All Accepted Papers

ARES 2023 Full, Short, SoK Research Papers

Best Paper

A2P2 – An Android Application Patching Pipeline Based On Generic Changesets
Florian Draschbacher (Graz University of Technology and Secure Information Technology Center Austria, Austria)

Enabling Efficient Threshold Signature Computation via Java Card API
Antonín Dufka and Petr Švenda (Masaryk University, Czechia)

Nakula: Coercion Resistant Data Storage against Time-Limited Adversary
Hayyu Imanda and Kasper Rasmussen (University of Oxford, United Kingdom)

STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports
Francesco Marchiori, Mauro Conti (University of Padova, Italy) and Nino Vincenzo Verde (Leonardo S.p.A., Italy)

Cryptography

RETRACT: Expressive Designated Verifier Anonymous Credentials
Heini Bergsson Debes (Technical University of Denmark, Denmark) and Thanassis Giannetsos (Digital Security & Trusted Computing Group, Ubiquitous Technologies Limited, Greece)

Practical Verifiable & Privacy-Preserving Double Auctions
Armin Memar Zahedani, Jelle Vos and Zekeriya Erkin (Delft University of Technology, Netherlands)

Efficient Implementation of a Post-Quantum Anonymous Credential Protocol
Olivier Blazy (LIX, CNRS, Inria, École Polytechnique, Institut Polytechnique de Paris, France), Céline Chevalier (CRED, Université Paris-Panthéon-Assas and DIENS, École normale supérieure, PSL University, CNRS, INRIA, France), Guillaume Renaut (École normale supérieure, France), Thomas Ricosset, Eric Sageloli (Thales, France) and Hugo Senet (Thales, DIENS, École normale supérieure, PSL University, CNRS, INRIA, France)

Hardware security

Automated Side-Channel Attacks using Black-Box Neural Architecture Search
Pritha Gupta (Paderborn University, Germany), Jan Peter Drees (Bergische Universität Wuppertal, Germany) and Eyke Hüllermeier (Ludwig Maximilian University of Munich, Germany)

Long-Term Analysis of the Dependability of Cloud-based NISQ Quantum Computers
Chuanqi Xu and Jakub Szefer (Yale University, United States)
Short Research Paper

SoK: A Systematic Review of TEE Usage for Developing Trusted Applications
Arttu Paju, Muhammad Owais Javed, Juha Nurmi (Tampere University, Finland), Juha Savimäki (Tampere University, Unikie Oy, Finland), Brian McGillion (Technology Innovation Institute (TII), United Arab Emirates) and Billy Bob Brumley(Tampere University, Finland)

You Only Get One-Shot: Eavesdropping Input Images to Neural Network by Spying SoC-FPGA Internal Bus
May Myat Thu, Maria Méndez Real, Maxime Pelcat and Philippe Besnier (Univ Rennes, INSA Rennes, Nantes Université, CNRS, IETR-UMR 6164, F-35000 Rennes, France)
Short Research Paper

Mobile and edge

Characterizing the MasterPrint threat on Android devices with capacitive sensors
Miguel Peidro-Paredes, Jose Maria de Fuentes, Lorena González-Manzano and Miguel Velasco-Gomez (Universidad Carlos III de Madrid, Spain)

Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps
Ulf Kargén (Linköping University, Sweden), Noah Mauthe (CISPA Helmholtz Center for Information Security, Germany) and Nahid Shahmehri (Linköping University, Sweden)

SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability
Dipkamal Bhusal (Rochester Institute of Technology, United States), Rosalyn Shin (Independent Researcher, Unites States), Ajay Ashok Shewale, Monish Kumar Manikya Veerabhadran (Rochester Institute of Technology, United States), Michael Clifford (Toyota Infotech, United States), Sara Rampazzi (University of Florida, United States) and Nidhi Rastogi (Rochester Institute of Technology, United States)

Universal Remote Attestation for Cloud and Edge Platforms
Simon Ott, Monika Kamhuber, Joana Pecholt and Sascha Wessel (Fraunhofer AISEC, Germany)

Privacy

A hybrid anonymization pipeline to improve the privacy-utility balance in sensitive datasets for ML purposes
Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon and Vincent Naessens (KU Leuven – DistriNet, Belgium)

Evaluating Statistical Disclosure Attacks and Countermeasures for Anonymous Voice Calls
David Schatz, Michael Rossberg and Guenter Schaefer (Technische Universität Ilmenau, Germany)

k-Anonymity on Metagenomic Features in Microbiome Databases
Rudolf Mayer (Vienna University of Technology, SBA Research, Austria) , Alicja Karlowicz and Markus Hittmeir (SBA Research, Austria)

Mitigating Intersection Attacks in Anonymous Microblogging
Sarah Abdelwahab Gaballah, Thanh Hoang Long Nguyen, Lamya Abdullah, Ephraim Zimmer and Max Mühlhäuser (Technical University of Darmstadt, Germany)

Authentication

Actions Speak Louder Than Passwords: Dynamic Identity for Machine-to-Machine Communication
Wil Liam Teng and Kasper Rasmussen (University of Oxford, United Kingdom)

Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems
Willem Verheyen, Tim Van Hamme, Sander Joos, Davy Preuveneers and Wouter Joosen (imec-Distrinet, KU Leuven, Belgium)

Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities
Amir Sharif (Center for Cybersecurity, Fondazione Bruno Kessler, Italy), Francesco Antonio Marino (Italian Government Printing Office and Mint, Italy), Giada Sciarretta (Center for Cybersecurity, Fondazione Bruno Kessler, Italy), Giuseppe de Marco (Department for digital transformation, Italy), Roberto Carbone (Center for Cybersecurity, Fondazione Bruno Kessler, Italy) and Silvio Ranise (University of Trento and Center for Cybersecurity, Fondazione Bruno Kessler, Italy)

Rogue key and impersonation attacks on FIDO2: From theory to practice
Manuel Barbosa, André Cirne and Luís Esquível (University of Porto (FCUP) and INESC TEC, Portugal)

Secure software and malware detection

Adoption of Information Security Practices in Large-Scale Agile Software Development: A Case Study in the Finance Industry
Sascha Nägele, Lorena Korn and Florian Matthes (Technical University Munich, Germany)

A Practical Attack on the TLSH Similarity Digest Scheme
Gábor Fuchs, Roland Nagy and Levente Buttyán (CrySys Lab, HIT, BME, Hungary)

Linux-based IoT Benchmark Generator For Firmware Security Analysis Tools
Dairo de Ruck, Victor Goeman, Michiel Willocx, Jorn Lapon and Vincent Naessens (imec-Distrinet, KU Leuven, Belgium)

SoK: Practical Detection of Software Supply Chain Attacks
Marc Ohm (University of Bonn & Fraunhofer FKIE, Germany) and Charlene Stuke (University of Bonn, Germany)

Network security and privacy

Formal Security Analysis of Vehicle Diagnostic Protocols
Timm Lauser and Christoph Krauß (Darmstadt University of Applied Sciences, Germany)

Modeling Tor Network Growth by Extrapolating Consensus Data
Christoph Döpmann and Florian Tschorsch (TU Berlin, Germany)
Short Research Paper

Real-Time Defensive Strategy Selection via Deep Reinforcement Learning
Axel Charpentier, Christopher Neal (Polytechnique Montréal, IRT SystemX, Canada), Nora Boulahia-Cuppens, Frédéric Cuppens (Polytechnique Montréal, Canada) and Reda Yaich (IRT SystemX, France)

The Effect of Length on Key Fingerprint Verification Security and Usability
Dan Turner (Canada), Siamak Shahandashti and Helen Petrie (University of York, United Kingdom)

Threat intelligence and incident response

An Exploratory Study on the Use of Threat Intelligence Sharing Platforms in Germany, Austria and Switzerland
Daniel Fischer (Technische Universität Ilmenau, Germany), Clemens Sauerwein (University of Innsbruck, Austria), Martin Werchan and Dirk Stelzer (Technische Universität Ilmenau, Germany)
Short Research Paper

Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts
Hiroki Nakano (NTT Security KK / Yokohama National University, Japan) , Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu (NTT Security KK, Japan), Katsunari Yoshioka and Tsutomu Matsumoto (Yokohama National University, Japan)

Digital Twin-Enhanced Incident Response for Cyber-Physical Systems
David Allison, Paul Smith (AIT Austrian Institute of Technology GmbH, Austria) and Kieran McLaughlin (Queen’s University Belfast, United Kingdom)

Dizzy: Large-Scale Crawling and Analysis of Onion Services
Yazan Boshmaf (Qatar Computing Research Institute, HBKU, Qatar), Isuranga Perera (Texas A&M University, United States), Udesh Kumarasinghe (University of Colombo, Sri Lanka), Sajitha Liyanage and Husam Al Jawaheri (Qatar Computing Research Institute, HBKU, Qatar)

Accepted Workshop Papers and EU Projects Symposium Workshop Papers 2023

Note: Papers are listed in no specific order.

CSA

Approach to harmonisation of technological solutions, operating procedures, preparedness and cross-sectorial collaboration opportunities for first aid response in cross-border mass-casualty incidents
Yantsislav Yanakiev (Bulgarian Defence Institute, Bulgaria), Sergio López Bernal (University of Murcia, Spain), Alberto Montarelo Navajo (TASSICA Emergency Training & Research Segovia, Spain), Nikolai Stoianov (Bulgarian Defence Institute, Bulgaria), Manuel Gil Pérez (University of Murcia, Spain) and Carmen Martín Curto (TASSICA Emergency Training & Research Segovia, Spain)

Automatic incident response solutions: a review of proposed solutions’ input and output
Henrik Karlzén and Teodor Sommestad (Swedish Defence Research Agency (FOI), Sweden)

Securing cloud-based military systems with Security Chaos Engineering and Artificial Intelligence
Martin Bedoya,  Sara Palacios (Universidad del Rosario, NTT Data, Colombia) Daniel Diaz-López (Universidad del Rosario, Colombia, New York University, United States), Pantaleone Nespoli (University of Murcia, Spain) Estefania Laverde, Sebastián Suárez (Universidad del Rosario, Colombia)

The fighting Age of machines: the use of cyber deception for Adversarial Artificial Intelligence in Cyber Defence
David Lopes Antunes and Salvador Llopis Sanchez (Universitat Politecnica de Valencia, Spain)

Towards the Definition Of Cognitive Warfare And Related Countermeasures: A Systematic Review
Frida Muñoz Plaza, Marco Antonio Sotelo Monge (Indra, Spain) and Héctor González Ordi (Universidad Complutense de Madrid, Spain)

CUING

How to hide your VM from the big bad wolf? Co-location resistance vs. resource utilisation in VM placement strategies
Jens Lindemann (Universität Hamburg, Germany)

Network Covert Channels in Routing Protocols
Michael Schneider (FernUniversität in Hagen, Germany), Daniel Spiekermann (Dortmund University of Applied Sciences and Arts, Germany) and Jörg Keller (FernUniversität in Hagen, Germany)

Real-world actor-based image steganalysis via classifier inconsistency detection
Daniel Lerch-Hostalot and David Megias (Universitat Oberta de Catalunya, Spain)

An Analysis of PhotoDNA
Martin Steinebach (Fraunhofer, Germany)

Proof-of-work based new encoding scheme for information hiding purposes
Pawel Rajba (University of Wroclaw, Poland), Jörg Keller (FernUniversität in Hagen, Germany) and Wojciech Mazurczyk (Warsaw University of Technology, Poland)

ENS

Confidential Quantum Computing
Barbora Hrdá and Sascha Wessel (Fraunhofer AISEC, Germany)

Modern NetFlow network dataset with labeled attacks and detection methods
Mikołaj Komisarek (ITTI Sp. z o.o., Poland), Marek Pawlicki (ITTI Sp. z o.o.;Bydgoszcz University of Science and Technology Institute of Telecommunications, Poland), Tomi Simič, David Kavčnik (Bydgoszcz University of Science and Technology Institute of Telecommunications;ITTI Sp. z o.o., Slovenia), Rafał Kozik and Michał Choraś (Institute of Telecommunications, Bydgoszcz University of Science and Technology, Poland)

ScasDK – A Development Kit for Security Assurance test in Multi-Network-Function 5G
Francesco Mancini and Giuseppe Bianchi (CNIT / University of Rome “Tor Vergata”, Italy)

Security Architecture in the SILVANUS project
Natan Orzechowski, Karol Rzepka, Przemysław Szary, Krzysztof Cabaj, Wojciech Mazurczyk (Warsaw University of Technology, Poland), Nelly Leligou (Netcompany-Intrasoft, Luxembourg), Marcin Przybyszewski (ITTI Sp. z o.o., Poland), Rafał Kozik and Michał Choraś (Bydgoszcz University of Science and Technology, ITTI Sp. z o.o., Poland)

EPESec

Risk Assessments in Virtual Power Plants with NESCOR Criteria, Practical Application, Advantages and Disadvantages
Georgios Gkoktsis (Fraunhofer SIT, Germany), Hagen Lauer (Technische Hochschule Mittelhessen, Germany) and Lukas Jaeger (Fraunhofer SIT, Germany)

ELECTRON: An Architectural Framework for Securing the Smart Electrical Grid with Federated Detection, Dynamic Risk Assessment and Self-Healing
Panagiotis Radoglou-Grammatikis, Athanasios Liatifis (University of Western Macedonia, Greece), Christos Dalamagkas, Alexios Lekidis (Innovation Hub of Public Power Corporation S.A., Greece), Konstantinos Voulgaridis, Thomas Lagkas (Department of Computer Science, International Hellenic University, Greece), Nikolaos Fotos, Sofia-Anna Menesidou, Thomas Krousarlis (UBITECH Limited, Cyprus), Pedro Ruzafa Alcazar, Juan Francisco Martinez, Antonio Skarmeta (Department of Information and Communications Engineering, University of Murcia, Spain), Alberto Molinuevo Martín, Inaki Angulo (TECNALIA, Basque Research and Technology Alliance (BRTA), Spain), Jesus Villalobos Nieto, Hristo Koshutanski, Rodrigo Diaz Rodriguez (ATOS Spain SA, Spain), Ilias Siniosoglou (MetaMind Innovations P.C., Greece), Orestis Mavropoulos (Exalens, United Kingdom), Konstantinos Kyranou, Theocharis Saoulidis (Sidroco Holdings Ltd, Cyprus), Allon Adir, Ramy Masalha (IBM Research, Israel), Emanuele Bellini (LOGOS, Italy), Nikolaos Kolokotronis (Department of Informatics and Telecommunications, University of Peloponnese, Greece), Stavros Shiaeles (University of Portsmouth, United Kingdom), Jose Garcia Franquelo (Isotrol, Spain), George Lalas, Andreas Zalonis (Netcompany-Intrasoft, Luxembourg), Antonis Voulgaridis, Angelina Bintoudi, Konstantinos Votis (Centre of Research & Technology Hellas, Greece), David Pampliega (Schneider Electric, Spain) and Panagiotis Sarigiannidis (University of Western Macedonia, Greece)

Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems
Dimitrios Christos Asimopoulos (MetaMind Innovations P.C., Greece), Panagiotis Radoglou-Grammatikis (University of Western Macedonia, Greece), Ioannis Makris (MetaMind Innovations P.C., Greece), Valeri Mladenov (Technical University of Sofia, Bulgaria), Konstantinos E. Psannis (University of Macedonia, Greece), Sotirios Goudos (Aristotle University of Thessaloniki, Greece) and Panagiotis Sarigiannidis (University of Western Macedonia, Greece)

Explainable AI-based Intrusion Detection in the Internet of Things
Marios Siganos (K3Y Ltd; Bulgaria), Panagiotis Radoglou-Grammatikis (K3Y Ltd, University of Western Macedonia, Bulgaria), Igor Kotsiuba (Durham University, United Kingdom), Evangelos Markakis (Hellenic Mediterranean University, Greece), Ioannis Moscholios (University of Peloponnese, Greece), Sotirios Goudos (Aristotle University of Thessaloniki, Greece) and Panagiotis Sarigiannidis (University of Western Macedonia, Greece)

EPIC-ARES (joint session with SSE and IWSECC)

Secure Multi-User Contract Certificate Management for ISO 15118-20 Using Hardware Identities
Christian Plappert, Lukas Jäger (Fraunhofer SIT | ATHENE, Germany), Alexander Irrgang and Chandrasekhar Potluri (Mercedes-Benz AG, Germany)

A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations
Stefan Tatschner (Fraunhofer AISEC; University of Limerick, Germany), Sebastian N. Peters, David Emeis (Fraunhofer AISEC, Germany), John Morris and Thomas Newe (University of Limerick, Ireland)

An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data Protection
Andreas Diepenbrock and Sabine Sachweh (Dortmund University of Applied Sciences and Arts, Germany)

Experiences with Secure Pipelines in Highly Regulated Environments
Jose Morales and Hasan Yasar (Carnegie Mellon University, United States)

Creating a Decryption Proof Verifier for the Estonian Internet Voting System
Jan Willemson (Cybernetica, Estonia)

Attack on “A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server”
Srinivas Vivek (International Institute of Information Technology Bangalore, India)

Exploring NFT Validation through Digital Watermarking
Mila Dalla Preda and Francesco Masaia (University of Verona, Italy)

Simulated environment for multiparty quantum digital signature across the network
Daniel G. Aguado (Universidad Politécnica de Madrid Departamento de Arquitectura y Tecnología de Sistemas Informáticos, Spain), Marta Irene Garcia Cid (Indra Sistemas S.A.; Universidad Politécnica de Madrid Escuela Técnica Superior de Ingenieros Informáticos, Spain), Laura Ortiz Martín (Universidad Politécnica de Madrid Departamento de Arquitectura y Tecnología de Sistemas Informáticos, Spain) and Vicente Martín Ayuso (Universidad Politécnica de Madrid Lenguajes y Sistemas Informáticos e Ingeniería de Software, Spain)

ETACS

IoT Security Seminar: Raising Awareness and Sharing Critical Knowledge
Victor Goeman, Dairo de Ruck, Ilse Bohé, Jorn Lapon and Vincent Naessens (imec-DistriNet, KU Leuven, Belgium)

Curricula Designer with Enhanced ECSF Analysis
Jan Hajny, Marek Sikora (Brno University of Technology, Czechia), Fabio Di Franco (ENISA, Greece) and Konstantinos Adamos (University of the Aegean, Greece)

The Curation Mechanism for the Czech National Qualifications Framework in Cybersecurity
František Kasl, Pavel Loutocký and Jakub Vostoupal (Masaryk University Centre for Education, Czechia)

DJM-CYBER: A Joint Master in Advanced Cybersecurity
Yianna Danidou (European University Cyprus, Cyprus), Sara Ricci (Brno University of Technology, Czechia), Antonio Skarmeta (Universidad de Murcia, Spain), Jiri Hosek (Brno University of Technology, Czechia), Stefano Zanero (Politecnico di Milano, Italy) and Imre Lendak (Eötvös Loránd University Faculty of Informatics;University of Novi Sad Faculty of Technical Sciences, Hungary)

Enhancing Cybersecurity Education in Europe: The REWIRE’s Course Selection Methodology
Alan Briones Delgado (La Salle – Ramon Llull University, Spain), Sara Ricci (Brno University of Technology, Czechia), Argyro Chatzopoulou (APIROPLUS Solutions Ltd., Cyprus), Jakub Čegan (Masaryk University, Czechia), Petr Dzurenda (Brno University of Technology, Czechia) and Ioannis Koutoudis (AKMI Internacional, Greece)

TASEP: A Collaborative Social Engineering Tabletop Role-Playing Game to Prevent Successful Social Engineering Attacks
Lukas Hafner, Florian Wutz, Daniela Pöhn and Wolfgang Hommel (Universität der Bundeswehr München, Germany)

A Study of Different Awareness Campaigns in a Company
Laura Gamisch (Ludwig-Maximilians-Universität München, Germany) and Daniela Pöhn (Universität der Bundeswehr München, Germany)

Interactive Environment for Effective Cybersecurity Teaching and Learning
Willi Lazarov, Tomas Stodulka (Brno University of Technology, Czechia), Tiina Schafeitel-Tähtinen, Marko Helenius (Tampere University, Finland) and Zdenek Martinasek (Brno University of Technology, Czechia)

Dynamic Cybersecurity Curriculum Optimization Method (DyCSCOM)
Marko Zivanovic, Imre Lendak and Ranko Popovic (Faculty of Technical Sciences, University of Novi Sad, Serbia)

Why Mary Can Hack: Effectively Introducing High School Girls to Cybersecurity
Gabriele Costa, Silvia De Francisci, Serenella Valiani (IMT School for Advanced Studies Lucca, Italy) and Paolo Prinetto (Politecnico di Torino, Italy)

FARES

Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name Notation
Vincent Drury, Jakob Drees and Ulrike Meyer (RWTH Aachen University, Germany)

Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity Wins
Jan-Phillip Makowski and Daniela Pöhn (Universität der Bundeswehr München, Germany)

A case study with CICIDS2017 on the robustness of machine learning against adversarial attacks in intrusion detection
Marta Catillo, Andrea Del Vecchio, Antonio Pecchia and Umberto Villano (Università degli Studi del Sannio, Italy)

Mitigate Data Poisoning Attack by Partially Federated Learning
Khanh Huu The Dam and Axel Legay (UCLouvain, Belgium)

Fairness of AI in Predicting the Risk of Recidivism: Review and Phase Mapping of AI Fairness Techniques
Michael Farayola, Irina Tal (School of Computing, Dublin City University, Ireland), Bendechache Malika, Takfarinas Saber (School of Computer Science, University of Galway, Ireland) and Regina Connolly (Business School, Dublin City University, Ireland)

Program Characterization for Software Exploitation Detection
Ayman Youssef, Mohamed Abdelrazek and Chandan Kumar Karmakar (Deakin University, Australia)

JITScanner: Just-in-Time Executable Page Check in the Linux Operating System
Pasquale Caporaso, Giuseppe Bianchi and Francesco Quaglia (Università degli studi di Roma Tor Vergata, Italy)

Obfuscated Mobile Malware Detection by means of Dynamic Analysis and Explainable Deep Learning
Francesco Mercaldo (University of Molise & IIT-CNR, Italy), Giovanni Ciaramella (IIT-CNR, Italy), Antonella Santone (University of Molise, Italy) and Fabio Martinelli (IIT-CNR, Italy)

Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids
Luigi Coppolino, Roberto Nardone, Alfredo Petruolo, Luigi Romano (University of Naples “Parthenope”, Italy) and Andrej Souvent (Operato d.o.o., Slovenia)

A Survey of Steganography Tools at Layers 2-4 and HTTP
Stefano Bistarelli (Università di Perugia, Italy), Michele Ceccarelli, Chiara Luchini, Ivan Mercanti (Università degli Studi di Perugia, Italy) and Francesco Santini (Dipartimento di Matematica e Informatica, Università di Perugia, Italy)

Towards Grammatical Tagging for the Legal Language of Cybersecurity
Gianpietro Castiglione, Giampaolo Bella and Daniele Francesco Santamaria (University of Catania, Italy)

GRASEC

Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems
Lionel Tailhardat (Orange, France), Raphaël Troncy (EURECOM, France) and Yoan Chabot (Orange, France)

IoT Network Attack Detection: Leveraging Graph Learning for Enhanced Security
Mohamed-Lamine Messai (Univ Lyon, Univ Lyon 2, UR ERIC, France) and Hamida Seba (University Lyon 1, France)

Investigating Impact of Fake-Type Content Poisoning Attack on NDN
Noriaki Kamiyama (Ritsumeikan University, Japan) and Takuto Kudo (Fukuoka University, Japan)

Graph-Based Android Malware Detection and Categorization through BERT Transformer
Marco Simoni and Andrea Saracino (Consiglio Nazionale delle Ricerche, Italy)

IoT-SECFOR

Security Analysis of the KNX Smart Building Protocol KNX Security
Malte Küppers, Marko Schuba, Georg Neugebauer, Tim Hoener and Sacha Hack (FH Aachen University of Applied Sciences, Germany)

FISMOS – An FPGA Implementation of a Security Module as Open Source
Philipp Schubaur, Peter Knauer and Dominik Merli (Technical University of Applied Sciences Augsburg, Germany)

Securing Federated GANs: Enabling Synthetic Data for Health Registries Consortium
Narasimha Raghavan Veeraragavan and Jan Franz Nygård (The Cancer Registry of Norway, Norway)

A Generic IoT Quantum-Safe Watchdog Timer Protocol
Michael Eckel, Tanja Gutsche (Fraunhofer SIT | ATHENE, Germany), Hagen Lauer and André Rein (University of Applied Sciences Mittelhessen | THM, Germany)

IWAPS

Needle in the Haystack: Analyzing the Right of Access According to GDPR Article 15 Five Years after the Implementation
Daniela Pöhn, Niklas Mörsdorf and Wolfgang Hommel (Universität der Bundeswehr München, Germany)

A BYOD security awareness survey among professionals
George Petihakis, Dimitrios Kiritsis, Aristeidis Farao, Panagiotis Bountakas, Aggeliki Panou and Christos Xenakis (University of Piraeus, Greece)

Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles
Sakshyam Panda, Emmanouil Panaousis, George Loukas (University of Greenwich, United Kingdom) and Konstantinos Kentrotis (EXUS, Greece)

Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT
Michail Bampatsikos, Vaios Bolgouras (University of Piraeus, Greece), Ilias Politis (ISI / “Athena” RC, Greece) and Christos Xenakis (University of Piraeus, Greece)

Enabling Qualified Anonymity for Enhanced  User Privacy in the Digital Era
Vaios Bolgouras (University of Piraeus, Greece), Konstantinos Papadamou (Cyprus University of Technology, Cyprus), Ioana Stroinea (certSIGN, Romania), Michail Papadakis (LSTech ESPANA, Spain), George Gugulea (certSIGN, Romania), Michael Sirivianos (Cyprus University of Technology, Cyprus) and Christos Xenakis (University of Piraeus, Greece)

AI/ML-based real-time classification of Software Defined Networking traffic
Alexandru Vulpe, Cosmin Dobrin, Apostol Stefan and Alexandru Caranica (University Politehnica of Bucharest, Romania)

A Comprehensive Study on Third-Party User Tracking in Mobile Applications
Federica Paci, Jacopo Pizzoli (University of Verona, Italy) and Nicola Zannone (Eindhoven University of Technology, Netherlands)

An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management
Konstantinos Loupos, Harris Niavis, Fotis Michalopoulos, George Misiakoulis (INLECOM, Greece), Antonio Skarmeta, Jesús García (Universidad De Murcia, Spain), Angel Palomares (ATOS It Solutions And Services Iberia Sl, Spain), Hui Song, Rustem Dautov (SINTEF AS, Norway), Francesca Giampaolo, Rosella Mancilla, Francesca Costantino (Engineering – Ingegneria Informatica SPA, Italy), Dimitri Landuyt, Sam Michiels (Katholieke Universiteit Leuven, Belgium), Stefan More (Graz University of Technology and Secure Information Technology Center, Belgium), Christos Xenakis, Michail Bampatsikos, Ilias Politis (University Of Piraeus Research Center, Greece), Konstantinos Krilakis and Dimitris Syvridis (Eulambia Advanced Technologies, Greece)

A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles
Meriem Benyahya, Teri Lenard, Anastasija Collen and Niels Nijdam (Geneva School of Economics and Management Université de Genève, Switzerland)

Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic
Vasileios Pantelakis, Panagiotis Bountakas, Aristeidis Farao and Christos Xenakis (University of Piraeus, Greece)

A Qualitative Analysis of Illicit Arms Trafficking on Darknet Marketplaces
Pantelitsa Leonidou, Nikos Salamanos (Cyprus University of Technology, Cyprus), Aristeidis Farao (University of Piraeus, Greece), Maria Aspri (LSTech LTD, Spain) and Michael Sirivianos (Cyprus University of Technology, Cyprus)

Exploring Federated Learning for Speech-based Parkinson’s Disease Detection
Athanasios Sarlas, Alexandros Kalafatelis (Department of Ports Management and Shipping, National & Kapodistrian University of Athens, Greece), Georgios Alexandridis (Department of Digital Industry Technologies, National & Kapodistrian University of Athens, Greece), Michail-Alexandros Kourtis (Institute of Informatics and Telecommunications, National Centre for Scientific Research “DEMOKRITOS” (NCSRD), Greece) and Panagiotis Trakadas (Department of Ports Management and Shipping, National & Kapodistrian University of Athens, Greece)

Securing the Flow: Security and Privacy Tools for Flow-based Programming
Thodoris Ioannidis, Vaios Bolgouras, Christos Xenakis and Ilias Politis (University of Piraeus, Greece)

Parameterizing poisoning attacks in federated learning-based intrusion detection
Mohamed Amine Merzouk, Frédéric Cuppens, Nora Cuppens-Boulahia (Polytechnique Montréal, Canada) and Reda Yaich (IRT SystemX, France)

IWCC

Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators
Alpesh Bhudia (Royal Holloway, University of London, United Kingdom), Anna Cartwright (Oxford Brookes University, United Kingdom), Edward Cartwright (De Montfort University, United Kingdom), Darren Hurley-Smith (Royal Holloway University of London, United Kingdom) and Julio Hernandez (University of Kent, United Kingdom)

Cheaper than you thought? A dive into the darkweb market of cyber-crime products
Dimitrios Georgoulias (Aalborg University, Denmark), Ricardo Yaben and Emmanouil Vasilomanolakis (Technical University of Denmark, Denmark)

Tactics, Techniques and Procedures of Cybercrime: A Methodology and Tool for Cybercrime Investigation Process
Gargi Sarkar, Hardeep Singh (Indian Institute of Technology, India), Subodh Kumar (Microsoft India, India) and Sandeep K. Shukla (Indian Institute of Technology, India)

Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access
Juha Nurmi (Tampere University, Finland), Mikko Niemelä (Cyber Intelligence House, Portugal) and Billy Brumley (Tampere University, Finland)

PCSCI

Detecting a Complex Attack Scenario in an Airport: The PRAETORIAN Framework
Stefan Schauer (AIT Austrian Institute of Technology GmbH, Austria), Tamara Hadjina (KONCAR Digital, Croatia), Melita Damjanović (Zagreb Airport, Austria), Eva María Muñoz Navarro, Juan José Hernández Montesinos (ETRA I+D, Spain), Javier Hingant Gómez (Universitat Politècnica de València, Spain) and Lazaros Papadopoulos (School of Electrical and Computer Engineering, National Technical University of Athens, Greece)

A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures
Tim H. Stelkens-Kobsch, Hilke Boumann, Florian Piekert, Meilin Schaper and Nils Carstengerdes (German Aerospace Center (DLR), Germany)

Identification and Evaluation of Cyber-Physical Threats on Interdependent Critical Infrastructures
Sandra König, Abdelkader Magdy Shaaban (AIT Austrian Institute of Technology GmbH, Austria), Tamara Hadjina (Koncar, Croatia), Klemen Gregorc and Albert Kutej (KABEG, Austria)

PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats
Lazaros Papadopoulos, Antonios Karteris, Dimitrios Soudris (School of Electrical and Computer Engineering, National Technical University of Athens, Greece), Eva Muñoz-Navarro, Juan José Hernández-Montesinos (ETRA Investigación y Desarrollo, Spain), Stephane Paul, Nicolas Museux (THALES Research and Technology, France), Sandra König, Manuel Egger, Stefan Schauer (AIT Austrian Institute of Technology GmbH, Austria), Alfonso Climente, Javier Hingant Gómez, Israel Pérez-Llopis (Universitat Politècnica de València, Spain) and Tamara Hadjina (Koncar Digital, Croatia)

SecIndustry

HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems
Marco Lucchese (University of Verona, Italy), Francesco Lupia, Massimo Merro, Federica Paci (University of Verona, Italy) and Nicola Zannone (Eindhoven University of Technology, Netherlands), Angelo Furfaro (University of Calabria, Italy)

ICSvertase: A Framework for Purpose-based Design and Classification of ICS Honeypots
Stash Kempinski (Eindhoven University of Technology, Netherlands), Shuaib Ichaarine (University of Technology Eindhoven, Netherlands), Savio Sciancalepore and Emmanuele Zambon (Eindhoven University of Technology, Netherlands)

A Forensic I/O Recorder for Industrial Control Systems Using PLCs and OPC UA
Alexios Karagiozidis (rt-solutions.de GmbH, Germany) and Martin Gergeleit (University of Applied Sciences RheinMain, Germany)

OpenScope-sec: An ADS-B Simulator to Support the Security Research
Riccardo Cestaro, Mauro Conti, Elonora Mancini and Federico Turrin (University of Padova, Italy)

PLC Logic-Based Cybersecurity Risks Identification for ICS
Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon (CEA/LETI, France) and Stéphane Mocanu (INRIA, France)

Automated ICS template for STRIDE Microsoft Threat Modeling Tool
Mike Da Silva, Maxime Puys, Pierre-Henri Thevenon (CEA/LETI, France), Stéphane Mocanu and Nelson Nkawa (INRIA, France)

Survey on Digital Twins: from concepts to applications
Jessica B. Heluany and Vasileios Gkioulos (NTNU, France)

Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AI
Fadhila Tlili (University of technology of Troyes LIST3N;National School of Electronics and Telecoms of Sfax SMARTS, France), Samiha Ayed (University of technology of Troyes, France) and Lamia Chaari Fourati (University of Sfax, France)

Towards Obfuscation of Programmable Logic Controllers
Vittoria Cozza, Mila Dalla Preda, Marco Lucchese, Massimo Merro (University of Verona, Italy) and Nicola Zannone (Eindhoven University of Technology, Netherlands)

SECPID

CACS: a cloud privacy-preserving attribute management system
Aivo Kalu, Burak Can Kus, Peeter Laud, Kin Long Leung, Nikita Snetkov and Jelizaveta Vakarjuk (Cybernetica AS, Estonia)

RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving Privacy
Stephan Krenn (AIT Austrian Institute of Technology GmbH, Austria), Jan Orlicky (IMA s.r.o., Czechia), Daniel Slamanig (AIT Austrian Institute of Technology GmbH, Austria) and Tomáš Trpišovský (IMA s.r.o., Czechia)

Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes
Stefan More (Graz University of Technology and Secure Information Technology Center Austria, Austria)

Quantum-resistant End-to-End Secure Messaging and Email Communication
Sebastian Ramacher (AIT Austrian Institute of Technology, Austria), Christoph Döberl, Wolfgang Eibner (X-Net Services GmbH, Austria), Simon Gärtner (University of Applied Sciences Upper Austria, Austria), Manuela Kos and Florian Kutschera (AIT Austrian Institute of Technology, Austria)

Key Management Systems for Large-Scale Quantum Key Distribution Networks
Paul James, Stephan Laschet, Luca Torresetti, Sebastian Ramacher (AIT Austrian Institute of Technology, Austria)

SP2I

On Efficiency and Usability of Group Signatures on Smartphone and Single-board Platforms
Patrik Dobias, Lukas Malina, Petr Ilgner and Petr Dzurenda (Brno University of Technology, Czechia)

A Decentralised Public Key Infrastructure for X-Road
Mariia Bakhtina, Kin Long Leung, Raimundas Matulevičius, Ahmed Awad (University of Tartu, Estonia) and Petr Švenda (Masaryk University, Czechia)

Securing Data Exchange in the Convergence of Metaverse and IoT Applications
Rizwan Patan and Reza M. Parizi (Kennesaw State University, United States)

Data Loss Prevention Solution for Linux Endpoint Devices
Lukas Daubner and Adam Považanec (Masaryk University, Czechia)

On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures
Lukas Malina, Patrik Dobias, Jan Hajny (Brno University of Technology, Czechia) and Kim-Kwang Raymond Choo (University of Texas at San Antonio, United States)

Security level evaluation with F4SLE
Mari Seeba (University of Tartu, Computer Science Institute & Estonian Information System Authority, Estonia), Tarmo Oja, Maria Pibilota Murumaa (University of Tartu Computer Science Institute & Cybernetica AS, Estonia) and Vaclav Stupka Stupka (Masaryk University & CyberSecurity Hub, z.u., Czechia)

STAM

Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework
Eider Iturbe, Erkuden Rios, Angel Rego (TECNALIA Research Innovation, Basque Research and Technology Alliance (BRTA), Spain) and Nerea Toledo (University of the Basque Country, Spain)

A deep learning anomaly detection framework with explainability and robustness
Manh-Dung Nguyen, Anis Bouaziz, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli and Edgardo Montes de Oca (Montimage, France)

VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices
Eduard Paul Enoiu (Mälardalen University, Sweden), Dragos Truscan (ABO Akademi, Finland), Andrey Sadovykh (SOFTEAM, France) and Wissam Mallouli (Montimage, France)

The DYNABIC approach to resilience of critical infrastructures
Erkuden Rios, Eider Iturbe, Angel Rego (TECNALIA Research Innovation, Basque Research and Technology Alliance (BRTA), Spain), Nicolas Ferry, Jean-Yves Tigli, Stéphane Lavirotte, Gérald Rocher (Université Côte d’Azur, France), Phu Nguyen, Hui Song, Rustem Dautov (SINTEF, Norway), Wissam Mallouli and Ana Rosa Cavalli (Montimage EURL, France)

Automatic Test Generation to Improve Scrum for Safety Agile Methodology
Mario Barbareschi, Salvatore Barone (Università degli Studi di Napoli Federico II, Italy), Valentina Casola (University of Naples Federico II, Italy), Salvatore Della Torca and Daniele Lombardi (Università degli Studi di Napoli Federico II, Italy)

HTTP/2 Attacks Generation using 5Greplay
Francesco G. Caccavale, Huu-Nghia Nguyen, Ana Cavalli, Edgardo Montes de Oca and Wissam Mallouli (Montimage, France)

Trustbus

Mitigating Privilege Misuse in Access Control through Anomaly Detection
Gelareh Hasel Mehri, Inez Wester (Eindhoven University of Technology, Netherlands), Federica Paci (University of Verona, Italy) and Nicola Zannone (Eindhoven University of Technology, Netherlands)

Fingerprint forgery training: Easy to learn, hard to perform
Agata Kruzikova and Vashek Matyas (Masaryk University, Czechia)

Mitigating undesired interactions between liveness detection components in biometric authentication
Emma Lavens, Davy Preuveneers and Wouter Joosen (imec – DistriNet, KU Leuven, Belgium)

An Improved Honeypot Model for Attack Detection and Analysis
Marwan Abbas-Escribano and Hervé Debar (Telecom Sud Paris, France)

Implementing Data Sovereignty: Requirements & Challenges from Practice
Malte Hellmeier, Julia Pampus, Haydar Qarawlus (Fraunhofer ISST, Germany) and Falk Howar (TU Dortmund, Fraunhofer ISST, Germany)

Application of Secure Two-Party Computation in a Privacy-Preserving Android App
Marco De Vincenzi, Ilaria Matteucci, Fabio Martinelli (IIT-CNR, Italy) and Stefano Sebastio (Collins Aerospace – Applied Research & Technology, Ireland)

TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework
Sarwar Sayeed, Nikolaos Pitropakis, William J Buchanan (Edinburgh Napier University, United Kingdom), Evangelos Markakis, Dimitra Papatsaroucha (Hellenic Mediterranean University Research Center, Greece) and Ilias Politis (InQbit/Industrial Systems Institute ATHENA RC, Romania)

Effect of Group Based Synchronization on User Anonymity in Mix Networks
Alperen Aksoy (Friedrich-Alexander University of Erlangen-Nuremberg, Germany) and Dogan Kesdogan (University of Regensburg, Germany)

New Identity-Based Identification and Signature Schemes in the Standard Model
Syh-Yuan Tan (Newcastle University, United Kingdom) and Swee-Huay Heng (Multimedia University, Malaysia)

Cookiescanner: An Automated Tool for Detecting and Evaluating GDPR Consent Notices on Websites
Ralf Gundelach and Dominik Herrmann (Otto-Friedrich-Universität Bamberg, Germany)

User Acceptance Criteria for Privacy Preserving Machine Learning Techniques
Sascha Löbner, Sebastian Pape (Goethe University Frankfurt, Germany) and Vanessa Bracamonte (KDDI Research, Inc., Japan)

Bypassing antivirus detection: old-school malware, new tricks
Efstratios Chatzoglou (University of the Aegen, Greece), Georgios Karopoulos (European Commission, Joint Research Centre (JRC), Italy), Georgios Kambourakis and Zisis Tsiatsikas (University of the Aegean, Greece)

Smartphones in a Microwave: Formal and Experimental Feasibility Study on Fingerprinting the Corona-Warn-App
Henrik Graßhoff (University of Münster, Germany), Florian Adamsky (Hof University of Applied Sciences, Germany), Stefan Schiffner (BHH University of Applied Sciences, Germany)

WSDF

Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) Controller
Abdullah Alshaya, Adam Kardorff, Christian Facundus, Ibrahim Baggili and Golden Richard III (Louisiana State University, United States)

Digital Forensics Triage App for Android
Jannik Neth, Marko Schuba (FH Aachen University of Applied Sciencess, Germany), Karsten Brodkorb (State Office of Criminal Investigation North-Rhine Westphalia, Germany), Tim Hoener, Sacha Hack and Georg Neugebauer (FH Aachen University of Applied Sciencess, Germany)

Reconstructing Timelines: From NTFS Timestamps to File Histories
Jelle Bouma, Hugo Jonker (Open University of the Netherlands, Netherlands), Vincent van der Meer (Zuyd University of Applied Science, Open University of the Netherlands, Netherlands) and Eddy van den Aker (Zuyd University of Applied Science, Netherlands)

Enabling the forensic study of application-level encrypted data in Android via a Frida-based decryption framework
Cosimo Anglano, Massimo Canonico, Andrea Cepollina, Davide Freggiaro, Alderico Gallo and Marco Guazzone (University of Piemonte Orientale, Italy)

Accepted CD-MAKE Paper 2023

Probabilistic framework based on Deep Learning for differentiating ultrasound movie view planes
Andrei Gabriel Nascu, Smaranda Belciug (Faculty of Sciences, Dep. of Computer Science, University of Craiova, Romania), Dominic Gabriel Iliescu and Anca Ofiteru (University of Craiova, University of Medicine and Pharmacy Craiova, Romania)

Hyper-Stacked: Scalable and Distributed Approach to AutoML for Big Data
Ryan Dave (School of Computer Science, University of Nottingham, Nottingham, United Kingdom) , Juan S. Angarita-Zapata and Isaac Triguero

Let me think! Investigating the effect of explanations feeding doubts about the AI advice
Federico Cabitza, Andrea Campagner (Università degli Studi di Milano-Bicocca, Italy), Lorenzo Famiglini (Universita’ La Bicocca Milano, Italy), Chiara Natali (University of Milan-Bicocca, Italy), Valerio Caccavella and Enrico Gallazzi (UOC Patologia Vertebrale e Scoliosi, ASST G. Pini – CTO, Milan, Italy)

Enhancing Trust in Machine Learning Systems by Formal Methods
Paul Tavolato (University of Vienna, Austria) and Christina Tavolato-Wötzl (Austro Control Digital Services GmbH, Austria)

Sustainability Effects of Robust and Resilient Artificial Intelligence
Torsten Priebe, Peter Kieseberg, Alexander Adrowitzer, Oliver Eigner and Fabian Kovac (St.Pölten University of Applied Sciences, Austria)

Controllable AI – An alternative to trustworthiness in complex AI systems?
Peter Kieseberg (St. Pölten University of Applied Sciences, Austria), Andreas Holzinger (Holzinger Group, Austria) , Federico Cabitza, Andrea Campagner (University of Milano-Bicocca, Italy), Edgar Weippl (University of Vienna, Austria) and A Min Tjoa (SBA Research, Austria)

Memorization of Named Entities in Fine-tuned BERT Models
Andor Diera, Nicolas Lell (Ulm University, Germany), Aygul Garifullina (BT, United Kingdom) and Ansgar Scherp (Ulm University, Germany)

The Split Matters: Flat Minima Methods for Improving the Performance of GNNs
Nicolas Lell and Ansgar Scherp (University of Ulm, Germany)

Transformers are Short-text Classifiers
Fabian Karl and Ansgar Scherp (University of Ulm, Germany)

Standing Still is Not An Option: Alternative Baselines for Attainable Utility Preservation
Sebastian Eresheim (University of Vienna, University of Applied Sciences Saint Poelten, Austria), Fabian Kovac and Alexander Adrowitzer (University of Applied Sciences Saint Poelten, Austria)

Reinforcement Learning with Temporal-Logic-Based Causal Diagrams
Yash Paliwal (Arizona State University, Arizona, USA), Rajarshi Roy (Max Planck Institute for Software Systems, Germany), Jean-Raphael Gaglione (University of Texas at Austin, USA), Nasim Baharisangari (Arizona State University, USA), Daniel Neider (TU Dortmund University, Germany), Xiaoming Duan (Shanghai Jiao Tong University), Ufuk Topcu (University of Texas at Austin, USA) and Zhe Xu (Arizona State University, USA)

Event and Entity Extraction from Generated Video Captions
Johannes Scherer (University of Ulm, Germany), Deepayan Bhowmik (Newcastle University, United Kingdom) and Ansgar Scherp (University of Ulm, Germany)

Fine-Tuning Language Models for Scientific Writing Support
Justin Mücke, Daria Waldow, Luise Metzger, Philipp Schauz, Marcel Hoffmann, Nicolas Lell and Ansgar Scherp (University of Ulm, Germany)

Using Machine Learning to Generate an ESG Dictionary
Daniel O’Leary (University of Southern California, United States)

The Tower of Babel in explainable Artificial Intelligence (xAI)
David Schneeberger (Medical University of Graz, Austria), Richard Röttger (South Denmark University, Denmark), Federico Cabitza, Andrea Campagner (University of Milano-Bicocca, Italy), Markus Plass, Heimo Müller (Medical University of Graz, Austria) and Andreas Holzinger (Medical University of Graz; University of Natural Resources and Life Sciences, Austria)

Efficient approximation of Asymmetric Shapley Values using Functional Decomposition
Arne Gevaert, Anna Saranti, Andreas Holzinger and Yvan Saeys

Human-in-the-Loop Integration of Domain-Knowledge Graphs for Explainable and Federated Deep Learning
Andreas Holzinger, Bastian Pfeifer, Anna Saranti, Anne-Christin Hauschild, Jacqueline Beinecke, Dominik Heider, Richard Röttger, Heimo Müller and Jan Baumbach

Domain-Specific Evaluation of Visual Explanations for Application-Grounded Facial Expression Recognition
Bettina Finzel, Ines Rieger, Simon Kuhn and Ute Schmid