Below you can find the program of ARES / CD-MAKE 2018.
Your registration includes the entrance to all ARES / CD-MAKE conference, ARES EU Workshop Symposium and workshop sessions as well as social events!
The ICS-CSR 2018 Conference will be held in conjunction with ARES 2018. The program of ICS-CSR can be found here: Program. If you are interested in participating both ARES 2018 & ICS-CSR 2018, a combined ticket is now available. More details.
Opening:
Keynote:
A Next-generation Secure Internet for the 21st Century
Welcome message
Keynote
: Peter Schneider, Nokia Bell Labs, Germany
Keynote I:
"
Cyber Security Threat Intelligence: Challenges and Research Opportunities
"
Introductory talk
:
An overview on the H2020 TAKEDOWN Project
ANASTACIA - Advanced Networked Agents for Security and Trust Assessment in CPS / iOT Architectures
SAINT - Cyber threat risk and cost assessment: tangible and intangible factors
YAKSHA - Automating honeypot deployment and malware analytics
FORTIKA
- The FORTIKA Paradigm: Cyber Security Accelerator for trusted SMEs IT Ecosystem
Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Image
FALKE-MC: A Neural Network Based Approach to Locate Cryptographic Functions in Machine Code
To Trust or Not to Trust: Data Origin Authentication for Group Communication in 5G Networks
Evaluation of Apache Spot’s machine learning capabilities in an SDN/NFV enabled environment
Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments
Augmented DDoS Mitigation with Reputation Scores
The challenge of detecting sophisticated attacks: Insights from SOC Analysts
Conceptualizing the digital TAKEDOWN platforms for supporting first-line-practitioners and law enforcement agencies
The AWID and TAKEDOWN prevention approach. The generation of a holistic good practice model for prevention of radicalization in youth work
A review of network vulnerabilities scanning tools: types, capabilities and functioning
CYBECO - Supporting cyber insurance from a behavioural choice perspective
SISSDEN - Avoiding cyber-threat detection evasion techniques
CIPSEC
- Enhancing Critical infrastructure Protection with innovative SECurity framework
CS-AWARE - Cybersecurity situational awareness and information sharing solution
RED-Alert - Use of Social Media Forensics in the Early Detection of Terrorist Activities - European Project RED-Alert Approach
Truessec.eu - Privacy and Cybersecurity Trust-Enhancing Labels
Secure Equality Testing Protocols in the Two-Party Setting
Android authorship attribution through string analysis
Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services
Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service
A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation
SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System
Mission-Centric Risk Assessment to Improve Cyber Situational Awareness
The Mouseworld, a security traffic analysis lab based on NFV/SDN
Risks of Sharing Cyber Incident Information
Hunting Observable Objects for Indication of Compromise
Challenges of Cryptocurrencies Forensics – A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals
Enhancing Cyber-Security by Safeguarding Information Privacy: the European Union and the Implementation of the “Data Protection by Design” Approach
Cybercrime and Organized Crime
ARIES - Architecture for a Reliable European Identity Ecosystem
LIGHTest - LIGHTest Automated Trust Verification
CREDENTIAL
- Design and Implementation of Privacy-Friendly Web-Based Authentication in CREDENTIAL
FutureTrust - FutureTrust extending the eIDAS reach
SPECIAL - New ways for informed consent and transparency under the GDPR with technical specifications
LEPS
Discovering software vulnerabilities using data-flow analysis and machine learning
Speeding Up Bug Finding using Focused Fuzzing
HYDRA- Hypothesis Driven Repair Automation
Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments
Framework for Security Event Management in 5G
Keynote II
: Prof. Dr. Hervé Debar (Telecom SudParis) “
Reasoning about alert formats: a comparative study
”
Closing remarks
Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials
Definitions for Plaintext-Existence Hiding in Cloud Storage
Fully-Featured Anonymous Credentials with Reputation System
An Overview of the SAURON Project
A Framework for Monitoring Net Neutrality
Meeting point:
19:00 in the foyer of the University
Get a taste of Hamburg´s cuisine and culture at this year´s ARES reception. Fish buns, local craft beer and the performance of a shanty-choir will get you in the mood for a great conference.
19:15: Opening, Anja Diek (chief officer in the Hamburg Ministry of Science, Research and Equalities)
Monday
Time
09:30 - 17:45
10:15 - 11:30
Edgar Weippl, SBA Research
Mathias Fischer & Hannes Federrath, Universität Hamburg, Germany
Christian Doerr, TU Delft, Germany
Adrian Perrig, ETH Zürich
11:45 - 12:45
Wojciech Mazurczyk & Krzysztof Cabaj, Warsaw University of Technology, Pascal Bisson, Thales, France
Dr. Sheikh Mahbub Habib, Continental AG
Prof. Dr. Kim-Kwang Raymond Choo (The University of Texas at San Antonio)
Andrea Tundis, Technische Universität Darmstadt (TUDA)
Matteo Bonfanti, ETH Center for Security Studies
The TAKEDOWN's partners
Jon Shamah, EEMEA
Jorge Bernal, University of Murcia (UMU)
Edgardo Montes de Oca, Montimage
Nikolaos Mantas, University of Piraeus
Evangelos Markakis, TEI Crete
Martin Pirker, FH St. Pölten
Hong-Huy Nguyen (SOKENDAI (The Graduate University for Advanced Studies), Japan), Ngoc-Dung Tieu-Thi (SOKENDAI (The Graduate University for Advanced Studies), Japan), Hoang-Quoc Nguyen-Son (National Institute of Informatics, Japan), Vincent Nozick (Japanese-French Laboratory for Informatics (JFLI) (UMI 3527), Japan), Junichi Yamagishi (National Institute of Informatics, Japan) and Isao Echizen (National Institute of Informatics, Japan)
Alexander Aigner (University of Applied Sciences Upper Austria, Austria)
12:45 - 14:00
14:00 - 15:30
Pascal Bisson, Thales, France
Robert Annessi, Joachim Fabini and Tanja Zseby
Universal Trusted Execution Environments for Securing SDN/NFV Operations
Vincent Lefebvre, Gianni Santinelli, Tilo MÜller and Johannes Götzfried
Enhancing NFV Orchestration with Security Policies
Christian Banse and Florian Wendland
Identity and Access Control for micro-services based 5G NFV platforms
Daniel Guija and Muhammad Shuaib Siddiqui
Dr. Emmanouil Vasilomanolakis, TU Darmstadt
Christos M. Mathas, Olga E. Segou, Georgios Xylouris, Dimitris Christinakis, Michail - Alexandros Kourtis, Costas Vassilakis and Anastasios Kourtis
Nikolaos Tsinganos, George Sakellariou, Panagiotis Fouliras and Ioannis Mavridis
Tomáš Jánský, Tomáš Čejka, Martin Žádník and Václav Bartoš
Olusola Akinrolabu, Ioannis Agrafiotis and Arnau Erola
Matteo Bonfanti, ETH Center for Security Studies
Florian Huber
Karin Rainer, Mario Springnagel and Diana Silvestru
Andrea Tundis, Wojciech Mazurczyk and Max Mühlhäuser
Jon Shamah, EEMEA
Aitor Couce Vieira, ICMAT
Edgardo Montes de Oca, Montimage
Christian Schlehuber, Deutsche Bahn AG (DB)
Juha Röning, OULU
Syed Naqvi, Birmingham City University (BCU)
Manel Medina, UPC
Christian Doerr, TU Delft
Majid Nateghizad (Delft University of Technology, Netherlands), Thijs Veugen (TNO, Netherlands), Zekeriya Erkin (Delft University of Technology, Netherlands) and Reginald L. Lagendijk (Delft University of Technology, Netherlands)
Vaibhavi Kalgutkar (University of New Brunswick, Canada), Natalia Stakhanova (University of New Brunswick, Canada), Paul Cook (University of New Brunswick, Canada) and Alina Matyukhina (University of New Brunswick, Canada)
Heng Zhang (DEEDS Group, Department of Computer Science, TU Darmstadt, Germany), Ruben Trapero (Atos Research & Innovation, Spain), Jesus Luna Garcia (TU Darmstadt, Germany) and Neeraj Suri (TU Darmstadt, Germany)
15:30 - 16:00
16:00 - 17:30
Wojciech Mazurczyk, Warsaw University of Technology
Gregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca and Pascal Bisson
Marco Antonio Sotelo Monge, Jorge Maestre Vidal and Luis Javier García Villalba
Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski and Piotr Zórawski
Marcin Przybyszewski, ITTI
Franklin Silva and Paul Jacob
Antonio Pastor, Alberto Mozo Velasco, Diego R. Lopez and Jesús Luis Folgueira, Angeliki Kapodistria
Adham Albakri, Eerke Boiten and Rogério de Lemos
Arnold Sykosch, Michael Meier and Marc Ohm
Andrea Tundis, Technische Universität Darmstadt (TUDA)
Syed Naqvi
Matteo E. Bonfanti
Václav Jirovský, Andrej Pastorek, Max Mühlhäuser and Andrea Tundis
Jorge Bernal Bernabe, University of Murcia (UMU)
Jorge Bernal, University of Murcia (UMU)
Jon Shamah, EEMEA
Krenn Stephan, Austrian Institute of Technology (AIT)
Jon Shamah, EEMEA
Harald Zwingelberg, ULD
Alexander Aigner, University of Applied Sciences Upper Austria
Jorrit Kronjee, Arjen Hommersom and Harald Vranken (Open University of the Netherlands, Netherlands)
Ulf Kargén and Nahid Shahmehri (Linköping University, Sweden)
Partha Pal, Brett Benyo, Shane Clark and Aaron Paulos (Raytheon BBN, United States)
17:30 - 17:40
17:40 - 18:40
Krzysztof Cabaj, Warsaw University of Technology
Jorge Maestre Vidal, Marco Antonio Sotelo Monge and Luis Javier García Villalba
Iris Adam and Jing Ping
Dr. Sheikh Mahbub Habib, Continental AG
Dr. Emmanouil Vasilomanolakis, TU Darmstadt
Stephan Krenn, AIT Austrian Institute of Technology GmbH, Austria
Farzaneh Karegar, John Sören Pettersson and Simone Fischer-Hübner
Arseny Kurnikov, Andrew Paverd, Mohammad Mannan and N. Asokan
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum and Mohsen Toorani
Kai Bemmann, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilling, Michael Schlichtig and Marcel Stienemeier
Stefan Schauer, AIT Austrian Institute of Technology
Stefan Schauer, AIT Austrian Institute of Technology
An Event Correlation Engine for Cyber-Physical Infrastructures
Nicolas Museux, Thales
Threat Propagation for Identifying Cascading Effects
Sandra König, AIT Austrian Institute of Technology
SAURON Case Study of Port of Piraeus
Christos Douligeris, University of Piraeus
Legal Aspects of Situational Awareness under GDPR and the NIS Directive
Plixavra Vogiatzoglou, KU Leuven
Paul Smith, AIT Austrian Institute of Technology
Wilfried Mayer (SBA Research, Austria), Thomas Schreiber (TU Wien, Austria) and Edgar Weippl (SBA Research, Austria)
The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns
Julian Rauchberger, Sebastian Schrittwieser, Tobias Dam, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger (St. Pölten UAS, Austria) and Hyoungshick Kim (Sungkyunkwan University, South Korea)
19:00 - 21:30
19:30: Shanty Choir
20:00: DJane
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme
Non-Interactive Key Exchange from Identity-Based Encryption
Welcome Message
Introductory talk I: Criminal Use of Information Hiding Initiative – an update
Introductory talk II: CUING and CTI (Cyber Threat Intelligence)
Keynote
: Europol's European Cybercrime Centre - a networked approach
Keynote
:
Structured Argumentation in Digital Forensic Practice: Opportunity or Burden?
Digital Forensics in the Next Five Years
CRUSOE: Data Model for Cyber Situation Awareness
Keynote
:
Machine learning and AI for the sciences – towards understanding
Behavioural Comparison of Systems for Anomaly Detection
Converting Unstructured System Logs into Structured Event List for Anomaly Detection
Stealthy Attacks on Smart Grid PMU State Estimation
Channel Steganalysis
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach
Steganography by synthesis - Can commonplace image manipulations like face morphing create plausible steganographic channels?
Forensic APFS File Recovery
Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits
I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out
Keynote
Roundtable
A Modified Particle Swarm Optimization Algorithm for Community Detection in Complex Networks
Mouse tracking measures and movement patterns with application for online surveys
Protecting Patients’ Data: An Efficient Method for Health Data Privacy
Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach
Get Me Cited, Scotty! Analysis of Academic Publications in Covert Channel Research
Breaking down violence: A deep-learning strategy to model and classify violence in videos
Digitally Signed and Permission Restricted PDF Files: a Case Study on Digital Forensics
Investigating the Use of Online Open Source Information as Evidence in European Courts
A Process Framework for Stakeholder-specific Visualization of Security Metrics
A reference architecture for the container ecosystem
A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures
Knowledge compilation techniques for model-based diagnosis of complex active systems
A Pyramidal-based Model to Compute the Impact of Cyber Security Events
ToGather: Towards Automatic Investigation of Android Malware Cyber-Infrastructures
Towards Utilization of Covert Channels as a Green Networking Technique
Enhanced Electromagnetic Side-channel Eavesdropping Attacks on Computer Monitors
Keynote
: DevOps is the key for Continous Security: RMF, ATO and beyond
Surveying Secure Software Development Practices in Finland
Challenges and Mitigation Approaches for Getting Secured Applications in a Big Company
Software Security Activities that Support Incident Management in Secure DevOps
Security Wrapper Orchestration in Cloud
IWSECC Interactive Forum Discussion (Track Dr. Antonio Muñoz)
An Efficient Approach for Extraction Positive and Negative Association Rules in Big Data
Meeting Point:
17:30 in front of the University, buses leave at 17:40
We will take you on an evening Harbour Cruise. Experience the multifaceted Port of Hamburg, see and learn about its most interesting places. Our cruise will take us through Hafencity, Speicherstadt (depending on the tide), watergates and canals.
Tuesday
Time
08:00 - 16:30
09:00 - 10:30
Edgar Weippl, SBA Research
Nina Gerber (KIT, Germany), Verena Zimmermann (TU Darmstadt, Germany), Birgit Henhapl (TU Darmstadt, Germany), Sinem Emeröz (TU Darmstadt, Germany) and Melanie Volkamer (KIT, Germany)
Masoomeh Sepehri (University of Milan, Italy), Maryam Sepehri (University of Milan, Italy), Alberto Trombetta (Università degli Studi dell’Insubria, Italy) and Ernesto Damiani (Khalifa University of Science and Technology, United Arab Emirates)
Olivier Blazy (Université de Limoges, France) and Céline Chevalier (ENS, France)
Wojciech Mazurczyk, Warsaw University of Technology & Joerg Keller, FernUniversitaet in Hagen, Germany
Wojciech Mazurczyk, Warsaw University of Technology
Jart Armin, Stichting CUlng Foundation, The Netherlands
Philipp Amann, Europol EC3
Richard Overill, King's College London
Virginia N. L. Franqueira, University of Derby, UK
Laoise Luciano, Mateusz Topor, Ibrahim Baggili and Frank Breitinger
Christian Dörr, TU Delft
Jana Komárková, Martin Husák, Martin Laštovička and Daniel Tovarňák (Masaryk University, Czech Republic).
Integrating Threat Intelligence to Enhance an Organization’s Information Security Management
Mathias Gschwandtner (Leopold-Franzens University Innsbruck, Austria), Lukas Demetz (University of Applied Sciences Kufstein, Austria), Matthias Gander (Leopold-Franzens University Innsbruck, Austria) and Ronald Maier (Department of Information Systems, Production and Logistics Management, Austria)
MAL (the Meta Attack Language): A Language for Domain-Specific Probabilistic Threat Modeling and Attack Simulation
Pontus Johnson, Robert Lagerström and Mathias Ekstedt (KTH Royal Institute of Technology, Sweden)
10:30 - 11:00
11:00 - 12:00
Andreas Holzinger, Medical University Graz
Klaus-Robert Müller, Machine Learning Group TU Berlin, MPI for Informatics, Saarbrücken, and Korea University, Seoul
12:00 - 13:15
13:15 - 14:45
Csilla Farkas, University of South Carolina
Martin Pirker, Patrick Kochberger and Stefan Schwandter (St. Pölten UAS, Austria)
Zongze Li (University of north Texas, United States), Song Fu (University of north Texas, United States), Matthew Davidson (University of north Texas, United States), Sean Blanchard (Los Alamos National Laboratory, United States) and Michael Lang (Los Alamos National Laboratory, United States)
Sarita Paudel (AIT Austrian Institute of Technology, Austria), Tanja Zseby (Vienna University of Technology, Austria) and Paul Smith (AIT Austrian Institute of Technology, Austria)
Angelo Consoli
Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland
Martin Steinebach
Wojciech Mazurczyk, Steffen Wendzel and Krzysztof Cabaj
Christian Kraetzer and Jana Dittmann
Richard Overill, King's College London
Jonas Plum and Andreas Dewald
Jacob Taylor, Benjamin Turnbull and Gideon Creech
Gokila Dorai, Shiva Houshmand and Ibrahim Baggili
Christian Dörr, TU Delft
Kas Clark, National Cyber Security Center, Netherlands
Francesco Buccafurri, Mediterranean University of Reggio Calabria, Italy
Alireza Abdollahpouri, Shadi Rahimi, Shahnaz Mohammadi Majd and Chiman Salavati
Catia Cepeda, Joao Rodrigues, Maria Camila Dias, Diogo Oliveira, Dina Rindlisbacher, Marcus Cheetham and Hugo Gamboa
14:45 - 15:15
15:15 - 16:15
Melanie Volkamer, Karlsruhe Institute of Technology
Mark Daniels, John Rose and Csilla Farkas (University of South Carolina, United States)
Influence Factors on the Quality of User Experience in OS Reliability: A Qualitative Experimental Study
Caio Augusto Rodrigues Dos Santos, Daniela Yabe, Lucas Miranda and Rivalino Matias (Federal University of Uberlandia, Brazil)
Joerg Keller, FernUniversitaet in Hagen, Germany
Krzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski and Piotr Zórawski
Steffen Wendzel
Richard Overill, King's College London
Bruno Malveira Peixoto, Sandra Avila, Zanoni Dias and Anderson Rocha
Patricio Domingues and Miguel Frade
Yi-Ching Liao
Dr. Antonio Muñoz, University of Málaga
Tanja Hanauer, Wolfgang Hommel, Stefan Metzger and Daniela Pöhn
Madiha Syed and Eduardo B. Fernandez
Stefan Rass, Thomas Grafenauer, Sandra König and Stefan Schauer
Svetla Boytcheva, Bulgarian Academy of Sciences, Sofia
Gianfranco Lamperti, Marina Zanella and Xiangfu Zhao
Recognition of Handwritten Characters Using Google Fonts and Freeman Chain Codes
Alexei Dingli, Mark Bugeja and Dylan Seychell
16:15 - 16:30
16:30 - 17:30
Chibuike Ugwuoke, TU Delft
Gustavo Gonzalez, Jose Manuel Rubio Hernan and Joaquin Garcia-Alfaro
Elmouatez Billah Karbab Karbab and Mourad Debbabi
Klaus Kieseberg, SBA Research
Daniel Geisler, Wojciech Mazurczyk and Joerg Keller
Asanka Sayakkara, Nhien An Le Khac and Mark Scanlon
Juha Röning, University of Oulu
Hasan Yasar
Kalle Rindell, Jukka Ruohonen and Sami Hyrynsalmi
Pawel Rajba
Martin Gilje Jaatun
Eduardo B. Fernandez, Florida Atlantic University
Aapo Kalliola, Shankar Lal, Kimmo Ahola, Ian Oliver, Yoan Miche and Tuomas Aura
Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications
Jamal Toutouh, Antonio Muñoz and Sergio Nesmachnow
Panagiotis Germanakos, SAP SE & University of Cyprus
Bemarisika Parfait, Ramanantsoa Harrimann and Totohasina André
Field-Reliability Predictions based on Statistical System Life Cycle Models
Lukas Felsberger, Dieter Kranzlmüller and Benjamin Todd
17:30 - 20:00
Keynote
:
Innovations in permutation-based crypto
Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks
Anonymous Charging and Billing of Electric Vehicles
Comparison of Data Flow Error Detection Techniques in Embedded Systems: an Empirical Study
Keynote:
Steganography in the World of IoT
Keynote
:
Reality of malware author attribution
Monitoring Product Sales in Darknet Shops
IoT Forensic: identification and classification of evidence in criminal investigations
Toward a Distributed Trust Management scheme for VANET
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting
Towards a Privacy Preserving and Flexible Scheme for Assessing the Credibility and the Accuracy of Safety Messages Exchanged in VANETs
Building a Knowledge Based Summarization System for Text Data Mining
Spanish Twitter Data Used As A Source Of Information About Consumer Food Choice
Feedback Matters! Predicting the Appreciation of Online Articles: A Data-Driven Approach
An investigation of a deep learning based malware detection system
Towards the Automatic Generation of Low-Interaction Web Application Honeypots
Learning Malware Using Generalized Graph Kernels
Denial-of-Service Attacks on LoRaWAN
Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain
Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection
A New Classification of Attacks against the Cyber-Physical Security of Smart Grids
Practical Precise Taint-flow Static Analysis for Android App Sets
Detection of Obfuscation Techniques in Android Applications
Tackling Android’s Native Library Malware with Robust, Efficient and Accurate Similarity Measures
A Combined CNN and LSTM Model for Arabic Sentiment Analysis
Between the Lines: Machine Learning for Prediction of Psychological Traits - a Survey
LawStats -- Large-scale German Court Decision Evaluation using Web Service Classifiers
Clinical Text Mining for Context Sequences Identification
Distributed and Cooperative firewall/controller in cloud environments
Cloud Architectures for Searchable Encryption
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot
Towards Wireless Secret key Agreement with LoRa Physical Layer
Secure Fixed-point Division for Homomorphically Encrypted Operands
Attribute Based Content Security and Caching in Information Centric IoT
Evidence Identification in Heterogenous Data Using Clustering
A Multi-Device Assistive System for Industrial Maintenance Operations
Feedback Presentation for Workers in Industrial Environments – Challenges and Opportunities
Meeting point:
17:30 in front of the University, buses leave at 17:40
Our Conference Dinner – a highlight at ARES 2018 – will take place right at the heart of Hamburg´s historical port area. Located at the centre of the Speicherstadt, the Experience Warehouse combines comfort with the flair of ancient merchant tradition.
After an aperitif you will get the chance to experience Hamburg´s most popular tourist attraction, the Miniature Wonderland. The biggest model railway exhibition impresses through lifelike scenery of European countries, the US, replica of Hamburg Airport and much more.
Wednesday
Time
08:00 - 16:30
09:30 - 10:30
Edgar Weippl, SBA Research
Dr. Joan Daemen, Radboud University, Security Architect at ST Microelectronics
10:30 - 11:00
11:00 - 12:30
Jose Manuel Rubio Hernán, Télécom SudParis, CNRS UMR 5157 SAMOVAR, Université Paris-Saclay
Martin Salfer (Technical University of Munich, Germany) and Claudia Eckert (Technical University of Munich, Germany)
Daniel Zelle, Markus Springer, Maria Zhdanova and Christoph Krauß (Fraunhofer, Germany)
Venu Babu Thati (Katholieke Universiteit Leuven, Belgium), Jens Vankeirsbilck (Katholieke Universiteit Leuven, Belgium), Niels Penneman (Televic Healthcare, Belgium), Davy Pissoort (Katholieke Universiteit Leuven, Belgium) and Jeroen Boydens (Katholieke Universiteit Leuven, Belgium)
Virginia Franqueira, University of Derby
Aleksandra Mileva, University of Goce Delcev, MK
Security Threats and Possible Countermeasures in Applications Covering Different Industry Domains
Musa Samaila, João Sequeiros, Mário Freire and Pedro Inácio
Wojciech Mazurczyk, Warsaw University of Technology
Natalia Stakhanova, University of New Brunswick, Canada
Yannikos, Annika Schäfer and Martin Steinebach
François Bouchaud, Gilles Grimaud and Thomas Vantroys
Klaus Kieseberg, SBA Research
Amira Kchaou, Ryma Abassi and Sihem Guemara El Fatmi
David Berend, Bernhard Jungk and Shivam Bhasin
Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi and Sihem Guemara El Fatmi
Constantions Mourlas, National & Kapodistrian University of Athens, Greece
Andrey Timofeyev and Ben Choi
Luis Gabriel Moreno Sandoval, Carolina Sanchez Barriga, Katherine Espindola Buitrago, Alexandra Pomares Quimbaya and Juan Carlos García Días
Catherine Sotirakou, Panagiotis Germanakos, Andreas Holzinger and Constantinos Mourlas
12:30 - 14:00
14:00 - 15:30
Johannes Blömer, University of Paderborn
Mohit Sewak, Sanjay Sahay and Hemant Rathore (BITS, Pilani, Department of CS & IS, Goa Campus, India)
Marius Musch (TU Braunschweig, Germany), Martin Johns (TU Braunschweig, Germany) andMartin Härterich (SAP Security Research, Germany)
Khanh Huu The Dam (LIPN and University Paris Diderot, France) and Tayssir Touili (LIPN, CNRS & University Paris 13, France)
Virginia Franqueira, University of Derby
Eef van Es, Harald Vranken and Arjen Hommersom
Towards In-Network Security for Smart Homes
Martin Serror, Martin Henze, Sacha Hack, Marko Schuba and Klaus Wehrle
On Track of Sigfox Confidentiality with End-to-End Encryption
Radek Fujdiak, Petr Petr, Konstantin Mikhaylov, Lukas Malina, Petr Mlynek, Jiri Misurec and Vojtech Blazek
Improved RNS-Based PRNGs
Alan Michaels
Krzysztof Cabaj, Warsaw University of Technology
Marek Pawlicki, Michal Choras and Rafal Kozik
Elena Doynikova, Andrey Fedorchenko and Igor Kotenko
Ghada Elbez, Hubert B. Keller and Veit Hagenmeyer
Klaus Kieseberg, SBA Research
William Klieber, Lori Flynn, William Snavely and Michael Zheng
Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet and Francesco Mercaldo
Anatoli Kalysch, Mykolai Protsenko, Oskar Milisterfer and Tilo Müller (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Philipp Cimiano, Universität Bielefeld
Abdulaziz Alayba, Vasile Palade, Matthew England and Rahat Iqbal
Dirk Johannßen and Chris Biemann
Eugen Ruppert, Dirk Hartung, Phillip Sittig, Tjorben Gschwander, Lennart Rönneburg, Tobias Killing and Chris Biemann
Svetla Boytcheva
15:30 - 16:00
16:00 - 17:20
Simon Tjoa, FH St. Pölten
Ferdaous Kamoun-Abid (NTS’COM, ENET’COM, Tunisia ), Amel Meddeb-Makhlouf (NTS’COM, ENET’COM, Tunisia), Faouzi Zarai (NTS’COM, ENET’COM, Tunisia) and Mohsen Guizani (ECE Department, University of Idaho, United States)
Johannes Blömer and Nils Löken (University of Paderborn, Germany)
Virginia Franqueira, University of Derby
Owen Lo, Bill Buchanan and Douglas Carson
Alberto Giaretta, Michele De Donno and Nicola Dragoni
Henri Ruotsalainen and Stepan Grebeniuk
Chibuike Ugwuoke, Zekeriya Erkin, Reginald Lagendijk
Nurefsan Sertbas, Samet Aytac, Orhan Ermis, Gurkan Ger, Faith Alagoz
Hussam Mohammed, Nathan Clarke, Fudong Li
Mario Heinz, Ostwestfalen-Lippe University of Applied Sciences
Mario Heinz, Hitesh Dhiman and Carsten Röcker
Mario Heinz and Carsten Röcker
17:30 - 23:00
Assessing Internet-wide Cyber Situational Awareness of Critical Sectors
Spreading Alerts Quietly: New Insights from Theory and Practice
A Reactive Defense Against Bandwidth Attacks Using Learning Automata
Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers
Mission-Centric Automated Cyber Red Teaming
Ransomware’s early mitigation mechanisms
A GDPR compliance module for supporting the exchange of information between CERTs
Keynote
-
Usable Privacy&Security Preserving Services in the Cloud
The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation
Keynote
Explainable AI: the new 42?
A Rule Extraction Study Based on a Convolutional Neural Network
ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus
Let’s shock our IoT’s heart: ARMv7-M under (fault) attacks
Enterprise WLAN Security Flaws: Current Attacks and Relative Mitigations
X.509 Certificate Error Testing
CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle
Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems
User privacy attitudes regarding proximity sensing
Critical Analysis of LPL according to Articles 12 - 14 of the GDPR
Privacy and DRM Requirements for Collaborative Development of AI Applications
Evaluating Explanations by Cognitive Value
Measures of model interpretability for model selection
Regular inference on artificial neural networks
Automating Car Design Studio with Generative Adversarial Networks (GAN)
What are Security Patterns? A Formal Model for Security and Design of Software
A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts
In)Secure Configuration Practices of WPA2 Enterprise Supplicants
Topological Characteristics of digital models of geological core
On a new method to build group equivariant operators by means of permutants
Shortened persistent homology for a biomedical retrieval system with relevance feedback
Thursday
Time
08:30 - 14:00
09:30 - 11:00
Christian Doerr, TU Delft
Martin Husák (Masaryk University, Czech Republic), Nataliia Neshenko (Florida Atlantic University, United States), Morteza Safaei Pour (Florida Atlantic University, United States), Elias Bou-Harb (Florida Atlantic University, United States) and Pavel Čeleda (Masaryk University, Czech Republic)
Olivier Blazy (Université de Limoges, France) and Céline Chevalier (ENS, France)
Nafiseh Kahani (Queen’s Univeristy, Canada) and Mehran Fallah (Amirkabir University of Technology, Iran)
Eduardo B. Fernandez, Florida Atlantic University
Omid Mir, Rene Mayrhofer, Michael Hölzl and Thanh-Binh Nguyen
Reputation-Based Security System For Edge Computing
Francis Nwebonyi, Rolando Martins and Manuel E. Correia
New authentication concept using certificates for big data analytic tools
Paul Velthuis, Marcel Schäfer and Martin Steinebach
Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set
Simon Duque Anton, Suneetha Kanoor, Daniel Fraunholz and Hans Dieter Schotten
Jungwoo Ryoo, Pennsylvania State University
Suneel Randhawa, Benjamin Turnbull, Joseph Yuen and Jonathan Dean
Ruta Mussaileb, Nora Cuppens, Jean Louis Lanet, Helene Bouder, Benjamin Bouget and Aurelien Palisse
Otto Hellwig, Gerald Quirchmayr, Walter Hötzendorfer, Christof Tschohl, Edith Huber, Franz Vock, Florian Nentwich, Bettina Pospisil, Matthias Gusenbauer and Gregor Langner
Max Maaß, TU-Darmstadt, Germany
Simone Fischer-Hübner, Karlstad University, Sweden
Jonas Walter, Bettina Abendroth, Thilo von Pape, Christian Plappert, Daniel Zelle, Christoph Krauß, Gundula Gagzow and Hendrik Decke
Andreas Holzinger, Medical University of Graz
Randy Goebel
Randy Goebel, Ajay Chander, Katharina Holzinger, Freddy Lecue, Zeynep Akata, Simone Stumpf, Peter Kieseberg, Andreas Holzinger
Guido Bologna
11:00 - 11:30
11:30 - 13:00
Jose Manuel Rubio Hernán, CNRS UMR 5157 SAMOVAR, Université Paris-Saclay
Tianxiang Huang (Chongqing University of Posts and Telecommunications, China), Jianying Zhou (Singapore University of Technology and Design, Singapore) and Andrei Bytes (Singapore University of Technology and Design, Singapore)
Sebanjila K. Bukasa (LHS-PEC INRIA-RBA, France), Ronan Lashermes (LHS-PEC INRIA-RBA, France), Jean-Louis Lanet (LHS-PEC INRIA-RBA, France) and Axel Legay (TAMIS INRIA-RBA, France)
Mohamed Abo-Soliman and Marianne Azer (Nile University, Egypt)
Aaron Visaggio, University of Sannio
David Mcluskie and Xavier Bellekens
Evaluating the degree of security of a system built using security patterns
Eduardo B. Fernandez, Nobukazu Yoshioka and Hironori Washizaki
Attack Difficulty Metric for Assessment of Network Security
Preetam Mukherjee and Chandan Mazumdar
Robustness Estimation of Infrastructure Networks: On the Usage of Degree Centrality
Sebastian Wandelt and Xiaoqian Sun
Simon Tjoa, St. Pölten University of Applied Sciences
Thomas Lorünser, Thomas Länger, Henrich C. Pöhls and Leon Sell
Priya Anand and Jungwoo Ryoo
Dr. Jörg Daubert, TU-Darmstadt
Håkan Jonsson and Carl Magnus Olsson
Armin Gerl and Dirk Pohl
Vida Ahmadi Mehri, Dragos Ilie and Kurt Tutschku
Andreas Holzinger, Medical University of Graz
Ajay Chander and Ramya Srinivasan
André M. Carrington, Paul Fieguth and Helen Chen
Franz Mayr and Sergio Yovine
Sreedhar Radhakrishnan, Varun Bharadwaj, Varun Manjunath and Ramamoorthy Srinath.
Creative Intelligence
13:00 - 14:00
14:00 - 15:30
Martin Husák, Masaryk University
Anika Behrens (University of Bremen, Germany)
Gerardo Canfora, Andrea Di Sorbo, Enrico Emanuele, Sara Forootani and Corrado A. Visaggio (University of Sannio, Italy)
Alberto Bartoli (Università degli Studi di Trieste – DEEI, Italy), Eric Medvet (DI3 – University of Trieste, Italy), Fabiano Tarlao (Department of Engineering and Architecture, University of Trieste, Italy) and Andrea De Lorenzo (University of Trieste – DIA, Italy)
Massimo Ferri, University of Bologna
Rustem Gilmanov, Iskander Taymanov, Alexander Kalyuzhnyuk and Andrey Yakovlev
Francesco Camporesi, Patrizio Frosini and Nicola Quercioli
Alessia Angeli, Massimo Ferri, Eleonora Monti and Ivan Tomba
15:30 - 15:45