Loading...

Conference Program

Tentative structure of the IEEE CSR 2025 event’s program; it is subject to change and will be updated in the coming weeks.

See also the accepted papers of the workshops.

Cyber Security

SafetilBERT: An efficient and explained LLM for IoMT attacks classification
M. Niang, H. Nakouri, and F. Jaafar

Reimagining the usermode process space by utilizing hardware-enforced sub-process isolation
M. Nelson and M. Mirakhorli

Evasion of deep learning malware detection via adversarial selective obfuscation
C. Greco, M. Ianni, A. Guzzo, and G. Fortino

DP-Tabula: Differentially private synthetic tabular data generation with large language models
W. Niu, Z. Zhang, A. Huertas, C. Feng, J. Von Der Assen, N. Nezhadsistani, and B. Stiller

A machine learning approach to automate greybox testing
A. Hijazi, D. Mezher, E. Zeidan, and C. Bassil

Offloading key switching on GPUs: A path towards seamless acceleration of FHE
O. Papadakis, M. Papadimitriou, A. Stratikopoulos, M. Xekalaki, J. Fumero, and C. Kotselidis

Towards DoS attack detection for IoT systems: A cross-layer oriented approach based on machine learning techniques
D. Tasiopoulos, A. Xenakis, A. Lekidis, D. Kosmanos, C. Chaikalis, and V. Vlachos

Enhancing deep learning based IDS adversarial robustness with causal inference
M. François, P. E. Arduin, and M. Merad

Defending against beta poisoning attacks in machine learning models
N. Gulciftci and M. E. Gursoy

Reducing human-induced label bias in SMS spam with context-enhanced clustering (CEC)
G. Shu Fuhnwi, A. M. Reinhold, and C. Izurieta

A novel GNN-based approach for detection of prompt injection attacks
G. Jadhav, A. K. Singh, Z. Khanam, and R. Hercock

Enhancing cyber threat intelligence sharing through data spaces in critical infrastructures
M. Akbari Gurabi, Ö. Sen, N. Rahimidanesh, A. Ulbig, and S. Decker

Explainable ransomware detection through static analysis and machine learning
G. Ciaramella, F. Martinelli, A. Santone, and F. Mercaldo

Space cyber risk management: Desired properties
E. Ear, B. Bailey, and S. Xu

Machine-learning anomaly detection for early identification of DDOS in smart home IoT devices
R. Lamptey, M. Saedi, and V. Stankovic

LDP3: An extensible and multi-threaded toolkit for local differential privacy protocols and post-processing methods
B. K. Balioglu, A. Khodaie, and M. E. Gursoy

Efficient and privacy-preserving authentication using verifiable credentials
A. Badirova, S. D. Varnosfaderani, and R. Yahyapour

Evasive ransomware attacks using low-level behavioral adversarial examples
M. Hirano and R. Kobayashi

Integrating cyber threat intelligence into threat modeling for autonomous ships using PASTA and MISP
M. Erbas, J. Vanharanta, J. Paavola, L. Tsiopoulos, and R. Vaarandi

Budget-conscious differentially private aggregation of power data timeseries
F. Kserawi and G. Ghinita

Technological framework for secure and resilient food supply chain
M. Fischer, R. Tönjes, R. Bohara, M. Ross, A. Hegde, C. Wressnegger, and M. Brunner

Classification of software vulnerability artifacts using public Internet data
L. Ambrus De Lima, E. Rabello Ussler, M. A. Santos Bicudo, D. Sadoc Menasché, A. Kocheturov, and G. Srivastava

PCIe monitoring for secure code execution in heterogeneous system architectures
I. Georgakas, E. Papadogiannaki, K. Georgopoulos, and S. Ioannidis

Abstract attack intention inference using low-rank gated arithmetic interactive attention
W. Yang, M. Wang, and D. Wojtczak

A reinforcement learning approach to multi-parametric input mutation for fuzzing
M. L. Uwibambe, A. Tyagi, and Q. Li

The notional risk scores approach to space cyber risk management
E. Ear, B. Bailey, and S. Xu

Optimized security measure selection: Leveraging MILP solvers to balance risk and cost
P. Saha Fobougong, M. Mejri, and K. Adi

Large scale cyber security log classification using semi-supervised clustering
P. Cai, M. Lazarescu, S. T. Soh, and R. Ryan

Security vulnerabilities in AI-generated JavaScript: A comparative study of large language models
D. Aydın and Ş. Bahtiyar

Contrastive self-supervised network intrusion detection using augmented negative pairs
J. Wilkie, H. Hindy, C. Tachtatzis, and R. Atkinson

Design and implementation of a tool to improve error reporting for eBPF code
R. Rizza, R. Sisto, and F. Valenza

FE4MQTT – Using functional encryption to improve the privacy in publish-subscribe communication schemes
M. Fischer and R. Tönjes

Metamorphic relation prediction for security vulnerability testing of online banking applications
K. Rahman, A. M. Reinhold, and C. Izurieta

A collusion-resistant DECO-based attestation protocol for practical applications
U. Şen, M. Osmanoğlu, and A. A. Selçuk

An efficient methodology for real-time risk and impact assessment in 5G networks
D. Varvarigou, K. Lampropoulos, O. Koufopavlou, S. Denazis, and P. Kitsos

Adaptive weighted ensemble learning for intrusion detection in industrial IoT and edge computing
S. Ruiz Villafranca, L. M. Garcia Sáez, J. Roldán Gómez, J. Carrillo Mondéjar, J. M. Castelo Gómez, and J. L. Martínez

CONSENTIS – An innovative framework for identity and consent management for EU digital and data strategies
N. Kyriakoulis, C. Dimopoulos, G. Daniil, K. Lampropoulos, V. Prevelakis, P. Karantzias, A. B. Popescu, A. Fuentes Exposito, N. Nikolaou, S. Papastergiou, G. Alexandris, M. Tasouli, G. Karavias, E. Kosta, and O. Mihaila

MiniLib: A flow analysis-based approach for attack surface reduction through software debloating
L. Kopanias, P. Sotiropoulos, N. Kolokotronis, and C. Vassilakis

RuleXploit: A framework for generating suricata rules from exploits using generative AI
A. Papoutsis, A. Dimitriadis, I. Koritsas, D. Kavallieros, T. Tsikrika, S. Vrochidis, and I. Kompatsiaris

C2-based malware detection trough network analysis using machine learning
M. Martijan, V. Krinickij, and L. Bukauskas

A Bayesian–Markov framework for proactive and dynamic cyber risk assessment driven by EPSS
P. Cheimonidis and K. Rantos

From one network to another: Transfer learning for IoT malware detection
K. Bosinaki, D. Natsos, G. Siachamis, and A. L. Symeonidis

Post-quantum security evaluation of aeronautical communications
K. Spalas and N. Kolokotronis

Trusted identity authentication for digital scholarship participants based on verifiable credential
X. Wu, Z. Wu, and H. Li

HyperDtct: Hypervisor-based ransomware detection using system calls
J. Von Der Assen, A. Huertas Celdran, J. M. Lüthi, J. M. Jorquera Valero, F. Enguix, G. Bovet, and B. Stiller

Using topic modeling and LLMs to recommend CAPEC attack patterns: A comparative study
U. Moore, X. Yuan, and H. Moradi

A multi-level user identity authentication scheme based on environmental detection
N. Zeeshan, L. L. Spada, and M. Bakyt

A comprehensive 5G dataset for control and data plane security and resource management
B. Nugraha, M. Hajizadeh, T. Niehoff, A. Venkatesh Jnanashree, T. V. Phan, D. Triantafyllopoulou, O. Krause, M. Mieth, K. Moessner, and T. Bauschert

CTI-GEN: A framework for generating STIX 2.1 compliant CTI using generative AI
A. Papoutsis, A. Dimitriadis, D. Kavallieros, T. Tsikrika, S. Vrochidis, I. Kompatsiaris, and G. Meditskos

Practical confidential data cleaning using trusted execution environments
A. Basu, M. Yoshino, and M. Toba

Scalable and adaptive security framework for the IoT-edge-cloud continuum
S. Cuñat Negueroles, I. Makropodis, L. Cabanillas Rodriguez, C. Xenakis, I. Chouchoulis, C. Palau, and I. Lacalle

PASTA threat modeling for cyber resilience and COLREG compliance in autonomous ship systems
M. Erbas, G. Visky, O. Maennel, L. Tsiopoulos, and R. Vaarandi

ResViT: A hybrid model for robust deepfake video detection
A. Aria, S. L. Mirtaheri, S. A. Asghari, R. Shahbazian, and A. Pugliese

eIDPS: A comprehensive comparative analysis of packet-level and flow-level intrusion detection and prevention
S. Kostopoulos, D. Papatsaroucha, I. Kefaloukos, and E. K. Markakis

Cyber Resilience

An AI-powered pipeline for enabling self-healing in software systems
G. Siachamis, G. Papadopoulos, and A. Symeonidis

Designing AI systems with correction mechanisms towards attack-resilient architectures
E. Kafali, C. N. Spartalis, T. Semertzidis, C. Z. Patrikakis, and P. Daras

Accounting for the impact of real-world data and costs in autonomous cyber defence
A. Neal, A. Acuto, P. Green, C. Lear, N. Hare, and S. Maskell

A lightweight firmware resilience engine for real-time operating systems
U. Budak, F. De Santis, O. Yasar, M. Safieh, and G. Sigl

Adapt-LFA: Adaptive gradient-guided label flipping attack against federated learning-based intrusion detection in IoT
H. Rezaei, R. Taheri, I. Jordanov, and S. Shiaeles

A structured process for scenario-based gamification of cyber threat intelligence for space system security
M. Kriesten, M. Thinyane, and D. Ormrod

ReLATE: Resilient learner selection for multivariate time-series classification against adversarial attacks
C. I. Kocal, O. Gungor, A. Tartz, T. Rosing, and B. Aksanli

Mapping of maritime ecosystem components in the cybersecurity landscape
E. Roponena, S. Lielbārde, E. Citskovska, A. Brilingaitė, L. Bukauskas, and R. Pirta

A novel MQTT-ZT secure broker: Zero trust architecture for IoT security
M. James, T. Newe, D. O’Shea, and G. D. O’Mahony

Cybersecurity mesh architecture for electric vehicle charging infrastructure
R. Bohara, M. Ross, and O. Joglekar

Optimizing network services with quantum dynamic programming and Grover’s search
E. Zeydan, J. Mangues Bafalluy, Y. Turk, A. Aydeger, and M. Liyanage

Informed defense: How attacker profiles transform vulnerability assessments
M. Z. Naseer, V. Fodor, and M. Ekstedt

Sunburst vapor – A cybersecurity prompted case study of national-scale organizational transformation
E. Moore, S. Fulton, T. Amador, R. Mancuso, I. Martinez, and D. Likarish

Machine learning model complexity as a mitigation strategy against industrial espionage through membership inference attacks
R. Dautov, H. Song, C. Schaefer, S. Kim, and V. Pietsch

Composite product cybersecurity certification using explainable AI based dynamic risk assessment
N. Basheer, S. Islam, S. Papastergiou, and E. Maria Kalogeraki

An approach for a supporting multi-LLM system for automated certification based on the German IT-Grundschutz
L. Muth and M. Margraf

A preliminary ontology for 5G network resilience: Hybrid threats, risk reduction, compliance
R. A. Paskauskas

Cyber resilience strategies throughout the system development lifecycle
G. Deffenbaugh and S. Kameneni

A proposal for an ontology to enhance IT architecture resilience
B. Mbaye, M. Mejri, and P. Saha Fobougong

FAIR: Facilitating artificial intelligence resilience in manufacturing industrial Internet
Y. Zeng, I. Lourentzou, X. Deng, and R. Jin

Development of an SDN-based space system simulation framework for intrusion detection
U. Uhongora, M. Thinyane, and Y. W. Law

CPS Security

Anomaly identification in power systems using dynamic state estimation and deep learning
F. Alsaeed, E. Abukhousa, S. S. F. Syed Afroz, A. Qwbaiban, and A. S. Meliopoulos

Driving resilience: Assessing security incidents’ criticality in autonomous vehicles
Y. Qendah and S. Katzenbeisser

A lightweight IDS framework using FPGA-based hardware fingerprinting on Zynq SoC
A. W. Mohammed, A. Ali, H. Arif, F. R. P. Mohammed, and H. Malik

DFA: Dynamic frame alteration for video manipulation attack in IoT environments
B. C. Nchelem, A. K. Singh, and H. Mouratidis

Fault tolerance vs. attack detection in industrial control systems: A deep learning approach
H. Mehrpouyan

Security risk analysis of logistical support solutions for MaaS and DLT-based mitigations
G. Kisa Isik, A. Eker, T. Tryfonas, and G. Oikonomou

CAN-MAID: An intrusion detection protocol for CAN bus
K. Marquis and J. Chandy

Application and evaluation of a substation threat modeling language for automatic attack graph generation
E. Rencelj Ling and M. Ekstedt

TPKey: Using TPMS signals for secure and usable intra-vehicle device authentication
O. Achkar, L. Nissen, S. Raza, R. Shirsat, N. Klingensmith, G. Zouridakis, and K. I. Lee

Not-so-secret authentication: The SyncBleed attacks and defenses for zero-involvement authentication systems
I. Ahlgren, R. Shirsat, O. Achkar, G. K. Thiruvathukal, K. I. Lee, and N. Klingensmith

Ontology-driven threat modeling analysis of CPSs
M. Kordi and N. Maunero

Vulnerability assessment combining CVSS temporal metrics and Bayesian networks
S. Perone, S. Guarino, L. Faramondi, and R. Setola

Securing DRL-based traffic signal control against experience replay manipulation attacks
M. Bouhaddi

ThreatSpider: CTI-driven semi-automated threat modelling for cybersecurity certification
A. Amro and G. Kavallieratos

Cybersecurity-oriented digital twins: A double-edged sword or a game changer?
S. Abdullahi and S. Lazarova Molnar

Towards safety and security testing of cyberphysical power systems by shape validation
A. Geiger, I. Hacker, Ö. Sen, and A. Ulbig

Evaluating smart home privacy: The relationship between encrypted sensor data and occupancy prediction through machine learning
S. Mohanty, D. Papadopoulos, and C. Schindelhauer

Strategic interactions in multi-sensor networks against false data injection
V. Bonagura, C. Foglietta, S. Panzieri, F. Pascucci, and L. Badia

Lessons learned from a cybersecurity risk assessment of OpenADR in smart grid planning
G. Erdogan, A. Omerovic, E. Solvang, A. Killingberg, A. Kvinnesland, and I. Abrahamsen

Post-quantum cryptography for maritime systems
D. Berger, A. Lye, A. Maidl, J. Stoppe, and A. Windhorst

Indepth analysis of a side-channel message recovery attack against FrodoKEM
P. A. Berthet

Knowledge systematization for security orchestration in CPS and IoT systems
P. Nguyen, H. Song, R. Dautov, N. Ferry, A. Rego, E. Rios, E. Iturbe, V. Valdes, A. R. Cavalli, and W. Maloulli

Wicked problem, parsimonious solution: Securing electric vehicle charging station software
E. Sheppard, Z. Wadhams, D. Arford, C. Izurieta, and A. M. Reinhold

NetPacketformer: Real-time, context-aware network intrusion detection with transformers
A. Domi, C. Zonios, G. Tatsis, A. Drosou, and D. Tzovaras

Data manipulation attack mitigation in power systems using physics-informed neural networks
S. Falas, M. Asprou, C. Konstantinou, and M. K. Michael

The invisible threat: Simulating and analyzing the coordinated sensor manipulation attack (CSMA) on UAVs
S. Sadeghpour and P. Madani

Will be made available in the coming weeks.

Will be made available in the coming weeks.