Tuesday, August 29, 2023 – Detailed
Time (UTC +2) |
SA 1
Ground Floor
|
SA 2
Ground Floor
|
SA 3
First Floor
|
SA 4
First Floor
|
SA 7
First Floor
|
SA 9
First Floor
|
|
---|---|---|---|---|---|---|---|
08:30 - 18:00 |
Organizers available
Registration starts at 08:30
Conference Office - Ground Floor
|
||||||
09:00 - 10:30 |
Cybersecurity Education, Training and Awareness
Session Chair:
Jan Hajny & Lisa Moravek, Brno University of Technology, Czechia Invited Talk - European Cybersecurity Skills Framework
IoT Security Seminar: Raising Awareness and Sharing Critical Knowledge Why Mary Can Hack: Effectively Introducing High School Girls to Cybersecurity DJM-CYBER: A Joint Master in Advanced Cybersecurity A Study of Different Awareness Campaigns in a Company
|
Session Chair:
Pavel Laskov, University of Liechtenstein, Liechtenstein Talk - Skill demand analysis for digital forensics and incident response Radek Hranicky, Brno University of Technology, Czech Republic. Talk - Project contributions: teaching and training material Pavel Laskov, University of Liechtenstein, Liechtenstein. Talk - Project contributions: technical and instructional infrastructure John Sheppard, South East Technological University, Ireland. |
Applied Cybersecurity in Intelligent Infrastructures.
Session Chair:
Raimundas Matulevičius, University of Tartu, Estonia |
Challenges and Opportunities for Security Testing and Monitoring in the Light of the Cyber-Resilience Act
Session Chair:
Wissam Mallouli, Montimage, France |
Session Chair:
Vasilis Gkioulos, Norwegian University of Science and Technology, Norway |
||
10:30 - 11:00 |
Coffee Break
|
||||||
11:00 - 12:30 |
Cybersecurity Skills Frameworks and Tools
Session Chair:
Jan Hajny & Lisa Moravek, Brno University of Technology, Czechia |
Use case investigation
Session Chair:
Pavel Laskov, University of Liechtenstein, Liechtenstein In this session, the participants will investigate an “incident” in a virtualized IT environment simulating a small enterprise. An incident scenario will be provided based on a typical pattern an external attack exploiting a database vulnerability. The participants will be guided step by step through the investigation process involving inspection of specific indicators of compromise relevant to this use case. |
Security, Privacy and Trust in Intelligent Infrastructures
Session Chair:
Jan Willemson, Cybernetica AS, Estonia and Lukas Malina, Brno University of Technology, Czechia |
Testing and Monitoring
Session Chair:
Erkuden Rios, TECNALIA Research Innovation, Basque Research and Technology Alliance (BRTA), Spain |
Project Presentations and Panel Discussion
Session Chair:
Vasilis Gkioulos, Norwegian University of Science and Technology, Norway RESili8: Resilience for Cyber-Physical Energy Systems Francesca Soro, Scientist, Austrian Institute of Technology
Incidence response and resilience actions in EPES/OT Swarna Kumarswamy-Das, Cybersecurity Scientist, TNO
Overview of H2020 ELECTRON Project Ilias Siniosoglou, University of Western Macedonia
Panel discussion Panel discussing the main challenges regarding current and future cybersecurity in the Electrical Power and Energy Systems (EPES) sector. Panelists David Allison, Junior Scientist and PhD Candidate at Austrian Institute of Technology. Yoram Meijaard, Cybersecurity Consultant, TNO Ilias Siniosoglou, University of Western Macedonia
|
||
12:30 - 13:30 |
Lunch Break
|
||||||
13:30 - 15:00 |
Cybersecurity Skills Frameworks and Tools
Session Chair:
Jan Hajny & Lisa Moravek, Brno University of Technology, Czechia The Curation Mechanism for the Czech National Qualifications Framework in Cybersecurity Enhancing Cybersecurity Education in Europe: The REWIRE's Course Selection Methodology
CHESS Project Presentation and Discussion Jan Hajny – CHESS, Brno University of Technology Raimundas Matulevicius – CHESS, University of Tartu Jan Willemson – CHESS, Cybernetica
|
Session Chair:
Prof. Wojciech Mazurczyk, Warsaw University of Technology, Poland Keynote - Trustworthy and Explainable AI (xAI) in Emerging Network Security Applications Prof. Michal Choraś, Bydgoszcz University of Science and Technology, Poland
|
Future Cybersecurity in Intelligent Infrastructures
Session Chair:
Lukas Malina, Brno University of Technology, Czechia Invited Talk - Privacy and verifiability trade-offs in voting systems Jan Willemson, Cybernetica, Estonia
CHESS topics panel discussion - Internet of Secure Things (IoST), Blockchain, Quantum-Resistant Cybersecurity Lisa Moravek, Brno University of Technology, Czechia |
Consortium Partners
Session Chair:
Gregor Langner, AIT Austrian Institute of Technology GmbH, Austria Panel Discussion - Coltrane Gregor Langner, Steven Furnell, Vittorio Scarano, Jerry Andrissen
|
CD-MAKE I
Actionable Explainable AI (AxAI)
Session Chair:
Bettina Finzel, University of Bamberg, Germany |
Session Chair:
Stefan Schauer, AIT Austrian Institute of Technology, Austria Talk - The PRAETORIAN Project: Current Challenges and Solutions F rederic Guyomard
Talk - Pandemic: Challenges and Opportunities for the Critical Infrastructures Gilda De Marco |
|
15:00 - 15:30 |
Coffee Break
|
||||||
15:30 - 17:00 |
Session Chair:
Prof. Krzysztof Cabaj, Warsaw University of Technology, Poland |
Session Chair:
Manuela Kos, AIT Austrian Institute of Technology GmbH, Austria C ACS: a cloud privacy-preserving attribute management system RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving Privacy Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes Key Management Systems for Large-Scale Quantum Key Distribution Networks Quantum-resistant End-to-End Secure Messaging and Email Communication |
EDU Partner
Session Chair:
Gregor Langner, AIT Austrian Institute of Technology GmbH, Austria
Talk – INDUCE
Discussion on methods for assessing cybersecurity awareness
|
CD-MAKE II
New Trends in Machine Learning
Session Chair:
Federico Cabitza, University of Milano-Bicocca, Italy |
Session Chair:
Stefan Schauer, AIT Austrian Institute of Technology, Austria Talk Pasquale D’Antonio
Identification and Evaluation of Cyber-Physical Threats on Interdependent Critical Infrastructures Detecting a Complex Attack Scenario in an Airport: The PRAETORIAN Framework
Talk - Physical Security Platform for the Greek Ports Yannis Papagiannopolous |
||
17:00 - 17:15 |
Coffee Break
|
||||||
17:15 - 18:30 |
University of Oxford, United Kingdom
Session Chair:
Andreas Holzinger, Human-Centered AI Lab (Holzinger Group), University of Natural Resources and Life Sciences, Austria
Auditorium - Ground Floor
CD-MAKE Keynote - Physics-inspired learning on graphs
|
||||||
19:00 - 22:00 |
Welcome Reception
Palazzo San Domenico
|
Wednesday, August 30, 2023 – Detailed
Time (UTC +2) |
SA 1
Ground Floor
|
SA 2
Ground Floor
|
SA 3
First Floor
|
SA 4
First Floor
|
SA 7
First Floor
|
SA 9
First Floor
|
|
---|---|---|---|---|---|---|---|
08:30 - 18:00 |
Organizers available
Conference Office - Ground Floor
|
||||||
09:00 - 09:15 |
Opening of the Conference
Auditorium - Ground Floor
|
||||||
09:15 - 10:30 |
VP of Research at Forescout Technologies
Session Chair:
Aaron Visaggio, University of Sannio, Italy
Auditorium - Ground Floor
ARES Keynote - Exploring the Cyber Threat Landscape: Analyzing the Past to Uncovering Future Trends
|
||||||
10:30 - 11:00 |
Coffee Break
|
||||||
11:00 - 12:30 |
Risks, Threats, Forensics and Honeynet in Industrial Control Systems (Part I)
Session Chair:
Sandeep Pirbhulal, Norwegian Computing Center, Norway Invited Talk - DocExploit´s Cybersecurity Suite or how to be aware of the security level of your code to build and maintain a more secure one?
PLC Logic-Based Cybersecurity Risks Identification for ICS A Framework for Purpose-based Design and Classification of ICS Honeypots |
Anonymity and Privacy in cyberspace
Session Chair:
Aggeliki Panou, University of Piraeus, Greece |
Privacy, Anonymity, Privacy-by-Design
Session Chair:
Marijke Coetzee, North-West University, South Africa & Günther Pernul, Universität Regensburg, Germany Cookiescanner: An Automated Tool for Detecting and Evaluating GDPR Consent Notices on Websites Effect of Group Based Synchronization on User Anonymity in Mix Networks TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework User Acceptance Criteria for Privacy Preserving Machine Learning Techniques Application of Secure Two-Party Computation in a Privacy-Preserving Android App |
Session Chair:
Kacper Gradoń, Warsaw University of Technology, Poland & University College London, United Kingdom Keynote - What's wrong with Wolfie? Generative Artificial Intelligence and its implications for (Cyber) Security Dr hab. Kacper Gradoń, Ph.D., D.Sc.
|
Session Chair:
Andrew Marrington, Zayed University, United Arab Emirates Keynote - Jumping Jams: Effective Jamming in Channel Hopping-Based IoT Networks Dr. Alessandro Brighente, Department of Mathematics, University of Padova, Padua, Italy
Security Analysis of the KNX Smart Building Protocol KNX Security
|
Session Chair:
Marco Antonio Sotelo Monge, INDRA SISTEMAS SA, Spain, and Salvador Llopis Sanchez, Universitat Politecnica de Valencia, Spain |
|
12:30 - 13:30 |
Lunch Break
|
||||||
13:30 - 15:00 |
Risks, Threats, Forensics and Honeynet in Industrial Control Systems (Part II)
Session Chair:
Sandeep Pirbhulal, Norwegian Computing Center, Norway |
Cybersecurity risk application
Session Chair:
Christos Xenakis, University of Piraeus, Greece |
Incident Detection, Society, Social Aspects
Session Chair:
Marijke Coetzee, North-West University, South Africa & Günther Pernul, Universität Regensburg, Germany |
Session Chair:
Kacper Gradoń, Warsaw University of Technology, Poland & University College London, United Kingdom |
Session Chair:
Andrew Marrington, Zayed University, United Arab Emirates |
Session Chair:
Mohamed-Lamine Messai, University of Lyon, France Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems IoT Network Attack Detection: Leveraging Graph Learning for Enhanced Security Investigating Impact of Fake-Type Content Poisoning Attack on NDN Graph-Based Android Malware Detection and Categorization through BERT Transformer |
|
15:00 - 15:30 |
Coffee Break
|
||||||
15:30 - 17:00 |
Cybersecurity, Digital Twin and Obfuscation
Session Chair:
Halvor Holtskog, Norwegian University of Science and Technology, Norway |
AI/ML-based real-time classification of Software Defined Networking traffic Exploring Federated Learning for Speech-based Parkinson's Disease Detection An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT |
Identities, Access Management
Session Chair:
Günther Pernul, Universität Regensburg, Germany New Identity-Based Identification and Signature Schemes in the Standard Model Implementing Data Sovereignty: Requirements & Challenges from Practice Mitigating Privilege Misuse in Access Control through Anomaly Detection Mitigating undesired interactions between liveness detection components in biometric authentication |
Session Chair:
Prof. Wojciech Mazurczyk, Warsaw University of Technology, Poland Keynote - Error Rates in Multimedia Forensics Prof. Martin Steinebach, Fraunhofer Institute, Germany
|
Session Chair:
Andrew Marrington, Zayed University, United Arab Emirates Keynote - Who You Gonna Call? Unmasking AI Investigations through AI Forensics Dr. Ibrahim (Abe) Baggili, Louisiana State University, Baton Rouge, LA, U.S.A.
|
CyberSecurity and AI
Session Chair:
Francesco Buccafurri, University of Reggio Calabria, Italy |
|
17:00 - 17:15 |
Coffee Break
|
||||||
17:15 - 18:45 |
Supporting and Related Project: Introduction
Session Chair:
Halvor Holtskog, Norwegian University of Science and Technology, Norway Center for Research-based Innovation, Norwegian Center for Cybersecurity in Critical Sectors (NORCICS) Sokratis Katsikas, NORCICS Director
International Alliance for Strengthening Cybersecurity and Privacy in Healthcare (CybAlliance) Sandeep Pirbhulal, Project Manager
Reinforcing Competence in Cybersecurity of Critical Infrastructures: A Norway – US Partnership (RECYCIN). Saba Chockalingam, Project Manager |
Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic Parameterizing poisoning attacks in federated learning-based intrusion detection
Keynote - The 3GPP Common API framework (CAPIF) – open-source implementation and innovation potential |
Session Chair:
Prof. Angelo Consoli, Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland |
Session Chair:
Andrew Marrington, Zayed University, United Arab Emirates |
Thursday, August 31, 2023 – Detailed
Time (UTC +2) |
SA 1
Ground Floor
|
SA 2
Ground Floor
|
SA 3
First Floor
|
||||
---|---|---|---|---|---|---|---|
08:30 - 18:00 |
Organizers available
Conference Office - Ground Floor
|
||||||
09:00 - 10:30 |
ARES I
Cryptography
Session Chair:
Elisa Costante, Forescout Technologies, Netherlands |
ARES II
Mobile and edge
Session Chair:
Corrado Aaron Visaggio, University of Sannio, Italy |
ARES III
Hardware security
Session Chair:
Riccardo Scandariato, TU Hamburg, Germany Automated Side-Channel Attacks using Black-Box Neural Architecture Search Long-Term Analysis of the Dependability of Cloud-based NISQ Quantum Computers SoK: A Systematic Review of TEE Usage for Developing Trusted Applications You Only Get One-Shot: Eavesdropping Input Images to Neural Network by Spying SoC-FPGA Internal Bus |
||||
10:30 - 11:00 |
Coffee Break
|
||||||
11:00 - 12:30 |
ARES IV
Privacy
Session Chair:
Pierangela Samarati, Università degli Studi di Milano, Italy |
ARES V
Authentication
Session Chair:
Maryline Laurent, Télécom SudParis, Institut Polytechnique de Paris, France Actions Speak Louder Than Passwords: Dynamic Identity for Machine-to-Machine Communication Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities Rogue key and impersonation attacks on FIDO2: From theory to practice
|
ARES VI
Secure Software And Malware Detection
Session Chair:
Marta Catillo, Università degli Studi del Sannio, Italy |
||||
12:30 - 13:30 |
Lunch Break
|
||||||
13:30 - 15:00 |
ARES VII - Best Paper
Best Paper
Session Chair:
Maryline Laurent, Télécom SudParis, Institut Polytechnique de Paris, France and Riccardo Scandariato, TU Hamburg, Germany
Auditorium - Ground Floor
A2P2 - An Android Application Patching Pipeline Based On Generic Changesets Florian Draschbacher (Graz University of Technology and Secure Information Technology Center Austria, Austria)
Enabling Efficient Threshold Signature Computation via Java Card API Antonín Dufka and Petr Švenda (Masaryk University, Czechia)
Nakula: Coercion Resistant Data Storage against Time-Limited Adversary Hayyu Imanda and Kasper Rasmussen (University of Oxford, United Kingdom)
STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports Francesco Marchiori, Mauro Conti (University of Padova, Italy) and Nino Vincenzo Verde (Leonardo S.p.A., Italy) |
||||||
15:00 - 15:30 |
Coffee Break
|
||||||
15:30 - 17:00 |
ARES VIII
Network Security and Privacy
Session Chair:
Edgar Weippl, University of Vienna, SBA Research, Austria |
ARES IX
Threat intelligence and incident response
Session Chair:
Umberto Villano, Università del Sannio, Italy |
ARES Women*
Session
We are thrilled to announce that the ARES 2023 Conference will host its first-ever Women* Session! This new event will bring together women* from the realms of technology, research, and cybersecurity to share their experiences, insights, and visions. The ARES Women* Session provides a space for exchanging ideas, building connections, and empowering the presence of women* in an industry continuously striving for diversity and inclusivity. Note: By 'Women*', we refer to all individuals who identify as women or define themselves as female. The session is open to all who identify and perceive themselves in this way.
|
||||
17:00 - 17:15 |
Coffee Break
|
||||||
17:15 - 18:30 |
Università degli Studi di Milano, Italy
Session Chair:
Aaron Visaggio, University of Sannio, Italy
Auditorium - Ground Floor
ARES Keynote - Data security and privacy in emerging scenarios The rapid advancements in Information and Communication Technologies (ICTs) have been greatly changing our society, with clear societal and economic benefits. Mobile technology, Cloud, Big Data, Internet of things, services and technologies that are becoming more and more pervasive and conveniently accessible, towards to the realization of a ‘smart’ society’. At the heart of this evolution is the ability to collect, analyze, process and share an ever-increasing amount of data, to extract knowledge for offering personalized and advanced services. A major concern, and potential obstacle, towards the full realization of such evolution is represented by security and privacy issues. As a matter of fact, the (actual or perceived) loss of control over data and potential compromise of their confidentiality can have a strong detrimental impact on the realization of an open framework for enabling collection, processing, and sharing of data, typically stored or processed by external cloud services. In this talk, I will illustrate some security and privacy issues arising in emerging scenarios, focusing in particular on the problem of managing data while guaranteeing confidentiality and integrity of data stored or processed by external providers. |
||||||
19:00 - 21:30 |
Conference Dinner
Masseria Roseto
Meeting point - 18.45 In front of the entrance of the auditorium. Bus transfer to Masseria Roseto 19.00. Bus transfer back to Benevento from 22.00 on. |
Friday, September 01, 2023 – Detailed
Time (UTC +2) |
SA 1
Ground Floor
|
SA 2
Ground Floor
|
SA 3
First Floor
|
||||
---|---|---|---|---|---|---|---|
08:30 - 16:30 |
Organizers available
Conference Office - Ground Floor
|
||||||
09:00 - 10:15 |
Co-Director LSTS, Vrije Universiteit Brussel (VUB), Belgium
Session Chair:
Human-Centered AI Lab (Holzinger Group), University of Natural Resources and Life Sciences, Austria CD-MAKE Keynote - Whiteboxing machine learning The deployment of AI systems based on machine learning (ML) in real world scenarios faces a number of challenges due to its black box nature. The GDPR right to an explanation has given rise to frantic attempts to develop and design self-explanatory systems, meant to help people understand their decisions and behaviour. In this keynote I will explain (pun intended) why meaningful explanations require keen attention to the proxies used in ML research design. Once those confronted with the decisions or behaviour of ML systems have a better understanding of the pragmatic choices that must be made to allow a machine to learn, it will become easier to foresee what ML systems can and cannot do. Whiteboxing ML should focus on the proxies that stand for real world events, actions and states of affairs, highlighting that a proxy (dataset, variable, model) is not what it stands for. |
||||||
10:15 - 10:45 |
Coffee Break
|
||||||
10:45 - 12:15 |
CD-MAKE III
Performance and Trust
Session Chair:
Mireille Hildebrandt, Co-Director LSTS, Vrije Universiteit Brussel (VUB), Belgium Standing Still is Not An Option: Alternative Baselines for Attainable Utility Preservation Enhancing Trust in Machine Learning Systems by Formal Methods Sustainability Effects of Robust and Resilient Artificial Intelligence The Split Matters: Flat Minima Methods for Improving the Performance of GNNs |
JITScanner: Just-in-Time Executable Page Check in the Linux Operating System Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids Program Characterization for Software Exploitation Detection Obfuscated Mobile Malware Detection by means of Dynamic Analysis and Explainable Deep Learning |
|||||
12:15 - 13:15 |
Lunch Break
|
||||||
13:15 - 14:45 |
CD-MAKE IV
Hot Topics and Applications
Session Chair:
Andrea Campagner, IRCCS Istituto Ortopedico Galeazzi, Italy Probabilistic framework based on Deep Learning for differentiating ultrasound movie view planes Let me think! Investigating the effect of explanations feeding doubts about the AI advice Memorization of Named Entities in Fine-tuned BERT Models Event and Entity Extraction from Generated Video Captions Fine-Tuning Language Models for Scientific Writing Support
|
(joint session with SSE and IWSECC)
Session Chair:
Simon Duque-Anton, Comlet Verteilte Systeme GmbH, Germany |
|||||
14:45 - 15:00 |
Coffee Break
|