Accepted Papers

ARES 2018 Full Research papers:

A Framework for Monitoring Net Neutrality
Wilfried Mayer (SBA Research, Austria), Thomas Schreiber (TU Wien, Austria) and Edgar Weippl (SBA Research, Austria)

A Pyramidal-based Model to Compute the Impact of Cyber Security Events
Gustavo Gonzalez (Atos, Spain), Jose Manuel Rubio Hernan (Télécom SudParis, CNRS UMR 5157 SAMOVAR, Université Paris-Saclay, France) and Joaquin Garcia-Alfaro (Télécom SudParis, CNRS UMR 5157 SAMOVAR, Université Paris-Saclay, France)

An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme
Masoomeh Sepehri (University of Milan, Italy), Maryam Sepehri (University of Milan, Italy), Alberto Trombetta (Università degli Studi dell’Insubria, Italy) and Ernesto Damiani (Khalifa University of Science and Technology, United Arab Emirates)

Android authorship attribution through string analysis
Vaibhavi Kalgutkar (University of New Brunswick, Canada), Natalia Stakhanova (University of New Brunswick, Canada), Paul Cook (University of New Brunswick, Canada) and Alina Matyukhina (University of New Brunswick, Canada)

Anonymous Charging and Billing of Electric Vehicles
Daniel Zelle, Markus Springer, Maria Zhdanova  and Christoph Krauß (Fraunhofer, Germany)

Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks
Martin Salfer (Technical University of Munich, Germany) and Claudia Eckert (Technical University of Munich, Germany)

Behavioural Comparison of Systems for Anomaly Detection
Martin Pirker, Patrick Kochberger and Stefan Schwandter (St. Pölten UAS, Austria)

Cloud Architectures for Searchable Encryption
Johannes Blömer and Nils Löken (University of Paderborn, Germany)

Comparison of Data Flow Error Detection Techniques in Embedded Systems: an Empirical Study
Venu Babu Thati (Katholieke Universiteit Leuven, Belgium), Jens Vankeirsbilck (Katholieke Universiteit Leuven, Belgium), Niels Penneman (Televic Healthcare, Belgium), Davy Pissoort (Katholieke Universiteit Leuven, Belgium) and Jeroen Boydens (Katholieke Universiteit Leuven, Belgium)

Converting Unstructured System Logs into Structured Event List for Anomaly Detection
Zongze Li (University of north Texas, United States), Song Fu (University of north Texas, United States), Matthew Davidson (University of north Texas, United States), Sean Blanchard (Los Alamos National Laboratory, United States) and Michael Lang (Los Alamos National Laboratory, United States)

Discovering software vulnerabilities using data-flow analysis and machine learning
Jorrit Kronjee, Arjen Hommersom and Harald Vranken (Open University of the Netherlands, Netherlands)

Distributed and Cooperative firewall/controller in cloud environments
Ferdaous Kamoun-Abid (NTS’COM, ENET’COM, Tunisia ), Amel Meddeb-Makhlouf (NTS’COM, ENET’COM, Tunisia), Faouzi Zarai (NTS’COM, ENET’COM, Tunisia) and Mohsen Guizani (ECE Department, University of Idaho, United States)

FALKE-MC: A Neural Network Based Approach to Locate Cryptographic Functions in Machine Code
Alexander Aigner (University of Applied Sciences Upper Austria, Austria)

Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
Nina Gerber (KIT, Germany), Verena Zimmermann (TU Darmstadt, Germany), Birgit Henhapl (TU Darmstadt, Germany), Sinem Emeröz (TU Darmstadt, Germany) and Melanie Volkamer (KIT, Germany)

Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services
Heng Zhang (DEEDS Group, Department of Computer Science, TU Darmstadt, Germany), Ruben Trapero (Atos Research & Innovation, Spain), Jesus Luna Garcia (TU Darmstadt, Germany) and Neeraj Suri (TU Darmstadt, Germany)

HYDRA- Hypothesis Driven Repair Automation
Partha Pal, Brett Benyo, Shane Clark and Aaron Paulos (Raytheon BBN, United States)

Influence Factors on the Quality of User Experience in OS Reliability: A Qualitative Experimental Study
Daniela Yabe, Caio Augusto Rodrigues Dos Santos, Lucas Miranda and Rivalino Matias (Federal University of Uberlandia, Brazil)

Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images
Hong-Huy Nguyen (SOKENDAI (The Graduate University for Advanced Studies), Japan), Ngoc-Dung Tieu-Thi (SOKENDAI (The Graduate University for Advanced Studies), Japan), Hoang-Quoc Nguyen-Son (National Institute of Informatics, Japan), Vincent Nozick (Japanese-French Laboratory for Informatics (JFLI) (UMI 3527), Japan), Junichi Yamagishi (National Institute of Informatics, Japan) and Isao Echizen(National Institute of Informatics, Japan)

Non-Interactive Key Exchange from Identity-Based Encryption
Olivier Blazy (Université de Limoges, France) and Céline Chevalier (ENS, France)

Protecting Patients’ Data: An Efficient Method for Health Data Privacy
Mark Daniels, John Rose and Csilla Farkas (University of South Carolina, United States)

Secure Equality Testing Protocols in the Two-Party Setting
Majid Nateghizad (Delft University of Technology, Netherlands), Thijs Veugen (TNO, Netherlands), Zekeriya Erkin (Delft University of Technology, Netherlands) and Reginald L. Lagendijk (Delft University of Technology, Netherlands)

Speeding Up Bug Finding using Focused Fuzzing
Ulf Kargén and Nahid Shahmehri (Linköping University, Sweden)

Stealthy Attacks on Smart Grid PMU State Estimation
Sarita Paudel (AIT Austrian Institute of Technology, Austria), Tanja Zseby (Vienna University of Technology, Austria) and Paul Smith (AIT Austrian Institute of Technology, Austria)

The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns
Julian Rauchberger, Sebastian Schrittwieser, Tobias Dam, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger (St. Pölten UAS, Austria) and Hyoungshick Kim (Sungkyunkwan University, South Korea)

ToGather: Towards Automatic Investigation of Android Malware Cyber-Infrastructures
Elmouatez Billah Karbab Karbab and Mourad Debbabi (Concordia University, Canada)

ARES 2018 Short Research papers:

What are Security Patterns? A Formal Model for Security and Design of Software
Anika Behrens (University of Bremen, Germany)

An investigation of a deep learning based malware detection system
Mohit Sewak, Sanjay Sahay and Hemant Rathore (BITS, Pilani, Department of CS & IS, Goa Campus, India)

Enterprise WLAN Security Flaws: Current Attacks and Relative Mitigations
Mohamed Abo-Soliman and Marianne Azer (Nile University, Egypt)

Assessing Internet-wide Cyber Situational Awareness of Critical Sectors
Martin Husák (Masaryk University, Czech Republic), Nataliia Neshenko (Florida Atlantic University, United States), Morteza Safaei Pour (Florida Atlantic University, United States), Elias Bou-Harb (Florida Atlantic University, United States) and Pavel Čeleda (Masaryk University, Czech Republic)

(In)Secure Configuration Practices of WPA2 Enterprise Supplicants
Alberto Bartoli (Università degli Studi di Trieste – DEEI, Italy), Eric Medvet (DI3 – University of Trieste, Italy), Fabiano Tarlao (Department of Engineering and Architecture, University of Trieste, Italy) and Andrea De Lorenzo (University of Trieste – DIA, Italy)

Towards the Automatic Generation of Low-Interaction Web Application Honeypots
Marius Musch (TU Braunschweig, Germany), Martin Johns (TU Braunschweig, Germany) andMartin Härterich (SAP Security Research, Germany)

Learning Malware Using Generalized Graph Kernels
Khanh Huu The Dam (LIPN and University Paris Diderot, France) and Tayssir Touili (LIPN, CNRS & University Paris 13, France)

Spreading Alerts Quietly: New Insights from Theory and Practice
Olivier Blazy (Université de Limoges, France) and Céline Chevalier (ENS, France)

Let’s shock our IoT’s heart: ARMv7-M under (fault) attacks
Sebanjila K. Bukasa (LHS-PEC INRIA-RBA, France), Ronan Lashermes (LHS-PEC INRIA-RBA, France), Jean-Louis Lanet (LHS-PEC INRIA-RBA, France) and Axel Legay (TAMIS INRIA-RBA, France)

ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus
Tianxiang Huang (Chongqing University of Posts and Telecommunications, China), Jianying Zhou (Singapore University of Technology and Design, Singapore) and Andrei Bytes (Singapore University of Technology and Design, Singapore)

A Reactive Defense Against Bandwidth Attacks Using Learning Automata
Nafiseh Kahani (Queen’s Univeristy, Canada) and Mehran Fallah (Amirkabir University of Technology, Iran)

A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts
Gerardo Canfora, Andrea Di Sorbo, Enrico Emanuele, Sara Forootani and Corrado A. Visaggio (University of Sannio, Italy)