Download the conference’s program overview in PDF format (in progress)
Download the full conference’s program (incl. workshops) (in progess)
Download the conference’s program overview in PDF format (in progress)
Download the full conference’s program (incl. workshops) (in progess)
Monday 31th of July |
Tuesday 1st of August |
Wednesday 2nd of August |
|||||||
Timeslot (CET) |
Auditorium |
Room 7 |
Room 8 |
Auditorium |
Room 7 |
Room 8 |
Auditorium |
Room 7 |
Room 8 |
08:40–09:00 |
Welcome |
||||||||
09:00–9:20 |
Track 3-S13 |
HACS-S16 |
CRE-S19 |
Track 3-S22 |
Track 1 – S25 |
2P-DPA-S28 |
|||
9:20–10:40 |
Track 1-S1 |
Track 1-S5 |
EPES-SPR-S9 |
||||||
10:40–11:00 |
Coffee break |
Coffee break |
Coffee break |
||||||
11:00–12:00 |
Track 1-S2 |
Track 1-S6 |
DS4CS-S10 |
Track 1-S14 |
HACS-S17 |
CRE-S20 |
Track 1-S23 |
Track 2-S26 |
2P-DPA-S29 |
12.00–13:00 |
Keynote 1 |
Keynote 2 |
Keynote 4 |
||||||
13:00–14:00 |
Light Lunch |
Light Lunch |
Light Lunch |
||||||
14:00–15:00 |
Track 3-S3 |
Track 2-S7 |
Track 1-S11 |
Keynote 3 |
Track 1-S24 |
Track 1-3 S27 |
DR-DCHE -S30 |
||
15:00–15:40 |
Industrial Panel |
||||||||
15:40–16:00 |
Coffee Break |
Coffee Break |
Coffee Break |
||||||
16:00–17:00 |
Track 1-S4 |
Track 3-S8 |
DS4CS-S12 |
Track 1-2 -S15 |
2D-DPA-S18 |
CRE-S21 |
Conclusions |
||
17:00–18:00 |
|||||||||
19:30–24:00 |
IEEE |
Monday 31st of July
Room: Auditorium
08:40–09:20 |
Welcome from the chairs WL Institutional welcome Chairs: E. Bellini, University of Roma Tre (IT), N. Kolokotronis, University of the Peloponnese (GR), S. Shiaeles, University of Portsmouth (UK) Room: Auditorium |
|
9:20–10:40 CET |
Technical session Track 1 – S1 Chair: Nicholas Kolokotronis Room: Auditorium |
|
09:20–09:40 |
Comparative Analysis of Pattern Mining Algorithms for Event Logs O. Gasimov, R. Vaarandi, M. Pihelgas |
|
09:40–10:00 |
To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection Y. Sharma, E. Giunchiglia, S. Birnbach, I. Martinovic |
|
10:00–10:20 |
stealthML: Data-driven Malware for Stealthy Data Exfiltration K. Chung, P. Cao, Z. Kalbarczyk, R. Iyer |
|
10:20–10:40 |
Explaining Binary Obfuscation C. Greco, M. Ianni, A. Guzzo, G.Fortino |
|
10:40–11:00 |
Coffee break |
|
11.00–12:00 CET |
Technical session Track 1 – S2 Chair: Simone Bussa Room: Auditorium |
|
11.00–11:20 |
New Version, New Answer: Investigating Cybersecurity Static-Analysis Tool Findings A.M. Reinhold, T. Weber, C. Lemak, D. Reimanis, C. Izurieta |
|
11.20–11:40 |
Qerberos: A Protocol for Secure Distribution of QRNG Keys D. Soler, C. Dafonte, M. Fernandez-Veiga, A. Fernandez, F. Novoa, R. Diaz-Redondo |
|
11.40–12:00 |
Efficiency of Malware Detection based on DNS Packet Analysis over Real Network Traffic L. Principi, M. Baldi, A. Cucchiarelli, L. Spalazzi |
|
12:00–13:00 |
Plenary session Keynote-1 Chair: Stavros Shiaeles Room: Auditorium |
|
Invited talk: The Italian Cybersecurity strategy: a support program for the development of new innovative entrepreneurship L. Nicoletti (Agenzia per la Cybersicurezza Nazionale- ACN) |
||
13:00–14:00 |
Lunch break |
|
14:00–15:40 CET |
Technical session Track 3 – S3 Chair: Emanuele Bellini (Univ. of Roma Tre) Room: Auditorium |
|
14:00–14:20 |
Formal Verification of a V2X Privacy-Preserving Scheme using Proverif S. Bussa, R. Sisto, F. Valenza |
|
14:20–14:40 |
A Game of Age of Incorrect Information Against an Adversary Injecting False Data L. Badia, V. Bonagura, S. Panzieri, F. Pascucci |
|
14:40–15:00 |
A cost-efficient Threat Intelligence Platform Powered by Crowdsourced OSINT A. Daou, F. Li, S Shiaeles |
|
15:00–15:20 |
Proactive Measures for Cyber-Physical Systems Cybersecurity K. Taha |
|
15:20–15:40 |
Invited Talk: Resilience in: Cyber and Social Domains under Attack I. Linkov |
|
15:40–16:00 |
Coffee break |
|
16:00–17:00 CET |
Technical session Track 1 – S4 Chair: Nathan Daughety (USAF) Room: Auditorium |
|
16:00–16:20 |
A Driver Detection Method by means of Explainable Deep Learning F. Martinelli, F. Mercaldo, A. Santone |
|
16:20–16:40 |
Optimizing AI for Mobile Malware Detection by Self-Built-Dataset GAN Oversampling and LGBM O. Dayan, L. Wolf, F. Wang, Y. Harel |
|
16:40–17:00 |
Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums (Remote) F. Moreno-Vera, M. Nogueira, C. Figueiredo, D. Menasche, M. Bicudo, A. Woiwood, E. Lovat, A. Kocheturov, L. Pfleger de Aguiar |
Room: Room 7
9:20–10:40 CET |
Technical session Track 1 – S5 Chair: Somone Bussa (Polytechnic of Turin) Room: Room 7 |
|
09:20–09:40 |
Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models J. Casajus-Setien, C. Bielza, P. Larrañaga |
|
09:40–10:00 |
Key Update for the IoT Security Standard OSCORE R. Hoglund , M. Tiloca, S. Bouget, S. Raza |
|
10:00–10:20 |
A Multi-Class Intrusion Detection System Based on Continual Learning C. Oikonomou, I. Iliopoulos, D. Ioannidis, D. Tzovaras |
|
10:40–11:00 |
Coffee break |
|
11.00–12:00 CET |
Technical session Track 1 – S6 Chair: Nicholas Kolokotronis (Univ. of Peloponnese) Room: Room 7 |
|
11.00–11:20 |
Blockchain-based trustworthy O2O interaction in the next 6G ecosystem E. Bellini, E. Damiani, S. Marrone |
|
11.20–11:40 |
A Recipe for Cost-Effective Secure IoT: the Safe Place Project Case Study F. Palmarini, L. Veronese, M. Busi, R. Focardi, F. Luccio |
|
11.40–12:00 |
VulDetect: A novel technique for detecting software vulnerabilities using Language Models Marwan omar, S. Shiaeles |
|
12:00–13:00 |
Plenary session Keynote 1 Room: Auditorium |
|
13:00–14:00 |
Lunch break |
|
14:00–15:40 CET |
Technical session Track 2 – S7 Chair: Stavors Shiaeles (Univ. or Portsmouth) Room: Room 7 |
|
14:00–14:20 |
SoK: Static Configuration Analysis in Infrastructure as Code Scripts P. Ranga, R. Konala, V. Kumar, D. Bainbridge |
|
14:20–14:40 |
Detecting Internal Reconnaissance Behavior Through Classification of Command Collections L. Vandenberghe, H. Manassery Koduvely, M. Pospelova |
|
14:40–15:00 |
Understanding Resilience: Looking at Frameworks & Standards – A Systematic Study from cyber perspective N. Laxman, D. Krohmer, M. Damm, R. Schwarz, P. Oliveira Antonino |
|
15:00–15:20 |
Merging Model-Based and Data-Driven Approaches for Resilient Systems Digital Twins Design L. Campanile, M.S. de Biase, R. De Fazio , M. Di Giovanni , F. Marulli, L. Verde |
|
15:20–15:40 |
A Semi-automatic Approach for Enhancing the Quality of Automatically Generated Inventories S. Bonomi, M. Cuoci, S. Lenti |
|
15:40–16:00 |
Coffee break |
|
16:00–17:00 CET |
Technical session Track 3 – S8 Chair: Simone Bussa (Polytechnic of Turin) Room: Room 7 |
|
16:00–16:20 |
Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees (Remote) R. LOH, V. THING |
|
16:20–16:40 |
Detecting Subspace Malicious Vectors Attack Against Smart Grid Using Sequence-Alignment Method (Remote) khaled alotaibi Rafat Rob Dana Nour Doaa Zamzami |
|
16:40–17:00 |
Small Satellite System Modeling for Vulnerability Analysis (Remote) K. Murbach, T. Morris, F. Wiersig, J. Golden |
Room: Room 8
9:20–10:40 CET |
Technical session EPES-SPR – S9 Chair: Panagiotis Sarigiannidis (Univ. of Western Macedonia) Room: Room 8 |
|
09:20–09:40 |
Modelling and Analysing Security Threats Targeting Protective Relay Operations in Digital Substations M. Elrawy, L. Hadjidemetriou, C. Laoudias, M. K. Michael |
|
09:40–10:00 |
Threat intelligence using Digital Twin Honeypots in Cybersecurity (Remote) M. Nintsiou, E. Grigoriou, Paris-Alexandros Karypidis, T. Saoulidis, E. Fountoukidis, P. Sarigiannidis – |
|
10:00–10:20 |
PHOENI2X – A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation K. Fysarakis, A. Lekidis, V. Mavroeidis, K. Lampropoulos, G. Lyberopoulos, I. Garcia-Milà Vidal, J. C. Terés i Casals, E. Rodriguez Luna, A. A. M. Sancho, A. Mavrelos, M. Tsantekidis, S. Pape, A. Chatzopoulou, C. Nanou, G. Drivas, V. Photiou, G. Spanoudakis, O. Koufopavlou |
|
10:20–10:40 |
Towards a Hybrid Blockchain-Based Energy Trading Market for Microgrids (Remote) P. Savvidis, N. Vakakis, A. Voulgaridis, E. Bellini, D. Ioannidis, K. Votis, D. Tzovaras |
|
10:40–11:00 |
Coffee break |
|
11.00–12:00 CET |
Technical session DS4CS – S10 Chair: Spiros Skiadopoulos Room: Room 8 |
|
11.00–11:20 |
Improving the Detection of Unknown DDoS Attacks through Continual Learning B. Nugraha, K. Yadav, P. Patil, T. Bauschert |
|
11.20–11:40 |
RoG: A Pipeline for Automated Sensitive Data Identification and Anonymisation S. Nikoletos, S. Vlachos, E. Zaragkas, C. Vassilakis, C. Tryfonopoulos, P. Raftopoulou |
|
11.40–12:00 |
Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks M. Zych, V. Mavroeidis, K. Fysarakis, M. Athanatos |
|
12.00–13:00 |
Plenary session Keynote 1 Room: Auditorium |
|
13:00–14:00 |
Lunch break |
|
14:00–15:40 CET |
Technical session Track 1 – S11 Chair: Gohar Sargsyan (CGI) Room: Room 8 |
|
14:00–14:20 |
UNDERSTANDING HUMAN FACTORS OF CYBERSECURITY: DRIVERS OF INSIDER THREATS M. Green, P. Dozier |
|
14:20–14:40 |
DDoS Attack Detection in a Real Urban IOT Environment using Federated Deep Learning K. Ahmadi, R. Javidan |
|
14:40–15:00 |
Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices J. von der Assen, A. Huertas Celdran, N. Huber, G. Bovet, G. Martinez Perez, B. Stiller |
|
15:00–15:20 |
HSchain: Anonymous Permissioned Blockchain with Enhanced Auditability J. Hou, L. Xu, L. Zhu, P. Jiang, S. Song |
|
15:20–15:40 |
Real-time APT Detection Technologies: A Literature Review S. Monch, H. Roth |
|
15:40–16:00 |
Coffee break |
|
16:00–17:20 CET |
Technical session DS4CS – S12 Chair: Christos Tryfonopoulos Room: Room 8 |
|
16:00–16:20 |
Minimizing Software-Rooted Risk through Library Implementation Selection (Remote) P. Sotiropoulos, C. Mathas, C. Vassilakis, N.Kolokotronis |
|
16:20–16:40 |
Learning When to Say Goodbye: What Should be the Shelf Life of an Indicator of Compromise? (Remote) B. Tostes, L. Ventura, E. Lovat, M. Martins, D. Sadoc Menasche |
|
Tuesday 1st of August
Room: Auditorium
9:00–10:40 CET |
Technical session Track 3 – S13 Chair: Stavros Shiaeles (Univ. of Portsmouth) Room: Auditorium |
|
09:00–09:20 |
SPAT: A Testbed for Automotive Cybersecurity Training R. Caviglia, G. B. Gaggero, M. Marchese , N. Vincis, A. Aceti, O. Morando |
|
09:20–09:40 |
Enhancing Industrial Cyber-Physical Systems Security with Smart Probing Approach V. Bonagura, C. Foglietta, S. Panzieri, F. Pascucci |
|
09:40–10:00 |
Control-Implications-Based Side-Channel Monitoring for Embedded Systems S. Roy, B. Drozdenko |
|
10:00–10:20 |
Identification of vulnerable IoT enabled transportation infrastructure into a cyber-physical transportation network K. Ntafloukas, L. Pasquale, B. Martinez Pastor, D. P. McCrum |
|
|
10:20–10:40 |
Default Credentials Vulnerability: The Case Study of Exposed IP Cams S. Perone, L. Faramondi, R. Setola |
10:40–11:00 |
Coffee break |
|
11.00–12:00 CET |
Technical session Track 1 – S14 Chair: Luca Faramondi (UCBM) Room: Auditorium |
|
11.00–11:20 |
Hunting IoT Cyberattacks With AI-Powered Intrusion Detection S. Grigoriadou, P. Radoglou-Grammatikis, I. Makris, T. Lagkas, V. Argyriou, A. Lytos, E. Fountoukidis, P. Sarigiannidis |
|
11.20–11:40 |
BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks M. Chelghoum, G. Bendiab, M. Benmohammed, S. Shiaeles, E. Bellini |
|
11.40–12:00 |
Efficient Early Anomaly Detection of Network Security Attacks Using Deep Learning T. Ahmad, D. Truscan |
|
12.00– 13:00 |
Plenary session Keynote 2 Chair: Nicholas Kolokotronis Room: Auditorium |
|
Invited talk: Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies M. Conti (Univ. of Padua, EiC IEEE TIFS) |
||
13:00–14:00 |
Lunch break |
|
14:00–15:00 CET |
Plenary session Keynote 3 Chair: Emanuele Bellini (Univ of Roma Tre) Room: Auditorium |
|
|
Invited talk: Breaking Down AI Security and Safety at the Industrial Edge R. Mariani (VP Industry Safety NVIDIA; First VP IEEE Computer Society) |
|
15:00–15:40 CET |
Plenary session Industrial Panel Chair: Ernesto Damiani (Univ. of Milan) Room: Auditorium |
|
|
Invited panelists: L. Ronchini (Thales), S. Bordi (Leonardo), R. Mariani (NVIDIA), Y. Harel (ICRC-Tel Aviv Univ.), Gohar Sargsyan(CGI) |
|
15:40–16:00 |
Coffee break |
|
16:00–17:00 CET |
Technical session Track 1-2 – S15 Chair: Fulvio Valenza Room: Auditorium |
|
16:00–16:20 |
An Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection AbUBAKR HASSAN AHMED IBRAHIM, M. Mejri, F. Jaafar |
|
16:20–16:40 |
Cyber threat hunting using unsupervised federated learning and adversary emulation S. Sheikhi, P. Kostakos |
|
16:40–17:00 |
Assessing Cybersecurity Hygiene and Cyber Threats Awareness in the Campus – A Case Study of Higher Education Institutions in Portugal and Poland L. Oliveira, A. Chmielewski, P. Rutecka, K. Cicha, M. Rizun, N. Torres, P. Pinto |
|
17:00–17:20 |
Evaluating Machine Learning approaches for Cyber and Physical anomalies in SCADA systems S. Guarino, L. Faramondi, R. Setola, F. Flammini |
Room: Room 7
9:00–10:40 CET |
Technical session HACS – S16 Chair: Nicolas Sklavos (Univ. of Patras) Room: Room7 |
|
09:00–09:20 |
Area-Delay Efficient Security Scheme for Smart Hospital Systems K. Tsantikidou, D. Boufeas, N. Sklavos |
|
09:20–09:40 |
A PUF Based on the Non-Linearity of Memristors C. Aitchison |
|
09:40–10:00 |
Breaking AES-128: Machine Learning-Based SCA under Different Scenarios and Devices S. Tehranipoor, N. Karimian, J Edmonds |
|
10:00–10:20 |
A New Fast and Side-channel Resistant AES Hardware Architecture (Remote) M. Macchetti, H Pelletier, C. Groux |
|
|
||
10:40–11:00 |
Coffee break |
|
11.00–12:00 CET |
Technical session HACS -S17 Chair: Nicolas Sklavos (Univ. of Patras) Room: Room 7 |
|
11.00–11:20 |
Randomized addressing countermeasures are inefficient against address-bit SCA (Remote) I. Kabin, Z. Dyka, P. Langendoerfer |
|
11.20–11:40 |
Counteracting Modeling Attacks using Hardware-based Dynamic Physical Unclonable Function (Remote) J. Dofe, S. Rajput |
|
11.40–12:00 |
Algorithm for simplifying the SHA-256 operations tree (Remote) A. Levina, A. Plotnikov |
|
12.00– 13:00 |
Plenary session Keynote 2 Room: Auditorium |
|
13:00–14:00 |
Lunch break |
|
14:00–15:00 CET |
Plenary session Keynote 3 Room: Auditorium |
|
15:00–15:40 |
Plenary session Industrial Panel Room: Auditorium |
|
15:40–16:00 |
Coffee break |
|
16:00–17:00 CET |
Technical session 2D-DPA – S18 Chair: Salvatore D’Antonio (Univ. Napoli Parthenope) Room: Room 7 |
|
16:00–16:20 |
A Practical and Scalable Privacy-preserving Framework S. D’Antonio, N. Avgerinos, I. Kamara, C. Kotselidis, I. Lazarou, T. Mannarino, G. Meditskos, K. Papachristopoulou, A. Papoutsis, P-. Roccetti, M. Zuber |
|
16:20–16:40 |
Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies A. Pedrouzo-Ulloa, J. Ramon, F. Pérez-González, S. Lilova, P. Duflot, Z. Chihani, N. Gentili, P. Ulivi, M. Ashadul Hoque, T. Mukammel, Z. Pritzker, A. Lemesle, J. Loureiro-Acuña, X. Martínez, G. Jiménez-Balsa |
|
16:40–17:00 |
Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation A. Pedrouzo-Ulloa, A. Boudguiga, O. Chakraborty, R. Sirdey, O. Stan, M. Zuber |
Room: Room 8
9:20–10:40 CET |
Technical session CRE – S19 Chair: Nick Multari(PNNL), Ms. Rosalie McQuaid (MITRE Corp) iRoom: Room 8 |
|
09:00–09:20 |
Introduciton ot CRE N. Multari |
|
09:40–10:00 |
Cyber Resilience, Societal Situational Awareness for SME (Remote) R. van Kranenburg, R. Bohara |
|
10:00–10:20 |
Invited Talk: V. Lotz (SAP) |
|
10:20–10:40 |
Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving G. Hatzivasilis, S. Ioannidis, G. Kalogiannis, M. Chatzimpyrros, G. Spanoudakis, G. Jiménez Prieto, A. Rojas Morgan, M. Juaniz Lopez, B. Cataldo, J. F. Ruiz |
|
10:40–11:00 |
Coffee break |
|
11.00–12:00 CET |
Technical session CRE – S20 Chair: Rosalie McQuaid(MITRE Corp) Room: Room 8 |
|
11.00–11:20 |
Invited Talk: AI and New Emerging Challenges to Security and Resilience. Weaponizing AI Dr. G.Sharkov, (CEE/ESI) |
|
11.20–11:40 |
Invited Talk: “AI and Cyber: The Beat Goes On” Dr. Paul Nielsen (Carnegie Melon Univ/SEI) |
|
12.00–13:00 CET |
Plenary session Keynote 2 Room: Auditorium |
|
13:00–14:00 |
Lunch break |
|
14:00–15:00 CET |
Plenary session Keynote 3 Room: Auditorium |
|
15:00–15:40 |
Plenary session Industrial panel Room: Auditorium |
|
15:40–16:00 |
Coffee break |
|
16:00–18:00 CET |
Technical session CRE – S21 Chair: Nick Moultari (PNNL) Room: Room 8 |
|
16:00–16:20 |
Verified Value Chains, Innovation and Competition A. Weber, S. Guilley, R. Rathfelder, M. Stoettinger, T. Grawunder, C. Lueth, M. Malenko, S. Reith, A. Puccetti, J. Seifert, N. Herfurth, G. Heiser, H. Sankowski |
|
16:20–16:50 |
Invited Talk: Surviving the Sands of Cyber -Entropy, Conflict, Risks, and Resiliency (Remote) S.Foote |
|
16:50–18:00 |
Panel Discussion on Cyber Resilience Dr. G.Sharkov, (CEE/ESI), Pdr. P. Nielsen (CMU/SEI), Mr. S. Foote(Phenomenati Inc.), Mr. V. Lotz (SAP), Authors of Accepted papers |
Room: Room E
19:30–19:45 CET |
IEEE SMC TC Homeland Security Award Chair: Francesco Flammini (TCHS chair), Emanuele Bellini (TCHS co-chair) |
|
19:45–20:00 |
IEEE CSR Best Paper Award session Chair: Emanuele Bellini (IEEE CSR), Nicholas Kolokotronis(IEEE CSR), Stavros Shiaeles (IEEE CSR), Giancarlo Fortino (IEEE SMC Italian Chapter), Rita Forsi, Domitilla Benigni (W4C Italy) |
|
20:00–24:00 |
Gala Dinner |
|
Wednesday 2nd of August
Room: Auditorium
9:00–10:40 CET |
Technical session Track 3 – S22 Chair: Simone Bussa (Polytechnic of Turin) Room: Auditorium |
|
09:00–09:20 |
Evaluating a process-aware IDS for smart grids on distributed hardware V. Menzel, K.O. Großhanten, A. Remke |
|
09:20–09:40 |
Multi-party Computation for Privacy and Security in Machine Learning: a practical reviews (Remote) A. Bellini, E. Bellini, M. Bertini, D. Almhaithawi, S. Cuomo |
|
09:40–10:00 |
A Feature-Aware Semi-Supervised Learning Approach for Automotive Ethernet K. Hassan Shibly, Md Delwar Hossain, H. Inoue, Yuzo Taenaka Y. Kadobayashi |
|
10:00–10:20 |
Trojan Triggers for Poisoning Unmanned Aerial Vehicles Navigation: A Deep Learning Approach (Remote) M. Mynuddin, Sultan Uddin Khan, M. Nabil Mahmoud |
|
10:20–10:40 |
Trustworthiness-Related Risks in Autonomous Cyber-Physical Production Systems – A Survey (Remote) M. Zahid, F. Flammini, A. Bucaioni |
|
10:40–11:00 |
Coffee break |
|
11.00–12:00 CET |
Technical session Track 1 – S23 Chair: Luca Faramondi (UCBM) Room: Auditorium |
|
11.00–11:20 |
Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms (Remote) N. Ferdous Aurna, Md Delwar Hossain, Y. Taenaka, Y. Kadobayashi |
|
11.20–11:40 |
Early Detection of Reconnaissance Attacks on IoT Devices by Analyzing Performance and Traffic Characteristics (Remote) P. Keshavamurthy, S. Kulkarni |
|
11.40–12:00 |
Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies (Remote) M. Ben Farah, O. Al-Kadri, Y. Ahmed, R. Abozariba, X. Bellekens |
|
12.00– 13:00 |
Plenary session Keynote – 4 Room: Auditorium |
|
Invited talk: Cyber-Security, Cyber-Forensics, and Cyber-Investigation: scientific, technical, and legal practical issues for Law Enforcement Agencies Coll. Marco Mattiucci (Arma dei Carabinieri) |
||
13:00–14:00 |
Lunch break |
|
14:00–15:40 CET |
Technical session Track 1 – S24 Chair: Nathan Daughety Room: Auditorium |
|
14:00–14:20 |
A Taxonomic Survey of Model Extraction Attacks (Remote) D. Genc, M. Ozuysal, E. Tomur |
|
14:20–14:40 |
Phishing and Smishing Detection Using Machine Learning (Remote) H. El Karhani, R. Jamal, Y. Bou Samra, I. Elhajj, A. Kayssi |
|
14:40–15:00 |
Evaluation of Applying LDA to Redacted Documents in Security and Safety Analysis (Remote) K. Umezawa, S. Wohlgemuth, K. Hasegawa, K. Takaragi |
|
15:00–15:20 |
Denial of Service Attack Detection via Differential Analysis of Generalized Entropy Progressions (Remote) O. Subasi, J. Manzano,K. Barker |
|
15:20–15:40 |
Ransomware Detection based on Network Behavior using Machine Learning and Hidden Markov Model with Gaussian Emission (Remote) A. Srivastava, N. Kumar, A. Handa, S. K. Shukla |
|
15:40–16:00 |
Coffee break |
|
16:00–16:10 CET |
Conclusions Room: Auditorium |
Room: Room 7
9:00–10:40 CET |
Technical session Track 1 – S25 Chair: Stavros Shiaeles Room: Room 7 |
|
09:00–09:20 |
A Taxonomy for Tsunami Security Scanner Plugins G. Lima, V. Gonçalves, P. Pinto |
|
09:20–09:40 |
ML and Network Traces to M.A.R.S. W. Cruz, L. Michel, B. Drozdenko, S. Roodbeen |
|
09:40–10:00 |
Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers (Remote) V. Thing |
|
10:00–10:20 |
A Survey of Attacks and Defenses for Deep Neural Networks (Remote) D. Machooka, X. Yuan, A. Esterline |
|
10:20–10:40 |
Mitigating Membership Inference Attacks in Machine Learning as a Service (Remote) M. Bouhaddi, K. Adi |
|
10:40–11:00 |
Coffee break |
|
11.00–12:00 CET |
Technical session Track 2 – S26 Chair: Fulvio Valenza Room: Auditorium |
|
11.00–11:20 |
Automated Patch Management: An Empirical Evaluation Study (Remote) V. Ahmadi Mehri, P. Arlos, E. Casalicchio |
|
11.20–11:40 |
Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies (Remote) E. Ear, J. Remy, S. Xu |
|
|
11.40–12:00 |
Nudge to Promote Employees’ Information Security Compliance Behavior: A Field Study (Remote) M. Inaba, T. Terada |
12.00– 13:00 |
Plenary session Keynote 4 Chair: Room: Auditorium |
|
13:00–14:00 |
Lunch break |
|
14:00–15:40 CET |
Technical session Track 1-3 – S27 Chair: Luca Faramondi (UCBM) Room: Auditorium |
|
14:00–14:20 |
Attacking a packet Analyzer: Caronte case study (Remote) D. Granata, M. Rak, F. Grimaldi |
|
14:20–14:40 |
Exposed: Critical Vulnerabilities in USSD Banking Authentication Protocols (Remote) Z. Lamoyero, O. Fajana |
|
14:40–15:00 |
IoT Forensics: Analysis of Ajax Systems’ mobile app for the end user (Remote) E. Dragonas, C. Lambrinoudakis |
|
15:00–15:20 |
IoT Forensics: Investigating the mobile app of Dahua Technology (Remote) E. Dragonas, C. Lambrinoudakis , M. Kotsis |
|
|
||
15:40–16:00 |
Coffee break |
|
16:00–16:10 CET |
Conclusion Chair: Room: Auditorium |
Room: Room 8
9:00–10:40 CET |
Technical session 2P-DPA – S28 Chair: Salvatore D’Antonio ( Univ. of Napoli Parthenope) Room: Room 8 |
|
09:00–09:20 |
Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation A. Pedrouzo-Ulloa, A. Boudguiga, O. Chakraborty, R. Sirdey, O. Stan, M. Zuber |
|
09:20–09:40 |
Comparison of machine learning models applied on anonymized data with different techniques J. Sainz-Pardo Diaz, A. Lopez Garcia |
|
09:40–10:00 |
Privacy-preserving Federated Learning System for Fatigue Detection (Remote) M. Mohammadi, R. Allocca, D. Eklund, R. Shrestha, S. Sinaei |
|
10:00–10:20 |
FedGA-Meta: Federated Learning Framework using Genetic Algorithms and Meta-Learning for Aggregation in Industrial Cyber-Physical Systems (Remote) B. S. GUENDOUZI, S. OUCHANI, H. AL ASSAAD, M. EL ZAHER JRADI |
|
10:20–10:40 |
How to secure the IoT-based surveillance systems in an ELEGANT way (Remote) A. Pawlicka, D. Puchalski, M. Pawlicki, R. Kozik, M. Choraś |
|
10:40–11:00 |
Coffee break |
|
11.00–12:00 CET |
Technical session 2P-DPA – S29 Chair: Salvatore D’Antonio (Univ. of Salerno) Room: Room 8 |
|
11.00–11:20 |
The Alliance of HE and TEE to Enhance their Performance and Security (Remote) S. D’Antonio, G. Lazarou, G. Mazzeo, O. Stan, M. Zuber, I. Tsavdaridis |
|
11.20–11:40 |
Detection of radio frequency interference in Satellite Ground Segments (Remote) F. Uccello, L. Coppolino , S. D’Antonio, A. Lyratzis, C. Bakalis, S. Touloumtzi, I. Papoutsis |
|
11.40–12:00 |
Comparison of Machine Learning Algorithms trained under Differential Privacy for Intrusion Detection Systems (Remote) I. Siachos, K. Kaltakis, K. Papachristopoulou, I. Giannoulakis, E. Kafetzakis |
|
12.00–13:00 |
Plenary session Keynote 4 Room: Auditorium |
|
13:00–14:00 |
Lunch break |
|
14:00–15:40 CET |
Technical session DR-DCHE – S30 Chair: Anna Maria Tammaro (Univ. of Parma), Emanuele Bellini (Univ. of Roma Tre) Room: Room 8 |
|
14:00–14:20 |
An Open Sharing Method for Digital Heritage Assets Based on Self-Sovereign Identity Technology J. Zhu, Z. Wu |
|
|
14:20–14:40 |
Metadata and Semantic Annotation of Digital Heritage Assets: a case study (Remote) A. Amato, S. Venticinque, G. Renda, S. Mataluna, D. Branco |
14:40–15:00 |
Invited: DARIAH-IT: Managing Digital Heritage Assets E. Degl’Innocenti |
|
15:00–15:40 |
Roundtable |
|
|
||
15:40–16:00 |
Coffee break |
|
16:00–16:10 CET |
Conclusions Room: Auditorium |