for Standard RISC-V Architectures. 23:1-23:7 - Stefan Tauner:

RIPEMB: A framework for assessing hardware-assisted software security schemes in embedded systems. 24:1-24:6
ARES VII - Awareness and Incident Response
- Martin Husák, Milan Cermák:

SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response. 25:1-25:10 - Avi Shaked, Yulia Cherdantseva, Pete Burnap:

Model-Based Incident Response Playbooks. 26:1-26:7 - Benedikt Putz

, Manfred Vielberth, Günther Pernul:
BISCUIT - Blockchain Security Incident Reporting based on Human Observations. 27:1-27:6 - Emmanouil Samanis, Joseph Gardiner, Awais Rashid:

SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools. 28:1-28:12
ARES VIII - Threat Intelligence and Intrusion Detection
- Arthur Drichel, Justus von Brandt, Ulrike Meyer:

Detecting Unknown DGAs without Context Information. 29:1-29:12 - Mostafa Roshani, Mehdi Nobakht:

HybridDAD: Detecting DDoS Flooding Attack using Machine Learning with Programmable Switches. 30:1-30:11 - Mohamed Amine Merzouk

, Joséphine Delas, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks. 31:1-31:6 - Joseph Khoury

, Morteza Safaei Pour
, Elias Bou-Harb:
A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale. 32:1-32:11
ARES IX - Cryptography
- Koki Morimura, Daisuke Maeda, Takashi Nishide:

Improved Integer-wise Homomorphic Comparison and Division based on Polynomial Evaluation. 33:1-33:10 - Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert:

Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS. 34:1-34:11 - Heini Bergsson Debes

, Thanassis Giannetsos
:
ZEKRO: Zero-Knowledge Proof of Integrity Conformance. 35:1-35:10
ARES X - Authentication
- Reyhan Düzgün, Naheem Noah, Peter Mayer

, Sanchari Das, Melanie Volkamer:
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays. 36:1-36:12 - David Biesner, Kostadin Cvejoski, Rafet Sifa:

Combining Variational Autoencoders and Transformer Language Models for Improved Password Generation. 37:1-37:6 - Christian Plappert

, Andreas Fuchs, Ronald Heddergott:
Analysis and Evaluation of Hardware Trust Anchors in the Automotive Domain. 38:1-38:11 - Daniela Pöhn

, Nils Gruschka, Leonhard Ziegler:
Multi-Account Dashboard for Authentication Dependency Analysis. 39:1-39:13
CSA I
- Yantsislav Yanakiev, Marta Irene García Cid

, Jorge Maestre Vidal, Nikolai Stoianov, Marco Antonio Sotelo Monge:
VALKYRIES: Harmonization and Pre-Standardization of Technology, Training and Tactical Coordinated Operations for First Responders on EU MCI. 40:1-40:6 - Marta Irene García Cid

, Jorge Álvaro González
, Laura Ortiz Martín, Diego Del Río Gómez:
Disruptive Quantum Safe Technologies. 41:1-41:8
CSA II
- Samuel Zurowski, George Lord, Ibrahim M. Baggili

:
A Quantitative Analysis of Offensive Cyber Operation (OCO) Automation Tools. 42:1-42:11
CUING I
- Mikolaj Komisarek, Marek Pawlicki, Maria-Elena Mihailescu, Darius Mihai, Mihai Carabas, Rafal Kozik, Michal Choras:

A novel, refined dataset for real-time Network Intrusion Detection. 43:1-43:8
CUING II
- Vaila Leask

, Rémi Cogranne, Dirk Borghys, Helena Bruyninckx:
UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media. 44:1-44:8 - Massimo Guarascio

, Marco Zuppelli, Nunziato Cassavia, Luca Caviglione, Giuseppe Manco
:
Revealing MageCart-like Threats in Favicons via Artificial Intelligence. 45:1-45:7 - Luca Caviglione, Martin Grabowski, Kai Gutberlet, Adrian Marzecki, Marco Zuppelli, Andreas Schaffhauser, Wojciech Mazurczyk:

Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit. 46:1-46:7 - Marcin Kowalczyk

, Agnieszka Malanowska
, Wojciech Mazurczyk, Krzysztof Cabaj:
Web Page Harvesting for Automatized Large-scale Digital Images Anomaly Detection. 47:1-47:9
CUING III
- Carina Heßeling

, Jörg Keller, Sebastian Litzinger:
Network Steganography Through Redundancy in Higher-Radix Floating-Point Representations. 48:1-48:7 - Niklas Bunzel, Tobias Chen, Martin Steinebach:

Using Telegram as a carrier for image steganography: Analysing Telegrams API limits. 49:1-49:8 - Tobias Schmidbauer, Jörg Keller, Steffen Wendzel

:
Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication. 50:1-50:10 - Tom Neubert, Antonio José Caballero Morcillo, Claus Vielhauer:

Improving Performance of Machine Learning based Detection of Network Steganography in Industrial Control Systems. 51:1-51:8
CUING IV
- Pawel Rajba, Wojciech Mazurczyk:

Limitations of Web Cryptojacking Detection: A Practical Evaluation. 52:1-52:6 - York Yannikos

, Julian Heeger, Martin Steinebach:
Data Acquisition on a Large Darknet Marketplace. 53:1-53:6 - Florian Platzer

, Alexandra Lux:
A Synopsis of Critical Aspects for Darknet Research. 54:1-54:8 - Martin Steinebach, Tiberius Berwanger, Huajian Liu:

Towards Image Hashing Robust Against Cropping and Rotation. 55:1-55:7
ENS I
- Aleksandra Pawlicka, Marek Pawlicki, Rafal Renk, Rafal Kozik, Michal Choras:

The cybersecurity-related ethical issues of cloud technology and how to avoid them. 56:1-56:7
ENS II
- Mohammed A. Abdelmaguid, Hossam S. Hassanein

, Mohammad Zulkernine:
SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET. 57:1-57:10 - Marek Pawlicki, Rafal Kozik, Michal Choras:

Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection. 58:1-58:6 - Georgios Agrafiotis, Eftychia Makri, Ioannis Flionis, Antonios Lalas, Konstantinos Votis, Dimitrios Tzovaras

:
Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion. 59:1-59:7 - Prajwol Kumar Nakarmi, Jakob Sternby, Ikram Ullah

:
Applying Machine Learning on RSRP-based Features for False Base Station Detection. 60:1-60:7
ENS III
- Zahra Nezhadian, Enrico Branca

, Natalia Stakhanova:
Analysis and prediction of web proxies misbehavior. 61:1-61:11 - Seongmin Park, Ilsun You, Hoonyong Park, Dowon Kim:

Analyzing RRC Replay Attack and Securing Base Station with Practical Method. 62:1-62:8 - Enkeleda Bardhi

, Mauro Conti
, Riccardo Lazzeretti, Eleonora Losiouk
, Ahmed Taffal:
Sim2Testbed Transfer: NDN Performance Evaluation. 63:1-63:9 - Karol Rzepka, Przemyslaw Szary, Krzysztof Cabaj, Wojciech Mazurczyk:

Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications. 64:1-64:9
ENS IV
- Davide Cocca, Antonio Pirozzi, Corrado Aaron Visaggio:

We cannot trust in you: a study about the dissonance among anti-malware engines. 65:1-65:13 - Pascal Wichmann

, Alexander Groddeck, Hannes Federrath:
FileUploadChecker: Detecting and Sanitizing Malicious File Uploads in Web Applications at the Request Level. 66:1-66:10 - Arash Bozorgchenani, Charilaos C. Zarakovitis

, Su Fong Chien, Heng Siong Lim, Qiang Ni
, Antonios Gouglidis, Wissam Mallouli:
Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks. 67:1-67:6 - Chrystel Gaber, Ghada Arfaoui, Yannick Carlinet, Nancy Perrot

, Laurent Valleyre, Marc Lacoste, Jean-Philippe Wary, Yacine Anser, Rafal Artych, Aleksandra Podlasek, Edgardo Montes de Oca, Vinh Hoa La, Vincent Lefebvre, Gürkan Gür
:
The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service. 68:1-68:7
EPESec I
- László Erdodi, Pallavi Kaliyar, Siv Hilde Houmb, Aida Akbarzadeh, André Jung Waltoft-Olsen:

Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104. 69:1-69:10 - Jose Antonio Lopez

, Iñaki Angulo, Saturnino Martinez:
Substation-Aware. An intrusion detection system for the IEC 61850 protocol. 70:1-70:7 - Alexios Lekidis

:
Cyber-security measures for protecting EPES systems in the 5G area. 71:1-71:10 - Evangelos Chaskos, Jason Diakoumakos

, Nicholas Kolokotronis, George Lepouras:
Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification Model. 72:1-72:9 - Athanasios Liatifis

, Christos Dalamagkas
, Panagiotis I. Radoglou-Grammatikis
, Thomas Lagkas, Evangelos K. Markakis
, Valeri M. Mladenov, Panagiotis G. Sarigiannidis:
Fault-Tolerant SDN Solution for Cybersecurity Applications. 73:1-73:6 - Engla Rencelj Ling, Jose Eduardo Urrea Cabus

, Ismail Butun, Robert Lagerström, Johannes Olegård:
Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis. 74:1-74:7
EPESec II
- Dimitrios Skias, Sofia Tsekeridou

, Theodore B. Zahariadis, Artemis C. Voulkidis, Terpsichori Helen Velivassaki:
Demonstration of alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform to Cybersecurity policy, regulatory and legislative advancements. 75:1-75:8 - Konstantinos-Panagiotis Grammatikakis

, Ioannis Koufos, Nicholas Kolokotronis:
A Collaborative Intelligent Intrusion Response Framework for Smart Electrical Power and Energy Systems. 76:1-76:10 - Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis:

Evaluating The Cyber-Security Culture of the EPES Sector: Applying a Cyber-Security Culture Framework to assess the EPES Sector's resilience and readiness. 77:1-77:10 - Theodoros Rokkas, Ioannis Neokosmidis:

Classifying the factors affecting the adoption of the SDN-microSENSE innovations. 78:1-78:6
ETACS I - Cybersecurity Education, Training and Awareness
- Sunil Chaudhary

, Marko Kompara, Sebastian Pape, Vasileios Gkioulos:
Properties for Cybersecurity Awareness Posters' Design and Quality Assessment. 79:1-79:8 - Tomás Lieskovan, Jan Hajny:

Security of Smart Grid Networks in the Cyber Ranges. 80:1-80:8 - Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda, Stylianos Karagiannis

:
Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory. 81:1-81:8
ETACS II - Cybersecurity Skills Frameworks and Tools
- Jan Hajny, Marek Sikora, Athanasios Vasileios Grammatopoulos, Fabio Di Franco:

Adding European Cybersecurity Skills Framework into Curricula Designer. 82:1-82:6 - Jakub Vostoupal

, Frantisek Kasl, Pavel Loutocký
, Tomás Pitner
, Patrik Valo, Adam Valalský, Damián Paranic:
The Platform for Czech National Qualifications Framework in Cybersecurity. 83:1-83:6 - Sara Ricci, Marek Sikora, Simon Parker, Imre Lendak, Yianna Danidou, Argyro Chatzopoulou, Remi Badonnel, Donatas Alksnys:

Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation. 84:1-84:10
FARES I - Post-Quantum, Digital Identity, & Access Control
- Amir Sharif

, Matteo Ranzi, Roberto Carbone, Giada Sciarretta, Silvio Ranise:
SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes. 85:1-85:10 - Tahir Ahmad

, Umberto Morelli
, Silvio Ranise:
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness. 86:1-86:10 - Markus Rautell

, Outi-Marja Latvala
, Visa Antero Vallivaara, Kimmo Halunen:
Applying a cryptographic metric to post-quantum lattice-based signature algorithms. 87:1-87:8 - Giovanni Ciaramella, Giacomo Iadarola, Francesco Mercaldo, Marco Storto, Antonella Santone, Fabio Martinelli:

Introducing Quantum Computing in Mobile Malware Detection. 88:1-88:8
FARES II - Threat Intelligence and Detection
- Martin Macák, Radek Vaclavek, Dasa Kusniráková, Raimundas Matulevicius, Barbora Buhnova:

Scenarios for Process-Aware Insider Attack Detection in Manufacturing. 89:1-89:10 - Marta Catillo, Antonio Pecchia, Umberto Villano:

Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding. 90:1-90:7 - Lukás Sadlek, Pavel Celeda

, Daniel Tovarnák:
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. 91:1-91:8 - Xinrun Zhang, Akshay Mathur, Lei Zhao, Safia Rahmat, Quamar Niyaz, Ahmad Y. Javaid, Xiaoli Yang:

An Early Detection of Android Malware Using System Calls based Machine Learning Model. 92:1-92:9
IOSec I
- Masahiro Ishii

, Kento Mori, Ryoichi Kuwana, Satoshi Matsuura:
Multi-label Classification of Cybersecurity Text with Distant Supervision. 93:1-93:9 - Siegfried Hollerer

, Thilo Sauter, Wolfgang Kastner:
Risk Assessments Considering Safety, Security, and Their Interdependencies in OT Environments. 94:1-94:8 - Christos Tselios, Ilias Politis, Christos Xenakis

:
Improving Network, Data and Application Security for SMEs. 95:1-95:8
IoT-SECFOR I - Security Assessment and Threat Analysis
- Kamakshi Srikumar, Komal Kashish, Kolja Eggers, Nicolás E. Díaz Ferreyra

, Julian Koch
, Thorsten Schüppstuhl
, Riccardo Scandariato:
STRIPED: A Threat Analysis Method for IoT Systems. 96:1-96:6 - SeongHan Shin, Tomoyuki Ogawa, Ryo Fujita, Mari Itoh, Hirotaka Yoshida:

An Investigation of PSA Certified. 97:1-97:8
IoT-SECFOR II - Security Attacks and Solutions
- Henri Ruotsalainen:

Reactive Jamming Detection for LoRaWAN Based on Meta-Data Differencing. 98:1-98:8 - Ahmed Lekssays, Giorgia Sirigu

, Barbara Carminati, Elena Ferrari:
MalRec: A Blockchain-based Malware Recovery Framework for Internet of Things. 99:1-99:8 - Lukas Jäger, Dominik Lorych

, Michael Eckel
:
A Resilient Network Node for the Industrial Internet of Things. 100:1-100:10
IWAPS I - Blockchain Security Applications
- Vaios Bolgouras, Anna Angelogianni

, Ilias Politis, Christos Xenakis
:
Trusted and Secure Self-Sovereign Identity framework. 101:1-101:6 - Mandana Falahi, Andrei Vasilateanu, Nicolae Goga, George Suciu, Mari-Anais Sachian, Robert Florescu, Stefan-Daniel Stanciu:

Improving Security and Scalability in Smart Grids using Blockchain Technologies. 102:1-102:7 - Harris Niavis

, Konstantinos Loupos:
ConSenseIoT: A Consensus Algorithm for Secure and Scalable Blockchain in the IoT context. 103:1-103:6
IWAPS II - Next Generation Security Applications
- Antonio Muñoz

:
Secure Mobile Agents on Embedded Boards: a TPM based solution. 104:1-104:7 - Anastassios Voudouris, Ilias Politis, Christos Xenakis

:
Secret sharing a key in a distributed way, Lagrange vs Newton. 105:1-105:7 - Razvan-Alexandru Bratulescu, Robert-Ionut Vatasoiu

, Sorina-Andreea Mitroi, George Suciu, Mari-Anais Sachian, Daniel-Marian Dutu, Serban-Emanuel Calescu:
Fraudulent Activities in the Cyber Realm: DEFRAUDify Project: Fraudulent Activities in the Cyber Realm: DEFRAUDify Project. 106:1-106:5
IWAPS III - Cyber Insurance Applications
- Mohamed Ahmed, Sakshyam Panda

, Christos Xenakis
, Emmanouil Panaousis:
MITRE ATT&CK-driven Cyber Risk Assessment. 107:1-107:10 - Markos Charalambous, Aristeidis Farao

, George Kalatzantonakis, Panagiotis Kanakakis, Nikos Salamanos
, Evangelos Kotsifakos, Evangellos Froudakis:
Analyzing Coverages of Cyber Insurance Policies Using Ontology. 108:1-108:7
IWCC
- Mehdi Akbari Gurabi

, Avikarsha Mandal, Jan Popanda, Robert Rapp, Stefan Decker:
SASP: a Semantic web-based Approach for management of Sharable cybersecurity Playbooks. 109:1-109:8 - Axel Charpentier, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich:

Deep Reinforcement Learning-Based Defense Strategy Selection. 110:1-110:11 - Bethany Sumner, Gokila Dorai, John Heslen:

Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms. 111:1-111:10 - François Labrèche, Enrico Mariconti

, Gianluca Stringhini:
Shedding Light on the Targeted Victim Profiles of Malicious Downloaders. 112:1-112:10
IWCSEC I - Fast-Paced and Secure Code Development and Deployment
- Angelo Sotgiu, Maura Pintor

, Battista Biggio:
Explainability-based Debugging of Machine Learning for Vulnerability Discovery. 113:1-113:8 - Luca Mecenero, Ranindya Paramitha

, Ivan Pashchenko, Fabio Massacci
:
Lightweight Parsing and Slicing for Bug Identification in C. 114:1-114:10 - Simone Scalco

, Ranindya Paramitha
, Duc-Ly Vu, Fabio Massacci
:
On the feasibility of detecting injections in malicious npm packages. 115:1-115:8 - Anusha Bambhore Tukaram, Simon Schneider, Nicolás E. Díaz Ferreyra

, Georg Simhandl, Uwe Zdun, Riccardo Scandariato:
Towards a Security Benchmark for the Architectural Design of Microservice Applications. 116:1-116:7 - Clinton Cao, Agathe Blaise, Sicco Verwer, Filippo Rebecchi:

Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster. 117:1-117:9 - Raluca Brasoveanu, Yusuf Karabulut, Ivan Pashchenko:

Security Maturity Self-Assessment Framework for Software Development Lifecycle. 118:1-118:8
IWCSEC II - Software Certification
- Ákos Milánkovich

, Gergely Eberhardt
, Dávid Lukács:
The AssureMOSS security certification scheme. 119:1-119:10
IWSECC
- Ioannis Kalderemidis, Aristeidis Farao

, Panagiotis Bountakas, Sakshyam Panda
, Christos Xenakis
:
GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments. 120:1-120:9 - Santosh Kumar Upadhyaya, Srinivas Vivek:

Revisiting a Privacy-Preserving Location-based Service Protocol using Edge Computing. 121:1-121:5 - Mathias Schüpany, Martin Pirker

:
A Revisit of Attestable Nodes for Networked Applications. 122:1-122:7
IWSMA
- Amal Hbaieb, Samiha Ayed, Lamia Chaari:

Federated learning based IDS approach for the IoV. 123:1-123:6
IWSMR
- Sanaz Adel Alipour

, Rita Orji, Nur Zincir-Heywood:
Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the Literature. 124:1-124:9 - Daniela Pöhn

, Wolfgang Hommel:
TaxIdMA: Towards a Taxonomy for Attacks related to Identities. 125:1-125:13 - Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis:

Cyber-Security Culture Assessment in Academia: A COVID-19 Study: Applying a Cyber-Security Culture Framework to assess the Academia's resilience and readiness. 126:1-126:8
IWSRSC
- Marc Ohm

, Felix Boes, Christian Bungartz, Michael Meier
:
On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages. 127:1-127:10 - Arne Roar Nygård, Sokratis K. Katsikas:

SoK: Combating threats in the digital supply chain. 128:1-128:8
PCSCI I - Critical Infrastructures and Interdependencies
- Sandra König

, Abdelkader Magdy Shaaban
:
Parametrization of Probabilistic Risk Models. 129:1-129:6
PCSCI II - Technologies and Use Cases
- Antonios Karteris, Georgios Tzanos, Lazaros Papadopoulos, Konstantinos P. Demestichas, Dimitrios Soudris

, Juliette Pauline Philibert, Carlos López Gómez:
A Methodology for enhancing Emergency Situational Awareness through Social Media. 130:1-130:7
SecHealth I - Authentication of Medical Devices
- Marwa Gadala, Lorenzo Strigini, Radek Fujdiak:

Authentication for Operators of Critical Medical Devices: A Contribution to Analysis of Design Trade-offs. 131:1-131:9
SecHealth II - Privacy
- Harry Halpin:

A Critique of EU Digital COVID-19 Certificates: Do Vaccine Passports Endanger Privacy? 132:1-132:8 - Samuel Wairimu

, Lothar Fritsch:
Modelling privacy harms of compromised personal medical data - beyond data breach. 133:1-133:9
SECPID I
- Alessandro Brighente, Mauro Conti

, Savio Sciancalepore
:
Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing. 134:1-134:11 - Salatiel Ezennaya-Gomez, Edgar Blumenthal, Marten Eckardt, Justus Krebs, Christopher Kuo, Julius Porbeck, Emirkan Toplu, Stefan Kiltz, Jana Dittmann:

Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective. 135:1-135:12 - Cavidan Yakupoglu, Kurt Rohloff:

Towards Efficient FHE Based cPIR Schemes and Their Parameter Selection. 136:1-136:11
SECPID II
- Stefan More

, Lukas Alber:
YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC. 137:1-137:8 - Saurabh Deochake, Vrushali Channapattan:

Identity and Access Management Framework for Multi-tenant Resources in Hybrid Cloud Computing. 138:1-138:8 - Harry Halpin:

All that is Solid Melts into Air: Towards Decentralized Cryptographic Access Control. 139:1-139:6
SP2I I - Applied Cryptography, Security and Privacy
- Raúl Casanova Marqués, Petr Dzurenda, Jan Hajny:

Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card. 140:1-140:8 - Petr Dzurenda, Raúl Casanova Marqués, Lukas Malina:

Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials. 141:1-141:9
SP2I II - Security and Machine Learning in Intelligent Infrastructures
- Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Afra Mashhadi:

CloudFL: A Zero-Touch Federated Learning Framework for Privacy-aware Sensor Cloud. 142:1-142:8 - Branka Stojanovic

, Helmut Neuschmied, Martin Winter, Ulrike Kleb:
Enhanced Anomaly Detection for Cyber-Attack Detection in Smart Water Distribution Systems. 143:1-143:7
SP2I III - Security and Trust in Intelligent Infrastructures
- Petr Jedlicka, Lukas Malina, Tomas Gerlich

, Zdenek Martinasek, Jan Hajny, Petr Socha:
On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography. 144:1-144:9 - Abasi-Amefon Obot Affia

, Raimundas Matulevicius:
Security Risk Management in Shared Mobility Integration. 145:1-145:10 - Takahiro Ueda, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto:

An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive Devices. 146:1-146:8
SSE I - Malware and Vulnerability Analysis
- Tayssir Touili:

Register Automata for Malware Specification. 147:1-147:7 - Holger Schmidt, Max van Aerssen, Christian Leich, Abdulkader Benni, Salar Al Ali, Jakob Tanz:

CopypastaVulGuard - A browser extension to prevent copy and paste spreading of vulnerable source code in forum posts. 148:1-148:8 - Emma Lavens, Pieter Philippaerts

, Wouter Joosen:
A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners. 149:1-149:10 - Charles-Henry Bertrand Van Ouytsel

, Khanh-Huu-The Dam
, Axel Legay:
Symbolic analysis meets federated learning to enhance malware identifier. 150:1-150:10
SSE II - Managing Security on Applications
- Dominik Lorych

, Lukas Jäger:
Design Space Exploration of DICE. 151:1-151:10 - Daniele Granata, Massimiliano Rak, Giovanni Salzillo:

MetaSEnD: A Security Enabled Development Life Cycle Meta-Model. 152:1-152:10 - Vera Schmitt

, Maija Poikela
, Sebastian Möller
:
Android Permission Manager, Visual Cues, and their Effect on Privacy Awareness and Privacy Literacy. 153:1-153:12 - Katsuyuki Umezawa, Hiroki Koyanagi, Sven Wohlgemuth, Yusuke Mishina, Kazuo Takaragi:

Safety and Security Analysis using LDA based on Case Reports: Case Study and Trust Evaluation Method. 154:1-154:7 - Hasan Yasar, Sam E. Teplov:

DevSecOps In Embedded Systems: An Empirical Study Of Past Literature. 155:1-155:6
WSDF
- Vaia-Maria Angeli, Ahmad Atamli, Erisa Karafili:

Forensic analysis of Tor in Windows environment: A case study. 156:1-156:10 - Philipp Boigner, Robert Luh:

WSL2 Forensics: Detection, Analysis & Revirtualization. 157:1-157:7 - Hannes Mareen, Glenn Van Wallendael, Peter Lambert, Fouad Khelifi

:
Fast and Blind Detection of Rate-Distortion-Preserving Video Watermarks. 158:1-158:7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














