default search action
19th ARES 2024: Vienna, Austria
- Proceedings of the 19th International Conference on Availability, Reliability and Security, ARES 2024, Vienna, Austria, 30 July 2024 - 2 August 2024. ACM 2024, ISBN 979-8-4007-1718-5
ARES 2024 Research Article
- Johannes Wilson, Mikael Asplund, Niklas Johansson, Felipe Boeira:
Provably Secure Communication Protocols for Remote Attestation. 1:1-1:12 - Sarah Abdelwahab Gaballah, Lamya Abdullah, Max Mühlhäuser, Karola Marky:
Let the Users Choose: Low Latency or Strong Anonymity? Investigating Mix Nodes with Paired Mixing Techniques. 2:1-2:11 - Alessandro Palma, Nicola Bartoloni, Marco Angelini:
BenchIMP: A Benchmark for Quantitative Evaluation of the Incident Management Process Assessment. 3:1-3:12 - Stephan Wiefling, Marian Hönscheid, Luigi Lo Iacono:
A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web. 4:1-4:12 - Rahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Dali Kaafar:
Privacy Preserving Release of Mobile Sensor Data. 5:1-5:13 - Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon, Vincent Naessens:
Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledge. 6:1-6:12 - Luis Ibanez-Lissen, José María de Fuentes, Lorena González-Manzano, Nicolas Anciaux:
Continuous Authentication Leveraging Matrix Profile. 7:1-7:13 - Dominik Lorych, Christian Plappert:
Hardware Trust Anchor Authentication for Updatable IoT Devices. 8:1-8:11 - Michael Eckel, Sigrid Gürgens:
SECURA: Unified Reference Architecture for Advanced Security and Trust in Safety Critical Infrastructures. 9:1-9:13 - Huancheng Hu, Afshin Zivi, Christian Doerr:
Dealing with Bad Apples: Organizational Awareness and Protection for Bit-flip and Typo-Squatting Attacks. 10:1-10:11 - Dustin Kern, Christoph Krauß, Matthias Hollick:
Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains. 11:1-11:12 - Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao:
Subjective Logic-based Decentralized Federated Learning for Non-IID Data. 12:1-12:11 - Riccardo Taiello, Melek Önen, Clémentine Gritti, Marco Lorenzi:
Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Stragglers. 13:1-13:12 - Zhenlu Sun, André M. H. Teixeira, Salman Toor:
GNN-IDS: Graph Neural Network based Intrusion Detection System. 14:1-14:12 - Bibek Bhattarai, H. Howie Huang:
Prov2vec: Learning Provenance Graph Representation for Anomaly Detection in Computer Systems. 15:1-15:14 - Arthur Tran Van, Olivier Levillain, Hervé Debar:
Mealy Verifier: An Automated, Exhaustive, and Explainable Methodology for Analyzing State Machines in Protocol Implementations. 16:1-16:10 - Hooman Asadian, Paul Fiterau-Brostean, Bengt Jonsson, Konstantinos Sagonas:
Monitor-based Testing of Network Protocol Implementations Using Symbolic Execution. 17:1-17:12 - Tamir Tassa, Lihi Dery:
Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting Rules. 18:1-18:11 - Kai Hölk, Wojciech Mazurczyk, Marco Zuppelli, Luca Caviglione:
Investigating HTTP Covert Channels Through Fuzz Testing. 19:1-19:9 - Kurt A. Vedros, Constantinos Kolias, Daniel Barbará, Robert C. Ivans:
From Code to EM Signals: A Generative Approach to Side Channel Analysis-based Anomaly Detection. 20:1-20:10 - Michael Mundt, Harald Baier, Antje Raab-Düsterhöft:
Towards Reducing Business-Risk of Data Theft Implementing Automated Simulation Procedures of Evil Data Exfiltration. 21:1-21:12 - Robin Duraz, David Espes, Julien Francq, Sandrine Vaton:
SECL: A Zero-Day Attack Detector and Classifier based on Contrastive Learning and Strong Regularization. 22:1-22:12 - Majed Jaber, Nicolas Boutry, Pierre Parrend:
Graph-Based Spectral Analysis for Detecting Cyber Attacks. 23:1-23:14 - Thomas Prantl, Marco Lauer, Lukas Horn, Simon Engel, David Dingel, André Bauer, Christian Krupitzer, Samuel Kounev:
Security Analysis of a Decentralized, Revocable and Verifiable Attribute-Based Encryption Scheme. 24:1-24:11 - Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, Liang Zhao:
Secure Noise Sampling for DP in MPC with Finite Precision. 25:1-25:12 - Shoei Nashimoto, Rei Ueno, Naofumi Homma:
Comparative Analysis and Implementation of Jump Address Masking for Preventing TEE Bypassing Fault Attacks. 26:1-26:12 - Darren Hurley-Smith, Alastair P. Droop, Remy Lyon, Roxana Teodor:
Extracting Randomness from Nucleotide Sequencers for use in a Decentralised Randomness Beacon. 27:1-27:12 - Yuwen Zou, Wenjun Fan, Zhen Ma:
Unveiling Vulnerabilities in Bitcoin's Misbehavior-Score Mechanism: Attack and Defense. 28:1-28:12 - Davide Bove:
A Large-Scale Study on the Prevalence and Usage of TEE-based Features on Android. 29:1-29:11 - Yu-Chang Chen, Shih-Wei Li:
HeMate: Enhancing Heap Security through Isolating Primitive Types with Arm Memory Tagging Extension. 30:1-30:11 - Viktor Engström, Giuseppe Nebbione, Mathias Ekstedt:
A Metalanguage for Dynamic Attack Graphs and Lazy Generation. 31:1-31:11 - Xinyu Zhang, Siddharth Muralee, Sourag Cherupattamoolayil, Aravind Machiry:
On the Effectiveness of Large Language Models for GitHub Workflows. 32:1-32:14 - Ádám Ruman, Martin Drasar, Lukás Sadlek, Shanchieh Jay Yang, Pavel Celeda:
Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. 33:1-33:11 - Patrício Domingues, Miguel Frade, Miguel Negrão:
Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11. 34:1-34:10 - Antonia Welzel, Rebekka Wohlrab, Mazen Mohamad:
Increasing the Confidence in Security Assurance Cases using Game Theory. 35:1-35:13
ARES 2024 Short Research Papers
- Thibault Cholez, Claudia-Lavinia Ignat:
Sybil Attack Strikes Again: Denying Content Access in IPFS with a Single Computer. 36:1-36:7 - Christoph Wech, Reinhard Kugler, Manuel Leithner, Dimitris E. Simos:
Combinatorial Testing Methods for Reverse Engineering Undocumented CAN Bus Functionality. 37:1-37:7 - Theresa Kriecherbauer, Richard Schwank, Adrian Krauss, Konstantin Neureither, Lian Remme, Melanie Volkamer, Dominik Herrmann:
Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners. 38:1-38:7 - Alexander Günther, Sebastian Vollmer, Peter Liggesmeyer:
Confidence-Aware Fault Trees. 39:1-39:7 - Dmitrii Belimov, Evgenii Vinogradov:
Reverse Engineered MiniFS File System. 40:1-40:7
ARES 2024 Research Article
- Raphael Simon, Wim Mees:
SoK: A Comparison of Autonomous Penetration Testing Agents. 41:1-41:10 - Sara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert:
SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and Challenges. 42:1-42:13 - Claudia Ruggiero, Pietro Mazzini, Emilio Coppa, Simone Lenti, Silvia Bonomi:
SoK: A Unified Data Model for Smart Contract Vulnerability Taxonomies. 43:1-43:13 - Richard May, Jacob Krüger, Thomas Leich:
SoK: How Artificial-Intelligence Incidents Can Jeopardize Safety and Security. 44:1-44:12 - Matteo Brosolo, Vinod Puthuvath, Asmitha KA, Rafidha Rehiman K. A., Mauro Conti:
SoK: Visualization-based Malware Detection Techniques. 45:1-45:13 - Vassilis Papaspirou, Ioanna Kantzavelou, Yagmur Yigit, Leandros Maglaras, Sokratis K. Katsikas:
A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication Mechanism. 46:1-46:9 - Hanning Zhao, Bilhanan Silverajan:
Evaluating Cyber Security Dashboards for Smart Cities and Buildings: Enhancing User Modeling with LLMs. 47:1-47:10 - Vijay Jayadev, Naghmeh Moradpoor, Andrei Petrovski:
Assessing the Performance of Ethereum and Hyperledger Fabric Under DDoS Attacks for Cyber-Physical Systems. 48:1-48:6 - Oliver Eigner, Hubert Schölnast, Paul Tavolato:
How to Find out What's Going on in Encrypted Smart Meter Networks - without Decrypting Anything. 49:1-49:6 - Pouria Rad, Gokila Dorai, Mohsen M. Jozani:
From Seaweed to Security: Harnessing Alginate to Challenge IoT Fingerprint Authentication. 50:1-50:10 - Matthew Reaney, Kieran McLaughlin, James Grant:
Network Intrusion Response using Deep Reinforcement Learning in an Aircraft IT-OT Scenario. 51:1-51:7 - Konstantina Milousi, Prodromos Kiriakidis, Notis Mengidis, Georgios Rizos, Mariana S. Mazi, Antonis Voulgaridis, Konstantinos Votis, Dimitrios Tzovaras:
Evaluating Cybersecurity Risk: A Comprehensive Comparison of Vulnerability Scoring Methodologies. 52:1-52:11 - Pushparaj Bhosale, Wolfgang Kastner, Thilo Sauter:
Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach. 53:1-53:9 - Ben Swierzy, Felix Boes, Timo Pohl, Christian Bungartz, Michael Meier:
SoK: Automated Software Testing for TLS Libraries. 54:1-54:12 - Andreas Halbritter, Dominik Merli:
Accuracy Evaluation of SBOM Tools for Web Applications and System-Level Software. 55:1-55:9 - Eddie Billoir, Romain Laborde, Ahmad Samer Wazan, Yves Rütschlé, Abdelmalek Benzekri:
Enhancing Secure Deployment with Ansible: A Focus on Least Privilege and Automation for Linux. 56:1-56:7 - Luca Ardito:
Behavioural Modelling for Sustainability in Smart Homes. 57:1-57:11 - Thomas Hoad, Erisa Karafili:
A Web Browser Plugin for Users' Security Awareness. 58:1-58:7 - Giuseppe Marco Bianco, Luca Ardito, Michele Valsesia:
A tool for IoT Firmware Certification. 59:1-59:7 - Niels Pfau, Patrick Kochberger:
Analysis of the Windows Control Flow Guard. 60:1-60:11 - Alessandro Aldini, Tommaso Petrelli:
Image-based detection and classification of Android malware through CNN models. 61:1-61:11 - Christoph Dorner, Lukas Daniel Klausner:
If It Looks Like a Rootkit and Deceives Like a Rootkit: A Critical Examination of Kernel-Level Anti-Cheat Systems. 62:1-62:11 - Léo Lavaur, Yann Busnel, Fabien Autrel:
Systematic Analysis of Label-flipping Attacks against Federated Learning in Collaborative Intrusion Detection Systems. 63:1-63:12 - Salvador Llopis Sánchez, David Lopes Antunes:
Operation Assessment in cyberspace: Understanding the effects of Cyber Deception. 64:1-64:8 - Marta Irene García Cid, Michail-Alexandros Kourtis, David Domingo Martín, Nikolay Tcholtchev, Evangelos K. Markakis, Marcin Niemiec, Javier Faba, Laura Ortíz, Vicente Martín, Diego R. López, George Xilouris, Maria Gagliardi, José González, Miguel García, Giovanni Comandè, Nikolai Stoianov:
PQ-REACT: Post Quantum Cryptography Framework for Energy Aware Contexts. 65:1-65:7 - Jan Schröder, Jakub Breier:
RMF: A Risk Measurement Framework for Machine Learning Models. 66:1-66:6 - Tengfei Yang, Yuansong Qiao, Brian Lee:
Exploring the influence of the choice of prior of the Variational Auto-Encoder on cybersecurity anomaly detection. 67:1-67:9 - Florian Kammueller:
Analyzing Air-traffic Security using GIS-"blur' with Information Flow Control in the IIIf. 68:1-68:8 - Markus Wurzenberger, Stephan Krenn, Max Landauer, Florian Skopik, Cora Lisa Perner, Jarno Lötjönen, Jani Päijänen, Georgios Gardikis, Nikos Alabasis, Liisa Sakerman, Kristiina Omri, Juha Röning, Kimmo Halunen, Vincent Thouvenot, Martin Weise, Andreas Rauber, Vasileios Gkioulos, Sokratis K. Katsikas, Luigi Sabetta, Jacopo Bonato, Rocío Ortíz, Daniel Navarro, Nikolaos Stamatelatos, Ioannis Avdoulas, Rudolf Mayer, Andreas Ekelhart, Ioannis Giannoulakis, Emmanouil Kafetzakis, Antonello Corsi, Ulrike Lechner, Corinna Schmitt:
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence. 69:1-69:11 - Georgi Nikolov, Axelle Perez, Wim Mees:
Evaluation of Cyber Situation Awareness - Theory, Techniques and Applications. 70:1-70:10 - Florian Skopik, Benjamin Akhras, Elisabeth Woisetschläger, Medina Andresel, Markus Wurzenberger, Max Landauer:
On the Application of Natural Language Processing for Advanced OSINT Analysis in Cyber Defence. 71:1-71:10 - Pedro Miguel Sánchez Sánchez, Adrián Abenza Cano, Alberto Huertas Celdrán, Gregorio Martínez Pérez:
Evaluating the impact of contextual information on the performance of intelligent continuous authentication systems. 72:1-72:10 - José María Jorquera Valero, Antonio López Martínez, Pedro Miguel Sánchez Sánchez, Daniel Navarro-Martínez, Rodrigo Varas López, Javier Ignacio Rojo Lacal, Antonio Lopez Vivar, Marco Antonio Sotelo Monge, Manuel Gil Pérez, Gregorio Martínez Pérez:
Unlocking the Potential of Knowledge Graphs: A Cyber Defense Ontology for a Knowledge Representation and Reasoning System. 73:1-73:9 - Frida Muñoz Plaza, Inés Hernández San Román, Marco Antonio Sotelo Monge:
A Technical Exploration of Strategies for Augmented Monitoring and Decision Support in Information Warfare. 74:1-74:8 - Arthur Méreur, Antoine Mallet, Rémi Cogranne:
Are Deepfakes a Game-changer in Digital Images Steganography Leveraging the Cover-Source-Mismatch? 75:1-75:9 - Andrea Rosales, Agnieszka Malanowska, Tanya Koohpayeh Araghi, Minoru Kuribayashi, Marcin Kowalczyk, Daniel Blanche-Tarragó, Wojciech Mazurczyk, David Megías:
Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformation. 76:1-76:10 - Fabian Strachanski, Denis Petrov, Tobias Schmidbauer, Steffen Wendzel:
A Comprehensive Pattern-based Overview of Stegomalware. 77:1-77:10 - Marco Zuppelli, Massimo Guarascio, Luca Caviglione, Angelica Liguori:
No Country for Leaking Containers: Detecting Exfiltration of Secrets Through AI and Syscalls. 78:1-78:8 - Jörg Keller, Carina Heßeling, Steffen Wendzel:
Robust and Homomorphic Covert Channels in Streams of Numeric Data. 79:1-79:4 - Jeff Schymiczek, Tobias Schmidbauer, Steffen Wendzel:
A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning. 80:1-80:10 - Martin Steinebach:
Natural Language Steganography by ChatGPT. 81:1-81:9 - Daniel Lerch-Hostalot, David Megías Jiménez:
Single-image steganalysis in real-world scenarios based on classifier inconsistency detection. 82:1-82:6 - Krzysztof Chmiel, Pawel Rajba:
How to evade modern web cryptojacking detection tools? A review of practical findings. 83:1-83:10 - Omair Faraj, David Megías, Joaquín García-Alfaro:
ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenance. 84:1-84:11 - Alice Colombatto, Luca Giorgino, Andrea Vesco:
An Identity Key Management System with Deterministic Key Hierarchy for SSI-native Internet of Things. 85:1-85:6 - Stefan More, Jakob Heher, Edona Fasllija, Maximilian Mathie:
Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication Systems. 86:1-86:11 - Ricardo Bochnia, Jürgen Anke:
Long-Lived Verifiable Credentials: Ensuring Durability Beyond the Issuer's Lifetime. 87:1-87:9 - Tim Wood, Keerthi Thomas, Matthew Dean, Swaminathan Kannan, Robert Learney:
Towards Post-Quantum Verifiable Credentials. 88:1-88:10 - Markus Batz, Sebastian Zickau:
Towards Functions for Verifiable Credentials in a 2-Holder Model. 89:1-89:8 - Michael Hofmeier, Daniela Pöhn, Wolfgang Hommel:
DistIN: Analysis and Validation of a Concept and Protocol for Distributed Identity Information Networks. 90:1-90:10 - Virgil Hamici-Aubert, Julien Saint-Martin, Renzo E. Navas, Georgios Z. Papadopoulos, Guillaume Doyen, Xavier Lagrange:
Leveraging Overshadowing for Time-Delay Attacks in 4G/5G Cellular Networks: An Empirical Assessment. 91:1-91:10 - Pawel Rajba, Natan Orzechowski, Karol Rzepka, Przemyslaw Szary, Dawid Nastaj, Krzysztof Cabaj:
Identity and Access Management Architecture in the SILVANUS Project. 92:1-92:9 - Mikolaj Komisarek, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Aleksandra Pawlicka, Michal Choras:
Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic Analysis. 93:1-93:8 - Hongyu Jin, Zhichao Zhou, Panos Papadimitratos:
Future-proofing Secure V2V Communication against Clogging DoS Attacks. 94:1-94:8 - Marek Pawlicki, Damian Puchalski, Sebastian Szelest, Aleksandra Pawlicka, Rafal Kozik, Michal Choras:
Introducing a Multi-Perspective xAI Tool for Better Model Explainability. 95:1-95:8 - Christian Spinnler, Torsten Labs, Norman Franchi:
SoK: A Taxonomy for Hardware-Based Fingerprinting in the Internet of Things. 96:1-96:12 - Damian Puchalski, Marek Pawlicki, Rafal Kozik, Rafal Renk, Michal Choras:
Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics. 97:1-97:8 - Yejin Yoon, Jeehun Jung, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han:
Forensic Investigation of An Android Jellybean-based Car Audio Video Navigation System. 98:1-98:8 - Georgios Gkoktsis, Ludger Peters:
The Cyber Safe Position: An STPA for Safety, Security, and Resilience Co-Engineering Approach. 99:1-99:11 - Alexios Lekidis:
Anomaly detection mechanisms for in-vehicle and V2X systems. 100:1-100:8 - Julian Blümke, Kevin Mayer, Hans-Joachim Hof:
An Analysis of Security Concerns in Transitioning Battery Management Systems from First to Second Life. 101:1-101:11 - Jessica B. Heluany, Johannes Götzfried, Bernhard Mehlig, Vasileios Gkioulos:
Vulnerability management digital twin for energy systems. 102:1-102:11 - Ruben Cacciato, Mario Raciti, Sergio Esposito, Giampaolo Bella:
Modelling the privacy landscape of the Internet of Vehicles. 103:1-103:7 - Marc Ohm, Christian Bungartz, Felix Boes, Michael Meier:
Assessing the Impact of Large Language Models on Cybersecurity Education: A Study of ChatGPT's Influence on Student Performance. 104:1-104:7 - Willi Lazarov, Samuel Janek, Zdenek Martinasek, Radek Fujdiak:
Event-based Data Collection and Analysis in the Cyber Range Environment. 105:1-105:8 - Andrej Kristofík, Jakub Vostoupal, Kamil Malinka, Frantisek Kasl, Pavel Loutocký:
Beyond the Bugs: Enhancing Bug Bounty Programs through Academic Partnerships. 106:1-106:8 - Petr Dzurenda, Sara Ricci, Marek Sikora, Michal Stejskal, Imre Lendák, Pedro Adão:
Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization Techniques. 107:1-107:10 - Marko Zivanovic, Imre Lendák, Ranko Popovic:
Tackling the cybersecurity workforce gap with tailored cybersecurity study programs in Central and Eastern Europe. 108:1-108:8 - Jingyan Zhang, Irina Tal:
A Systematic Review of Contemporary Applications of Privacy-Aware Graph Neural Networks in Smart Cities. 109:1-109:10 - Ivan Visconti:
The Right to Be Zero-Knowledge Forgotten. 110:1-110:9 - Gianluca Dini:
On Implementing Linear Regression on Homomorphically Encrypted Data: A Case-Study. 111:1-111:8 - Andrej Pastorek, Andrea Tundis:
Navigating the landscape of IoT security and associated risks in critical infrastructures. 112:1-112:7 - Marta Catillo, Antonio Pecchia, Antonio Repola, Umberto Villano:
Towards realistic problem-space adversarial attacks against machine learning in network intrusion detection. 113:1-113:8 - Michael Mayowa Farayola, Malika Bendechache, Takfarinas Saber, Regina Connolly, Irina Tal:
Enhancing Algorithmic Fairness: Integrative Approaches and Multi-Objective Optimization Application in Recidivism Models. 114:1-114:10 - Francesco Blefari, Francesco Aurelio Pironti, Angelo Furfaro:
Toward a Log-based Anomaly Detection System for Cyber Range Platforms. 115:1-115:9 - Gregorio Dalia, Corrado Aaron Visaggio, Andrea Di Sorbo, Gerardo Canfora:
SBOM Ouverture: What We Need and What We Have. 116:1-116:9 - Lionel Tailhardat, Yoan Chabot, Antoine Py, Perrine Guillemette:
NORIA UI: Efficient Incident Management on Large-Scale ICT Systems Represented as Knowledge Graphs. 117:1-117:10 - Mohamed Yacine Touahria Miliani, Souhail Abdelmouaiz Sadat, Mohammed Haddad, Hamida Seba, Karima Amrouche:
Comparing Hyperbolic Graph Embedding models on Anomaly Detection for Cybersecurity. 118:1-118:11 - Atmane Ayoub Mansour Bahar, Kamel Soaïd Ferrahi, Mohamed-Lamine Messai, Hamida Seba, Karima Amrouche:
FedHE-Graph: Federated Learning with Hybrid Encryption on Graph Neural Networks for Advanced Persistent Threat Detection. 119:1-119:10 - Massimiliano Rak, Felice Moretta, Daniele Granata:
Advancing ESSecA: a step forward in Automated Penetration Testing. 120:1-120:11 - Hugo Teixeira De Castro, Ahmed Hussain, Gregory Blanc, Jamal El Hachem, Dominique Blouin, Jean Leneutre, Panos Papadimitratos:
A Model-based Approach for Assessing the Security of Cyber-Physical Systems. 121:1-121:10 - Dominik Lorych, Lukas Jäger, Andreas Fuchs:
Acceleration of DICE Key Generation using Key Caching. 122:1-122:8 - Bernardo Louro, Raquel Abreu, Joana Cabral Costa, João B. F. Sequeiros, Pedro R. M. Inácio:
Analysis of the Capability and Training of Chat Bots in the Generation of Rules for Firewall or Intrusion Detection Systems. 123:1-123:7 - Ashraf Abdelhamid, Mahmoud Said Elsayed, Heba K. Aslan, Marianne A. Azer:
Anomaly-Based Intrusion Detection for Blackhole Attack Mitigation. 124:1-124:9 - Diana Gratiela Berbecaru, Antonio Lioy:
Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS Connections. 125:1-125:9 - Georgios Petihakis, Aristeidis Farao, Panagiotis Bountakas, Athanasia Sabazioti, John Polley, Christos Xenakis:
AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks. 126:1-126:7 - João Costa, Filipe Apolinário, Carlos Ribeiro:
ARGAN-IDS: Adversarial Resistant Intrusion Detection Systems using Generative Adversarial Networks. 127:1-127:10 - Panagiotis Bountakas, Konstantinos Fysarakis, Thomas Kyriakakis, Panagiotis Karafotis, Aristeidis Sotiropoulos, Maria Tasouli, Cristina Alcaraz, George Alexandris, Vassiliki Andronikou, Tzortzia Koutsouri, Romarick Yatagha, George Spanoudakis, Sotiris Ioannidis, Fabio Martinelli, Oleg Illiashenko:
SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities: SYNAPSE. 128:1-128:10 - Aristeidis Farao, Christoforos Ntantogian, Stylianos Karagiannis, Emmanouil Magkos, Alexandra Dritsa, Christos Xenakis:
NITRO: an Interconnected 5G-IoT Cyber Range. 129:1-129:6 - Raphael Schermann, Simone Bussa, Rainer Urian, Ronald Toegl, Christian Steger:
PAKA: Pseudonymous Authenticated Key Agreement without bilinear cryptography. 130:1-130:10 - Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Vincent Naessens:
Advanced methods for generalizing time and duration during dataset anonymization. 131:1-131:11 - Salvador Cuñat, Raúl Reinosa Simón, Ignacio Lacalle, Carlos Enrique Palau:
Immutability and non-repudiation in the exchange of key messages within the EU IoT-Edge-Cloud Continuum. 132:1-132:8 - Stephen Meisenbacher, Florian Matthes:
Just Rewrite It Again: A Post-Processing Method for Enhanced Semantic Similarity and Privacy Preservation of Differentially Private Rewritten Text. 133:1-133:11 - Anastassios Voudouris, Aristeidis Farao, Aggeliki Panou, John Polley, Christos Xenakis:
Integrating Hyperledger Fabric with Satellite Communications: A Revolutionary Approach for Enhanced Security and Decentralization in Space Networks. 134:1-134:8 - George Suciu, Mari-Anais Sachian, Razvan-Alexandru Bratulescu, Kejsi Koci, Grigor Parangoni:
Entity Recognition on Border Security. 135:1-135:6 - Alexios Lekidis:
Towards 5G Advanced network slice assurance through isolation mechanisms. 136:1-136:7 - Mari-Anais Sachian, George Suciu, Maria Niculae, Adrian Florin Paun, Petrica Ciotirnae, Ivan Horatiu, Cristina Tudor, Robert Florescu:
Multimodal Security Mechanisms for Critical Time Systems using blockchain in Chriss project. 137:1-137:6 - Robert-Ionut Vatasoiu, Alexandru Vulpe, Robert Florescu, Mari-Anais Sachian, George Suciu:
Developing a Call Detail Record Generator for Cultural Heritage Preservation and Theft Mitigation: Applications and Implications. 138:1-138:5 - Alexios Lekidis, Hugo Morais:
Open V2X Management Platform Cyber-Resilience and Data Privacy Mechanisms. 139:1-139:8 - Jukka Ruohonen, Kalle Hjerppe, Maximilian von Zastrow:
An Exploratory Case Study on Data Breach Journalism. 140:1-140:9 - Pawel Gryka, Kacper T. Gradon, Marek Kozlowski, Milosz Kutyla, Artur Janicki:
Detection of AI-Generated Emails - A Case Study. 141:1-141:8 - Shiying Fan, Paul Moritz Ranly, Lukas Graner, Inna Vogel, Martin Steinebach:
Unveiling the Darkness: Analysing Organised Crime on the Wall Street Market Darknet Marketplace using PGP Public Keys. 142:1-142:10 - Stefan Tatschner, Sebastian N. Peters, Michael P. Heinl, Tobias Specht, Thomas Newe:
ParsEval: Evaluation of Parsing Behavior using Real-world Out-in-the-wild X.509 Certificates. 143:1-143:9 - Georg T. Becker, Thomas Eisenbarth, Hannes Federrath, Mathias Fischer, Nils Loose, Simon Ott, Joana Pecholt, Stephan Marwedel, Dominik Meyer, Jan Stijohann, Anum Talpur, Matthias Vallentin:
SOVEREIGN - Towards a Holistic Approach to Critical Infrastructure Protection. 144:1-144:9 - Mohammad Reza Nosouhi, Zubair A. Baig, Robin Doss, Divyans Mahansaria, Debi Prasad Pati, Praveen Gauravaram, Lei Pan, Keshav Sood:
Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments. 145:1-145:11 - Alexander Giehl, Michael P. Heinl, Victor Embacher:
EmuFlex: A Flexible OT Testbed for Security Experiments with OPC UA. 146:1-146:9 - Jolahn Vaudey, Stéphane Mocanu, Gwenaël Delaval, Éric Rutten:
An IEC 62443-security oriented domain specific modelling language. 147:1-147:10 - Ijeoma Ebere-Uneze, Syed Naqvi:
Using Artificial Intelligence in Cyber Security Risk Management for Telecom Industry 4.0. 148:1-148:7 - Sabine Delaître, José Maria Pulgar Gutiérrez:
Vulnerability detection tool in source code by building and leveraging semantic code graph. 149:1-149:9 - Sebastian N. Peters, Nikolai Puch, Michael P. Heinl, Philipp Zieris, Mykolai Protsenko, Thorsten Larsen-Vefring, Marcel Ely Gomes, Aliza Maftun, Thomas Zeschg:
Gateway to the Danger Zone: Secure and Authentic Remote Reset in Machine Safety. 150:1-150:9 - Vasiliki-Georgia Bilali, Eustratios Magklaris, Dimitrios Kosyvas, Lazaros Karagiannidis, Eleftherios Ouzounoglou, Angelos Amditis:
A SOAR platform for standardizing, automating operational processes and a monitoring service facilitating auditing procedures among IoT trustworthy environments. 151:1-151:8 - Saber Mhiri, Alfonso Egio, Maxime Compastié, Pablo Cosio:
Proxy Re-Encryption for Enhanced Data Security in Healthcare: A Practical Implementation. 152:1-152:11 - Alexandr Silonosov, Lawrence Henesey:
Telemetry data sharing based on Attribute-Based Encryption schemes for cloud-based Drone Management system. 153:1-153:8 - Robert Haas, Martin Pirker:
The State of Boot Integrity on Linux - a Brief Review. 154:1-154:6 - Sara Ricci, Vladyslav Shapoval, Petr Dzurenda, Peter B. Roenne, Jan Oupický, Lukas Malina:
Lattice-based Multisignature Optimization for RAM Constrained Devices. 155:1-155:10 - Lukas Malina, Patrik Dobias, Petr Dzurenda, Gautam Srivastava:
Quantum-Resistant and Secure MQTT Communication. 156:1-156:8 - Viet Anh Phan, Jan Jerabek, Lukas Malina:
Comparison of Multiple Feature Selection Techniques for Machine Learning-Based Detection of IoT Attacks. 157:1-157:10 - Ondrej Pospisil, Radek Fujdiak:
Identification of industrial devices based on payload. 158:1-158:9 - Paul Georg Wagner, Pascal Birnstill, Jürgen Beyerer:
DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote Attestation. 159:1-159:11 - Lukas Malina, Petr Dzurenda, Norbert Lövinger, Ijeoma Faustina Ekeh, Raimundas Matulevicius:
Secure and Privacy-Preserving Car-Sharing Systems. 160:1-160:10 - Mubashar Iqbal, Sabah Suhail, Raimundas Matulevicius:
DECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and Blockchain. 161:1-161:11 - Ibtisam Ehsan, Muhammad Irfan Khalid, Markus Helfert, Mansoor Ahmed:
Chain Links on Wheels: A Security Scheme for IoV Connectivity through Blockchain Integration. 162:1-162:8 - Amna Shifa, Rónán Kennedy, Mamoona Naveed Asghar:
GDPR-compliant Video Search and Retrieval System for Surveillance Data. 163:1-163:6 - Eider Iturbe, Javier Arcas, Erkuden Rios, Nerea Toledo:
A Multi-layer Approach through Threat Modelling and Attack Simulation for Enhanced Cyber Security Assessment. 164:1-164:8 - Gérald Rocher, Jean-Yves Tigli, Stéphane Lavirotte, Nicolas Ferry:
A Framework Towards Assessing the Resilience of Urban Transport Systems. 165:1-165:10 - Valeria Valdés Ríos, Fatiha Zaïdi, Ana Rosa Cavalli, Angel Rego:
Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment. 166:1-166:9 - Djibrilla Amadou Kountché, Jocelyn Aubert, Manh-Dung Nguyen, Natalia Kalfa, Nicola Gregorio Durante, Cristiano Passerini, Stéphane Kuding:
The PRECINCT Ecosystem Platform for Critical Infrastructure Protection: Architecture, Deployment and Transferability. 167:1-167:8 - Valentina Casola, Salvatore Della Torca:
Transfer Adversarial Attacks through Approximate Computing. 168:1-168:6 - Stylianos Karagiannis, Camilla Fusco, Leonidas Agathos, Wissam Mallouli, Valentina Casola, Christoforos Ntantogian, Emmanouil Magkos:
AI-Powered Penetration Testing using Shennina: From Simulation to Validation. 169:1-169:7 - Manh-Dung Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca:
AI4SOAR: A Security Intelligence Tool for Automated Incident Response. 170:1-170:8 - Stefan Marksteiner, Marjan Sirjani, Mikael Sjödin:
Automated Passport Control: Mining and Checking Models of Machine Readable Travel Documents. 171:1-171:8 - Daniele Lombardi, Mario Barbareschi, Salvatore Barone, Valentina Casola:
A comprehensive evaluation of interrupt measurement techniques for predictability in safety-critical systems. 172:1-172:10 - Philipp Schloyer, Peter Knauer, Bernhard Bauer, Dominik Merli:
Automating Side-Channel Testing for Embedded Systems: A Continuous Integration Approach. 173:1-173:6 - Charalambos Klitis, Ioannis Makris, Pavlos S. Bouzinis, Dimitrios Christos Asimopoulos, Wissam Mallouli, Kitty Kioskli, Eleni Seralidou, Christos Douligeris, Loizos Christofi:
NERO: Advanced Cybersecurity Awareness Ecosystem for SMEs. 174:1-174:9 - Huu Nghia Nguyen, Manh-Dung Nguyen, Edgardo Montes de Oca:
A Framework for In-network Inference using P4. 175:1-175:6 - Wisam Abbasi, Paolo Mori, Andrea Saracino:
Further Insights: Balancing Privacy, Explainability, and Utility in Machine Learning-based Tabular Data Analysis. 176:1-176:10 - Argyri Pattakou, Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis:
A Unified Framework for GDPR Compliance in Cloud Computing. 177:1-177:9 - Michail Pantelelis, Christos Kalloniatis:
Create, Read, Update, Delete: Implications on Security and Privacy Principles regarding GDPR. 178:1-178:7 - Sjoerd Berning, Vincent Dunning, Dayana Spagnuelo, Thijs Veugen, Jasper van der Waa:
The Trade-off Between Privacy & Quality for Counterfactual Explanations. 179:1-179:9 - Sebastian Groll, Sascha Kern, Ludwig Fuchs, Günther Pernul:
A Framework for Managing Separation of Duty Policies. 180:1-180:10 - Thomas Baumer, Johannes Grill, Jacob Adan, Günther Pernul:
A Trust and Reputation System for Examining Compliance with Access Control. 181:1-181:10 - Sascha Schiegg, Florian Strohmeier, Armin Gerl, Harald Kosch:
Individual privacy levels in query-based anonymization. 182:1-182:8 - Joshua Stock, Henry Heitmann, Janik Noel Schug, Daniel Demmler:
DealSecAgg: Efficient Dealer-Assisted Secure Aggregation for Federated Learning. 183:1-183:11 - Christos Baloukas, Lazaros Papadopoulos, Kostas Demestichas, Axel Weissenfeld, Sven Schlarb, Mikel Aramburu, David Redó, Jorge García, Seán Gaines, Thomas Marquenie, Ezgi Eren, Irmak Erdogan Peter:
A Risk Assessment and Legal Compliance Framework for Supporting Personal Data Sharing with Privacy Preservation for Scientific Research. 184:1-184:10 - Agata Kruzikova, Jakub Suchanek, Milan Broz, Martin Ukrop, Vashek Matyas:
What Johnny thinks about using two-factor authentication on GitHub: A survey among open-source developers. 185:1-185:11 - Cristian Lepore, Romain Laborde, Jessica Eynard:
Aligning eIDAS and Trust Over IP: A Mapping Approach. 186:1-186:9 - Ahmad Samer Wazan, Romain Laborde, Abdelmalek Benzekri, Imran Taj:
Article 45 of the eIDAS Directive Unveils the need to implement the X.509 4-cornered trust model for the WebPKI. 187:1-187:11 - Kristian Kannelønning, Sokratis K. Katsikas:
Deployment of Cybersecurity Controls in the Norwegian Industry 4.0. 188:1-188:8 - Manfred Vielberth, Kristina Raab, Magdalena Glas, Patrick Grümer, Günther Pernul:
Elevating TARA: A Maturity Model for Automotive Threat Analysis and Risk Assessment. 189:1-189:9 - Antonin Dufka, Jakub Janku, Petr Svenda:
Trust-minimizing BDHKE-based e-cash mint using secure hardware and distributed computation. 190:1-190:10 - Mo Zhang, Eduard Marin, Mark Ryan, Vassilis Kostakos, Toby Murray, Benjamin Tag, David F. Oswald:
OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels. 191:1-191:13 - Jeng-Yu Chou, Brian Levine:
A Quantitative Analysis of Inappropriate Content, Age Rating Compliance, and Risks to Youth on the Whisper Platform. 192:1-192:10 - Ruba Alsmadi, Taha Gharaibeh, Andrew M. Webb, Ibrahim M. Baggili:
Give Me Steam: A Systematic Approach for Handling Stripped Symbols in Memory Forensics of the Steam Deck. 193:1-193:10 - Farkhund Iqbal, Abdullah Kazim, Áine MacDermott, Richard Ikuesan, Musaab Hasan, Andrew Marrington:
Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot. 194:1-194:9 - Tadani Nasser Alyahya, Leonardo Aniello, Vladimiro Sassone:
ScaNeF-IoT: Scalable Network Fingerprinting for IoT Device. 195:1-195:9 - Cristoffer Leite, Jerry den Hartog, Daniel Ricardo dos Santos:
Using DNS Patterns for Automated Cyber Threat Attribution. 196:1-196:11 - Michael Galhuber, Robert Luh:
Timestamp-based Application Fingerprinting in NTFS. 197:1-197:10 - Clinton Walker, Taha Gharaibeh, Ruba Alsmadi, Cory Lloyd Hall, Ibrahim M. Baggili:
Forensic Analysis of Artifacts from Microsoft's Multi-Agent LLM Platform AutoGen. 198:1-198:9 - Maximilian Olbort, Daniel Spiekermann, Jörg Keller:
Manipulating the Swap Memory for Forensic Investigation. 199:1-199:6 - Taha Gharaibeh, Steven Seiden, Mohamed Abouelsaoud, Elias Bou-Harb, Ibrahim M. Baggili:
Don't, Stop, Drop, Pause: Forensics of CONtainer CheckPOINTs (ConPoint). 200:1-200:11 - Joseph Brown, Abdur Rahman Onik, Ibrahim Baggili:
Blue Skies from (X?s) Pain: A Digital Forensic Analysis of Threads and Bluesky. 201:1-201:12 - Sabrina Friedl, Charlotte Zajewski, Günther Pernul:
Sustainability in Digital Forensics. 202:1-202:9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.