Detailed Program pdf
Program Guide ARES 2019
Monday, 26.08.2019
Time |
Track 1
LH B (LT 1)
|
Track 2
LH C (LT2)
|
Track 3
LH D (SR 2)
|
Track 4
LH E (SR 1)
|
|
---|---|---|---|---|---|
12:00 - 17:45 |
Registration
|
||||
12:30 - 13:30 |
Lunch
|
||||
13:30 - 14:45 |
ARES Opening & Keynote
Session Chair:
Edgar Weippl, SBA Research, Austria
LH A (LT 3)
ARES Opening
Keynote
: Securing Our Future: The Importance of Academia in Closing the Cybersecurity Talent Gap
|
||||
14:45 - 15:15 |
Coffee Break
|
||||
15:15 - 16:45 |
ARES Full I
Dependability and resilience
Session Chair:
Edgar Weippl, SBA Research, Austria
Plug-and-Patch: Secure Value Added Services for Electric Vehicle Charging
Efficient attack countermeasure selection accounting for recovery and action costs
Using Context and Provenance to defend against USB-borne attacks
|
5G-NS
Session Chair:
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Keynote
: Cooperative Security for 5G and the Internet
Framework for Anticipatory Self-Protective 5G Environments
6G Network Needs to Support Embedded Trust
|
PCSCP I
Session Chair:
Stefan Schauer, AIT Austrian Institute of Technology, Austria
An Overview of the SAURON Project
A Novel Approach for Detecting Hybrid Threats in the Maritime Industry
Modelling Cascading Effects of a Cyber-Attack on a Container Port
How Ports can combat the Hybrid Cyber Physical Security Threat: Lessons from the SAURON project
|
NG - SOC I
Session Chair:
Ewa Piatkowska, AIT Austrian Institute of Technology, Austria
The SOCCRATES Project: Motivation and Aims
ACT: Cyber Threat Intelligence Platform
Threat modelling and attack simulations with MAL and securiCAD
Automated Response based on SecuriCAD recommendations
|
|
16:45 - 17:00 |
short Coffe Break
|
||||
17:00 - 18:30 |
ARES Short I
Identity, authorization and privacy
Session Chair:
Andreas Holzinger, Medical University Graz, Austria
On the Exploitation of Online SMS Receiving Services to Forge ID Verification
Does “www.” Mean Better Transport Layer Security?
An Attribute-Based Privacy-Preserving Ethereum Solution for Service Delivery with Accountability Requirements
Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example
|
5G-NS II
Session Chair:
Dr. Krzysztof Cabaj, Warsaw University of Technology, Poland
Securing Ethernet-based Optical Fronthaul for 5G Network
Towards a Security Architecture for Hybrid WMNs
Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches
|
PCSCP II
Session Chair:
Stefan Schauer, AIT Austrian Institute of Technology, Austria
Threat modeling and automated generation of security requirements for critical transportation infrastructure
The ISPS implementation and Crisis Management
CyberSec4Europe: Maritime Transport Scenarios
|
NG - SOC II
Session Chair:
Reinder Wolthuis (TNO), Netherlands
Anomaly Detection (DNS Ninja & ABC tool)
Adversarial Machine Learning
(Open Discussion) Future Challenges for SOCs
|
|
19:00 - 21:30 |
Welcome Reception / Dinner
Meeting point: 18:30 at the registration desk
The official ARES & CD-MAKE 2019 Reception takes place at Eliot Hall. Enjoy delicious finger food with a bottle of lager, mingle and network. Eliot College is the longest established college and is named after the famous poet. From the dining hall windows there is a magnificent view of the Cathedral, which is spectacular at night.
|
Tuesday, 27.08.2019
Time |
Track 1
LH B
|
Track 2
LH C
|
Track 3
LH D
|
Track 4
LH E
|
Track 5
LH F
|
Track 6
LH G
|
---|---|---|---|---|---|---|
08:00 - 16:30 |
Registration
|
|||||
08:30 - 09:15 |
CD-MAKE Opening Keynote
Session Chair:
Andreas Holzinger, Medical University Graz, Austria, Peter Kieseberg, FH St.Pölten, Austria, Edgar Weippl, SBA-Research, Austria, A Min Tjoa, TU Vienna, Austria
LH A
Keynote
: Toward to transparency of deep learning in medical imaging: Beyond quantitative to qualitative AI
|
|||||
09:15 - 10:45 |
ARES Full II
Best Paper Session
Session Chair:
Steven Furnell, University of Plymouth, UK
Thieves in the Browser: Web-based Cryptojacking in the Wild
Behavior-Aware Network Segmentation using IP Flows
Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild
|
CD-MAKE I
Explainable I
Session Chair:
Yoichi Hayashi, Dept. Computer Science, Meiji University
KANDINSKY Patterns as IQ-Test for machine learning
New Frontiers in Explainable AI: Understanding the GI to Interpret the GO
|
IoT-SECFOR I
Session Chair:
Prof. Gareth Howells, University of Kent, UK
Invited talk
:
Practical IoT Device Authentication with ICMetrics
A Secure Publish/Subscribe Protocol for Internet of Things
|
CUING I
Keynote Session
Session Chair:
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Introductory talk I
:
Criminal Use of Information Hiding Initiative – an update
Keynote
:
Steganography and steganalysis: Lessons learnt the hard way over 15 years of academic practice.
|
IWSMR
Session Chair:
Steffen Wendzel, Worms University of Applied Sciences, Germany Keynote : The need of standardisation and reference collections in digital forensics Christian Hummert (Central Office for Information Technology in the Security Sector (ZITiS) in Germany)
Analysis of User Evaluations in Security Research
The power of interpretation: Qualitative methods in cybersecurity research
Examining and Constructing Attacker Categorisations - an Experimental Typology for Digital Banking
|
|
10:45 - 11:10 |
Coffee Break
|
|||||
11:10 - 12:20 |
ARES Keynote
Session Chair:
Mark Scanlon, University College Dublin, Ireland
LH A
|
|||||
12:20 - 13:20 |
Lunch
|
|||||
13:20 - 14:50 |
ARES Full III
Software security
Session Chair:
Sheikh Mahbub Habib, Continental AG, Germany
A First ISA-Level Characterization of EM Pulse Effects on Superscalar Microarchitectures — A Secure Software Perspective
Obfuscation-Resilient Code Recognition in Android Apps
Costing Secure Software Development Study – A Systematic Mapping Study
|
CD-MAKE II
Explainable II
Session Chair:
Federico Cabitza, Università degli Studi di Milano-Bicocca, Italy
Automated Machine Learning (Auto-ML) As a Novel Approach to Investigate the Trade-off Between Accurate and Interpretable Classification Models
Estimating the Driver Status Using Long Short Term Memory
Using Relational Concept Networks for Explainable Decision Support
|
IoT-SECFOR II
Session Chair:
Virginia Franqueira, University of Derby, UK
Invited Talk
:
Trust and Security in Internet of Vehicles (IoV)
Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation
|
FARES I
Protection and Detection
Session Chair:
Lorenzo Musarella, Università Mediterranea di Reggio Calabria, Italy
A Pattern for a Virtual Network Function (VNF)
Near-optimal Evasion of Randomized Convex-inducing Classifiers in Adversarial Environments
AMON: an Automaton MONitor for Industrial Cyber-Physical Security
Decision Support for Mission-Centric Cyber Defence
|
CUING II
Session Chair:
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Protocol-independent Detection of `Messaging Ordering' Network Covert Channels
Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks
Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability
Towards Reversible Storage Network Covert Channels
|
LPW I
Session Chair:
Paolo Palmieri, University College Cork, Ireland
Keynote
:
Location privacy from a statistical perspective
eBook Readers, Location Surveillance and the Threat to Freedom of Association
|
14:50 - 15:20 |
Coffee Break
|
|||||
15:20 - 16:20 |
ARES Full IV
Cryptographic mechanisms and applications I
Session Chair:
Mark Scanlon, University College Dublin, Ireland
Practical Group-Signatures with Privacy-Friendly Openings
E2E Verifiable Borda Count Voting System without Tallying Authorities
|
CD-MAKE III
Learning I
Session Chair:
Alex Freitas, University of Kent, UK
Guided Machine Learning
Using Ontologies to Express Prior Knowledge for Genetic Programming
|
IoT-SECFOR III
Session Chair:
Virginia Franqueira, University of Derby, UK
IoT-HarPSecA: A Framework for Facilitating the Design and Development of Secure IoT Devices
Securing the Device Drivers of Your Embedded Systems: Framework and Prototype
Energy Attack in LoRaWAN: Experimental Validation
Wrap up
|
FARES II
Measurement and Robust Design
Session Chair:
Eduardo Fernandez, Florida Atlantic University, USA
Managing the over-estimation of resilience
GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform
Cyber Security Skill Set Analysis for Common Curricula Development
|
CUING III
Session Chair:
Angelo Consoli, Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland
Detection and Analysis of Tor Onion Services
Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research
|
LPW II
Session Chair:
Luca Calderoni, University of Bologna, Italy
Securing V2X Communications for the Future - Can PKI Systems offer the answer?
Location Tracking Using Smartphone Accelerometer and Magnetometer Traces
|
16:20 - 16:35 |
short Coffe Break
|
|||||
16:35 - 17:35 |
ARES Full V
Cryptographic mechanisms and applications II
Session Chair:
Edgar Weippl, SBA Research, Austria
SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer
Anonymous Identity Based Encryption with Traceable Identities
|
CD-MAKE IV
Learning II
Session Chair:
Fang Chen, University of Technology, Sydney, Australia
Real Time Hand Movement Trajectory Tracking for Enhancing Dementia Screening in Ageing Deaf Signers of British Sign Language
Commonsense Reasoning using Theorem Proving and Machine Learning
|
IWSMA
Session Chair:
Peter Kieseberg, FH St.Pölten, Austria
Analyzing Android’s File-Based Encryption: Information Leakage through Unencrypted Metadata
Post-Quantum Cryptography in Embedded Systems
The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms based on a Brazilian case study
|
CUING IV
Session Chair:
Wojciech Mazurczyk, Warsaw University of Technology, Poland
SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation
Privacy and Robust Hashes
|
LPW III
Session Chair:
Paolo Palmieri, University College Cork, Ireland
A Location Privacy Analysis of Bluetooth Mesh
DEMISe: Interpretable Deep Extraction and Mutual Information Selection Techniques for IoT Intrusion Detection
|
|
17:35 - 20:00 |
City Walk
Meeting point: 18:00 Tower House Westgate Garden
A dedicated team of guides from Canterbury Guided Tours provide information of the highest quality as they take you on a journey into the past through narrow, cobbled streets and by crooked 17th-century houses. From medieval lanes and pilgrim inns to the majestic Cathedral's Precincts and the famous 'crooked house', this walking tour is an excellent way to see the sights and learn some history too! |
Wednesday, 28.08.2019
Time |
Track 1
LH B (LT 1)
|
Track 2
LH C (LT2)
|
Track 3
LH D (SR 2)
|
Track 4
LH E (SR 1)
|
Track 5
LH F (SR 6)
|
Track 6
LH G (SR 3)
|
Track 7
LH H (SR 4)
|
Track 8
LH I (SR 5)
|
---|---|---|---|---|---|---|---|---|
08:00 - 16:00 |
Registration
|
|||||||
08:30 - 09:00 |
CD-MAKE Tutorial
Session Chair:
Andreas Holzinger, Medical University Graz, Austria
LH A (LT 3)
Special Tutorial : What is missing in the evaluation of binary classifiers and diagnostic tests? Improved AUC measures & ROC explanations
presented by André Carrington,Ottawa Hospital Research Institute, Canada |
|||||||
09:00 - 10:00 |
CD-MAKE Keynote
Session Chair:
Andreas Holzinger, Medical University Graz, Austria
LH A (LT 3)
Keynote
: Explainable Artificial Intelligence – Methods, Applications & Recent Developments
|
|||||||
10:00 - 10:30 |
Coffee Break
|
|||||||
10:30 - 12:00 |
ARES Full VI
Network Security I
Session Chair:
Shujun Li, University of Kent, UK
Towards Efficient Reconstruction of Attacker Lateral Movement
Strong Tenant Separation in Cloud Computing Platforms
Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages
|
CD-MAKE V
Data & Knowledge I
Session Chair:
Jan Paralic, Technical University Kosice, Slovakia
Physiological Indicators for User Trust in Machine Learning with Influence Enhanced Fact-Checking
Detection of Diabetic Retinopathy and Maculopathy in Eye Fundus Images Using Deep Learning and Image Augmentation
Semi-automated Quality Assurance for Domain-expert-driven Data Exploration – An Application to Principal Component Analysis
|
SSE I
Secure Software Development
Session Chair:
Juha Röning
Invited Talk:
Securing Software Supply Chains: A Case for New Research in Software Security?
Learning Software Security in Context: An Evaluation in Open Source Software Development Environment
The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects
|
IWSECC I
Session Chair:
Eduardo B. Fernandez, Florida Atlantic University, USA Welcome talk IWSSEC 2019
Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey
A Misuse Pattern for Compromising VMs via Virtual Machine Escape in NFV
Short Discussion |
WSDF I
Session Chair:
Virginia Franqueira, University of Derby, UK
Welcome
Keynote
: Immersive Virtual Insanity: Exploring Immersive Virtual Reality Security & Forensics
Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts
|
CyberTIM I & WCTI
Keynote Session
Session Chair:
Dr. Emmanouil Vasilomanolakis, Aalborg University, Denmark Keynote : CTI in Cyber Defence: Challenges and opportunities Dr. Panayotis Kikiras (European Defense Agency)
Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures
|
IWCC I
Session Chair:
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Keynote:
Internet-wide Measurements to Prevent and Combat Cybercrime: The Case of DNS Zone Poisoning
An Analysis Framework for Product Prices and Supplies in Darknet Marketplace
Limits in the data for detecting crimincals on social media
|
IFIP Meeting
|
12:00 - 13:00 |
Lunch
|
|||||||
13:00 - 14:30 |
ARES Full VII
Web security and attacks
Session Chair:
Francesco Buccafurri, University of Reggio Calabria, Italy
PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering
Towards a framework for detecting advanced Web bots
Characterizing the Redundancy of DarkWeb .onion Services
|
CD-MAKE VI
Data & Knowledge II
Session Chair:
Ljiljana Trtica-Majnaric, Josip Juraj Strossmayer University of Osijek, Croatia
Ranked MSD: A New Feature Ranking and Feature Selection Approach for Biomarker Identification
How to improve the adaptation phase of the CBR in the medical domain
Machine Learning for the Family Doctor: A Case of Cluster Analysis for studying and prediction of Aging Comorbidities and Frailty
Machine Learning Explainability Through Comprehensible Decision Trees
|
SSE II
Managing security on applications
Session Chair:
Lotfi ben Othmane, Iowa State University, USA
Managing Security in Software Or: How I Learned to Stop Worrying and Manage the Security Technical Debt
Applying Security Testing Techniques to Automotive Engineering
Model Driven Security in a Mobile Banking Application Context
|
IWSECC II
Session Chair:
Eduardo B. Fernandez, Florida Atlantic University, USA
Preserving context security in AWS IoT Core
DTE Access Control Model for Integrated ICS Systems
Discussion |
WSDF II
Session Chair:
Richard Overill, King’s College London, UK
Assessing the Applicability of Authorship Verification Methods
Improved Manipulation Detection with Convolutional Neural Network for JPEG Images
Map My Murder! A Digital Forensic Study of Mobile Health and Fitness Applications
Deep Learning-based Facial Detection and Recognition in Still Images for Digital Forensics
|
CyberTIM II
Threat prediction, detection and mitigation
Session Chair:
Dr. Sheikh Mahbub Habib, Continental AG, Frankfurt, Germany
AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts,
Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts,
A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources,
|
IWCC II
Session Chair:
Dr. Krzysztof Cabaj, Warsaw University of Technology, Poland
Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning
Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs
Realistically Fingerprinting Social Media Webpages in HTTPS Traffic
|
WISI I
Session Chair:
Stefan Jaksic, AIT Austrian Institute of Technology, Austria
Keynote
:
Security lifecycles for smart mobility and smart production
Using Temporal and Topological Features for Intrusion Detection in Operational Networks
Performance Evaluation of Elliptic-Curve Libraries on Automotive-Grade Microcontrollers
|
14:30 - 15:00 |
Coffee Break
|
|||||||
15:00 - 16:30 |
ARES Full VIII
Network Security II
Session Chair:
Mathias Fischer, University of Hamburg, Germany
Detecting DGA domains with recurrent neural networks and side information
Black Box Attacks on Deep Anomaly Detectors
|
CD-MAKE VII
Security & Privacy
Session Chair:
Edgar Weippl, SBA-Research, Austria
Knowledge Extraction for Cryptographic Algorithm Validation Test Vectors by Means of Combinatorial Coverage Measurement
An Evaluation of Fingerprinting Schemes and their Utility Effects on Machine Learning
Differentially Private Obfuscation of Facial Images
|
WSDF III
Session Chair:
Virginia Franqueira, University of Derby, UK
IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systems
A Study of Network Forensic Investigation in Docker Environments
Revisiting Data Hiding Techniques for Apple File System
IoT Ignorance is Digital Forensics Research Bliss: A Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions
Wrap-up
|
CyberTIM III
Threat Intelligence Sharing
Session Chair:
Jörg Daubert, Philipps University of Marburg, Germany
NERD: Network Entity Reputation Database,
Cyber Threat Information Sharing: Perceived Benefits and Barriers,
Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems,
Closing of CyberTIM |
IWCC III
Session Chair:
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Ontology of Metrics for Cyber Security Assessment
Fake News Detection by Image Montage Recognition
HEHLKAPPE: Utilizing Deep Learning to Manipulate Surveillance Camera Footage in Real-Tim
|
WISI II
Session Chair:
Stefan Jaksic, AIT Austrian Institute of Technology, Austria
Applicability of the IEC 62443 standard in Industry 4.0 / IIoT
Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing
Federated Identity Management and Interoperability for Heterogeneous Cloud Platform Ecosystems
|
||
17:00 - 23:30 |
Conference Dinner Dover
Visit Dover White Cliffs & Conference Dinner at Dover Town Hall
Meeting point: 16:30 at the registration desk
After visiting the famous Dover White Cliffs with a gaze at Dover Castle, we will gather in the stone hall for an aperitif. The hall is complete with flags and banners of the Cinque Ports, arms and armour and portraits of former dignitaries of Dover. The official Conference Dinner will be held in the Connaught Hall, which was originally opened in 1880´s as a concert and meeting hall very much Victorian with pillars and balconies and a magnificent dance floor. |
Thursday, 29.08.2019
Time |
Track 1
LH B (LT 1)
|
Track 2
LH C (LT2)
|
Track 3
LH D (SR 2)
|
Track 4
LH E (SR 1)
|
|
---|---|---|---|---|---|
09:00 - 15:00 |
Registration
|
||||
09:30 - 11:00 |
ARES Short II
Threat detection and response
Session Chair:
Abdelmalek Benzekri, University of Toulouse, France
STAMAD – a STAtic MAlware Detector
Enhancing credibility of digital evidence through provenance-based incident response handling
Language-based Integration of Digital Forensics & Incident Response
|
CD-MAKE VIII
Learning III
Session Chair:
Epaminondas Kapetanios, Cognitive Computing, University of Westminster, London, UK
Insights into Learning Competence through Probabilistic Graphical Models
Sparse Nerves in Practice
Backdoor Attacks in Neural Networks –\ a Systematic Evaluation on Multiple Traffic Sign Datasets
|
BASS I
Privacy, Authentication, and Access Control
Session Chair:
Peter Kieseberg, FH St.Pölten, Austria
Privacy-Enhancing Context Authentication from Location-Sensitive Data
Semantic Mediation for A Posteriori Log Analysis
Alexa’s Voice Recording Behavior: A Survey of User Understanding and Awareness
|
||
11:00 - 11:30 |
Coffee Break
|
||||
11:30 - 12:30 |
CD-MAKE Keynote
Session Chair:
Peter Kieseberg, FH St.Pölten, Austria
LH A (LT 3)
Keynote
:
Crossing the chasm: from Academia to Industry
|
||||
12:30 - 13:30 |
Lunch
|
MAKE Journal
Editorial Meeting
LH C (LT2)
|
|||
13:30 - 15:00 |
ARES Short III
Security Solutions
Session Chair:
Budi Arief, University of Kent, UK
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions
On the Utility of Synthetic Data: An Empirical Evaluation on Machine Learning
|
CD-MAKE IX
Learning IX
Session Chair:
Vasile Palade, Coventry University, UK
Deep Learning for Proteomics Data for Feature Selection and Classification
Package and Classify Wireless Product Features to Their Sales Items and Categories Automatically
Temporal diagnosis of discrete-event systems with dual knowledge compilation
|
iPAT Panel Session
Privacy and Trust with Publicly Available Data
Session Chair:
Jörg Daubert,Philipps University of Marburg, Germany
Privacy & Trust-related websites and data sources
Trust: CAIQ-related Websites
The politicization of personal data
|
BASS II
Communication networks
Session Chair:
Andrea Saracino, IIT-CNR, Italy
Inivited Talk
: Authentication of the future - a challenge to privacy?
Adversarial Communication Networks Modeling for Intrusion Detection Strengthened against Mimicry
|
|
15:00 - 15:15 |
short Coffe Break
|