Below you can find the program of ARES / CD-MAKE 2018.
Your registration includes the entrance to all ARES / CD-MAKE conference, ARES EU Workshop Symposium and workshop sessions as well as social events!
The ICS-CSR 2018 Conference will be held in conjunction with ARES 2018. The program of ICS-CSR can be found here: Program. If you are interested in participating both ARES 2018 & ICS-CSR 2018, a combined ticket is now available. More details.
Monday
Time |
Track 1: ARES EU Projects Symposium
LH F (220)
|
Track 2: ARES EU Projects Symposium
LH C (120)
|
Track 3: ARES EU Projects Symposium
LH D (121)
|
Track 4: ARES EU Projects Symposium
LH E (122)
|
Track 5: ARES
LH G (221)
|
---|---|---|---|---|---|
09:30 - 17:45 |
Registration
Foyer
|
||||
10:15 - 11:30 |
ARES & ARES EU Projects Symposium Opening
Opening & Keynote
Session Chair:
Edgar Weippl, SBA Research
Lecture Hall A
Opening:
Keynote:
A Next-generation Secure Internet for the 21st Century
|
||||
11:45 - 12:45 |
5G-NS I
Welcome & Keynote
Session Chair:
Wojciech Mazurczyk & Krzysztof Cabaj, Warsaw University of Technology, Pascal Bisson, Thales, France
LH F (220)
Welcome message Keynote : Peter Schneider, Nokia Bell Labs, Germany |
CyberTIM I
Opening
Session Chair:
Dr. Sheikh Mahbub Habib, Continental AG
LH C (120)
Keynote I:
"
Cyber Security Threat Intelligence: Challenges and Research Opportunities
"
|
IWOCCTN I
Session Chair:
Andrea Tundis, Technische Universität Darmstadt (TUDA) Matteo Bonfanti, ETH Center for Security Studies
LH D (121)
Introductory talk
:
An overview on the H2020 TAKEDOWN Project
|
ECoSP I
Session Chair:
Jon Shamah, EEMEA
LH E (122)
ANASTACIA - Advanced Networked Agents for Security and Trust Assessment in CPS / iOT Architectures
SAINT - Cyber threat risk and cost assessment: tangible and intangible factors
YAKSHA - Automating honeypot deployment and malware analytics
FORTIKA
- The FORTIKA Paradigm: Cyber Security Accelerator for trusted SMEs IT Ecosystem
|
ARES Full I
Machine Learning
Session Chair:
Martin Pirker, FH St. Pölten
LH G (221)
Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Image
FALKE-MC: A Neural Network Based Approach to Locate Cryptographic Functions in Machine Code
|
12:45 - 14:00 |
Lunch
|
||||
14:00 - 15:30 |
5G-NS II
Session Chair:
Pascal Bisson, Thales, France
LH F (220)
To Trust or Not to Trust: Data Origin Authentication for Group Communication in 5G Networks
|
CyberTIM II
Attack Detection and Mitigation
Session Chair:
Dr. Emmanouil Vasilomanolakis, TU Darmstadt
LH C (120)
Evaluation of Apache Spot’s machine learning capabilities in an SDN/NFV enabled environment
Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments
Augmented DDoS Mitigation with Reputation Scores
The challenge of detecting sophisticated attacks: Insights from SOC Analysts
|
IWOCCTN II
Cyber Organized Crime and Terrorism
Session Chair:
Matteo Bonfanti, ETH Center for Security Studies
LH D (121)
Conceptualizing the digital TAKEDOWN platforms for supporting first-line-practitioners and law enforcement agencies
The AWID and TAKEDOWN prevention approach. The generation of a holistic good practice model for prevention of radicalization in youth work
A review of network vulnerabilities scanning tools: types, capabilities and functioning
|
ECoSP II
Session Chair:
Jon Shamah, EEMEA
LH E (122)
CYBECO - Supporting cyber insurance from a behavioural choice perspective
SISSDEN - Avoiding cyber-threat detection evasion techniques
CIPSEC
- Enhancing Critical infrastructure Protection with innovative SECurity framework
CS-AWARE - Cybersecurity situational awareness and information sharing solution
RED-Alert - Use of Social Media Forensics in the Early Detection of Terrorist Activities - European Project RED-Alert Approach
Truessec.eu - Privacy and Cybersecurity Trust-Enhancing Labels
|
ARES Full II
Best Paper Session
Session Chair:
Christian Doerr, TU Delft
LH G (221)
Secure Equality Testing Protocols in the Two-Party Setting
Android authorship attribution through string analysis
Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services
|
15:30 - 16:00 |
Coffee Break
|
||||
16:00 - 17:30 |
5G-NS III
Session Chair:
Wojciech Mazurczyk, Warsaw University of Technology
LH F (220)
Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service
A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation
SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System
|
CyberTIM III
Threat Intelligence Sharing
Session Chair:
Marcin Przybyszewski, ITTI
LH C (120)
Mission-Centric Risk Assessment to Improve Cyber Situational Awareness
The Mouseworld, a security traffic analysis lab based on NFV/SDN
Risks of Sharing Cyber Incident Information
Hunting Observable Objects for Indication of Compromise
|
IWOCCTN III
Cyber Security
Session Chair:
Andrea Tundis, Technische Universität Darmstadt (TUDA)
LH D (121)
Challenges of Cryptocurrencies Forensics – A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals
Enhancing Cyber-Security by Safeguarding Information Privacy: the European Union and the Implementation of the “Data Protection by Design” Approach
Cybercrime and Organized Crime
|
ECoSP III
Session Chair:
Jorge Bernal Bernabe, University of Murcia (UMU)
LH E (122)
ARIES - Architecture for a Reliable European Identity Ecosystem
LIGHTest - LIGHTest Automated Trust Verification
CREDENTIAL
- Design and Implementation of Privacy-Friendly Web-Based Authentication in CREDENTIAL
FutureTrust - FutureTrust extending the eIDAS reach
SPECIAL - New ways for informed consent and transparency under the GDPR with technical specifications
LEPS |
ARES Full III
Software Security
Session Chair:
Alexander Aigner, University of Applied Sciences Upper Austria
LH G (221)
Discovering software vulnerabilities using data-flow analysis and machine learning
Speeding Up Bug Finding using Focused Fuzzing
HYDRA- Hypothesis Driven Repair Automation
|
17:30 - 17:40 |
Room switch
|
||||
17:40 - 18:40 |
5G-NS IV
Session Chair:
Krzysztof Cabaj, Warsaw University of Technology
LH F (220)
Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments
Framework for Security Event Management in 5G
|
CyberTIM IV
Session Chair:
Dr. Sheikh Mahbub Habib, Continental AG
LH C (120)
Keynote II : Prof. Dr. Hervé Debar (Telecom SudParis) “ Reasoning about alert formats: a comparative study ”
Closing remarks
|
SECPID
Session Chair:
Stephan Krenn, AIT Austrian Institute of Technology GmbH, Austria
LH D (121)
17:40-19:10
Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials
Definitions for Plaintext-Existence Hiding in Cloud Storage
Fully-Featured Anonymous Credentials with Reputation System
|
PCSCP
Session Chair:
Stefan Schauer, AIT Austrian Institute of Technology
LH H (222)
17:30-19:10
An Overview of the SAURON Project
|
ARES Full IV
Network Security and Monitoring I
Session Chair:
Paul Smith, AIT Austrian Institute of Technology
LH G (221)
A Framework for Monitoring Net Neutrality
|
19:00 - 21:30 |
University of Hamburg (East-Wing Foyer)
Meeting point: 19:00 in the foyer of the University Get a taste of Hamburg´s cuisine and culture at this year´s ARES reception. Fish buns, local craft beer and the performance of a shanty-choir will get you in the mood for a great conference.
19:15: Opening, Anja Diek (chief officer in the Hamburg Ministry of Science, Research and Equalities)
|
Tuesday
Time |
Track 1: ARES
LH G (221)
|
Track 2: Workshops
LH H (222)
|
Track 3: Workshops
LH D (121)
|
Track 4: Workshops
LH E (122)
|
Track 5: CD-MAKE
LH C (120)
|
---|---|---|---|---|---|
08:00 - 16:30 |
Registration
Foyer
|
||||
09:00 - 10:30 |
ARES Full V
Cryptography
Session Chair:
Edgar Weippl, SBA Research
LH G (221)
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme
Non-Interactive Key Exchange from Identity-Based Encryption
|
CUING I
Introduction & Keynote
Session Chair:
Wojciech Mazurczyk, Warsaw University of Technology & Joerg Keller, FernUniversitaet in Hagen, Germany
LH H (222)
Welcome Message
Introductory talk I: Criminal Use of Information Hiding Initiative – an update
Introductory talk II: CUING and CTI (Cyber Threat Intelligence)
Keynote
: Europol's European Cybercrime Centre - a networked approach
|
WSDF I
Session Chair:
Richard Overill, King's College London
LH D (121)
Keynote
:
Structured Argumentation in Digital Forensic Practice: Opportunity or Burden?
Digital Forensics in the Next Five Years
|
WCTI I
Session Chair:
Christian Dörr, TU Delft
LH E (122)
CRUSOE: Data Model for Cyber Situation Awareness
|
|
10:30 - 11:00 |
Coffee Break
|
||||
11:00 - 12:00 |
CD-MAKE I
Keynote & Discussion
Session Chair:
Andreas Holzinger, Medical University Graz
Lecture Hall A
Keynote
:
Machine learning and AI for the sciences – towards understanding
|
||||
12:00 - 13:15 |
Lunch
|
||||
13:15 - 14:45 |
ARES Full VI
Anomaly Detection
Session Chair:
Csilla Farkas, University of South Carolina
LH G (221)
Behavioural Comparison of Systems for Anomaly Detection
Converting Unstructured System Logs into Structured Event List for Anomaly Detection
Stealthy Attacks on Smart Grid PMU State Estimation
|
CUING II
Session Chair:
Angelo Consoli Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland
LH H (222)
Channel Steganalysis
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach
Steganography by synthesis - Can commonplace image manipulations like face morphing create plausible steganographic channels?
|
WSDF II
Session Chair:
Richard Overill, King's College London
LH D (121)
Forensic APFS File Recovery
Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits
I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out
|
WCTI II
Session Chair:
Christian Dörr, TU Delft
LH E (122)
Keynote
Roundtable |
CD-Make II
Session Chair:
Francesco Buccafurri, Mediterranean University of Reggio Calabria, Italy
LH C (120)
A Modified Particle Swarm Optimization Algorithm for Community Detection in Complex Networks
Mouse tracking measures and movement patterns with application for online surveys
|
14:45 - 15:15 |
Coffee Break
|
||||
15:15 - 16:15 |
ARES Full VII
Security and the User
Session Chair:
Melanie Volkamer, Karlsruhe Institute of Technology
LH G (221)
Protecting Patients’ Data: An Efficient Method for Health Data Privacy
|
CUING III
Session Chair:
Joerg Keller, FernUniversitaet in Hagen, Germany
LH H (222)
Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach
Get Me Cited, Scotty! Analysis of Academic Publications in Covert Channel Research
|
WSDF III
Session Chair:
Richard Overill, King's College London
LH D (121)
Breaking down violence: A deep-learning strategy to model and classify violence in videos
Digitally Signed and Permission Restricted PDF Files: a Case Study on Digital Forensics
Investigating the Use of Online Open Source Information as Evidence in European Courts
|
IWSECC I
Security Implementations for Cloud Computing
Session Chair:
Dr. Antonio Muñoz, University of Málaga
LH E (122)
A Process Framework for Stakeholder-specific Visualization of Security Metrics
A reference architecture for the container ecosystem
A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures
|
CD-MAKE III
Session Chair:
Svetla Boytcheva, Bulgarian Academy of Sciences, Sofia
LH C (120)
Knowledge compilation techniques for model-based diagnosis of complex active systems
|
16:15 - 16:30 |
short Coffee Break
|
||||
16:30 - 17:30 |
ARES Full VIII
Network Security and Monitoring II
Session Chair:
Chibuike Ugwuoke, TU Delft
LH G (221)
A Pyramidal-based Model to Compute the Impact of Cyber Security Events
ToGather: Towards Automatic Investigation of Android Malware Cyber-Infrastructures
|
CUING IV
Session Chair:
Klaus Kieseberg, SBA Research
LH H (222)
Towards Utilization of Covert Channels as a Green Networking Technique
Enhanced Electromagnetic Side-channel Eavesdropping Attacks on Computer Monitors
|
SSE
Secure software development and DevOps
Session Chair:
Juha Röning, University of Oulu
LH F (220)
Keynote
: DevOps is the key for Continous Security: RMF, ATO and beyond
Surveying Secure Software Development Practices in Finland
Challenges and Mitigation Approaches for Getting Secured Applications in a Big Company
Software Security Activities that Support Incident Management in Secure DevOps
|
IWSECC II
Security Engineering Solutions for Cloud Computing
Session Chair:
Eduardo B. Fernandez, Florida Atlantic University
LH E (122)
Security Wrapper Orchestration in Cloud
IWSECC Interactive Forum Discussion (Track Dr. Antonio Muñoz) |
CD-MAKE IV
Session Chair:
Panagiotis Germanakos, SAP SE & University of Cyprus
LH C (120)
An Efficient Approach for Extraction Positive and Negative Association Rules in Big Data
|
17:30 - 20:00 |
Meeting Point: 17:30 in front of the University, buses leave at 17:40 We will take you on an evening Harbour Cruise. Experience the multifaceted Port of Hamburg, see and learn about its most interesting places. Our cruise will take us through Hafencity, Speicherstadt (depending on the tide), watergates and canals. |
Wednesday
Time |
Track 1: ARES
LH D (121)
|
Track 2: Workshops
LH H (222)
|
Track 3: Workshops
LH E (122)
|
Track 4: Workshops
LH F (220)
|
Track 5: CD-MAKE
LH C (120)
|
|
---|---|---|---|---|---|---|
08:00 - 16:30 |
Registration
Foyer
|
|||||
09:30 - 10:30 |
ARES Keynote Session
Session Chair:
Edgar Weippl, SBA Research
Lecture Hall A
Keynote
:
Innovations in permutation-based crypto
|
|||||
10:30 - 11:00 |
Coffee Break
|
|||||
11:00 - 12:30 |
ARES Full IX
Automotive
Session Chair:
Jose Manuel Rubio Hernán, Télécom SudParis, CNRS UMR 5157 SAMOVAR, Université Paris-Saclay
LH D (121)
Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks
Anonymous Charging and Billing of Electric Vehicles
Comparison of Data Flow Error Detection Techniques in Embedded Systems: an Empirical Study
|
IoT-SECFOR I
Welcome
Session Chair:
Virginia Franqueira, University of Derby
LH H (222)
Keynote:
Steganography in the World of IoT
|
IWCC I
Session Chair:
Wojciech Mazurczyk, Warsaw University of Technology
LH E (122)
Keynote
:
Reality of malware author attribution
Monitoring Product Sales in Darknet Shops
IoT Forensic: identification and classification of evidence in criminal investigations
|
IWSMA I
Session Chair:
Klaus Kieseberg, SBA Research
LH F (220)
Toward a Distributed Trust Management scheme for VANET
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting
Towards a Privacy Preserving and Flexible Scheme for Assessing the Credibility and the Accuracy of Safety Messages Exchanged in VANETs
|
CD-MAKE V
Session Chair:
Constantions Mourlas, National & Kapodistrian University of Athens, Greece
LH C (120)
Building a Knowledge Based Summarization System for Text Data Mining
Spanish Twitter Data Used As A Source Of Information About Consumer Food Choice
Feedback Matters! Predicting the Appreciation of Online Articles: A Data-Driven Approach
|
|
12:30 - 14:00 |
Lunch
|
|||||
14:00 - 15:30 |
ARES Short I
Malware
Session Chair:
Johannes Blömer, University of Paderborn
LH D (121)
An investigation of a deep learning based malware detection system
Towards the Automatic Generation of Low-Interaction Web Application Honeypots
Learning Malware Using Generalized Graph Kernels
|
IoT-SECFOR II
Security Attacks & Solutions
Session Chair:
Virginia Franqueira, University of Derby
LH H (222)
Denial-of-Service Attacks on LoRaWAN
|
IWCC II
Session Chair:
Krzysztof Cabaj, Warsaw University of Technology
LH E (122)
Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain
Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection
A New Classification of Attacks against the Cyber-Physical Security of Smart Grids
|
IWSMA II
Session Chair:
Klaus Kieseberg, SBA Research
LH F (220)
Practical Precise Taint-flow Static Analysis for Android App Sets
Detection of Obfuscation Techniques in Android Applications
Tackling Android’s Native Library Malware with Robust, Efficient and Accurate Similarity Measures
|
MAKE-Text
Session Chair:
Philipp Cimiano, Universität Bielefeld
LH C (120)
A Combined CNN and LSTM Model for Arabic Sentiment Analysis
Between the Lines: Machine Learning for Prediction of Psychological Traits - a Survey
LawStats -- Large-scale German Court Decision Evaluation using Web Service Classifiers
Clinical Text Mining for Context Sequences Identification
|
|
15:30 - 16:00 |
Coffe Break
|
|||||
16:00 - 17:20 |
ARES Full X
Cloud Security
Session Chair:
Simon Tjoa, FH St. Pölten
LH D (121)
Distributed and Cooperative firewall/controller in cloud environments
Cloud Architectures for Searchable Encryption
|
IoT-SECFOR III
Security Assessment & Analysis
Session Chair:
Virginia Franqueira, University of Derby
LH H (222)
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot
Towards Wireless Secret key Agreement with LoRa Physical Layer
|
SPEBD
LH E (122)
Secure Fixed-point Division for Homomorphically Encrypted Operands
Attribute Based Content Security and Caching in Information Centric IoT
Evidence Identification in Heterogenous Data Using Clustering
|
MAKE-Smart Factory
Session Chair:
Mario Heinz, Ostwestfalen-Lippe University of Applied Sciences
LH C (120)
A Multi-Device Assistive System for Industrial Maintenance Operations
Feedback Presentation for Workers in Industrial Environments – Challenges and Opportunities
|
||
17:30 - 23:00 |
Hamburg City Center
Meeting point: 17:30 in front of the University, buses leave at 17:40 Our Conference Dinner – a highlight at ARES 2018 – will take place right at the heart of Hamburg´s historical port area. Located at the centre of the Speicherstadt, the Experience Warehouse combines comfort with the flair of ancient merchant tradition. After an aperitif you will get the chance to experience Hamburg´s most popular tourist attraction, the Miniature Wonderland. The biggest model railway exhibition impresses through lifelike scenery of European countries, the US, replica of Hamburg Airport and much more. |
Thursday
Time |
Track 1: ARES
LH D (121)
|
Track 2: Workshops
LH H (222)
|
Track 3: Workshops
LH E (122)
|
Track 4: Workshops
LH F (220)
|
Track 5: CD-MAKE
LH C (120)
|
|
---|---|---|---|---|---|---|
08:30 - 14:00 |
Registration
Foyer
|
|||||
09:30 - 11:00 |
ARES Short II
Monitoring
Session Chair:
Christian Doerr, TU Delft
LH D (121)
Assessing Internet-wide Cyber Situational Awareness of Critical Sectors
Spreading Alerts Quietly: New Insights from Theory and Practice
A Reactive Defense Against Bandwidth Attacks Using Learning Automata
|
FARES I
Protection and Detection
Session Chair:
Eduardo B. Fernandez, Florida Atlantic University
LH H (222)
Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers
|
SAW I
Session Chair:
Jungwoo Ryoo, Pennsylvania State University
LH E (122)
Mission-Centric Automated Cyber Red Teaming
Ransomware’s early mitigation mechanisms
A GDPR compliance module for supporting the exchange of information between CERTs
|
iPAT I
Session Chair:
Max Maaß, TU-Darmstadt, Germany
LH F (220)
Keynote
-
Usable Privacy&Security Preserving Services in the Cloud
The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation
|
MAKE-Explainable AI I
Session Chair:
Andreas Holzinger, Medical University of Graz
LH C (120)
Keynote
Explainable AI: the new 42?
A Rule Extraction Study Based on a Convolutional Neural Network
|
|
11:00 - 11:30 |
Coffee Break
|
|||||
11:30 - 13:00 |
ARES Short III
Attacks and Mitigation
Session Chair:
Jose Manuel Rubio Hernán, CNRS UMR 5157 SAMOVAR, Université Paris-Saclay
LH D (121)
ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus
Let’s shock our IoT’s heart: ARMv7-M under (fault) attacks
Enterprise WLAN Security Flaws: Current Attacks and Relative Mitigations
|
FARES II
Session Chair:
Aaron Visaggio, University of Sannio
LH H (222)
X.509 Certificate Error Testing
|
SAW II
Session Chair:
Simon Tjoa, St. Pölten University of Applied Sciences
LH E (122)
CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle
Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems
|
iPAT II
Session Chair:
Dr. Jörg Daubert, TU-Darmstadt
LH F (220)
User privacy attitudes regarding proximity sensing
Critical Analysis of LPL according to Articles 12 - 14 of the GDPR
Privacy and DRM Requirements for Collaborative Development of AI Applications
|
MAKE-Explainable AI II
Session Chair:
Andreas Holzinger, Medical University of Graz
LH C (120)
Evaluating Explanations by Cognitive Value
Measures of model interpretability for model selection
Regular inference on artificial neural networks
Automating Car Design Studio with Generative Adversarial Networks (GAN)
|
|
13:00 - 14:00 |
Lunch
+ CD-MAKE Journal Editorial Board meeting (Room 221, East Wing)
|
|||||
14:00 - 15:30 |
ARES Short IV
Security Practices
Session Chair:
Martin Husák, Masaryk University
LH D (121)
What are Security Patterns? A Formal Model for Security and Design of Software
A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts
In)Secure Configuration Practices of WPA2 Enterprise Supplicants
|
CD-MAKE Topology
Session Chair:
Massimo Ferri, University of Bologna
LH C (120)
Topological Characteristics of digital models of geological core
On a new method to build group equivariant operators by means of permutants
Shortened persistent homology for a biomedical retrieval system with relevance feedback
|
||||
15:30 - 15:45 |
short Coffee Break
|