ARES 2022 |
ARES 2022 Keynote Speaker
The strange world of the password
Usable Privacy: Retrospective and Challenges ahead
Best Paper Session
VMIFresh: Efficient and Fresh Caches for Virtual Machine Introspection
Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence
Distance-based Techniques for Personal Microbiome Identification
SOAR4IoT: Securing IoT Assets with Digital Twins
|
ARES 2021 |
ARES 2021 Keynote Speaker
When humans and security or privacy technology interact
Secure and Privacy-Conscious Federated Analytics
Best Paper Session
Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Listen to Your Heart: Evaluation of the Cardiologic Ecosystem
Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet
|
ARES 2020 |
ARES 2020 Keynote Speaker
Children need Cyber Security Education too
Security, the Elusive Goal of Privacy, and the Surprising Difficulties around Corona Tracing
Best Paper Session
Jit Fault Detection: Increasing Availability in 1oo2 Systems Just-In-Time
How do App Vendors Respond to Subject Access Requests? A Longitudinal Privacy Study on iOS and Android Apps
Vector Packet Encapsulation: The Case for a Scalable IPsec Encryption Protocol
|
ARES 2019 |
ARES 2019 Keynote Speaker
Securing Our Future: The Importance of Academia in Closing the Cybersecurity Talent Gap
Why strong foundations matter: Lessons from developing CyBOK, the Cyber Security Body of Knowledge
Best Paper Session
Thieves in the Browser: Web-based Cryptojacking in the Wild
Behavior-Aware Network Segmentation using IP Flows
Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild
|
ARES 2018 |
ARES 2018 Keynote Speaker
A Next-generation Secure Internet for the 21st Century
Innovations in permutation-based crypto
Best Paper Session
Secure Equality Testing Protocols in the Two-Party Setting
Android authorship attribution through string analysis
Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services
|
ARES 2017 |
ARES 2017 Keynote SpeakerAndrea Servida , Head of Unit DG CONNECT – H4 “eGovernment and Trust”, European Commission, Belgium
Bring Mathematics into Biology: past, present and future impact on Health
Cloaking Functions: Differential Privacy with Gaussian Processes
Cyber security in manufacturing industrial control systems and preparing for the Factory of the Future
Best Paper Session
Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme
VMAttack: Deobfuscating Virtualization-Based Packed Binaries
A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets
|
ARES 2016 |
ARES 2016 Keynote Speaker
International Judicial Cooperation in the Fight against Cybercrime
Toward Causal Machine Learning
Data Analytic in Anonymized Networks: Is There Hope for Privacy?
Cyber-Legislation, Standardisation and Pan-European Cooperation as strategic drivers to strengthen Cybersecurity across Europe
Best Paper Session
A recommender-based system for assisting non-technical users in managing Android permissions
No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large (BEST PAPER ARES 2016)
Revisiting a Watermark-based Detection Scheme to Handle Cyber-Physical Attacks
|
ARES 2015 |
ARES 2015 Keynote Speaker
Let’s Encrypt: Deploying free, secure, and automated HTTPS certificates for the entire Web
In blocks we trust: the case of crypto-currencies
Data Security and Privacy in the Cloud
The European Strategic Agenda for Research and Innovation in Cybersecurity
Best Paper Session
A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting
Optimizing IT Service Costs With Respect to the Availability Service Level Objective
Structural Weaknesses in the Open Smart Grid Protocol (BEST PAPER ARES 2015)
|
ARES 2014 |
ARES 2014 Keynote Speaker
Mass surveillance and cryptology
Monitoring Threats and Vulnerabilities in Complex IT Landscapes
Change, Innovation, and Resilience in the DNS Ecosystem: a Verisign Labs Perspective
Best Paper Session
A New Access Control Scheme for Facebook-Style Social Networks (BEST PAPER ARES 2014)
No Smurfs: Revealing Fraud Chains in Mobile Money Transfers
BitTorrent Sync: Network Investigation Methodology
|
ARES 2013 |
ARES 2013 Keynote Speaker
Data Protection in Social Networks: Going Beyond Access Control
(>>Interview & Video<<)
Six Research Challenges for the Security and Privacy of Health Information Technology
(
>>Interview & Video<<
)
Opening & Best Paper Session ( >> Interviews & Video<< )
Laribus: Privacy-Preserving Detection of Fake SSL Certificates with a Social P2P Notary Network
Reliability Prediction for Component-Based Software Systems with Architectural-Level Fault Tolerance Mechanisms
A Statistical Approach for Fingerprinting Probing Activities
ARES 2013 PanelThreats & Risk Management – Bridging the Gap between Industry needs and Research
Moderator: Martin Gilje Jaatun, SINTEF ICT, Norway
ARES 2013 Tutorials
Bug Parades, Zombies, and the BSIMM: A Decade of Software Security (extended dance version)
Tutorial on DNS Security
Tutorial on Secure Enterprise – wide Identity Management and Role Modeling
Tutorial on Challenges in Data Protection – Privacy by Design
|
ARES 2012 |
ARES 2012 Keynote Speaker
Designing Software Systems that Comply with Privacy and Security Regulations
Declarative Security
ARES 2012 PanelRaising the Bar: Performing More Effective Cyber Security Studies
Moderator: Shari Lawrence Pfleeger
|
ARES 2011 |
ARES 2011 Keynote Speaker
Software Security and the BSIMM
(
>>Video low quality<<
) (
>>Video medium quality<<
)
Keeping the Human in the Loop
(
>>Video low quality<<
) (
>>Video medium quality<<
)
ARES 2011 Invited Talk
Some Thoughts on Cyber Security & Privacy
(
>>Video low quality<<
) (
>>Video medium quality<<
)
|
ARES 2010 |
ARES 2010 Keynote Speaker
Information security – where computer science, economics and psychology meet
(
Video Part 1
,
Video Part 2
,
Video Part 3
,
Video Part 4
,
Video Part 5
)
Thinking outside the box
(
Video Part 1
,
Video Part 2
,
Video Part 3
,
Video Part 4
)
CISIS 2010 Keynote Speaker
Using Next Generation Grid Technologies for Advancing Virtual Organizations
(
Video Part 1
,
Video Part 2
,
Video Part 3
)
Scheduling in Grid Systems
(
Video Part1
,
Video Part 2
,
Video Part 3
,
Video Part 4
)
|
ARES 2009 |
ARES 2009 Keynote Speaker
Digital Identity Protection – Concepts and Issues
Topoligical Analysis of Network Attack Vulnerability
Pairing based cryptography – theory, implementations and applications
ARES 2009 Invited Talk
Integrative security approach as a key success factor of dependability
|
ARES 2008 |
ARES 2008 Keynote Speaker
Security and Privacy Challenges in Location Based Service Environments
Infrastructure Support for Authorization, Access Control and Privilege Management
ASCAA Principles for Next-Generation Role-Based Access Control
|
ARES 2007 |
ARES 2007 Keynote Speaker
Security principles for the Austrian eGovernment
Data Mining, Security and Privacy: Developments and Directions
|
ARES 2006 |
ARES 2006 Keynote Speaker
Dr. Louis Marinos, ENISA Security Competence Department, Risk Management, Greece
|