Loading...

Conference Program

Download the conference’s program overview in PDF format (in progress)

Download the full conference’s program (incl. workshops) (in progess)

Program overview


Monday 31th of July

Tuesday 1st of August

Wednesday 2nd of August

Timeslot (CET)

Auditorium

Room 7

Room 8

Auditorium

Room 7

Room 8

Auditorium

Room 7

Room 8

08:40–09:00

Welcome

09:00–9:20

Track 3-S13

HACS-S16

CRE-S19

Track 3-S22

Track 1 – S25

2P-DPA-S28

9:20–10:40

Track 1-S1

Track 1-S5

EPES-SPR-S9

10:40–11:00

Coffee break

Coffee break

Coffee break

11:00–12:00

Track 1-S2

Track 1-S6

DS4CS-S10

Track 1-S14

HACS-S17

CRE-S20

Track 1-S23

Track 2-S26

2P-DPA-S29

12.00–13:00

Keynote 1

Keynote 2

Keynote 4

13:00–14:00

Light Lunch

Light Lunch

Light Lunch

14:00–15:00

Track 3-S3

Track 2-S7

Track 1-S11

Keynote 3

Track 1-S24

Track 1-3 S27

DR-DCHE -S30

15:00–15:40

Industrial Panel

15:40–16:00

Coffee Break

Coffee Break

Coffee Break

16:00–17:00

Track 1-S4

Track 3-S8

DS4CS-S12

Track 1-2 -S15

2D-DPA-S18

CRE-S21

Conclusions

17:00–18:00

19:30–24:00

IEEE
Awards Ceremony + Gala Dinner

 


Monday 31st of July

Room: Auditorium

08:40–09:20
CET

Welcome from the chairs WL

Institutional welcome

Chairs: E. Bellini, University of Roma Tre (IT), N. Kolokotronis, University of the Peloponnese (GR), S. Shiaeles, University of Portsmouth (UK) Room: Auditorium

9:20–10:40

CET

Technical session Track 1 – S1

Chair: Nicholas Kolokotronis Room: Auditorium

09:20–09:40

Comparative Analysis of Pattern Mining Algorithms for Event Logs

O. Gasimov, R. Vaarandi, M. Pihelgas

09:40–10:00

To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection

Y. Sharma, E. Giunchiglia, S. Birnbach, I. Martinovic

10:00–10:20

stealthML: Data-driven Malware for Stealthy Data Exfiltration

K. Chung, P. Cao, Z. Kalbarczyk, R. Iyer

10:20–10:40

Explaining Binary Obfuscation

C. Greco, M. Ianni, A. Guzzo, G.Fortino

10:40–11:00
CET

Coffee break

11.00–12:00

CET

Technical session Track 1 – S2

Chair: Simone Bussa Room: Auditorium

11.00–11:20

New Version, New Answer: Investigating Cybersecurity Static-Analysis Tool Findings

A.M. Reinhold, T. Weber, C. Lemak, D. Reimanis, C. Izurieta      

11.20–11:40

Qerberos: A Protocol for Secure Distribution of QRNG Keys

D. Soler, C. Dafonte, M. Fernandez-Veiga, A. Fernandez, F. Novoa, R. Diaz-Redondo      

11.40–12:00

Efficiency of Malware Detection based on DNS Packet Analysis over Real Network Traffic

L. Principi, M. Baldi, A. Cucchiarelli, L. Spalazzi

12:00–13:00
CET

Plenary session Keynote-1

Chair: Stavros Shiaeles Room: Auditorium

Invited talk: The Italian Cybersecurity strategy: a support program for the development of new innovative entrepreneurship

L. Nicoletti (Agenzia per la Cybersicurezza Nazionale- ACN)

[More details]

13:00–14:00
CET

Lunch break

14:00–15:40

CET

Technical session Track 3 – S3

Chair: Emanuele Bellini (Univ. of Roma Tre) Room: Auditorium

14:00–14:20

Formal Verification of a V2X Privacy-Preserving Scheme using Proverif

S. Bussa, R. Sisto, F. Valenza

14:20–14:40

A Game of Age of Incorrect Information Against an Adversary Injecting False Data

L. Badia, V. Bonagura, S. Panzieri, F. Pascucci   

14:40–15:00

A cost-efficient Threat Intelligence Platform Powered by Crowdsourced OSINT

A. Daou, F. Li, S Shiaeles

15:00–15:20

Proactive Measures for Cyber-Physical Systems Cybersecurity

K. Taha

15:20–15:40

Invited Talk: Resilience in: Cyber and Social Domains under Attack

I. Linkov

15:40–16:00
CET

Coffee break

16:00–17:00

CET

Technical session Track 1 – S4

Chair: Nathan Daughety (USAF)  Room: Auditorium

16:00–16:20

A Driver Detection Method by means of Explainable Deep Learning

F. Martinelli, F. Mercaldo, A. Santone

16:20–16:40

Optimizing AI for Mobile Malware Detection by Self-Built-Dataset GAN Oversampling and LGBM

O. Dayan, L. Wolf, F. Wang, Y. Harel

16:40–17:00

Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums (Remote)

F. Moreno-Vera,  M. Nogueira, C. Figueiredo, D. Menasche, M. Bicudo,  A. Woiwood, E. Lovat, A. Kocheturov, L. Pfleger de Aguiar                    

 

Room: Room 7

9:20–10:40

CET

Technical session Track 1 – S5

Chair: Somone Bussa (Polytechnic of Turin)  Room: Room 7

09:20–09:40

Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models

J. Casajus-Setien, C. Bielza, P. Larrañaga

09:40–10:00

Key Update for the IoT Security Standard OSCORE

R. Hoglund       , M. Tiloca, S. Bouget, S. Raza

10:00–10:20

A Multi-Class Intrusion Detection System Based on Continual Learning

C. Oikonomou, I. Iliopoulos, D. Ioannidis, D. Tzovaras   

10:40–11:00
CET

Coffee break

11.00–12:00

CET

Technical session Track 1 – S6

Chair: Nicholas Kolokotronis (Univ. of Peloponnese)  Room: Room 7

11.00–11:20

Blockchain-based trustworthy O2O interaction in the next 6G ecosystem

E. Bellini, E. Damiani, S. Marrone

11.20–11:40

A Recipe for Cost-Effective Secure IoT: the Safe Place Project Case Study

F. Palmarini, L. Veronese, M. Busi, R. Focardi, F. Luccio 

11.40–12:00

VulDetect: A novel technique for detecting software vulnerabilities using Language Models

Marwan omar, S. Shiaeles

12:00–13:00
CET

Plenary session Keynote 1  

Room: Auditorium

13:00–14:00
CET

Lunch break

14:00–15:40

CET

Technical session Track 2 – S7

Chair: Stavors Shiaeles (Univ. or Portsmouth)  Room: Room 7

14:00–14:20

SoK: Static Configuration Analysis in Infrastructure as Code Scripts

P. Ranga, R. Konala, V. Kumar, D. Bainbridge

14:20–14:40

Detecting Internal Reconnaissance Behavior Through Classification of Command Collections

L. Vandenberghe, H. Manassery Koduvely, M. Pospelova

14:40–15:00

Understanding Resilience: Looking at Frameworks & Standards – A Systematic Study from cyber perspective

N. Laxman, D. Krohmer, M. Damm, R. Schwarz, P. Oliveira Antonino     

15:00–15:20

Merging Model-Based and Data-Driven Approaches for Resilient Systems Digital Twins Design

L. Campanile, M.S. de Biase, R. De Fazio , M. Di Giovanni , F. Marulli, L. Verde

15:20–15:40

A Semi-automatic Approach for Enhancing the Quality of Automatically Generated Inventories

S. Bonomi, M. Cuoci, S. Lenti

15:40–16:00
CET

Coffee break

16:00–17:00

CET

Technical session Track 3 – S8

Chair: Simone Bussa (Polytechnic of Turin) Room: Room 7

16:00–16:20

Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit Guarantees (Remote)

R. LOH, V. THING

16:20–16:40

Detecting Subspace Malicious Vectors Attack Against Smart Grid Using Sequence-Alignment Method (Remote)

khaled alotaibi Rafat Rob         Dana Nour        Doaa Zamzami

16:40–17:00

Small Satellite System Modeling for Vulnerability Analysis (Remote)

K. Murbach, T. Morris, F. Wiersig, J. Golden

Room: Room 8

9:20–10:40

CET

Technical session EPES-SPR – S9 

Chair: Panagiotis Sarigiannidis (Univ. of Western Macedonia) Room: Room 8

09:20–09:40

Modelling and Analysing Security Threats Targeting Protective Relay Operations in Digital Substations

M. Elrawy, L. Hadjidemetriou, C. Laoudias, M. K. Michael         

09:40–10:00

Threat intelligence using Digital Twin Honeypots in Cybersecurity (Remote)

M. Nintsiou, E. Grigoriou, Paris-Alexandros Karypidis, T. Saoulidis, E. Fountoukidis, P. Sarigiannidis        

10:00–10:20

PHOENI2X – A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation
& Response Capabilities  for Business Continuity and Recovery, Incident Response, and Information (Remote)

K. Fysarakis, A. Lekidis, V. Mavroeidis,   K. Lampropoulos, G. Lyberopoulos, I. Garcia-Milà Vidal, J. C. Terés i Casals,  E. Rodriguez Luna, A. A. M. Sancho, A. Mavrelos, M. Tsantekidis, S. Pape, A. Chatzopoulou, C. Nanou, G. Drivas, V. Photiou, G. Spanoudakis, O. Koufopavlou

10:20–10:40

Towards a Hybrid Blockchain-Based Energy Trading Market for Microgrids (Remote)

P. Savvidis, N. Vakakis,  A. Voulgaridis,   E. Bellini, D. Ioannidis, K. Votis,  D. Tzovaras      

10:40–11:00
CET

Coffee break

11.00–12:00

CET

Technical session DS4CS – S10 

Chair: Spiros Skiadopoulos Room: Room 8

11.00–11:20

Improving the Detection of Unknown DDoS Attacks through Continual Learning

B. Nugraha, K. Yadav, P. Patil, T. Bauschert

11.20–11:40

RoG: A Pipeline for Automated Sensitive Data Identification and Anonymisation

S. Nikoletos, S. Vlachos, E. Zaragkas, C. Vassilakis, C. Tryfonopoulos, P. Raftopoulou

11.40–12:00

Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks

M. Zych, V. Mavroeidis, K. Fysarakis, M. Athanatos

12.00–13:00
CET

Plenary session Keynote 1  

Room: Auditorium

13:00–14:00
CET

Lunch break

14:00–15:40

CET

Technical session Track 1 – S11

Chair: Gohar Sargsyan (CGI)  Room: Room 8

14:00–14:20

UNDERSTANDING HUMAN FACTORS OF CYBERSECURITY: DRIVERS OF INSIDER THREATS

M. Green, P. Dozier

14:20–14:40

DDoS Attack Detection in a Real Urban IOT Environment using Federated Deep Learning

K. Ahmadi, R. Javidan

14:40–15:00

Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices

J. von der Assen, A. Huertas Celdran, N. Huber, G. Bovet, G. Martinez Perez, B. Stiller    

15:00–15:20

HSchain: Anonymous Permissioned Blockchain with Enhanced Auditability

J. Hou, L. Xu, L. Zhu, P. Jiang, S. Song

15:20–15:40

Real-time APT Detection Technologies: A Literature Review

S. Monch, H. Roth

15:40–16:00
CET

Coffee break

16:00–17:20

CET

Technical session DS4CS – S12

Chair: Christos Tryfonopoulos Room: Room 8

16:00–16:20

Minimizing Software-Rooted Risk through Library Implementation Selection (Remote)

P. Sotiropoulos, C. Mathas, C. Vassilakis, N.Kolokotronis

16:20–16:40

Learning When to Say Goodbye: What Should be the Shelf Life of an Indicator of Compromise? (Remote)

B. Tostes, L. Ventura, E. Lovat, M. Martins, D. Sadoc Menasche

Tuesday 1st of August

Room: Auditorium

9:00–10:40

CET

Technical session Track 3 – S13

Chair:  Stavros Shiaeles (Univ. of Portsmouth) Room: Auditorium

09:00–09:20

SPAT: A Testbed for Automotive Cybersecurity Training

R. Caviglia, G. B. Gaggero, M. Marchese , N. Vincis, A. Aceti, O. Morando

09:20–09:40

Enhancing Industrial Cyber-Physical Systems Security with Smart Probing Approach

V. Bonagura, C. Foglietta, S. Panzieri, F. Pascucci  

09:40–10:00

Control-Implications-Based Side-Channel Monitoring for Embedded Systems

S. Roy, B. Drozdenko

10:00–10:20

Identification of vulnerable IoT enabled transportation infrastructure into a cyber-physical transportation network

K. Ntafloukas,  L. Pasquale, B. Martinez Pastor, D. P. McCrum  

 

10:20–10:40

Default Credentials Vulnerability: The Case Study of Exposed IP Cams

S. Perone, L. Faramondi,    R. Setola

10:40–11:00
CET

Coffee break

11.00–12:00

CET

Technical session Track 1 – S14

Chair: Luca Faramondi (UCBM) Room: Auditorium

11.00–11:20

Hunting IoT Cyberattacks With AI-Powered Intrusion Detection

S. Grigoriadou, P. Radoglou-Grammatikis, I. Makris, T. Lagkas, V. Argyriou, A. Lytos, E. Fountoukidis, P. Sarigiannidis                 

11.20–11:40

BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks

M. Chelghoum, G. Bendiab, M. Benmohammed, S. Shiaeles, E. Bellini   

11.40–12:00

Efficient Early Anomaly Detection of Network Security Attacks Using Deep Learning

T. Ahmad, D. Truscan

12.00– 13:00
CET

Plenary session Keynote 2

Chair: Nicholas Kolokotronis Room: Auditorium

Invited talk: Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies

M. Conti (Univ. of Padua, EiC IEEE TIFS)

[More details]

13:00–14:00
CET

Lunch break

14:00–15:00

CET

Plenary session Keynote 3

Chair: Emanuele Bellini (Univ of Roma Tre) Room: Auditorium

 

Invited talk: Breaking Down AI Security and Safety at the Industrial Edge

R. Mariani (VP  Industry Safety NVIDIA; First VP IEEE Computer Society)

[More details]

15:00–15:40

CET

Plenary session Industrial Panel  

Chair: Ernesto Damiani (Univ. of Milan) Room: Auditorium

 

Invited panelists: L. Ronchini (Thales), S. Bordi (Leonardo), R. Mariani (NVIDIA), Y. Harel (ICRC-Tel Aviv Univ.), Gohar Sargsyan(CGI)

15:40–16:00
CET

Coffee break

16:00–17:00

CET

Technical session Track 1-2 – S15

Chair: Fulvio Valenza Room: Auditorium

16:00–16:20

An Explainable Artificial Intelligence Approach for a Trustworthy Spam Detection

AbUBAKR HASSAN AHMED IBRAHIM, M. Mejri, F. Jaafar

16:20–16:40

Cyber threat hunting using unsupervised federated learning and adversary emulation

S. Sheikhi, P. Kostakos

16:40–17:00

Assessing Cybersecurity Hygiene and Cyber Threats Awareness in the Campus – A Case Study of Higher Education Institutions in Portugal and Poland

L. Oliveira, A. Chmielewski, P. Rutecka, K. Cicha, M. Rizun, N. Torres, P. Pinto

17:00–17:20

Evaluating Machine Learning approaches for Cyber and Physical anomalies in SCADA systems

S. Guarino, L. Faramondi, R. Setola, F. Flammini

 

Room: Room 7

9:00–10:40

CET

Technical session HACS – S16

Chair: Nicolas Sklavos (Univ. of Patras)  Room: Room7

09:00–09:20

Area-Delay Efficient Security Scheme for Smart Hospital Systems

K. Tsantikidou, D. Boufeas, N. Sklavos

09:20–09:40

A PUF Based on the Non-Linearity of Memristors

C. Aitchison

09:40–10:00

Breaking AES-128: Machine Learning-Based SCA under Different Scenarios and Devices

S. Tehranipoor, N. Karimian, J Edmonds

10:00–10:20

A New Fast and Side-channel Resistant AES Hardware Architecture (Remote)

M. Macchetti, H Pelletier, C. Groux

 

10:40–11:00
CET

Coffee break

11.00–12:00

CET

Technical session HACS -S17 

Chair: Nicolas Sklavos (Univ. of Patras)  Room: Room 7

11.00–11:20

Randomized addressing countermeasures are inefficient against address-bit SCA (Remote)

I. Kabin, Z. Dyka, P. Langendoerfer

11.20–11:40

Counteracting Modeling Attacks using Hardware-based Dynamic Physical Unclonable Function (Remote)

J. Dofe, S. Rajput

11.40–12:00

Algorithm for simplifying the SHA-256 operations tree (Remote)

A. Levina, A. Plotnikov

12.00– 13:00
CET

Plenary session Keynote 2

Room: Auditorium

13:00–14:00
CET

Lunch break

14:00–15:00 CET

Plenary session Keynote 3

Room: Auditorium

15:00–15:40
CET

Plenary session Industrial Panel 

Room: Auditorium

15:40–16:00
CET

Coffee break

16:00–17:00

CET

Technical session 2D-DPA – S18

Chair: Salvatore D’Antonio (Univ. Napoli Parthenope)  Room: Room 7

16:00–16:20

A Practical and Scalable Privacy-preserving Framework

S. D’Antonio, N. Avgerinos, I. Kamara, C. Kotselidis, I. Lazarou, T. Mannarino, G. Meditskos, K. Papachristopoulou, A. Papoutsis, P-. Roccetti, M. Zuber         

16:20–16:40

Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies

A. Pedrouzo-Ulloa, J. Ramon, F. Pérez-González, S. Lilova, P. Duflot, Z. Chihani, N. Gentili, P. Ulivi, M. Ashadul Hoque, T. Mukammel, Z. Pritzker, A. Lemesle, J. Loureiro-Acuña, X. Martínez, G. Jiménez-Balsa        

16:40–17:00

Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation

A. Pedrouzo-Ulloa, A. Boudguiga, O. Chakraborty, R. Sirdey, O. Stan, M. Zuber  

Room: Room 8

9:20–10:40

CET

Technical session CRE – S19 

Chair: Nick Multari(PNNL), Ms. Rosalie McQuaid (MITRE Corp) iRoom: Room 8

09:00–09:20

Introduciton ot CRE

N. Multari    

09:40–10:00

Cyber Resilience, Societal Situational Awareness for SME (Remote)

R. van Kranenburg, R. Bohara

10:00–10:20

Invited Talk:

V. Lotz (SAP)

10:20–10:40

Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving

G. Hatzivasilis,  S. Ioannidis, G. Kalogiannis,  M. Chatzimpyrros,  G. Spanoudakis, G. Jiménez Prieto, A. Rojas Morgan, M. Juaniz Lopez, B. Cataldo, J. F. Ruiz          

10:40–11:00
CET

Coffee break

11.00–12:00

CET

Technical session CRE – S20

Chair: Rosalie McQuaid(MITRE Corp) Room: Room 8

11.00–11:20

Invited Talk: AI and New Emerging Challenges to Security and Resilience. Weaponizing AI

Dr. G.Sharkov, (CEE/ESI)

11.20–11:40

Invited Talk: “AI and Cyber: The Beat Goes On”

Dr. Paul Nielsen (Carnegie Melon Univ/SEI)

12.00–13:00 CET

Plenary session Keynote 2

Room: Auditorium

13:00–14:00
CET

Lunch break

14:00–15:00 CET

Plenary session Keynote 3

Room: Auditorium

15:00–15:40
CET

Plenary session Industrial panel

Room: Auditorium

15:40–16:00
CET

Coffee break

16:00–18:00

CET

Technical session CRE – S21

Chair: Nick Moultari (PNNL) Room: Room 8

16:00–16:20

Verified Value Chains, Innovation and Competition

A. Weber, S. Guilley, R. Rathfelder, M. Stoettinger, T. Grawunder, C. Lueth, M. Malenko, S. Reith, A. Puccetti, J. Seifert, N. Herfurth, G. Heiser, H. Sankowski

16:20–16:50

Invited Talk: Surviving the Sands of Cyber -Entropy, Conflict, Risks, and Resiliency (Remote)

S.Foote

16:50–18:00

Panel Discussion on Cyber Resilience

Dr. G.Sharkov, (CEE/ESI), Pdr. P. Nielsen (CMU/SEI), Mr. S. Foote(Phenomenati Inc.), Mr. V. Lotz (SAP), Authors of Accepted papers

 

Room: Room E

19:30–19:45

CET

IEEE SMC TC Homeland Security Award
Session

Chair: Francesco Flammini (TCHS chair), Emanuele Bellini (TCHS co-chair)

19:45–20:00
CET

IEEE CSR Best Paper Award session  

Chair: Emanuele Bellini (IEEE CSR), Nicholas Kolokotronis(IEEE CSR), Stavros Shiaeles (IEEE CSR), Giancarlo Fortino (IEEE SMC Italian Chapter), Rita Forsi, Domitilla Benigni (W4C Italy)

20:00–24:00
CET

Gala Dinner

 

Wednesday 2nd of August

Room: Auditorium

9:00–10:40

CET

Technical session Track 3 – S22

Chair: Simone Bussa (Polytechnic of Turin) Room: Auditorium

09:00–09:20

Evaluating a process-aware IDS for smart grids on distributed hardware

V. Menzel, K.O.  Großhanten, A. Remke

09:20–09:40

Multi-party Computation for Privacy and Security in Machine Learning: a practical reviews (Remote)

A. Bellini, E. Bellini, M. Bertini, D. Almhaithawi, S. Cuomo

09:40–10:00

A Feature-Aware Semi-Supervised Learning Approach  for Automotive Ethernet

K. Hassan Shibly, Md Delwar Hossain, H. Inoue, Yuzo Taenaka   Y. Kadobayashi

10:00–10:20

Trojan Triggers for Poisoning Unmanned Aerial Vehicles Navigation: A Deep Learning Approach (Remote)

M. Mynuddin, Sultan Uddin Khan, M. Nabil Mahmoud

10:20–10:40

Trustworthiness-Related Risks in Autonomous Cyber-Physical Production Systems – A Survey (Remote)

M. Zahid, F. Flammini, A. Bucaioni

10:40–11:00
CET

Coffee break

11.00–12:00

CET

Technical session Track 1 – S23

Chair: Luca Faramondi (UCBM)  Room: Auditorium

11.00–11:20

Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms (Remote)

N. Ferdous Aurna, Md Delwar Hossain, Y. Taenaka,  Y. Kadobayashi       

11.20–11:40

Early Detection of Reconnaissance Attacks on IoT Devices by Analyzing Performance and Traffic Characteristics (Remote)

P. Keshavamurthy, S. Kulkarni

11.40–12:00

Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies (Remote)

M. Ben Farah, O. Al-Kadri, Y. Ahmed, R. Abozariba, X. Bellekens

12.00– 13:00
CET

Plenary session Keynote – 4

Room: Auditorium

Invited talk: Cyber-Security, Cyber-Forensics, and Cyber-Investigation: scientific, technical, and legal practical issues for Law Enforcement Agencies

Coll. Marco Mattiucci (Arma dei Carabinieri)

[More details]

13:00–14:00
CET

Lunch break

14:00–15:40

CET

Technical session Track 1 – S24

Chair: Nathan Daughety Room: Auditorium

14:00–14:20

A Taxonomic Survey of Model Extraction Attacks (Remote)

D. Genc, M. Ozuysal, E. Tomur

14:20–14:40

Phishing and Smishing Detection Using Machine Learning (Remote)

H. El Karhani, R. Jamal, Y. Bou Samra, I. Elhajj, A. Kayssi

14:40–15:00

Evaluation of Applying LDA to Redacted Documents in Security and Safety Analysis (Remote)

K. Umezawa, S. Wohlgemuth, K. Hasegawa, K. Takaragi

15:00–15:20

Denial of Service Attack Detection via Differential Analysis of Generalized Entropy Progressions (Remote)

O. Subasi, J. Manzano,K. Barker

15:20–15:40

Ransomware Detection based on Network Behavior using Machine Learning and Hidden Markov Model with Gaussian Emission (Remote)

A. Srivastava, N. Kumar, A. Handa, S. K. Shukla 

15:40–16:00
CET

Coffee break

16:00–16:10

CET

Conclusions

Room: Auditorium

Room: Room 7

9:00–10:40

CET

Technical session Track 1 – S25 

Chair: Stavros Shiaeles Room: Room 7

09:00–09:20

A Taxonomy for Tsunami Security Scanner Plugins

G. Lima, V. Gonçalves, P. Pinto

09:20–09:40

ML and Network Traces to M.A.R.S.

W. Cruz, L. Michel, B. Drozdenko, S. Roodbeen

09:40–10:00

Deepfake Detection with Deep Learning: Convolutional Neural Networks versus Transformers (Remote)

V. Thing

10:00–10:20

A Survey of Attacks and Defenses for Deep Neural Networks (Remote)

D. Machooka, X. Yuan, A. Esterline

10:20–10:40

Mitigating Membership Inference Attacks in Machine Learning as a Service (Remote)

M. Bouhaddi, K. Adi

10:40–11:00
CET

Coffee break

11.00–12:00

CET

Technical session Track 2 – S26

Chair: Fulvio Valenza Room: Auditorium

11.00–11:20

Automated Patch Management: An Empirical Evaluation Study (Remote)

V. Ahmadi Mehri, P. Arlos, E. Casalicchio

11.20–11:40

Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies (Remote)

E. Ear, J. Remy, S. Xu

 

11.40–12:00

Nudge to Promote Employees’ Information Security Compliance Behavior: A Field Study (Remote)

M. Inaba, T. Terada

12.00– 13:00
CET

Plenary session Keynote 4

Chair: Room: Auditorium

13:00–14:00
CET

Lunch break

14:00–15:40

CET

Technical session Track 1-3 – S27

Chair: Luca Faramondi (UCBM) Room: Auditorium

14:00–14:20

Attacking a packet Analyzer: Caronte case study (Remote)

D. Granata, M. Rak, F. Grimaldi

14:20–14:40

Exposed: Critical Vulnerabilities in USSD Banking Authentication Protocols (Remote)

Z. Lamoyero, O. Fajana

14:40–15:00

IoT Forensics: Analysis of Ajax Systems’ mobile app for the end user (Remote)

E. Dragonas, C. Lambrinoudakis

15:00–15:20

IoT Forensics: Investigating the mobile app of Dahua Technology (Remote)

E. Dragonas, C. Lambrinoudakis , M. Kotsis

 

15:40–16:00
CET

Coffee break

16:00–16:10

CET

Conclusion

Chair: Room: Auditorium

Room: Room 8

9:00–10:40

CET

Technical session 2P-DPA – S28

Chair: Salvatore D’Antonio ( Univ. of Napoli Parthenope) Room: Room 8

09:00–09:20

Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation

A. Pedrouzo-Ulloa, A. Boudguiga, O. Chakraborty, R. Sirdey, O. Stan, M. Zuber

09:20–09:40

Comparison of machine learning models applied on anonymized data with different techniques

J. Sainz-Pardo Diaz, A. Lopez Garcia

09:40–10:00

Privacy-preserving Federated Learning System for Fatigue Detection (Remote)

M. Mohammadi, R. Allocca, D. Eklund, R. Shrestha, S. Sinaei

10:00–10:20

FedGA-Meta: Federated Learning Framework using Genetic Algorithms and Meta-Learning for Aggregation in Industrial Cyber-Physical Systems (Remote)

B. S. GUENDOUZI, S. OUCHANI, H. AL ASSAAD, M. EL ZAHER JRADI        

10:20–10:40

How to secure the IoT-based surveillance systems in an ELEGANT way (Remote)

A. Pawlicka, D. Puchalski, M. Pawlicki, R. Kozik, M. Choraś

10:40–11:00
CET

Coffee break

11.00–12:00 CET

Technical session 2P-DPA – S29

Chair: Salvatore D’Antonio (Univ. of Salerno)  Room: Room 8

11.00–11:20

The Alliance of HE and TEE to Enhance their Performance and Security (Remote)

S. D’Antonio, G. Lazarou, G. Mazzeo, O. Stan, M. Zuber, I. Tsavdaridis   

11.20–11:40

Detection of radio frequency interference in Satellite Ground Segments (Remote)

F. Uccello, L. Coppolino , S. D’Antonio, A. Lyratzis, C. Bakalis, S. Touloumtzi, I. Papoutsis 

11.40–12:00

Comparison of Machine Learning Algorithms trained under Differential Privacy for Intrusion Detection Systems (Remote)

I. Siachos, K. Kaltakis, K. Papachristopoulou, I. Giannoulakis, E. Kafetzakis          

12.00–13:00
CET

Plenary session Keynote 4

Room: Auditorium

13:00–14:00
CET

Lunch break

14:00–15:40 CET

Technical session DR-DCHE – S30

Chair: Anna Maria Tammaro (Univ. of Parma), Emanuele Bellini (Univ. of Roma Tre) Room: Room 8

14:00–14:20

An Open Sharing Method for Digital Heritage Assets Based on Self-Sovereign Identity Technology

J. Zhu, Z. Wu

 

14:20–14:40

Metadata and Semantic Annotation of Digital Heritage Assets: a case study (Remote)

A. Amato, S. Venticinque, G. Renda, S. Mataluna, D. Branco

14:40–15:00

Invited: DARIAH-IT: Managing Digital Heritage Assets

 E. Degl’Innocenti

15:00–15:40

Roundtable

 

15:40–16:00
CET

Coffee break

16:00–16:10 CET

Conclusions

Room: Auditorium