Detailed Program

Tuesday, August 29, 2023 – Detailed

Conference Day 1
Time (UTC +2)
SA 1
Ground Floor
SA 2
Ground Floor
SA 3
First Floor
SA 4
First Floor
SA 7
First Floor
SA 9
First Floor
08:30 - 18:00
Organizers available
Registration starts at 08:30
Conference Office - Ground Floor
09:00 - 10:30
Cybersecurity Education, Training and Awareness
Session Chair:
Jan Hajny & Lisa Moravek, Brno University of Technology, Czechia
Session Chair:
Pavel Laskov, University of Liechtenstein, Liechtenstein

Talk - Skill demand analysis for digital forensics and incident response

Radek Hranicky, Brno University of Technology, Czech Republic.

Talk - Project contributions: teaching and training material

Pavel Laskov, University of Liechtenstein, Liechtenstein.

Talk - Project contributions: technical and instructional infrastructure

John Sheppard, South East Technological University, Ireland.

Applied Cybersecurity in Intelligent Infrastructures.
Session Chair:
Raimundas Matulevičius, University of Tartu, Estonia
Challenges and Opportunities for Security Testing and Monitoring in the Light of the Cyber-Resilience Act
Session Chair:
Wissam Mallouli, Montimage, France
Session Chair:
Vasilis Gkioulos, Norwegian University of Science and Technology, Norway
10:30 - 11:00
Coffee Break
11:00 - 12:30
Cybersecurity Skills Frameworks and Tools
Session Chair:
Jan Hajny & Lisa Moravek, Brno University of Technology, Czechia
Use case investigation
Session Chair:
Pavel Laskov, University of Liechtenstein, Liechtenstein

In this session, the participants will investigate an “incident” in a virtualized IT environment simulating a small enterprise. An incident scenario will be provided based on a typical pattern an external attack exploiting a database vulnerability. The participants will be guided step by step through the investigation process involving inspection of specific indicators of compromise relevant to this use case.

Security, Privacy and Trust in Intelligent Infrastructures
Session Chair:
Jan Willemson, Cybernetica AS, Estonia and Lukas Malina, Brno University of Technology, Czechia
Testing and Monitoring
Session Chair:
Erkuden Rios, TECNALIA Research Innovation, Basque Research and Technology Alliance (BRTA), Spain
Project Presentations and Panel Discussion
Session Chair:
Vasilis Gkioulos, Norwegian University of Science and Technology, Norway

RESili8: Resilience for Cyber-Physical Energy Systems

Francesca Soro, Scientist, Austrian Institute of Technology

Incidence response and resilience actions in EPES/OT

Swarna Kumarswamy-Das, Cybersecurity Scientist, TNO

Overview of H2020 ELECTRON Project

Ilias Siniosoglou, University of Western Macedonia

Panel discussion

Panel discussing the main challenges regarding current and future cybersecurity in the Electrical Power and Energy Systems (EPES) sector.

Panelists

David Allison, Junior Scientist and PhD Candidate at Austrian Institute of Technology.

Yoram Meijaard, Cybersecurity Consultant, TNO

Ilias Siniosoglou, University of Western Macedonia

12:30 - 13:30
Lunch Break
13:30 - 15:00
Cybersecurity Skills Frameworks and Tools
Session Chair:
Jan Hajny & Lisa Moravek, Brno University of Technology, Czechia
Session Chair:
Prof. Wojciech Mazurczyk, Warsaw University of Technology, Poland

Keynote - Trustworthy and Explainable AI (xAI) in Emerging Network Security Applications

Prof. Michal Choraś, Bydgoszcz University of Science and Technology, Poland

Future Cybersecurity in Intelligent Infrastructures
Session Chair:
Lukas Malina, Brno University of Technology, Czechia

Invited Talk - Privacy and verifiability trade-offs in voting systems

Jan Willemson, Cybernetica, Estonia

CHESS topics panel discussion - Internet of Secure Things (IoST), Blockchain, Quantum-Resistant Cybersecurity

Lisa Moravek, Brno University of Technology, Czechia

Consortium Partners
Session Chair:
Gregor Langner, AIT Austrian Institute of Technology GmbH, Austria

Panel Discussion - Coltrane

Gregor Langner, Steven Furnell, Vittorio Scarano, Jerry Andrissen

CD-MAKE I
Actionable Explainable AI (AxAI)
Session Chair:
Bettina Finzel, University of Bamberg, Germany
Session Chair:
Stefan Schauer, AIT Austrian Institute of Technology, Austria

Talk - The PRAETORIAN Project: Current Challenges and Solutions

F rederic Guyomard

PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats

A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical Infrastructures

Talk - Pandemic: Challenges and Opportunities for the Critical Infrastructures

Gilda De Marco

15:00 - 15:30
Coffee Break
15:30 - 17:00
Session Chair:
Prof. Krzysztof Cabaj, Warsaw University of Technology, Poland
Session Chair:
Manuela Kos, AIT Austrian Institute of Technology GmbH, Austria
EDU Partner
Session Chair:
Gregor Langner, AIT Austrian Institute of Technology GmbH, Austria

Talk – INDUCE
Petra Kölndorfer

Discussion on methods for assessing cybersecurity awareness
Daniel Köhler

CD-MAKE II
New Trends in Machine Learning
Session Chair:
Federico Cabitza, University of Milano-Bicocca, Italy
Session Chair:
Stefan Schauer, AIT Austrian Institute of Technology, Austria
17:00 - 17:15
Coffee Break
17:15 - 18:30
University of Oxford, United Kingdom
Session Chair:
Andreas Holzinger, Human-Centered AI Lab (Holzinger Group), University of Natural Resources and Life Sciences, Austria
Auditorium - Ground Floor

CD-MAKE Keynote - Physics-inspired learning on graphs
The message-passing paradigm has been the “battle horse” of deep learning on graphs for several years, making graph neural networks a big success in a wide range of applications, from particle physics to protein design. From a theoretical viewpoint, it established the link to the Weisfeiler-Lehman hierarchy, allowing to analyse the expressive power of GNNs. We argue that the very “node-and-edge”-centric mindset of current graph deep learning schemes may hinder future progress in the field. As an alternative, we propose physics-inspired “continuous” learning models that open up a new trove of tools from the fields of differential geometry, algebraic topology, and differential equations so far largely unexplored in graph ML.

more...

19:00 - 22:00
Welcome Reception
Palazzo San Domenico

Meeting point - 18.45

In front of the entrance of the auditorium

more...

Wednesday, August 30, 2023 – Detailed

Conference Day 2
Time (UTC +2)
SA 1
Ground Floor
SA 2
Ground Floor
SA 3
First Floor
SA 4
First Floor
SA 7
First Floor
SA 9
First Floor
08:30 - 18:00
Organizers available
Conference Office - Ground Floor
09:00 - 09:15
Opening of the Conference
Auditorium - Ground Floor
09:15 - 10:30
VP of Research at Forescout Technologies
Session Chair:
Aaron Visaggio, University of Sannio, Italy
Auditorium - Ground Floor

ARES Keynote - Exploring the Cyber Threat Landscape: Analyzing the Past to Uncovering Future Trends
The Threat Landscape is Constantly Evolving – And So Must Security Solutions. Cyber-criminal organizations, new ransomware tactics, and the proliferation of IoT/OT/IoMT devices have rapidly changed the modern threat landscape. To devise effective security solutions, security practitioners and researchers must pay close attention to the continuously evolving cyber threats. In this presentation, I’ll explore the last 10 years of cyber threats and provide predictions for future trends. I’ll also identify opened research questions the industry is looking for that could help further enhance security measures and protect our networks against new and potential threats.

more...

10:30 - 11:00
Coffee Break
11:00 - 12:30
Risks, Threats, Forensics and Honeynet in Industrial Control Systems (Part I)
Session Chair:
Sandeep Pirbhulal, Norwegian Computing Center, Norway

Invited Talk - DocExploit´s Cybersecurity Suite or how to be aware of the security level of your code to build and maintain a more secure one?

Sabine Delaitre

PLC Logic-Based Cybersecurity Risks Identification for ICS

A Framework for Purpose-based Design and Classification of ICS Honeypots

Anonymity and Privacy in cyberspace
Session Chair:
Aggeliki Panou, University of Piraeus, Greece
Privacy, Anonymity, Privacy-by-Design
Session Chair:
Marijke Coetzee, North-West University, South Africa & Günther Pernul, Universität Regensburg, Germany
Session Chair:
Kacper Gradoń, Warsaw University of Technology, Poland & University College London, United Kingdom

Keynote - What's wrong with Wolfie? Generative Artificial Intelligence and its implications for (Cyber) Security

Dr hab. Kacper Gradoń, Ph.D., D.Sc.

Tactics, Techniques and Procedures of Cybercrime: A Methodology and Tool for Cybercrime Investigation Process

Session Chair:
Andrew Marrington, Zayed University, United Arab Emirates
Session Chair:
Marco Antonio Sotelo Monge, INDRA SISTEMAS SA, Spain, and Salvador Llopis Sanchez, Universitat Politecnica de Valencia, Spain
12:30 - 13:30
Lunch Break
13:30 - 15:00
Risks, Threats, Forensics and Honeynet in Industrial Control Systems (Part II)
Session Chair:
Sandeep Pirbhulal, Norwegian Computing Center, Norway
Cybersecurity risk application
Session Chair:
Christos Xenakis, University of Piraeus, Greece
Incident Detection, Society, Social Aspects
Session Chair:
Marijke Coetzee, North-West University, South Africa & Günther Pernul, Universität Regensburg, Germany
Session Chair:
Kacper Gradoń, Warsaw University of Technology, Poland & University College London, United Kingdom
Session Chair:
Andrew Marrington, Zayed University, United Arab Emirates
Session Chair:
Mohamed-Lamine Messai, University of Lyon, France
15:00 - 15:30
Coffee Break
15:30 - 17:00
Cybersecurity, Digital Twin and Obfuscation
Session Chair:
Halvor Holtskog, Norwegian University of Science and Technology, Norway
Security applications
Session Chair:
Christos Xenakis, University of Piraeus, Greece
Identities, Access Management
Session Chair:
Günther Pernul, Universität Regensburg, Germany
Session Chair:
Prof. Wojciech Mazurczyk, Warsaw University of Technology, Poland
Session Chair:
Andrew Marrington, Zayed University, United Arab Emirates
CyberSecurity and AI
Session Chair:
Francesco Buccafurri, University of Reggio Calabria, Italy
17:00 - 17:15
Coffee Break
17:15 - 18:45
Supporting and Related Project: Introduction
Session Chair:
Halvor Holtskog, Norwegian University of Science and Technology, Norway

Center for Research-based Innovation, Norwegian Center for Cybersecurity in Critical Sectors (NORCICS)

Sokratis Katsikas, NORCICS Director

International Alliance for Strengthening Cybersecurity and Privacy in Healthcare (CybAlliance)

Sandeep Pirbhulal, Project Manager

Reinforcing Competence in Cybersecurity of Critical Infrastructures: A Norway – US Partnership (RECYCIN).

Saba Chockalingam, Project Manager

Secure Computing
Session Chair:
Aggeliki Panou, University of Piraeus, Greece
Session Chair:
Prof. Angelo Consoli, Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland
Session Chair:
Andrew Marrington, Zayed University, United Arab Emirates
Web and Blockchain
Session Chair:
Gianluca Lax, University of Reggio Calabria, Italy

Thursday, August 31, 2023 – Detailed

Conference Day 3
Time (UTC +2)
SA 1
Ground Floor
SA 2
Ground Floor
SA 3
First Floor
08:30 - 18:00
Organizers available
Conference Office - Ground Floor
09:00 - 10:30
ARES I
Cryptography
Session Chair:
Elisa Costante, Forescout Technologies, Netherlands
ARES II
Mobile and edge
Session Chair:
Corrado Aaron Visaggio, University of Sannio, Italy
ARES III
Hardware security
Session Chair:
Riccardo Scandariato, TU Hamburg, Germany
10:30 - 11:00
Coffee Break
11:00 - 12:30
ARES IV
Privacy
Session Chair:
Pierangela Samarati, Università degli Studi di Milano, Italy
ARES V
Authentication
Session Chair:
Maryline Laurent, Télécom SudParis, Institut Polytechnique de Paris, France
ARES VI
Secure Software And Malware Detection
Session Chair:
Marta Catillo, Università degli Studi del Sannio, Italy
12:30 - 13:30
Lunch Break
13:30 - 15:00
ARES VII - Best Paper
Best Paper
Session Chair:
Maryline Laurent, Télécom SudParis, Institut Polytechnique de Paris, France and Riccardo Scandariato, TU Hamburg, Germany
Auditorium - Ground Floor

A2P2 - An Android Application Patching Pipeline Based On Generic Changesets

Florian Draschbacher (Graz University of Technology and Secure Information Technology Center Austria, Austria)

Enabling Efficient Threshold Signature Computation via Java Card API

Antonín Dufka and Petr Švenda (Masaryk University, Czechia)

Nakula: Coercion Resistant Data Storage against Time-Limited Adversary

Hayyu Imanda and Kasper Rasmussen (University of Oxford, United Kingdom)

STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports

Francesco Marchiori, Mauro Conti (University of Padova, Italy) and Nino Vincenzo Verde (Leonardo S.p.A., Italy)

15:00 - 15:30
Coffee Break
15:30 - 17:00
ARES VIII
Network Security and Privacy
Session Chair:
Edgar Weippl, University of Vienna, SBA Research, Austria
ARES IX
Threat intelligence and incident response
Session Chair:
Umberto Villano, Università del Sannio, Italy
ARES Women*
Session

We are thrilled to announce that the ARES 2023 Conference will host its first-ever Women* Session! This new event will bring together women* from the realms of technology, research, and cybersecurity to share their experiences, insights, and visions.

The ARES Women* Session provides a space for exchanging ideas, building connections, and empowering the presence of women* in an industry continuously striving for diversity and inclusivity.

Note: By 'Women*', we refer to all individuals who identify as women or define themselves as female. The session is open to all who identify and perceive themselves in this way.

17:00 - 17:15
Coffee Break
17:15 - 18:30
Università degli Studi di Milano, Italy
Session Chair:
Aaron Visaggio, University of Sannio, Italy
Auditorium - Ground Floor

ARES Keynote - Data security and privacy in emerging scenarios

The rapid advancements in Information and Communication Technologies (ICTs) have been greatly changing our society, with clear societal and economic benefits. Mobile technology, Cloud, Big Data, Internet of things, services and technologies that are becoming more and more pervasive and conveniently accessible, towards to the realization of a ‘smart’ society’. At the heart of this evolution is the ability to collect, analyze, process and share an ever-increasing amount of data, to extract knowledge for offering personalized and advanced services.

A major concern, and potential obstacle, towards the full realization of such evolution is represented by security and privacy issues. As a matter of fact, the (actual or perceived) loss of control over data and potential compromise of their confidentiality can have a strong detrimental impact on the realization of an open framework for enabling collection, processing, and sharing of data, typically stored or processed by external cloud services. In this talk, I will illustrate some security and privacy issues arising in emerging scenarios, focusing in particular on the problem of managing data while guaranteeing confidentiality and integrity of data stored or processed by external providers.

more...

19:00 - 21:30
Conference Dinner
Masseria Roseto

Meeting point - 18.45

In front of the entrance of the auditorium. Bus transfer to Masseria Roseto 19.00. Bus transfer back to Benevento from 22.00 on.

more...

Friday, September 01, 2023 – Detailed

Conference Day 4
Time (UTC +2)
SA 1
Ground Floor
SA 2
Ground Floor
SA 3
First Floor
08:30 - 16:30
Organizers available
Conference Office - Ground Floor
09:00 - 10:15
Co-Director LSTS, Vrije Universiteit Brussel (VUB), Belgium
Session Chair:
Human-Centered AI Lab (Holzinger Group), University of Natural Resources and Life Sciences, Austria

CD-MAKE Keynote - Whiteboxing machine learning

The deployment of AI systems based on machine learning (ML) in real world scenarios faces a number of challenges due to its black box nature. The GDPR right to an explanation has given rise to frantic attempts to develop and design self-explanatory systems, meant to help people understand their decisions and behaviour. In this keynote I will explain (pun intended) why meaningful explanations require keen attention to the proxies used in ML research design. Once those confronted with the decisions or behaviour of ML systems have a better understanding of the pragmatic choices that must be made to allow a machine to learn, it will become easier to foresee what ML systems can and cannot do. Whiteboxing ML should focus on the proxies that stand for real world events, actions and states of affairs, highlighting that a proxy (dataset, variable, model) is not what it stands for.

more...

10:15 - 10:45
Coffee Break
10:45 - 12:15
CD-MAKE III
Performance and Trust
Session Chair:
Mireille Hildebrandt, Co-Director LSTS, Vrije Universiteit Brussel (VUB), Belgium
(joint session with SSE and IWSECC)
Session Chair:
Daniel Fraunholz, ZITiS, Germany
Vulnerability Detection
Session Chair:
Gianluca Lax, University of Reggio Calabria, Italy
12:15 - 13:15
Lunch Break
13:15 - 14:45
CD-MAKE IV
Hot Topics and Applications
Session Chair:
Andrea Campagner, IRCCS Istituto Ortopedico Galeazzi, Italy
(joint session with SSE and IWSECC)
Session Chair:
Simon Duque-Anton, Comlet Verteilte Systeme GmbH, Germany
14:45 - 15:00
Coffee Break