Accepted Papers

ARES 2019 Full Research Papers:

A First ISA-Level Characterization of EM Pulse Effects on Superscalar Microarchitectures — A Secure Software Perspective
Julien Proy (INVIA, France), Karine Heydemann (LIP6 – Sorbonne Université, France), Fabien Majéric (Gemalto/Université Jean-Monnet, France), Alexandre Berzati (INVIA, France) and Albert Cohen (Google, France)

Towards Efficient Reconstruction of Attacker Lateral Movement
Florian Wilkens (University of Hamburg, Germany), Steffen Haas (University of Hamburg, Germany), Dominik Kaaser (University of Hamburg, Germany), Peter Kling (University of Hamburg, Germany) and Mathias Fischer (University of Hamburg, Germany)

Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages
Mauro Conti (University of Padua, Italy), Ankit Gangwal (University of Padova, Italy) and Michele Todero (University of Padova, Italy)

Practical Group-Signatures with Privacy-Friendly Openings
Stephan Krenn (AIT Austrian Institute of Technology GmbH, Austria), Kai Samelin (TÜV Rheinland i-sec GmbH, Germany) and Christoph Striecks (AIT Austria, Austria)

PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering
Junaid Iqbal (University of New Brunswick, Canada), Ratinder Kaur (University of Saskatchewan, Canada) and Natalia Stakhanova (University of Saskatchewan, Canada)

Detecting DGA domains with recurrent neural networks and side information
Ryan Curtin (Symantec Corporation, United States), Andrew Gardner (Symantec Corporation, United States), Slawomir Grzonkowski (Symantec Corporation, Ireland), Alexey Kleymenov (Symantec Corporation, Ireland) and Alejandro Mosquera Lopez (Symantec Corporation, United States)

E2E Verifiable Borda Count Voting System without Tallying Authorities
Samiran Bag (The University of Warwick, United Kingdom), Muhammad Ajmal Azad (University of Derby, United Kingdom) and Feng Hao ((The University of Warwick, United Kingdom)

Obfuscation-Resilient Code Recognition in Android Apps
Johannes Feichtner (Graz University of Technology, Austria) and Christof Rabensteiner (Graz University of Technology, Austria)

Thieves in the Browser: Web-based Cryptojacking in the Wild
Marius Musch (TU Braunschweig, Germany), Christian Wressnegger (TU Braunschweig, Germany), Martin Johns (TU Braunschweig, Germany) and Konrad Rieck (TU Braunschweig, Germany)

Strong Tenant Separation in Cloud Computing Platforms
Michael Pfeiffer (Technische Universität Ilmenau, Germany), Michael Rossberg (Technische Universität Ilmenau, Germany), Simon Buttgereit (Technische Universität Ilmenau, Germany) and Guenter Schaefer (Technische Universität Ilmenau, Germany)

Costing Secure Software Development Study – A Systematic Mapping Study
Elaine Venson (University of Southern California, United States), Xiaomeng Guo (University of Southern California, United States), Zidi Yan (University of Southern California, United States) and Barry Boehm (University of Southern California, United States)

SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer
Ferhat Karakoç (Kuveyt Türk Participation Bank Research and Development Center, Turkey), Majid Nateghizad (Cyber Security Group, Department of Intelligent Systems, Delft University of Technology, Netherlands) and Zekeriya Erkin (Cyber Security Group, Department of Intelligent Systems, Delft University of Technology, Netherlands)

Behavior-Aware Network Segmentation using IP Flows
Juraj Smeriga (Institute of Computer Science, Masaryk University, Czechia) and Tomas Jirsik (Institute of Computer Science, Masaryk University, Czechia)

Black Box Attacks on Deep Anomaly Detectors
Aditya Kuppa (Symantec Corporation and School of Computer Science University College, Dublin, Ireland), Slawomir Grzonkowski (Symantec Corporation, Ireland), Muhammad Rizwan Asghar (School of Computer Science The University of Auckland, New Zealand) and Nhien An Le Khac (School of Computer Science University College, Dublin, Ireland)

Towards a framework for detecting advanced Web bots
Christos Iliou (Information Technologies Institute, CERTH, Greece), Theodoros Kostoulas (Department of Computing and Informatics, Bournemouth University, United Kingdom), Theodora Tsikrika (Information Technologies Institute, CERTH, Greece), Vasilis Katos (Department of Computing and Informatics, Bournemouth University, United Kingdom), Stefanos Vrochidis (Information Technologies Institute, CERTH, Greece) and Yiannis Kompatsiaris (Information Technologies Institute, CERTH, Greece)

Using Context and Provenance to defend against USB-borne attacks
Tobias Mueller (University of Hamburg, Germany), Ephraim Zimmer (University of Hamburg, Germany) and Ludovico De Nittis (GNOME, Italy)

Plug-and-Patch: Secure Value Added Services for Electric Vehicle Charging
Lucas Buschlinger (Fraunhofer, Germany), Markus Springer (Fraunhofer, Germany) and Maria Zhdanova (Fraunhofer, Germany)

Efficient attack countermeasure selection accounting for recovery and action costs
Jukka Soikkeli (Imperial College London, United Kingdom), Luis Muñoz-González (Imperial College London, United Kingdom) and Emil Lupu (Imperial College London, United Kingdom)

Anonymous Identity Based Encryption with Traceable Identities
Olivier Blazy (Université de Limoges, France), Laura Brouilhet (Université de Limoges, France) and Duong-Hieu Phan (Université de Limoges, France)

Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild
Morteza Safaei Pour (Cyber Threat Intelligence Lab, Florida Atlantic University, United States), Antonio Mangino (Cyber Threat Intelligence Lab, Florida Atlantic University, United States), Kurt Friday (Cyber Threat Intelligence Lab, Florida Atlantic University, United States), Matthias Rathbun (Cyber Threat Intelligence Lab, Florida Atlantic University, United States), Elias Bou-Harb (Cyber Threat Intelligence Lab, Florida Atlantic University, United States), Farkhund Iqbal (Zayed University, United Arab Emirates), Khaled Shaban (Qatar University, Qatar) and Abdelkarim Erradi (Qatar University, Qatar)

Characterizing the Redundancy of DarkWeb .onion Services
Pavlo Burda (Eindhoven University of Technology, Netherlands), Coen Boot (Radboud University, Netherlands)and Luca Allodi (Eindhoven University of Technology, Netherlands)

ARES 2019 Short Research papers:

STAMAD – a STAtic MAlware Detector
Khanh Huu The Dam (Nha Trang University, Viet Nam) and Tayssir Touili (LIPN, CNRS & University Paris 13, France)

Enhancing credibility of digital evidence through provenance-based incident response handling
Ludwig Englbrecht (University of Regensburg, Germany), Gregor Langner (University of Vienna, Austria), Günther Pernul (University of Regensburg, Germany) and Gerald Quirchmayr (University of Vienna, Austria)

On the Exploitation of Online SMS Receiving Services to Forge ID Verification
Muhammad Hajian Berenjestanaki (University of Tehran, Iran), Mauro Conti (University of Padua, Italy) and Ankit Gangwal (University of Padova, Italy)

Does “www.” Mean Better Transport Layer Security?
Eman Alashwali (University of Oxford, United Kingdom), Pawel Szalachowski (Singapore University of Technology and Design (SUTD), Singapore) and Andrew Martin (University of Oxford, United Kingdom)

Language-based Integration of Digital Forensics & Incident Response
Christopher Stelly (University of New Orleans, United States) and Vassil Roussev (University of New Orleans, United States)

An Attribute-Based Privacy-Preserving Ethereum Solution for Service Delivery with Accountability Requirements
Francesco Buccafurri (DIIES – Universita’ Mediterranea di Reggio Calabria, Italy), Vincenzo De Angelis (DIIES – Universita’ Mediterranea di Reggio Calabria, Italy), Gianluca Lax (DIIES – Universita’ Mediterranea di Reggio Calabria, Italy), Lorenzo Musarella (DIIES – Universita’ Mediterranea di Reggio Calabria, Italy) and Antonia Russo (DIIES – Universita’ Mediterranea di Reggio Calabria, Italy)

Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions
Olivier Blazy (Université de Limoges, France), Céline Chevalier (ENS, France) and Quoc Huy Vu (DIENS, École normale supérieure, CNRS, INRIA, PSL University, Paris, France)

On the Utility of Synthetic Data: An Empirical Evaluation on Machine Learning
Markus Hittmeir (SBA Research, Austria), Andreas Ekelhart (SBA Research, Austria) and Rudolf Mayer (SBA Research, Austria)

Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example
Mohamad Imad Mahaini (The University of Kent, United Kingdom), Shujun Li (The University of Kent, United Kingdom) and Rahime Belen Sağlam (Ankara Yıldırım Beyazıt University, Turkey)