Stop the war!
Остановите войну!
for scientists:
default search action
19th ARES 2024: Vienna, Austria
- Proceedings of the 19th International Conference on Availability, Reliability and Security, ARES 2024, Vienna, Austria, 30 July 2024 - 2 August 2024. ACM 2024, ISBN 979-8-4007-1718-5
ARES 2024 Research Article
- Johannes Wilson, Mikael Asplund, Niklas Johansson, Felipe Boeira:
Provably Secure Communication Protocols for Remote Attestation. 1:1-1:12 - Sarah Abdelwahab Gaballah, Lamya Abdullah, Max Mühlhäuser, Karola Marky:
Let the Users Choose: Low Latency or Strong Anonymity? Investigating Mix Nodes with Paired Mixing Techniques. 2:1-2:11 - Alessandro Palma, Nicola Bartoloni, Marco Angelini:
BenchIMP: A Benchmark for Quantitative Evaluation of the Incident Management Process Assessment. 3:1-3:12 - Stephan Wiefling, Marian Hönscheid, Luigi Lo Iacono:
A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web. 4:1-4:12 - Rahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Dali Kaafar:
Privacy Preserving Release of Mobile Sensor Data. 5:1-5:13 - Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon, Vincent Naessens:
Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledge. 6:1-6:12 - Luis Ibanez-Lissen, José María de Fuentes, Lorena González-Manzano, Nicolas Anciaux:
Continuous Authentication Leveraging Matrix Profile. 7:1-7:13 - Dominik Lorych, Christian Plappert:
Hardware Trust Anchor Authentication for Updatable IoT Devices. 8:1-8:11 - Michael Eckel, Sigrid Gürgens:
SECURA: Unified Reference Architecture for Advanced Security and Trust in Safety Critical Infrastructures. 9:1-9:13 - Huancheng Hu, Afshin Zivi, Christian Doerr:
Dealing with Bad Apples: Organizational Awareness and Protection for Bit-flip and Typo-Squatting Attacks. 10:1-10:11 - Dustin Kern, Christoph Krauß, Matthias Hollick:
Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains. 11:1-11:12 - Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao:
Subjective Logic-based Decentralized Federated Learning for Non-IID Data. 12:1-12:11 - Riccardo Taiello, Melek Önen, Clémentine Gritti, Marco Lorenzi:
Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Stragglers. 13:1-13:12 - Zhenlu Sun, André M. H. Teixeira, Salman Toor:
GNN-IDS: Graph Neural Network based Intrusion Detection System. 14:1-14:12 - Bibek Bhattarai, H. Howie Huang:
Prov2vec: Learning Provenance Graph Representation for Anomaly Detection in Computer Systems. 15:1-15:14 - Arthur Tran Van, Olivier Levillain, Hervé Debar:
Mealy Verifier: An Automated, Exhaustive, and Explainable Methodology for Analyzing State Machines in Protocol Implementations. 16:1-16:10 - Hooman Asadian, Paul Fiterau-Brostean, Bengt Jonsson, Konstantinos Sagonas:
Monitor-based Testing of Network Protocol Implementations Using Symbolic Execution. 17:1-17:12 - Tamir Tassa, Lihi Dery:
Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting Rules. 18:1-18:11 - Kai Hölk, Wojciech Mazurczyk, Marco Zuppelli, Luca Caviglione:
Investigating HTTP Covert Channels Through Fuzz Testing. 19:1-19:9 - Kurt A. Vedros, Constantinos Kolias, Daniel Barbará, Robert C. Ivans:
From Code to EM Signals: A Generative Approach to Side Channel Analysis-based Anomaly Detection. 20:1-20:10 - Michael Mundt, Harald Baier, Antje Raab-Düsterhöft:
Towards Reducing Business-Risk of Data Theft Implementing Automated Simulation Procedures of Evil Data Exfiltration. 21:1-21:12 - Robin Duraz, David Espes, Julien Francq, Sandrine Vaton:
SECL: A Zero-Day Attack Detector and Classifier based on Contrastive Learning and Strong Regularization. 22:1-22:12 - Majed Jaber, Nicolas Boutry, Pierre Parrend:
Graph-Based Spectral Analysis for Detecting Cyber Attacks. 23:1-23:14 - Thomas Prantl, Marco Lauer, Lukas Horn, Simon Engel, David Dingel, André Bauer, Christian Krupitzer, Samuel Kounev:
Security Analysis of a Decentralized, Revocable and Verifiable Attribute-Based Encryption Scheme. 24:1-24:11 - Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, Liang Zhao:
Secure Noise Sampling for DP in MPC with Finite Precision. 25:1-25:12 - Shoei Nashimoto, Rei Ueno, Naofumi Homma:
Comparative Analysis and Implementation of Jump Address Masking for Preventing TEE Bypassing Fault Attacks. 26:1-26:12 - Darren Hurley-Smith, Alastair P. Droop, Remy Lyon, Roxana Teodor:
Extracting Randomness from Nucleotide Sequencers for use in a Decentralised Randomness Beacon. 27:1-27:12 - Yuwen Zou, Wenjun Fan, Zhen Ma:
Unveiling Vulnerabilities in Bitcoin's Misbehavior-Score Mechanism: Attack and Defense. 28:1-28:12 - Davide Bove:
A Large-Scale Study on the Prevalence and Usage of TEE-based Features on Android. 29:1-29:11 - Yu-Chang Chen, Shih-Wei Li:
HeMate: Enhancing Heap Security through Isolating Primitive Types with Arm Memory Tagging Extension. 30:1-30:11 - Viktor Engström, Giuseppe Nebbione, Mathias Ekstedt:
A Metalanguage for Dynamic Attack Graphs and Lazy Generation. 31:1-31:11 - Xinyu Zhang, Siddharth Muralee, Sourag Cherupattamoolayil, Aravind Machiry:
On the Effectiveness of Large Language Models for GitHub Workflows. 32:1-32:14 - Ádám Ruman, Martin Drasar, Lukás Sadlek, Shanchieh Jay Yang, Pavel Celeda:
Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. 33:1-33:11 - Patrício Domingues, Miguel Frade, Miguel Negrão:
Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11. 34:1-34:10 - Antonia Welzel, Rebekka Wohlrab, Mazen Mohamad:
Increasing the Confidence in Security Assurance Cases using Game Theory. 35:1-35:13
ARES 2024 Short Research Papers
- Thibault Cholez, Claudia-Lavinia Ignat:
Sybil Attack Strikes Again: Denying Content Access in IPFS with a Single Computer. 36:1-36:7 - Christoph Wech, Reinhard Kugler, Manuel Leithner, Dimitris E. Simos:
Combinatorial Testing Methods for Reverse Engineering Undocumented CAN Bus Functionality. 37:1-37:7 - Theresa Kriecherbauer, Richard Schwank, Adrian Krauss, Konstantin Neureither, Lian Remme, Melanie Volkamer, Dominik Herrmann:
Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners. 38:1-38:7 - Alexander Günther, Sebastian Vollmer, Peter Liggesmeyer:
Confidence-Aware Fault Trees. 39:1-39:7 - Dmitrii Belimov, Evgenii Vinogradov:
Reverse Engineered MiniFS File System. 40:1-40:7
ARES 2024 Research Article
- Raphael Simon, Wim Mees:
SoK: A Comparison of Autonomous Penetration Testing Agents. 41:1-41:10 - Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert:
SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and Challenges. 42:1-42:13 - Claudia Ruggiero, Pietro Mazzini, Emilio Coppa, Simone Lenti, Silvia Bonomi:
SoK: A Unified Data Model for Smart Contract Vulnerability Taxonomies. 43:1-43:13 - Richard May, Jacob Krüger, Thomas Leich:
SoK: How Artificial-Intelligence Incidents Can Jeopardize Safety and Security. 44:1-44:12 - Matteo Brosolo, Vinod Puthuvath, Asmitha KA, Rafidha Rehiman K. A., Mauro Conti:
SoK: Visualization-based Malware Detection Techniques. 45:1-45:13 - Vassilis Papaspirou, Ioanna Kantzavelou, Yagmur Yigit, Leandros Maglaras, Sokratis K. Katsikas:
A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism. 46:1-46:9 - Hanning Zhao, Bilhanan Silverajan:
Evaluating Cyber Security Dashboards for Smart Cities and Buildings: Enhancing User Modeling with LLMs. 47:1-47:10 - Vijay Jayadev, Naghmeh Moradpoor, Andrei Petrovski:
Assessing the Performance of Ethereum and Hyperledger Fabric Under DDoS Attacks for Cyber-Physical Systems. 48:1-48:6 - Oliver Eigner, Hubert Schölnast, Paul Tavolato:
How to Find out What's Going on in Encrypted Smart Meter Networks - without Decrypting Anything. 49:1-49:6 - Pouria Rad, Gokila Dorai, Mohsen M. Jozani:
From Seaweed to Security: Harnessing Alginate to Challenge IoT Fingerprint Authentication. 50:1-50:10 - Matthew Reaney, Kieran McLaughlin, James Grant:
Network Intrusion Response using Deep Reinforcement Learning in an Aircraft IT-OT Scenario. 51:1-51:7 - Konstantina Milousi, Prodromos Kiriakidis, Notis Mengidis, Georgios Rizos, Mariana S. Mazi, Antonis Voulgaridis, Konstantinos Votis, Dimitrios Tzovaras:
Evaluating Cybersecurity Risk: A Comprehensive Comparison of Vulnerability Scoring Methodologies. 52:1-52:11 - Pushparaj Bhosale, Wolfgang Kastner, Thilo Sauter:
Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach. 53:1-53:9 - Ben Swierzy, Felix Boes, Timo Pohl, Christian Bungartz, Michael Meier:
SoK: Automated Software Testing for TLS Libraries. 54:1-54:12 - Andreas Halbritter, Dominik Merli:
Accuracy Evaluation of SBOM Tools for Web Applications and System-Level Software. 55:1-55:9 - Eddie Billoir, Romain Laborde, Ahmad Samer Wazan, Yves Rutschle, Abdelmalek Benzekri:
Enhancing Secure Deployment with Ansible: A Focus on Least Privilege and Automation for Linux. 56:1-56:7 - Luca Ardito:
Behavioural Modelling for Sustainability in Smart Homes. 57:1-57:11 - Thomas Hoad, Erisa Karafili:
A Web Browser Plugin for Users' Security Awareness. 58:1-58:7 - Giuseppe Marco Bianco, Luca Ardito, Michele Valsesia:
A tool for IoT Firmware Certification. 59:1-59:7 - Niels Pfau, Patrick Kochberger:
Analysis of the Windows Control Flow Guard. 60:1-60:11 - Alessandro Aldini, Tommaso Petrelli:
Image-based detection and classification of Android malware through CNN models. 61:1-61:11 - Christoph Dorner, Lukas Daniel Klausner:
If It Looks Like a Rootkit and Deceives Like a Rootkit: A Critical Examination of Kernel-Level Anti-Cheat Systems. 62:1-62:11 - Léo Lavaur, Yann Busnel, Fabien Autrel:
Systematic Analysis of Label-flipping Attacks against Federated Learning in Collaborative Intrusion Detection Systems. 63:1-63:12 - Salvador Llopis Sánchez, David Lopes Antunes:
Operation Assessment in cyberspace: Understanding the effects of Cyber Deception. 64:1-64:8 - Marta Irene García Cid, Michail-Alexandros Kourtis, David Domingo Martín, Nikolay Tcholtchev, Evangelos K. Markakis, Marcin Niemiec, Javier Faba, Laura Ortiz, Vicente Martín, Diego R. López, George Xilouris, Maria Gagliardi, José González, Miguel García, Giovanni Comandè, Nikolai Stoianov:
PQ-REACT: Post Quantum Cryptography Framework for Energy Aware Contexts. 65:1-65:7 - Jan Schröder, Jakub Breier:
RMF: A Risk Measurement Framework for Machine Learning Models. 66:1-66:6 - Tengfei Yang, Yuansong Qiao, Brian Lee:
Exploring the influence of the choice of prior of the Variational Auto-Encoder on cybersecurity anomaly detection. 67:1-67:9 - Florian Kammueller:
Analyzing Air-traffic Security using GIS-"blur' with Information Flow Control in the IIIf. 68:1-68:8 - Markus Wurzenberger, Stephan Krenn, Max Landauer, Florian Skopik, Cora Perner, Jarno Lötjönen, Jani Päijänen, Georgios Gardikis, Nikos Alabasis, Liisa Sakerman, Kristiina Omri, Juha Röning, Kimmo Halunen, Vincent Thouvenot, Martin Weise, Andreas Rauber, Vasileios Gkioulos, Sokratis K. Katsikas, Luigi Sabetta, Jacopo Bonato, Rocío Ortíz, Daniel Navarro, Nikolaos Stamatelatos, Ioannis Avdoulas, Rudolf Mayer, Andreas Ekelhart, Ioannis Giannoulakis, Emmanouil Kafetzakis, Antonello Corsi, Ulrike Lechner, Corinna Schmitt:
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence. 69:1-69:11 - Georgi Nikolov, Axelle Perez, Wim Mees:
Evaluation of Cyber Situation Awareness - Theory, Techniques and Applications. 70:1-70:10 - Florian Skopik, Benjamin Akhras, Elisabeth Woisetschläger, Medina Andresel, Markus Wurzenberger, Max Landauer:
On the Application of Natural Language Processing for Advanced OSINT Analysis in Cyber Defence. 71:1-71:10 - Pedro Miguel Sánchez Sánchez, Adrián Abenza Cano, Alberto Huertas Celdrán, Gregorio Martínez Pérez:
Evaluating the impact of contextual information on the performance of intelligent continuous authentication systems. 72:1-72:10 - José María Jorquera Valero, Antonio López Martínez, Pedro Miguel Sánchez Sánchez, Daniel Navarro-Martínez, Rodrigo Varas López, Javier Ignacio Rojo Lacal, Antonio Lopez Vivar, Marco Antonio Sotelo Monge, Manuel Gil Pérez, Gregorio Martínez Pérez:
Unlocking the Potential of Knowledge Graphs: A Cyber Defense Ontology for a Knowledge Representation and Reasoning System. 73:1-73:9 - Frida Muñoz Plaza, Inés Hernández San Román, Marco Antonio Sotelo Monge:
A Technical Exploration of Strategies for Augmented Monitoring and Decision Support in Information Warfare. 74:1-74:8 - Arthur Méreur, Antoine Mallet, Rémi Cogranne:
Are Deepfakes a Game-changer in Digital Images Steganography Leveraging the Cover-Source-Mismatch? 75:1-75:9 - Andrea Rosales, Agnieszka Malanowska, Tanya Koohpayeh Araghi, Minoru Kuribayashi, Marcin Kowalczyk, Daniel Blanche-Tarragó, Wojciech Mazurczyk, David Megías:
Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformation. 76:1-76:10 - Fabian Strachanski, Denis Petrov, Tobias Schmidbauer, Steffen Wendzel:
A Comprehensive Pattern-based Overview of Stegomalware. 77:1-77:10 - Marco Zuppelli, Massimo Guarascio, Luca Caviglione, Angelica Liguori:
No Country for Leaking Containers: Detecting Exfiltration of Secrets Through AI and Syscalls. 78:1-78:8 - Jörg Keller, Carina Heßeling, Steffen Wendzel:
Robust and Homomorphic Covert Channels in Streams of Numeric Data. 79:1-79:4 - Jeff Schymiczek, Tobias Schmidbauer, Steffen Wendzel:
A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning. 80:1-80:10 - Martin Steinebach:
Natural Language Steganography by ChatGPT. 81:1-81:9 - Daniel Lerch-Hostalot, David Megías Jiménez:
Single-image steganalysis in real-world scenarios based on classifier inconsistency detection. 82:1-82:6 - Krzysztof Chmiel, Pawel Rajba:
How to evade modern web cryptojacking detection tools? A review of practical findings. 83:1-83:10 - Omair Faraj, David Megías, Joaquín García-Alfaro:
ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenance. 84:1-84:11 - Alice Colombatto, Luca Giorgino, Andrea Vesco:
An Identity Key Management System with Deterministic Key Hierarchy for SSI-native Internet of Things. 85:1-85:6 - Stefan More, Jakob Heher, Edona Fasllija, Maximilian Mathie:
Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication Systems. 86:1-86:11 - Ricardo Bochnia, Jürgen Anke:
Long-Lived Verifiable Credentials: Ensuring Durability Beyond the Issuer's Lifetime. 87:1-87:9 - Tim Wood, Keerthi Thomas, Matthew Dean, Swaminathan Kannan, Robert Learney:
Towards Post-Quantum Verifiable Credentials. 88:1-88:10 - Markus Batz, Sebastian Zickau:
Towards Functions for Verifiable Credentials in a 2-Holder Model. 89:1-89:8 - Michael Hofmeier, Daniela Pöhn, Wolfgang Hommel:
DistIN: Analysis and Validation of a Concept and Protocol for Distributed Identity Information Networks. 90:1-90:10 - Virgil Hamici-Aubert, Julien Saint-Martin, Renzo E. Navas, Georgios Z. Papadopoulos, Guillaume Doyen, Xavier Lagrange:
Leveraging Overshadowing for Time-Delay Attacks in 4G/5G Cellular Networks: An Empirical Assessment. 91:1-91:10 - Pawel Rajba, Natan Orzechowski, Karol Rzepka, Przemyslaw Szary, Dawid Nastaj, Krzysztof Cabaj:
Identity and Access Management Architecture in the SILVANUS Project. 92:1-92:9 - Mikolaj Komisarek, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Aleksandra Pawlicka, Michal Choras:
Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic Analysis. 93:1-93:8 - Hongyu Jin, Zhichao Zhou, Panos Papadimitratos:
Future-proofing Secure V2V Communication against Clogging DoS Attacks. 94:1-94:8 - Marek Pawlicki, Damian Puchalski, Sebastian Szelest, Aleksandra Pawlicka, Rafal Kozik, Michal Choras:
Introducing a Multi-Perspective xAI Tool for Better Model Explainability. 95:1-95:8 - Christian Spinnler, Torsten Labs, Norman Franchi:
SoK: A Taxonomy for Hardware-Based Fingerprinting in the Internet of Things. 96:1-96:12 - Damian Puchalski, Marek Pawlicki, Rafal Kozik, Rafal Renk, Michal Choras:
Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics. 97:1-97:8 - Yejin Yoon, Jeehun Jung, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han:
Forensic Investigation of An Android Jellybean-based Car Audio Video Navigation System. 98:1-98:8 - Georgios Gkoktsis, Ludger Peters:
The Cyber Safe Position: An STPA for Safety, Security, and Resilience Co-Engineering Approach. 99:1-99:11 - Alexios Lekidis:
Anomaly detection mechanisms for in-vehicle and V2X systems. 100:1-100:8 - Julian Blümke, Kevin Mayer, Hans-Joachim Hof:
An Analysis of Security Concerns in Transitioning Battery Management Systems from First to Second Life. 101:1-101:11 - Jessica B. Heluany, Johannes Götzfried, Bernhard Mehlig, Vasileios Gkioulos:
Vulnerability management digital twin for energy systems. 102:1-102:11 - Ruben Cacciato, Mario Raciti, Sergio Esposito, Giampaolo Bella:
Modelling the privacy landscape of the Internet of Vehicles. 103:1-103:7 - Marc Ohm, Christian Bungartz, Felix Boes, Michael Meier:
Assessing the Impact of Large Language Models on Cybersecurity Education: A Study of ChatGPT's Influence on Student Performance. 104:1-104:7 - Willi Lazarov, Samuel Janek, Zdenek Martinasek, Radek Fujdiak:
Event-based Data Collection and Analysis in the Cyber Range Environment. 105:1-105:8 - Andrej Kristofík, Jakub Vostoupal, Kamil Malinka, Frantisek Kasl, Pavel Loutocký:
Beyond the Bugs: Enhancing Bug Bounty Programs through Academic Partnerships. 106:1-106:8 - Petr Dzurenda, Sara Ricci, Marek Sikora, Michal Stejskal, Imre Lendák, Pedro Adão:
Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization Techniques. 107:1-107:10 - Marko Zivanovic, Imre Lendák, Ranko Popovic:
Tackling the cybersecurity workforce gap with tailored cybersecurity study programs in Central and Eastern Europe. 108:1-108:8 - Jingyan Zhang, Irina Tal:
A Systematic Review of Contemporary Applications of Privacy-Aware Graph Neural Networks in Smart Cities. 109:1-109:10 - Ivan Visconti:
The Right to Be Zero-Knowledge Forgotten. 110:1-110:9