Tentative structure of the IEEE CSR 2025 event’s program; it is subject to change and will be updated in the coming weeks.
Tentative structure of the IEEE CSR 2025 event’s program; it is subject to change and will be updated in the coming weeks.
See also the accepted papers of the workshops.
SafetilBERT: An efficient and explained LLM for IoMT attacks classification
M. Niang, H. Nakouri, and F. Jaafar
Reimagining the usermode process space by utilizing hardware-enforced sub-process isolation
M. Nelson and M. Mirakhorli
Evasion of deep learning malware detection via adversarial selective obfuscation
C. Greco, M. Ianni, A. Guzzo, and G. Fortino
DP-Tabula: Differentially private synthetic tabular data generation with large language models
W. Niu, Z. Zhang, A. Huertas, C. Feng, J. Von Der Assen, N. Nezhadsistani, and B. Stiller
A machine learning approach to automate greybox testing
A. Hijazi, D. Mezher, E. Zeidan, and C. Bassil
Offloading key switching on GPUs: A path towards seamless acceleration of FHE
O. Papadakis, M. Papadimitriou, A. Stratikopoulos, M. Xekalaki, J. Fumero, and C. Kotselidis
Towards DoS attack detection for IoT systems: A cross-layer oriented approach based on machine learning techniques
D. Tasiopoulos, A. Xenakis, A. Lekidis, D. Kosmanos, C. Chaikalis, and V. Vlachos
Enhancing deep learning based IDS adversarial robustness with causal inference
M. François, P. E. Arduin, and M. Merad
Defending against beta poisoning attacks in machine learning models
N. Gulciftci and M. E. Gursoy
Reducing human-induced label bias in SMS spam with context-enhanced clustering (CEC)
G. Shu Fuhnwi, A. M. Reinhold, and C. Izurieta
A novel GNN-based approach for detection of prompt injection attacks
G. Jadhav, A. K. Singh, Z. Khanam, and R. Hercock
Enhancing cyber threat intelligence sharing through data spaces in critical infrastructures
M. Akbari Gurabi, Ö. Sen, N. Rahimidanesh, A. Ulbig, and S. Decker
Explainable ransomware detection through static analysis and machine learning
G. Ciaramella, F. Martinelli, A. Santone, and F. Mercaldo
Space cyber risk management: Desired properties
E. Ear, B. Bailey, and S. Xu
Machine-learning anomaly detection for early identification of DDOS in smart home IoT devices
R. Lamptey, M. Saedi, and V. Stankovic
LDP3: An extensible and multi-threaded toolkit for local differential privacy protocols and post-processing methods
B. K. Balioglu, A. Khodaie, and M. E. Gursoy
Efficient and privacy-preserving authentication using verifiable credentials
A. Badirova, S. D. Varnosfaderani, and R. Yahyapour
Evasive ransomware attacks using low-level behavioral adversarial examples
M. Hirano and R. Kobayashi
Integrating cyber threat intelligence into threat modeling for autonomous ships using PASTA and MISP
M. Erbas, J. Vanharanta, J. Paavola, L. Tsiopoulos, and R. Vaarandi
Budget-conscious differentially private aggregation of power data timeseries
F. Kserawi and G. Ghinita
Technological framework for secure and resilient food supply chain
M. Fischer, R. Tönjes, R. Bohara, M. Ross, A. Hegde, C. Wressnegger, and M. Brunner
Classification of software vulnerability artifacts using public Internet data
L. Ambrus De Lima, E. Rabello Ussler, M. A. Santos Bicudo, D. Sadoc Menasché, A. Kocheturov, and G. Srivastava
PCIe monitoring for secure code execution in heterogeneous system architectures
I. Georgakas, E. Papadogiannaki, K. Georgopoulos, and S. Ioannidis
Abstract attack intention inference using low-rank gated arithmetic interactive attention
W. Yang, M. Wang, and D. Wojtczak
A reinforcement learning approach to multi-parametric input mutation for fuzzing
M. L. Uwibambe, A. Tyagi, and Q. Li
The notional risk scores approach to space cyber risk management
E. Ear, B. Bailey, and S. Xu
Optimized security measure selection: Leveraging MILP solvers to balance risk and cost
P. Saha Fobougong, M. Mejri, and K. Adi
Large scale cyber security log classification using semi-supervised clustering
P. Cai, M. Lazarescu, S. T. Soh, and R. Ryan
Security vulnerabilities in AI-generated JavaScript: A comparative study of large language models
D. Aydın and Ş. Bahtiyar
Contrastive self-supervised network intrusion detection using augmented negative pairs
J. Wilkie, H. Hindy, C. Tachtatzis, and R. Atkinson
Design and implementation of a tool to improve error reporting for eBPF code
R. Rizza, R. Sisto, and F. Valenza
FE4MQTT – Using functional encryption to improve the privacy in publish-subscribe communication schemes
M. Fischer and R. Tönjes
Metamorphic relation prediction for security vulnerability testing of online banking applications
K. Rahman, A. M. Reinhold, and C. Izurieta
A collusion-resistant DECO-based attestation protocol for practical applications
U. Şen, M. Osmanoğlu, and A. A. Selçuk
An efficient methodology for real-time risk and impact assessment in 5G networks
D. Varvarigou, K. Lampropoulos, O. Koufopavlou, S. Denazis, and P. Kitsos
Adaptive weighted ensemble learning for intrusion detection in industrial IoT and edge computing
S. Ruiz Villafranca, L. M. Garcia Sáez, J. Roldán Gómez, J. Carrillo Mondéjar, J. M. Castelo Gómez, and J. L. Martínez
CONSENTIS – An innovative framework for identity and consent management for EU digital and data strategies
N. Kyriakoulis, C. Dimopoulos, G. Daniil, K. Lampropoulos, V. Prevelakis, P. Karantzias, A. B. Popescu, A. Fuentes Exposito, N. Nikolaou, S. Papastergiou, G. Alexandris, M. Tasouli, G. Karavias, E. Kosta, and O. Mihaila
MiniLib: A flow analysis-based approach for attack surface reduction through software debloating
L. Kopanias, P. Sotiropoulos, N. Kolokotronis, and C. Vassilakis
RuleXploit: A framework for generating suricata rules from exploits using generative AI
A. Papoutsis, A. Dimitriadis, I. Koritsas, D. Kavallieros, T. Tsikrika, S. Vrochidis, and I. Kompatsiaris
C2-based malware detection trough network analysis using machine learning
M. Martijan, V. Krinickij, and L. Bukauskas
A Bayesian–Markov framework for proactive and dynamic cyber risk assessment driven by EPSS
P. Cheimonidis and K. Rantos
From one network to another: Transfer learning for IoT malware detection
K. Bosinaki, D. Natsos, G. Siachamis, and A. L. Symeonidis
Post-quantum security evaluation of aeronautical communications
K. Spalas and N. Kolokotronis
Trusted identity authentication for digital scholarship participants based on verifiable credential
X. Wu, Z. Wu, and H. Li
HyperDtct: Hypervisor-based ransomware detection using system calls
J. Von Der Assen, A. Huertas Celdran, J. M. Lüthi, J. M. Jorquera Valero, F. Enguix, G. Bovet, and B. Stiller
Using topic modeling and LLMs to recommend CAPEC attack patterns: A comparative study
U. Moore, X. Yuan, and H. Moradi
A multi-level user identity authentication scheme based on environmental detection
N. Zeeshan, L. L. Spada, and M. Bakyt
A comprehensive 5G dataset for control and data plane security and resource management
B. Nugraha, M. Hajizadeh, T. Niehoff, A. Venkatesh Jnanashree, T. V. Phan, D. Triantafyllopoulou, O. Krause, M. Mieth, K. Moessner, and T. Bauschert
CTI-GEN: A framework for generating STIX 2.1 compliant CTI using generative AI
A. Papoutsis, A. Dimitriadis, D. Kavallieros, T. Tsikrika, S. Vrochidis, I. Kompatsiaris, and G. Meditskos
Practical confidential data cleaning using trusted execution environments
A. Basu, M. Yoshino, and M. Toba
Scalable and adaptive security framework for the IoT-edge-cloud continuum
S. Cuñat Negueroles, I. Makropodis, L. Cabanillas Rodriguez, C. Xenakis, I. Chouchoulis, C. Palau, and I. Lacalle
PASTA threat modeling for cyber resilience and COLREG compliance in autonomous ship systems
M. Erbas, G. Visky, O. Maennel, L. Tsiopoulos, and R. Vaarandi
ResViT: A hybrid model for robust deepfake video detection
A. Aria, S. L. Mirtaheri, S. A. Asghari, R. Shahbazian, and A. Pugliese
eIDPS: A comprehensive comparative analysis of packet-level and flow-level intrusion detection and prevention
S. Kostopoulos, D. Papatsaroucha, I. Kefaloukos, and E. K. Markakis
An AI-powered pipeline for enabling self-healing in software systems
G. Siachamis, G. Papadopoulos, and A. Symeonidis
Designing AI systems with correction mechanisms towards attack-resilient architectures
E. Kafali, C. N. Spartalis, T. Semertzidis, C. Z. Patrikakis, and P. Daras
Accounting for the impact of real-world data and costs in autonomous cyber defence
A. Neal, A. Acuto, P. Green, C. Lear, N. Hare, and S. Maskell
A lightweight firmware resilience engine for real-time operating systems
U. Budak, F. De Santis, O. Yasar, M. Safieh, and G. Sigl
Adapt-LFA: Adaptive gradient-guided label flipping attack against federated learning-based intrusion detection in IoT
H. Rezaei, R. Taheri, I. Jordanov, and S. Shiaeles
A structured process for scenario-based gamification of cyber threat intelligence for space system security
M. Kriesten, M. Thinyane, and D. Ormrod
ReLATE: Resilient learner selection for multivariate time-series classification against adversarial attacks
C. I. Kocal, O. Gungor, A. Tartz, T. Rosing, and B. Aksanli
Mapping of maritime ecosystem components in the cybersecurity landscape
E. Roponena, S. Lielbārde, E. Citskovska, A. Brilingaitė, L. Bukauskas, and R. Pirta
A novel MQTT-ZT secure broker: Zero trust architecture for IoT security
M. James, T. Newe, D. O’Shea, and G. D. O’Mahony
Cybersecurity mesh architecture for electric vehicle charging infrastructure
R. Bohara, M. Ross, and O. Joglekar
Optimizing network services with quantum dynamic programming and Grover’s search
E. Zeydan, J. Mangues Bafalluy, Y. Turk, A. Aydeger, and M. Liyanage
Informed defense: How attacker profiles transform vulnerability assessments
M. Z. Naseer, V. Fodor, and M. Ekstedt
Sunburst vapor – A cybersecurity prompted case study of national-scale organizational transformation
E. Moore, S. Fulton, T. Amador, R. Mancuso, I. Martinez, and D. Likarish
Machine learning model complexity as a mitigation strategy against industrial espionage through membership inference attacks
R. Dautov, H. Song, C. Schaefer, S. Kim, and V. Pietsch
Composite product cybersecurity certification using explainable AI based dynamic risk assessment
N. Basheer, S. Islam, S. Papastergiou, and E. Maria Kalogeraki
An approach for a supporting multi-LLM system for automated certification based on the German IT-Grundschutz
L. Muth and M. Margraf
A preliminary ontology for 5G network resilience: Hybrid threats, risk reduction, compliance
R. A. Paskauskas
Cyber resilience strategies throughout the system development lifecycle
G. Deffenbaugh and S. Kameneni
A proposal for an ontology to enhance IT architecture resilience
B. Mbaye, M. Mejri, and P. Saha Fobougong
FAIR: Facilitating artificial intelligence resilience in manufacturing industrial Internet
Y. Zeng, I. Lourentzou, X. Deng, and R. Jin
Development of an SDN-based space system simulation framework for intrusion detection
U. Uhongora, M. Thinyane, and Y. W. Law
Anomaly identification in power systems using dynamic state estimation and deep learning
F. Alsaeed, E. Abukhousa, S. S. F. Syed Afroz, A. Qwbaiban, and A. S. Meliopoulos
Driving resilience: Assessing security incidents’ criticality in autonomous vehicles
Y. Qendah and S. Katzenbeisser
A lightweight IDS framework using FPGA-based hardware fingerprinting on Zynq SoC
A. W. Mohammed, A. Ali, H. Arif, F. R. P. Mohammed, and H. Malik
DFA: Dynamic frame alteration for video manipulation attack in IoT environments
B. C. Nchelem, A. K. Singh, and H. Mouratidis
Fault tolerance vs. attack detection in industrial control systems: A deep learning approach
H. Mehrpouyan
Security risk analysis of logistical support solutions for MaaS and DLT-based mitigations
G. Kisa Isik, A. Eker, T. Tryfonas, and G. Oikonomou
CAN-MAID: An intrusion detection protocol for CAN bus
K. Marquis and J. Chandy
Application and evaluation of a substation threat modeling language for automatic attack graph generation
E. Rencelj Ling and M. Ekstedt
TPKey: Using TPMS signals for secure and usable intra-vehicle device authentication
O. Achkar, L. Nissen, S. Raza, R. Shirsat, N. Klingensmith, G. Zouridakis, and K. I. Lee
Not-so-secret authentication: The SyncBleed attacks and defenses for zero-involvement authentication systems
I. Ahlgren, R. Shirsat, O. Achkar, G. K. Thiruvathukal, K. I. Lee, and N. Klingensmith
Ontology-driven threat modeling analysis of CPSs
M. Kordi and N. Maunero
Vulnerability assessment combining CVSS temporal metrics and Bayesian networks
S. Perone, S. Guarino, L. Faramondi, and R. Setola
Securing DRL-based traffic signal control against experience replay manipulation attacks
M. Bouhaddi
ThreatSpider: CTI-driven semi-automated threat modelling for cybersecurity certification
A. Amro and G. Kavallieratos
Cybersecurity-oriented digital twins: A double-edged sword or a game changer?
S. Abdullahi and S. Lazarova Molnar
Towards safety and security testing of cyberphysical power systems by shape validation
A. Geiger, I. Hacker, Ö. Sen, and A. Ulbig
Evaluating smart home privacy: The relationship between encrypted sensor data and occupancy prediction through machine learning
S. Mohanty, D. Papadopoulos, and C. Schindelhauer
Strategic interactions in multi-sensor networks against false data injection
V. Bonagura, C. Foglietta, S. Panzieri, F. Pascucci, and L. Badia
Lessons learned from a cybersecurity risk assessment of OpenADR in smart grid planning
G. Erdogan, A. Omerovic, E. Solvang, A. Killingberg, A. Kvinnesland, and I. Abrahamsen
Post-quantum cryptography for maritime systems
D. Berger, A. Lye, A. Maidl, J. Stoppe, and A. Windhorst
Indepth analysis of a side-channel message recovery attack against FrodoKEM
P. A. Berthet
Knowledge systematization for security orchestration in CPS and IoT systems
P. Nguyen, H. Song, R. Dautov, N. Ferry, A. Rego, E. Rios, E. Iturbe, V. Valdes, A. R. Cavalli, and W. Maloulli
Wicked problem, parsimonious solution: Securing electric vehicle charging station software
E. Sheppard, Z. Wadhams, D. Arford, C. Izurieta, and A. M. Reinhold
NetPacketformer: Real-time, context-aware network intrusion detection with transformers
A. Domi, C. Zonios, G. Tatsis, A. Drosou, and D. Tzovaras
Data manipulation attack mitigation in power systems using physics-informed neural networks
S. Falas, M. Asprou, C. Konstantinou, and M. K. Michael
The invisible threat: Simulating and analyzing the coordinated sensor manipulation attack (CSMA) on UAVs
S. Sadeghpour and P. Madani
Will be made available in the coming weeks.
Will be made available in the coming weeks.