Loading...

Main Conference’s Program

Wednesday, July 27

All sessions are held in Athena room


08:40–09:00 CET

Welcome from the chairs WL

Chairs: S. Shiaeles, University of Portsmouth (UK)
N. Kolokotronis, University of the Peloponnese (GR)

Room: Athena

09:00–10:00 CET

Plenary session PL-1

Chair: S. Shiaeles, University of Portsmouth (UK)
Room: Athena

Invited talk: Tracking technologies: From James Bond to everyone

P. Haskell-Dowland

[More details]

10:00–11:40 CET

Technical session CSR-1

Chair: R. Kashef, Toronto Metropolitan University (CA)
Room: Athena

10:00–10:20

Flood control: TCP-SYN flood detection for software-defined networks using OpenFlow port statistics

T. Das, O. Abuhamdan, S. Sengupta, E. Arslan

10:20–10:40

A stable generative adversarial network architecture for network intrusion detection

R. Soleymanzadeh, R. Kashef

10:40–11:00

LSTM-based anomalous behavior detection in multi-agent reinforcement learning

C. Lischke, T. Liu, J. Mccalmon, M. Rahman, T. Halabi, S. Alqahtani

11:00–11:20

H4rm0ny: a competitive zero-sum two-player Markov game for multi-agent learning on evasive malware generation and detection

C. Molloy, S. Ding, B. Fung, P. Charland

11:20–11:40

Ensemble of random and isolation forests for graph-based intrusion detection in containers

A. Iacovazzi, S. Raza

11:40–12:00 CET

Coffee break

12.00–13:20 CET

Technical session CSR-2

Chair: E. Schiavone, ResilTech S.R.L. (IT)
Room: Athena

12.00–12:20

Auditing a software-defined cross domain solution architecture

N. Daughety, M. Pendleton, R. Perez, S. Xu, J. Franco

12.20–12:40

CoReTM: An approach enabling cross-functional collaborative threat modeling

J. Von der Assen, M. Figueredo Franco, C. Killer

12.40–13:00

Modelling and assessing the risk of cascading effects with resilblockly

I. Bicchierai, E. Schiavone, F. Brancati

13.00–13:20

An approach to address risk management challenges focused on IT governance framework

H. Alessa, R. Boodai, A. Alanazi

13:20–14:20 CET

Lunch break

14:20–16:00 CET

Technical session CSR-3

Chair: E. Bellini, LOGOS Ricerca e Innovazione (IT)
Room: Athena

14:20–14:40

ICT in healthcare: The role of IoT and the SECANT solution

M. Caballero, D. Kavallieros, A. Spyros, A. Tavernarakis, A. Tziouvaras, S. Bonacina, K. Chandrarmouli, M. Coroiu, L. Chen, T. Dounia, I. Giannoulakis, N. Gligoric, E. Kafetzakis, T. Kasig, V. Koumaras, T. Krousarlis, K. Lapidaki, A. Markakis, S. Marin, M. Manulis, S. Menesidou, S. Nifakos, L. Meng, S. Mhiri, M. Nati, K. Ntafloukas, D. Oniga, D. Papamartzivanos, S. Papastergiou, K. Sanchez, C. Sakkas, K. Stelliou, L. Trujillo, T. Tsikrika, E. Venegas, S. Vrochidis, D. Xydias

14:40–15:00

SENTINEL: Approachable, tailor-made cybersecurity and data protection for small enterprises

T. Trantidou, G. Bravos, P. Valoggia, I. Skourtis, M. Falelakis, K. Poulios, I. Spais, S. Ioannidis, T. Oudin, R. Costa, C. Konialis, D. Holkham, Z. Kasapi, A. Karantjias

15:00–15:20

BLEND: Efficient and blended iot data storage and communication with application layer security

J. Hoglund, S. Raza

15:20–15:40

A blockchain-based trustworthy cloud services digital ecosystem

E. Bellini, S. Cimato, A. Esposito, I. Aversa

15:40–16:00

CIDS: Collaborative intrusion detection system using blockchain technology

G. Gurung, G. Bendiab, M. Shiaele, S. Shiaeles

16:00–16:20 CET

Coffee break

16:20–18:00 CET

Technical session CSR-4

Chair: N. Kolokotronis, University of the Peloponnese (GR)
Room: Athena

16:20–16:40

Blockchain-enabled digital forensics for the IoT: Challenges, features, and current frameworks

S. Brotsis, N. Kolokotronis

16:40–17:00

Android device incident response: Viber analysis

A. Vasilaras, D. Dosis, M. Kotsis, P. Rizomiliotis

17:00–17:20

SeeShells: An optimized solution for utilizing shellbags in a digital forensic investigation

E. Amoruso, R. Leinecker, C. Zou

17:20–17:40

Evaluating perceptual hashing algorithms in detecting image manipulation over social media platforms

M. Alkhowaiter, K. Almubarak, C. Zou

Thursday, July 28

All sessions are held in Athena room


09:00–10:00 CET

Plenary session PL-2

Chair: E. Bellini, LOGOS Ricerca e Innovazione (IT)
Room: Athena

Invited talk: Intrusion detection through (unsupervised) machine learning: Pros, limitations and workarounds

A. Bondavalli

[More details]

10:00–11:40 CET

Technical session CSR-5

Chair: M. Ianni, University of Calabria (IT)
Room: Athena

10:00–10:20

ML-based anomaly detection system for DER DNP3 communication in smart grid

M. Abdelkhalek, M. Govindarasu

10:20–10:40

Moving target defense routing for SDN-enabled smart grid

M. Abdelkhalek, B. Hyder, M. Govindarasu, C. Rieger

10:40–11:00

Neural network based temporal point processes for attack detection in industrial control systems

G. Fortino, C. Greco, A. Guzzo, M. Ianni

11:00–11:20

Control logic obfuscation attack in industrial control systems

N. Zubair, A. Ayub, H. Yoo, I. Ahmed

11:20–11:40

Enhancing the aggregation of the federated learning for the industrial cyber physical systems

S. Guendouzi, S. Ouchani, M. Malki

11:40–12:00 CET

Coffee break

12.00–13:20 CET

Technical session CSR-6

Chair: F. Flammini, Mälardalen University (SE)
Room: Athena

12.00–12:20

Improving resilience in cyber-physical systems based on transfer learning

M. Saman Azari, F. Flammini, S. Santini

12.20–12:40

SoK: Demystifying cyber resilience quantification in cyber-physical systems

H. Lee, S. Kim, H. K. Kim

12.40–13:00

ML-based anomaly detection for intra-vehicular CAN-bus networks

S. Purohit, M. Govindarasu

13.00–13:20

Powertrace-based fuzzing of CAN connected hardware

M. Dunne, S. Fischmeister

13:20–14:20 CET

Lunch break

14:20–15:20 CET

Plenary session PL-3

Chair: N. Kolokotronis, University of the Peloponnese (GR)
Room: Athena

Invited talk: An interdisciplinary approach to cyber security and resilience research

K.-K. Raymond Choo

[More details]

15:20–16:20 CET

Awards session AW

Chairs: S. Shiaeles, University of Portsmouth (UK)
N. Kolokotronis, University of the Peloponnese (GR)
E. Bellini, LOGOS Ricerca e Innovazione (IT)

Room: Athena

Friday, July 29

All sessions are held in Athena room


09:00–10:00 CET

Plenary session PL-4

Chair: S. Shiaeles, University of Portsmouth (UK)
Room: Athena

Invited talk: Privacy through the lens of data flows

S. Li

[More details]

10:00–11:40 CET

Technical session CSR-7

Chair: D. Kavallieros, Centre for Research and Technology (GR)
Room: Athena

10:00–10:20

On usability of hash fingerprinting for endpoint application identification

J. Heino, A. Gupta, A. Hakkala, S. Virtanen

10:20–10:40

Data volume reduction for deep packet inspection by multi-layer application determination

M. Vogel, F. Schuster, F. Kopp, H. Konig

10:40–11:00

Host-based cyber attack pattern identification on honeypot logs using association rule learning

A. Papoutsis, C. Iliou, D. Kavallieros, T. Tsikrika, S. Vrochidis, I. Kompatsiaris

11:00–11:20

Using cyberscore for network traffic monitoring

L. Deri, A. Cardigliano

11:20–11:40

An approach to improve the robustness of machine learning based intrusion detection system models against the Carlini-Wagner attack

M. Pujari, B. Cherukuri, A. Javaid, W. Sun

11:40–12:00 CET

Coffee break

12.00–13:20 CET

Technical session CSR-8

Chair: G. Bendiab, University of Freres Mentouri (DZ)
Room: Athena

12.00–12:20

Semantic-aware vulnerability detection

Z. Huang, M. White

12.20–12:40

OGMA: Visualisation for software container security analysis and automated remediation

A. Mills, J. White, P. Legg

12.40–13:00

Configuration vulnerability in SNORT for Windows operating systems

S. Guarino, M. Grassi, R. Setola, L. Faramondi, C. Alcaraz

13.00–13:20

IPASS: A novel open-source intelligence password scoring system

J. Hubbard, G. Bendiab, S. Shiaeles

13:20–14:20 CET

Lunch break

14:20–16:00 CET

Technical session CSR-9

Chair: E. Bellini, LOGOS Ricerca e Innovazione (IT)
Room: Athena

14:20–14:40

On the (in)security of memory protection units

M. Grisafi, M. Ammar, B. Crispo

14:40–15:00

ETHERLED: Sending covert morse signals from air-gapped devices via network card (NIC) leds

M. Guri

15:00–15:20

A comparative overview of automotive radar spoofing countermeasures

M. Vu, W. Headley, K. Heaslip

15:20–15:40

How to build a SOC on a budget

R. Vaarandi, S. Mases