Loading...

Conference Program

High-level structure of the IEEE CSR 2025 event’s program that will be hosted in “Imperial Congress Hall”; please check here for the floor plan.

See also the accepted papers of the workshops.

Cyber Security

SafetilBERT: An efficient and explained LLM for IoMT attacks classification
M. Niang, H. Nakouri, and F. Jaafar

Reimagining the usermode process space by utilizing hardware-enforced sub-process isolation
M. Nelson and M. Mirakhorli

Evasion of deep learning malware detection via adversarial selective obfuscation
C. Greco, M. Ianni, A. Guzzo, and G. Fortino

DP-Tabula: Differentially private synthetic tabular data generation with large language models
W. Niu, Z. Zhang, A. Huertas, C. Feng, J. Von Der Assen, N. Nezhadsistani, and B. Stiller

A machine learning approach to automate greybox testing
A. Hijazi, D. Mezher, E. Zeidan, and C. Bassil

Offloading key switching on GPUs: A path towards seamless acceleration of FHE
O. Papadakis, M. Papadimitriou, A. Stratikopoulos, M. Xekalaki, J. Fumero, and C. Kotselidis

Towards DoS attack detection for IoT systems: A cross-layer oriented approach based on machine learning techniques
D. Tasiopoulos, A. Xenakis, A. Lekidis, D. Kosmanos, C. Chaikalis, and V. Vlachos

Audio-deepfake: Generation methods, legitimate applications and the potential for misuse
G. Bendiab, K. Zeltni, and M. Bader El Den

Enhancing deep learning based IDS adversarial robustness with causal inference
M. François, P. E. Arduin, and M. Merad

Defending against beta poisoning attacks in machine learning models
N. Gulciftci and M. E. Gursoy

Reducing human-induced label bias in SMS spam with context-enhanced clustering (CEC)
G. Shu Fuhnwi, A. M. Reinhold, and C. Izurieta

A novel GNN-based approach for detection of prompt injection attacks
G. Jadhav, A. K. Singh, Z. Khanam, and R. Hercock

Enhancing cyber threat intelligence sharing through data spaces in critical infrastructures
M. Akbari Gurabi, Ö. Sen, N. Rahimidanesh, A. Ulbig, and S. Decker

Explainable ransomware detection through static analysis and machine learning
G. Ciaramella, F. Martinelli, A. Santone, and F. Mercaldo

Space cyber risk management: Desired properties
E. Ear, B. Bailey, and S. Xu

Machine-learning anomaly detection for early identification of DDOS in smart home IoT devices
R. Lamptey, M. Saedi, and V. Stankovic

LDP3: An extensible and multi-threaded toolkit for local differential privacy protocols and post-processing methods
B. K. Balioglu, A. Khodaie, and M. E. Gursoy

Efficient and privacy-preserving authentication using verifiable credentials
A. Badirova, S. D. Varnosfaderani, and R. Yahyapour

Evasive ransomware attacks using low-level behavioral adversarial examples
M. Hirano and R. Kobayashi

Integrating cyber threat intelligence into threat modeling for autonomous ships using PASTA and MISP
M. Erbas, J. Vanharanta, J. Paavola, L. Tsiopoulos, and R. Vaarandi

Budget-conscious differentially private aggregation of power data timeseries
F. Kserawi and G. Ghinita

Technological framework for secure and resilient food supply chain
M. Fischer, R. Tönjes, R. Bohara, M. Ross, A. Hegde, C. Wressnegger, and M. Brunner

Classification of software vulnerability artifacts using public Internet data
L. Ambrus De Lima, E. Rabello Ussler, M. A. Santos Bicudo, D. Sadoc Menasché, A. Kocheturov, and G. Srivastava

PCIe monitoring for secure code execution in heterogeneous system architectures
I. Georgakas, E. Papadogiannaki, K. Georgopoulos, and S. Ioannidis

Abstract attack intention inference using low-rank gated arithmetic interactive attention
W. Yang, M. Wang, and D. Wojtczak

A reinforcement learning approach to multi-parametric input mutation for fuzzing
M. L. Uwibambe, A. Tyagi, and Q. Li

The notional risk scores approach to space cyber risk management
E. Ear, B. Bailey, and S. Xu

Optimized security measure selection: Leveraging MILP solvers to balance risk and cost
P. Saha Fobougong, M. Mejri, and K. Adi

Large scale cyber security log classification using semi-supervised clustering
P. Cai, M. Lazarescu, S. T. Soh, and R. Ryan

Security vulnerabilities in AI-generated JavaScript: A comparative study of large language models
D. Aydın and Ş. Bahtiyar

Contrastive self-supervised network intrusion detection using augmented negative pairs
J. Wilkie, H. Hindy, C. Tachtatzis, and R. Atkinson

Design and implementation of a tool to improve error reporting for eBPF code
R. Rizza, R. Sisto, and F. Valenza

FE4MQTT – Using functional encryption to improve the privacy in publish-subscribe communication schemes
M. Fischer and R. Tönjes

Metamorphic relation prediction for security vulnerability testing of online banking applications
K. Rahman, A. M. Reinhold, and C. Izurieta

A collusion-resistant DECO-based attestation protocol for practical applications
U. Şen, M. Osmanoğlu, and A. A. Selçuk

An efficient methodology for real-time risk and impact assessment in 5G networks
D. Varvarigou, K. Lampropoulos, O. Koufopavlou, S. Denazis, and P. Kitsos

Adaptive weighted ensemble learning for intrusion detection in industrial IoT and edge computing
S. Ruiz Villafranca, L. M. Garcia Sáez, J. Roldán Gómez, J. Carrillo Mondéjar, J. M. Castelo Gómez, and J. L. Martínez

CONSENTIS – An innovative framework for identity and consent management for EU digital and data strategies
N. Kyriakoulis, C. Dimopoulos, G. Daniil, K. Lampropoulos, V. Prevelakis, P. Karantzias, A. B. Popescu, A. Fuentes Exposito, N. Nikolaou, S. Papastergiou, G. Alexandris, M. Tasouli, G. Karavias, E. Kosta, and O. Mihaila

MiniLib: A flow analysis-based approach for attack surface reduction through software debloating
L. Kopanias, P. Sotiropoulos, N. Kolokotronis, and C. Vassilakis

RuleXploit: A framework for generating suricata rules from exploits using generative AI
A. Papoutsis, A. Dimitriadis, I. Koritsas, D. Kavallieros, T. Tsikrika, S. Vrochidis, and I. Kompatsiaris

C2-based malware detection trough network analysis using machine learning
M. Martijan, V. Krinickij, and L. Bukauskas

A Bayesian–Markov framework for proactive and dynamic cyber risk assessment driven by EPSS
P. Cheimonidis and K. Rantos

From one network to another: Transfer learning for IoT malware detection
K. Bosinaki, D. Natsos, G. Siachamis, and A. L. Symeonidis

Post-quantum security evaluation of aeronautical communications
K. Spalas and N. Kolokotronis

Trusted identity authentication for digital scholarship participants based on verifiable credential
X. Wu, Z. Wu, and H. Li

HyperDtct: Hypervisor-based ransomware detection using system calls
J. Von Der Assen, A. Huertas Celdran, J. M. Lüthi, J. M. Jorquera Valero, F. Enguix, G. Bovet, and B. Stiller

Using topic modeling and LLMs to recommend CAPEC attack patterns: A comparative study
U. Moore, X. Yuan, and H. Moradi

A multi-level user identity authentication scheme based on environmental detection
N. Zeeshan, L. L. Spada, and M. Bakyt

A comprehensive 5G dataset for control and data plane security and resource management
B. Nugraha, M. Hajizadeh, T. Niehoff, A. Venkatesh Jnanashree, T. V. Phan, D. Triantafyllopoulou, O. Krause, M. Mieth, K. Moessner, and T. Bauschert

CTI-GEN: A framework for generating STIX 2.1 compliant CTI using generative AI
A. Papoutsis, A. Dimitriadis, D. Kavallieros, T. Tsikrika, S. Vrochidis, I. Kompatsiaris, and G. Meditskos

Practical confidential data cleaning using trusted execution environments
A. Basu, M. Yoshino, and M. Toba

Scalable and adaptive security framework for the IoT-edge-cloud continuum
S. Cuñat Negueroles, I. Makropodis, L. Cabanillas Rodriguez, C. Xenakis, I. Chouchoulis, C. Palau, and I. Lacalle

PASTA threat modeling for cyber resilience and COLREG compliance in autonomous ship systems
M. Erbas, G. Visky, O. Maennel, L. Tsiopoulos, and R. Vaarandi

ResViT: A hybrid model for robust deepfake video detection
A. Aria, S. L. Mirtaheri, S. A. Asghari, R. Shahbazian, and A. Pugliese

eIDPS: A comprehensive comparative analysis of packet-level and flow-level intrusion detection and prevention
S. Kostopoulos, D. Papatsaroucha, I. Kefaloukos, and E. K. Markakis

Cyber Resilience

An AI-powered pipeline for enabling self-healing in software systems
G. Siachamis, G. Papadopoulos, and A. Symeonidis

Designing AI systems with correction mechanisms towards attack-resilient architectures
E. Kafali, C. N. Spartalis, T. Semertzidis, C. Z. Patrikakis, and P. Daras

Accounting for the impact of real-world data and costs in autonomous cyber defence
A. Neal, A. Acuto, P. Green, C. Lear, N. Hare, and S. Maskell

A lightweight firmware resilience engine for real-time operating systems
U. Budak, F. De Santis, O. Yasar, M. Safieh, and G. Sigl

Adapt-LFA: Adaptive gradient-guided label flipping attack against federated learning-based intrusion detection in IoT
H. Rezaei, R. Taheri, I. Jordanov, and S. Shiaeles

A structured process for scenario-based gamification of cyber threat intelligence for space system security
M. Kriesten, M. Thinyane, and D. Ormrod

ReLATE: Resilient learner selection for multivariate time-series classification against adversarial attacks
C. I. Kocal, O. Gungor, A. Tartz, T. Rosing, and B. Aksanli

Mapping of maritime ecosystem components in the cybersecurity landscape
E. Roponena, S. Lielbārde, E. Citskovska, A. Brilingaitė, L. Bukauskas, and R. Pirta

A novel MQTT-ZT secure broker: Zero trust architecture for IoT security
M. James, T. Newe, D. O’Shea, and G. D. O’Mahony

Cybersecurity mesh architecture for electric vehicle charging infrastructure
R. Bohara, M. Ross, and O. Joglekar

Optimizing network services with quantum dynamic programming and Grover’s search
E. Zeydan, J. Mangues Bafalluy, Y. Turk, A. Aydeger, and M. Liyanage

Informed defense: How attacker profiles transform vulnerability assessments
M. Z. Naseer, V. Fodor, and M. Ekstedt

Sunburst vapor – A cybersecurity prompted case study of national-scale organizational transformation
E. Moore, S. Fulton, T. Amador, R. Mancuso, I. Martinez, and D. Likarish

Machine learning model complexity as a mitigation strategy against industrial espionage through membership inference attacks
R. Dautov, H. Song, C. Schaefer, S. Kim, and V. Pietsch

Composite product cybersecurity certification using explainable AI based dynamic risk assessment
N. Basheer, S. Islam, S. Papastergiou, and E. Maria Kalogeraki

An approach for a supporting multi-LLM system for automated certification based on the German IT-Grundschutz
L. Muth and M. Margraf

A preliminary ontology for 5G network resilience: Hybrid threats, risk reduction, compliance
R. A. Paskauskas

Cyber resilience strategies throughout the system development lifecycle
G. Deffenbaugh and S. Kameneni

A proposal for an ontology to enhance IT architecture resilience
B. Mbaye, M. Mejri, and P. Saha Fobougong

FAIR: Facilitating artificial intelligence resilience in manufacturing industrial Internet
Y. Zeng, I. Lourentzou, X. Deng, and R. Jin

Development of an SDN-based space system simulation framework for intrusion detection
U. Uhongora, M. Thinyane, and Y. W. Law

CPS Security

Anomaly identification in power systems using dynamic state estimation and deep learning
F. Alsaeed, E. Abukhousa, S. S. F. Syed Afroz, A. Qwbaiban, and A. S. Meliopoulos

Driving resilience: Assessing security incidents’ criticality in autonomous vehicles
Y. Qendah and S. Katzenbeisser

A lightweight IDS framework using FPGA-based hardware fingerprinting on Zynq SoC
A. W. Mohammed, A. Ali, H. Arif, F. R. P. Mohammed, and H. Malik

DFA: Dynamic frame alteration for video manipulation attack in IoT environments
B. C. Nchelem, A. K. Singh, and H. Mouratidis

Fault tolerance vs. attack detection in industrial control systems: A deep learning approach
H. Mehrpouyan

Security risk analysis of logistical support solutions for MaaS and DLT-based mitigations
G. Kisa Isik, A. Eker, T. Tryfonas, and G. Oikonomou

CAN-MAID: An intrusion detection protocol for CAN bus
K. Marquis and J. Chandy

Application and evaluation of a substation threat modeling language for automatic attack graph generation
E. Rencelj Ling and M. Ekstedt

TPKey: Using TPMS signals for secure and usable intra-vehicle device authentication
O. Achkar, L. Nissen, S. Raza, R. Shirsat, N. Klingensmith, G. Zouridakis, and K. I. Lee

Not-so-secret authentication: The SyncBleed attacks and defenses for zero-involvement authentication systems
I. Ahlgren, R. Shirsat, O. Achkar, G. K. Thiruvathukal, K. I. Lee, and N. Klingensmith

Ontology-driven threat modeling analysis of CPSs
M. Kordi and N. Maunero

Vulnerability assessment combining CVSS temporal metrics and Bayesian networks
S. Perone, S. Guarino, L. Faramondi, and R. Setola

Securing DRL-based traffic signal control against experience replay manipulation attacks
M. Bouhaddi

ThreatSpider: CTI-driven semi-automated threat modelling for cybersecurity certification
A. Amro and G. Kavallieratos

Cybersecurity-oriented digital twins: A double-edged sword or a game changer?
S. Abdullahi and S. Lazarova Molnar

Towards safety and security testing of cyberphysical power systems by shape validation
A. Geiger, I. Hacker, Ö. Sen, and A. Ulbig

Evaluating smart home privacy: The relationship between encrypted sensor data and occupancy prediction through machine learning
S. Mohanty, D. Papadopoulos, and C. Schindelhauer

Strategic interactions in multi-sensor networks against false data injection
V. Bonagura, C. Foglietta, S. Panzieri, F. Pascucci, and L. Badia

Lessons learned from a cybersecurity risk assessment of OpenADR in smart grid planning
G. Erdogan, A. Omerovic, E. Solvang, A. Killingberg, A. Kvinnesland, and I. Abrahamsen

Post-quantum cryptography for maritime systems
D. Berger, A. Lye, A. Maidl, J. Stoppe, and A. Windhorst

Indepth analysis of a side-channel message recovery attack against FrodoKEM
P. A. Berthet

Knowledge systematization for security orchestration in CPS and IoT systems
P. Nguyen, H. Song, R. Dautov, N. Ferry, A. Rego, E. Rios, E. Iturbe, V. Valdes, A. R. Cavalli, and W. Maloulli

Wicked problem, parsimonious solution: Securing electric vehicle charging station software
E. Sheppard, Z. Wadhams, D. Arford, C. Izurieta, and A. M. Reinhold

NetPacketformer: Real-time, context-aware network intrusion detection with transformers
A. Domi, C. Zonios, G. Tatsis, A. Drosou, and D. Tzovaras

Data manipulation attack mitigation in power systems using physics-informed neural networks
S. Falas, M. Asprou, C. Konstantinou, and M. K. Michael

The invisible threat: Simulating and analyzing the coordinated sensor manipulation attack (CSMA) on UAVs
S. Sadeghpour and P. Madani

Monday, 04 Aug. 2025


08:40–10:00 Session CSR1: Intrusion detection
Chair: Alexios Lekidis, University of Thessaly (GR)
Room: Hall 1
08:40–09:00 Towards DoS attack detection for IoT systems: A cross-layer oriented approach based on machine learning techniques
D. Tasiopoulos, A. Xenakis, A. Lekidis, D. Kosmanos, C. Chaikalis, and V. Vlachos
09:00–09:20 Machine-learning anomaly detection for early identification of DDOS in smart home IoT devices
R. Lamptey, M. Saedi, and V. Stankovic
09:20–09:40 Adapt-LFA: Adaptive gradient-guided label flipping attack against federated learning-based intrusion detection in IoT
H. Rezaei, R. Taheri, I. Jordanov, and S. Shiaeles
09:40–10:00 Adaptive weighted ensemble learning for intrusion detection in industrial IoT and edge computing
S. Ruiz Villafranca, L. M. Garcia Sáez, J. Roldán Gómez, J. Carrillo Mondéjar, J. M. Castelo Gómez, and J. L. Martínez
08:40–10:00 Session CSR2: IoT security
Chair: Wanrong Yang, University of Liverpool (UK)
Room: Hall 2
08:40–09:00 Abstract attack intention inference using low-rank gated arithmetic interactive attention
W. Yang, M. Wang, and D. Wojtczak
09:00–09:20 A novel MQTT-ZT secure broker: Zero trust architecture for IoT security
M. James, T. Newe, D. O’Shea, and G. D. O’Mahony
09:20–09:40 Not-so-secret authentication: The SyncBleed attacks and defenses for zero-involvement authentication systems
I. Ahlgren, R. Shirsat, O. Achkar, G. K. Thiruvathukal, K. I. Lee, and N. Klingensmith
09:40–10:00 Fault tolerance vs. attack detection in industrial control systems: A deep learning approach
H. Mehrpouyan
08:40–10:00 Session WS1: SPARC workshop
Chair: George Hatzivasilis, Technical University of Crete (GR)
Room: Hall 3
08:40–08:40 Welcome by the chairs
N. Saxena, G. Hatzivasilis, and C. Hankin
08:40–09:00 Vulnerability analysis of Web 3.0 based decentralised oracle networks
D. Zhukovsky and M. T. Khan
09:00–09:20 CyberHeraclius: Cyber defence evaluation methodology
G. Hatzivasilis and S. Ioannidis
09:20–09:40 Cyber physical systems security risks based on OPC-UA set-up vulnerability in manufacturing industries
S. Abdullahi, M. Götz, and S. Lazarova Molnar
09:40–10:00 Securing firmware updates using transparency and traceability services
N. Fotiou, L. Georgiadis, G. Polyzos, and V. Siris
08:40–10:00 Session TUT1: IEEE CSR tutorials
Room: Hall 4
08:40–10:00 Applying data engineering and blockchain for B5G/6G networks: A step-by-step approach
M. Liyanage and E. Zeydan
10:00–10:20 Coffee break
10:20–12:00 Session CSR3: Intrusion detection
Chair: Angelos Papoutsis, Centre for Research and Technology Hellas (GR)
Room: Hall 1
10:20–10:40 Enhancing deep learning based IDS adversarial robustness with causal inference
M. François, P. E. Arduin, and M. Merad
10:40–11:00 Contrastive self-supervised network intrusion detection using augmented negative pairs
J. Wilkie, H. Hindy, C. Tachtatzis, and R. Atkinson
11:00–11:20 eIDPS: A comprehensive comparative analysis of packet-level and flow-level intrusion detection and prevention
S. Kostopoulos, D. Papatsaroucha, I. Kefaloukos, and E. K. Markakis
11:20–11:40 RuleXploit: A framework for generating suricata rules from exploits using generative AI
A. Papoutsis, A. Dimitriadis, I. Koritsas, D. Kavallieros, T. Tsikrika, S. Vrochidis, and I. Kompatsiaris
11:40–12:00 CAN-MAID: An intrusion detection protocol for CAN bus
K. Marquis and J. Chandy
10:20–12:00 Session CSR4: Risk assessment
Chair: Pierre Saha Fobougong, Laval University (CA)
Room: Hall 2
10:20–10:40 Optimized security measure selection: Leveraging MILP solvers to balance risk and cost
P. Saha Fobougong, M. Mejri, and K. Adi
10:40–11:00 A Bayesian–Markov framework for proactive and dynamic cyber risk assessment driven by EPSS
P. Cheimonidis and K. Rantos
11:00–11:20 Composite product cybersecurity certification using explainable AI based dynamic risk assessment
N. Basheer, S. Islam, S. Papastergiou, and E. Maria Kalogeraki
11:20–11:40 Lessons learned from a cybersecurity risk assessment of OpenADR in smart grid planning
G. Erdogan, A. Omerovic, E. Solvang, A. Killingberg, A. Kvinnesland, and I. Abrahamsen
11:40–12:00 Security risk analysis of logistical support solutions for MaaS and DLT-based mitigations
G. Kisa Isik, A. Eker, T. Tryfonas, and G. Oikonomou
10:20–12:00 Session WS2: 2P-DPA workshop
Chair: Salvatore D’ Antonio, Trustup srl/University of Naples Parthenope (IT)
Room: Hall 3
10:20–10:20 Welcome by the chairs
S. D’ Antonio
10:20–10:40 A real-time data capture probe for anomaly detection in industrial cyber-physical systems
R. F. Salazar Buttiglione, A. Gallo, S. Perone, E. Del Prete, and R. Setola
10:40–11:00 Implementation and experimental evaluation of defense techniques against adversarial attacks
G. M. Cristiano, S. D’Antonio, J. Giglio, and G. Mazzeo
11:00–11:20 Security challenges and solutions in containerized environments: A comprehensive review
R. Bagnato, L. Notarianni, A. Sabatini, and L. Vollero
11:20–11:40 Towards a privacy-preserving health data sharing: Architecture and critical implementation factors
A. Petruolo, A. Iannaccone, and S. D’Antonio
11:40–12:00 A game-theoretic multi-patroller approach for critical infrastructure monitoring
G. P. Rimoli, V. U. Castrillo, D. Pascarella, and M. Ficco
10:20–12:00 Session TUT2: IEEE CSR tutorials
Room: Hall 4
10:20–12:00 Applying data engineering and blockchain for B5G/6G networks: A step-by-step approach
M. Liyanage and E. Zeydan
12:00–12:40 Session KNT1: IEEE CSR keynote speakers
Chair: Stavros Shiaeles, University of Portsmouth (UK)
Room: Main Hall
12:00–12:40 Unifying security: How trusted execution environments secure AI on the edge and the battle against side-channel attacks
K. Markantonakis
12:40–13:40 Lunch break
Location: Elia restaurant
13:40–15:00 Session CSR5: AI security
Chair: Baris Aksanli, San Diego State University (US)
Room: Hall 1
13:40–14:00 Designing AI systems with correction mechanisms towards attack-resilient architectures
E. Kafali, C. N. Spartalis, T. Semertzidis, C. Z. Patrikakis, and P. Daras
14:00–14:20 Defending against beta poisoning attacks in machine learning models
N. Gulciftci and M. E. Gursoy
14:20–14:40 ReLATE: Resilient learner selection for multivariate time-series classification against adversarial attacks
C. I. Kocal, O. Gungor, A. Tartz, T. Rosing, and B. Aksanli
14:40–15:00 FAIR: Facilitating artificial intelligence resilience in manufacturing industrial Internet
Y. Zeng, I. Lourentzou, X. Deng, and R. Jin
13:40–15:00 Session CSR6: Security frameworks
Chair: Hafiz Malik, University of Michigan – Dearborn (US)
Room: Hall 2
13:40–14:00 Scalable and adaptive security framework for the IoT-edge-cloud continuum
S. Cuñat Negueroles, I. Makropodis, L. Cabanillas Rodriguez, C. Xenakis, I. Chouchoulis, C. Palau, and I. Lacalle
14:00–14:20 Development of an SDN-based space system simulation framework for intrusion detection
U. Uhongora, M. Thinyane, and Y. W. Law
14:20–14:40 A lightweight IDS framework using FPGA-based hardware fingerprinting on Zynq SoC
A. W. Mohammed, A. Ali, H. Arif, F. R. P. Mohammed, and H. Malik
14:40–15:00 Technological framework for secure and resilient food supply chain
M. Fischer, R. Tönjes, R. Bohara, M. Ross, A. Hegde, C. Wressnegger, and M. Brunner
13:40–15:00 Session WS3: CYPRES workshop
Chair: Mathaios Panteli, University of Cyprus (CY)
Room: Hall 3
13:40–13:40 Welcome by the chairs
M. Panteli, U. Stecchi, and A. Lalas
13:40–14:00 A multi-objective optimization framework for cyber threat mitigation using NSGA-II
K. Milousi, N. Vakakis, A. Mystakidis, M. S. Mazi, A. Voulgaridis, C. Tjortjis, K. Votis, and D. Tzovaras
14:00–14:20 Deciphering standards for cybersecurity in Industry 4.0: Advisory AI for cybersecure IIoT
A. Batziakas, I. Schoinas, A. Lalas, A. Drosou, N. Chatzidiamantis, and D. Tzovaras
14:20–14:40 Smart cities under threat: A systematic review and conceptual risk model
E. Roponena, R. Matisons, E. Citskovska, P. G. Rinkevičs, R. Pirta, and Ģ. Priedols
14:40–15:00 Advancing B5G security: An AI-augmented intrusion detection system using a real-time attack generator
G. Lazaridis, A. Damianou, A. Lalas, P. Chatzimisios, K. Votis, and D. Tzovaras
13:40–15:00 Session TUT3: IEEE CSR tutorials
Room: Hall 4
13:40–15:00 Web3: Securing advanced communication networks, the Internet and digital platforms
A. Vizzarri
15:00–15:20 Coffee break
15:20–17:00 Session CSR7: Trusted systems
Chair: Utku Budak, Technical University of Munich (DE)
Room: Hall 1
15:20–15:40 Practical confidential data cleaning using trusted execution environments
A. Basu, M. Yoshino, and M. Toba
15:40–16:00 A collusion-resistant DECO-based attestation protocol for practical applications
U. Şen, M. Osmanoğlu, and A. A. Selçuk
16:00–16:20 PCIe monitoring for secure code execution in heterogeneous system architectures
I. Georgakas, E. Papadogiannaki, K. Georgopoulos, and S. Ioannidis
16:20–16:40 A lightweight firmware resilience engine for real-time operating systems
U. Budak, F. De Santis, O. Yasar, M. Safieh, and G. Sigl
16:40–17:00 Reimagining the usermode process space by utilizing hardware-enforced sub-process isolation
M. Nelson and M. Mirakhorli
15:20–17:00 Session CSR8: Software security
Chair: Georgios Siachamis, Aristotle University of Thessaloniki (GR)
Room: Hall 2
15:20–15:40 An AI-powered pipeline for enabling self-healing in software systems
G. Siachamis, G. Papadopoulos, and A. Symeonidis
15:40–16:00 Security vulnerabilities in AI-generated JavaScript: A comparative study of large language models
D. Aydın and Ş. Bahtiyar
16:00–16:20 Cyber resilience strategies throughout the system development lifecycle
G. Deffenbaugh and S. Kameneni
16:20–16:40 A reinforcement learning approach to multi-parametric input mutation for fuzzing
M. L. Uwibambe, A. Tyagi, and Q. Li
16:40–17:00 Metamorphic relation prediction for security vulnerability testing of online banking applications
K. Rahman, A. M. Reinhold, and C. Izurieta
15:20–17:00 Session WS4: CYPRES workshop
Chair: Mathaios Panteli, University of Cyprus (CY)
Room: Hall 3
15:20–16:00 [Invited talk] AI for natural hazard resilience: Standards, early warning systems, and risk reduction in a changing climate
E. Xoplaki
16:00–16:20 Quantifying cascading impacts of natural hazards on power-communication interdependent networks
B. V. Venkatasubramanain, C. Laoudias, and M. Panteli
16:20–16:40 Towards a new taxonomy of infrastructures: Implications for resilience
J. Palma Oliveira, D. Antunes, B. Rosa, D. Garcia Sanchez, A. Sarroeira, and A. Cardoni
16:40–17:00 Beyond technical skills: Human, emotional, and resilience demands in CSIRT operations
D. Antunes, A. Salgado, V. Figueiredo, N. Oliveira, J. Ferreira, J. G. Santos, and J. Palma Oliveira
15:20–17:00 Session TUT4: IEEE CSR tutorials
Room: Hall 4
15:20–17:00 Mobile forensics fundamentals
S. Harding
20:00–21:00 Welcome cocktail
Location: Tholos Bar

Tuesday, 05 Aug. 2025


08:40–10:00 Session CSR9: Cyber threat intelligence
Chair: Mehdi Akbari Gurabi, Fraunhofer FIT / RWTH Aachen University (DE)
Room: Hall 1
08:40–09:00 Enhancing cyber threat intelligence sharing through data spaces in critical infrastructures
M. Akbari Gurabi, Ö. Sen, N. Rahimidanesh, A. Ulbig, and S. Decker
09:00–09:20 CTI-GEN: A framework for generating STIX 2.1 compliant CTI using generative AI
A. Papoutsis, A. Dimitriadis, D. Kavallieros, T. Tsikrika, S. Vrochidis, I. Kompatsiaris, and G. Meditskos
09:20–09:40 ThreatSpider: CTI-driven semi-automated threat modelling for cybersecurity certification
A. Amro and G. Kavallieratos
09:40–10:00 A structured process for scenario-based gamification of cyber threat intelligence for space system security
M. Kriesten, M. Thinyane, and D. Ormrod
08:40–10:00 Session CSR10: Privacy technologies
Chair: Weijie Niu, University of Zurich UZH (CH)
Room: Hall 2
08:40–09:00 DP-Tabula: Differentially private synthetic tabular data generation with large language models
W. Niu, Z. Zhang, A. Huertas, C. Feng, J. Von Der Assen, N. Nezhadsistani, and B. Stiller
09:00–09:20 LDP3: An extensible and multi-threaded toolkit for local differential privacy protocols and post-processing methods
B. K. Balioglu, A. Khodaie, and M. E. Gursoy
09:20–09:40 Budget-conscious differentially private aggregation of power data timeseries
F. Kserawi and G. Ghinita
09:40–10:00 Evaluating smart home privacy: The relationship between encrypted sensor data and occupancy prediction through machine learning
S. Mohanty, D. Papadopoulos, and C. Schindelhauer
08:40–10:00 Session WS5: IOSEC workshop
Chair: Kostas Lampropoulos, University of Patras (GR)
Room: Hall 3
08:40–08:40 Welcome by the chairs
K. Lampropoulos and C. Oprisa
08:40–09:20 [Invited talk] Cybersecurity engineering in the age of AI
C. Oprisa
09:20–09:40 Attacking the DLMS/COSEM advanced metering infrastructure
I. Papadopoulos, D. Merkouris, C. Dalamagkas, N. Nikoloudakis, and A. Arvanitis
09:40–10:00 SecAwarenessTruss: A federated cyber range solution for critical infrastructures
M. Smyrlis, E. Floros, N. Nikoloudakis, E. Stavrou, D. Merkouris, A. Arvanitis, G. Spanoudakis, S. E. Papadakis, G. Potamos, and S. Stavrou
08:40–10:00 Session WS6: CRE workshop
Chair: Nicholas J. Multari, Indiana University (US)
Room: Hall 4
08:40–08:40 Welcome by the chairs
N. J. Multari and R. McQuaid
08:40–09:00 Cybersecurity for sustainability: A path for strategic resilience
J. Saveljeva, I. Uvarova, L. Peiseniece, T. Volkova, J. Novicka, G. Polis, S. Kristapsone, and A. Vembris
09:00–09:20 Strategic allocation of defence resources against multi-step cyberattacks using evolutionary game theory
J. Zhang and W. Wang
09:20–10:00 [Invited talk] Unveiling the invisible: Knowledge graph-driven discovery of hidden cascade risks in critical infrastructure supply chains
G. Sharkov
10:00–10:20 Coffee break
10:20–12:00 Session CSR11: 5G and beyond security
Chair: Dionysia Varvarigou, University of Patras (GR)
Room: Hall 1
10:20–10:40 An efficient methodology for real-time risk and impact assessment in 5G networks
D. Varvarigou, K. Lampropoulos, O. Koufopavlou, S. Denazis, and P. Kitsos
10:40–11:00 A comprehensive 5G dataset for control and data plane security and resource management
B. Nugraha, M. Hajizadeh, T. Niehoff, A. Venkatesh Jnanashree, T. V. Phan, D. Triantafyllopoulou, O. Krause, M. Mieth, K. Moessner, and T. Bauschert
11:00–11:20 A preliminary ontology for 5G network resilience: Hybrid threats, risk reduction, compliance
R. A. Paskauskas
11:20–11:40 MiniLib: A flow analysis-based approach for attack surface reduction through software debloating
L. Kopanias, P. Sotiropoulos, N. Kolokotronis, and C. Vassilakis
11:40–12:00 NetPacketformer: Real-time, context-aware network intrusion detection with transformers
A. Domi, C. Zonios, G. Tatsis, A. Drosou, and D. Tzovaras
10:20–12:00 Session CSR12: Privacy technologies
Chair: Aytaj Badirova, University of Göttingen (DE)
Room: Hall 2
10:20–10:40 Efficient and privacy-preserving authentication using verifiable credentials
A. Badirova, S. D. Varnosfaderani, and R. Yahyapour
10:40–11:00 CONSENTIS – An innovative framework for identity and consent management for EU digital and data strategies
N. Kyriakoulis, C. Dimopoulos, G. Daniil, K. Lampropoulos, V. Prevelakis, P. Karantzias, A. B. Popescu, A. Fuentes Exposito, N. Nikolaou, S. Papastergiou, G. Alexandris, M. Tasouli, G. Karavias, E. Kosta, and O. Mihaila
11:00–11:20 Trusted identity authentication for digital scholarship participants based on verifiable credential
X. Wu, Z. Wu, and H. Li
11:20–11:40 FE4MQTT – Using functional encryption to improve the privacy in publish-subscribe communication schemes
M. Fischer and R. Tönjes
11:40–12:00 Offloading key switching on GPUs: A path towards seamless acceleration of FHE
O. Papadakis, M. Papadimitriou, A. Stratikopoulos, M. Xekalaki, J. Fumero, and C. Kotselidis
10:20–12:00 Session WS7: IOSEC workshop
Chair: Kostas Lampropoulos, University of Patras (GR)
Room: Hall 3
10:20–10:40 ATHENA: A federated architecture for cross-border cybersecurity operations and situational awareness
A. Peratikou, E. Charalambous, P. Smyrli, and S. Stavrou
10:40–11:00 Privacy-preserving classification of partially encrypted feature vectors using multi-key homomorphic encryption
D. E. Petrean and R. Potolea
11:00–11:20 A hybrid transformer–LLM pipeline for function name recovery in stripped binaries
R. Petrache and C. Lemnaru
11:20–11:40 Fraud detection in Web content using machine learning and natural language processing
A. Dance, A. Fraticiu, and C. Oprisa
11:40–12:00 DISTIL: Digital identities for the evaluation of job skills
D. Kasimatis, P. Papadopoulos, W. J. Buchanan, C. Chrysoulas, S. Sayeed, A. Mylonas, and N. Pitropakis
10:20–12:00 Session WS8: CRE workshop
Chair: Rosalie McQuaid, MITRE Corporation (US)
Room: Hall 4
10:20–10:40 Addressing the economics of critical national infrastructure (CNI) security
S. A. Shaikh
10:40–11:20 [Invited talk] Learning to adapt: The role of AI in shaping maritime cybersecurity
G. Raicu
11:20–12:00 [Invited talk] Towards crypto agility in complex software systems
V. Lotz
12:00–12:40 Session KNT2: IEEE CSR keynote speakers
Chair: Emanuele Bellini, University of Roma Tre (IT)
Room: Main Hall
12:00–12:40 Digital twins for trustworthy autonomy
F. Flammini
12:40–13:40 Lunch break
Location: Elia restaurant
13:40–15:00 Session CSR13: Critical infra resilience
Chair: Elizabete Citskovska, Riga Technical University (LV)
Room: Hall 1
13:40–14:00 Mapping of maritime ecosystem components in the cybersecurity landscape
E. Roponena, S. Lielbārde, E. Citskovska, A. Brilingaitė, L. Bukauskas, and R. Pirta
14:00–14:20 Space cyber risk management: Desired properties
E. Ear, B. Bailey, and S. Xu
14:20–14:40 The notional risk scores approach to space cyber risk management
E. Ear, B. Bailey, and S. Xu
14:40–15:00 A proposal for an ontology to enhance IT architecture resilience
B. Mbaye, M. Mejri, and P. Saha Fobougong
13:40–15:00 Session CSR14: Post-quantum security
Chair: Daniel Berger, German Aerospace Center (DE)
Room: Hall 2
13:40–14:00 Post-quantum cryptography for maritime systems
D. Berger, A. Lye, A. Maidl, J. Stoppe, and A. Windhorst
14:00–14:20 Post-quantum security evaluation of aeronautical communications
K. Spalas and N. Kolokotronis
14:20–14:40 Indepth analysis of a side-channel message recovery attack against FrodoKEM
P. A. Berthet
14:40–15:00 Optimizing network services with quantum dynamic programming and Grover’s search
E. Zeydan, J. Mangues Bafalluy, Y. Turk, A. Aydeger, and M. Liyanage
13:40–15:00 Session WS9: CRIRM workshop
Chair: Michalis Smyrlis, Sphynx (GR)
Room: Hall 3
13:40–13:40 Welcome by the chairs
M. Smyrlis and G. Spathoulas
13:40–14:00 CYBERUNITY: A federated architecture for next-generation cybersecurity training
C. Lal, A. V. Grammatopoulos, M. Takaronis, M. M. Yamin, G. Spathoulas, and C. Xenakis
14:00–14:20 Modelling attack and defense scenarios on federated cyber ranges
M. M. Yamin and B. Katt
14:20–14:40 From concept to deployment: An AI assistant for generating and configuring cyber range scenarios
G. S. Rizos, N. Kopalidis, N. Mengidis, A. Lalas, and K. Votis
14:40–15:00 LLM-powered intent-based categorization of phishing emails
E. Eilertsen, V. Mavroeidis, and G. Grov
13:40–15:00 Session WS10: CRE workshop
Chair: Nicholas J. Multari, Indiana University (US)
Room: Hall 4
13:40–14:20 [Invited talk] Mitigating biased, brittle and baroque generative AI
M. T. Maybury
14:20–15:00 [Panel discussion] AI/ML and it’s ramifications on cyber security and resilience
G. Sharkov, M. T. Maybury, V. Lotz, G. Raicu, and CRE authors
Panel moderator: Rosalie McQuaid
15:00–15:20 Coffee break
15:20–17:00 Session CSR15: Cyber-physical systems security
Chair: Marzieh Kordi, IMT School for Advanced Studies Lucca (IT)
Room: Hall 1
15:20–15:40 Ontology-driven threat modeling analysis of CPSs
M. Kordi and N. Maunero
15:40–16:00 Towards safety and security testing of cyberphysical power systems by shape validation
A. Geiger, I. Hacker, Ö. Sen, and A. Ulbig
16:00–16:20 Strategic interactions in multi-sensor networks against false data injection
V. Bonagura, C. Foglietta, S. Panzieri, F. Pascucci, and L. Badia
16:20–16:40 Knowledge systematization for security orchestration in CPS and IoT systems
P. Nguyen, H. Song, R. Dautov, N. Ferry, A. Rego, E. Rios, E. Iturbe, V. Valdes, A. R. Cavalli, and W. Maloulli
16:40–17:00 Cybersecurity-oriented digital twins: A double-edged sword or a game changer?
S. Abdullahi and S. Lazarova Molnar
15:20–17:00 Session CSR16: Attack graphs modeling
Chair: Muhammad Zeshan Naseer, KTH Royal Institute of Technology (SE)
Room: Hall 2
15:20–15:40 Informed defense: How attacker profiles transform vulnerability assessments
M. Z. Naseer, V. Fodor, and M. Ekstedt
15:40–16:00 Application and evaluation of a substation threat modeling language for automatic attack graph generation
E. Rencelj Ling and M. Ekstedt
16:00–16:20 Vulnerability assessment combining CVSS temporal metrics and Bayesian networks
S. Perone, S. Guarino, L. Faramondi, and R. Setola
16:20–16:40 Integrating cyber threat intelligence into threat modeling for autonomous ships using PASTA and MISP
M. Erbas, J. Vanharanta, J. Paavola, L. Tsiopoulos, and R. Vaarandi
16:40–17:00 PASTA threat modeling for cyber resilience and COLREG compliance in autonomous ship systems
M. Erbas, G. Visky, O. Maennel, L. Tsiopoulos, and R. Vaarandi
15:20–17:00 Session WS11: CRIRM workshop
Chair: Michalis Smyrlis, Sphynx (GR)
Room: Hall 3
15:20–16:00 [Invited talk] From cyber ranges to cyber-physical ranges
S. Katsikas
16:00–16:20 ERMIS: A cybersecurity market assurance and insurance-as-a-service
A. Paragioudakis, M. Smyrlis, and G. Spanoudakis
16:20–16:40 The challenges of cyber-insurance: The case of Greece
E. Vergis, E. Aliberti, and S. Asteriou
16:40–17:00 Cyber insurance in emerging European markets: A case study of Greece and Cyprus
D. Smyrli, V. Kakariaris, and M. Smyrlis
15:20–17:00 Session WS12: SECMAN-6G workshop
Chair: Gueltoum Bendiab, University of Freres Mentouri – Constantine 1 (DZ)
Room: Hall 4
15:20–15:20 Welcome by the chairs
G. Bendiab, B. Brik, and B. A. S. Al-rimy
15:20–15:40 Zero-trust and reinforcement learning for secure federated intelligence in 6G edge networks
G. Bendiab, M. Guerar, H. Haiouni, and L. Verderame
15:40–16:00 Evaluating forensic log readiness in simulated 6G networks
S. Rizvi, B. A. S. Al Rimy, N. Anjum, and A. Kanta
16:00–16:20 DLT-EVA: Hardening O-RAN auditing and digital evidence preservation through blockchain
K. Ntouros, E. Poulitsis, S. Brotsis, K. P. Grammatikakis, and N. Kolokotronis
16:20–16:40 AI-enhanced hybrid CFAR for 6G integrated sensing and communication (ISAC)
K. Belhi, S. Chabbi, and G. Meriem
16:40–17:00 Federated learning for securing medical imaging against deepfakes in 6G smart hospitals
R. Verdy Ricard, E. Perales, M. A. Labiod, G. Bendiab, and Y. Chenoune
20:00–22:00 Gala dinner & Awards
Location: Thalassa restaurant or Athina hall

Wednesday, 06 Aug. 2025


08:40–10:00 Session CSR17: Intrusion detection
Chair: Zeba Khanam, BT Security Research (UK)
Room: Hall 1
08:40–09:00 A novel GNN-based approach for detection of prompt injection attacks
G. Jadhav, A. K. Singh, Z. Khanam, and R. Hercock
09:00–09:20 SafetilBERT: An efficient and explained LLM for IoMT attacks classification
M. Niang, H. Nakouri, and F. Jaafar
09:20–09:40 Design and implementation of a tool to improve error reporting for eBPF code
R. Rizza, R. Sisto, and F. Valenza
09:40–10:00 HyperDtct: Hypervisor-based ransomware detection using system calls
J. Von Der Assen, A. Huertas Celdran, J. M. Lüthi, J. M. Jorquera Valero, F. Enguix, G. Bovet, and B. Stiller
08:40–10:00 Session CSR18: Autonomous vehicle security
Chair: Yaman Qendah, University of Passau (DE)
Room: Hall 2
08:40–09:00 Driving resilience: Assessing security incidents’ criticality in autonomous vehicles
Y. Qendah and S. Katzenbeisser
09:00–09:20 Cybersecurity mesh architecture for electric vehicle charging infrastructure
R. Bohara, M. Ross, and O. Joglekar
09:20–09:40 Wicked problem, parsimonious solution: Securing electric vehicle charging station software
E. Sheppard, Z. Wadhams, D. Arford, C. Izurieta, and A. M. Reinhold
09:40–10:00 TPKey: Using TPMS signals for secure and usable intra-vehicle device authentication
O. Achkar, L. Nissen, S. Raza, R. Shirsat, N. Klingensmith, G. Zouridakis, and K. I. Lee
08:40–10:00 Session WS13: CYBERSHIELD workshop
Chair: Sophia Karagiorgou, UBITECH Ltd (GR)
Room: Hall 3
08:40–09:00 Welcome by the chairs
S. Karagiorgou, G. Ledakis, and D. Ariu
09:00–09:20 CoEvolution: A comprehensive trustworthy framework for connected machine learning and secure interconnected AI solutions
A. Makris, A. Fournaris, A. Aghaie, I. Arakas, A. M. Anaxagorou, I. Arapakis, D. Bacciu, B. Biggio, G. Bouloukakis, S. Bouras, A. Bröring, A. Carta, M. Caselli, O. Giannakopoulou, N. Gkatzios, A. Gkillas, E. Haleplidis, S. Ioannidis, E. M. Kalogeraki, P. Karantzias, E. Kritharakis, A. Lalos, D. Lenk, S. Markopoulou, E. Metai, A. Miaoudakis, H. Mouratidis, J. Najar, T. Panagiotakopoulos, B. Peischl, M. Pintor, N. Piperigkos, V. Prevelakis, C. Segura, G. Spanoudakis, O. Tsirakis, O. Veledar, and K. Tserpes
09:20–09:40 On learning with confidentiality through encrypted AI pipelines
T. Anastasiou, S. Iatropoulou, and S. Karagiorgou
09:40–10:00 Feature-enhanced deep learning models for cyber-physical system security
J. Vaughn, K. Roy, and Y. Acquaah
08:40–10:00 Session WS14: HACS workshop
Chair: Peter Langendoerfer, IHP GmbH Leibniz Institute for High Performance Microelectronics & BTU Cottbus-Senftenberg (DE)
Room: Hall 4
08:40–09:00 Welcome by the chairs
P. Langendoerfer, C. Bobda, and N. Sklavos
09:00–09:20 Atomic patterns: Field operation distinguishability on cryptographic ASICs
A. A. Sigourou, Z. Dyka, P. Langendoerfer, and I. Kabin
09:20–09:40 Protection of the digital circuitry of a single-slope ADC against side-channel attacks
K. Ahmad, E. Öztürk, C. Körpe, H. Yang, J. Yang, K. Tihaiya, R. Tran, G. Dündar, V. Mooney, and K. Ozanoglu
09:40–10:00 Miti-CAT: Mitigating power side-channel vulnerabilities in FPGA-based CNN accelerators through distributed convolution computation
J. He and M. Zwolinski
10:00–10:20 Coffee break
10:20–12:00 Session CSR19: Intrusion detection
Chair: Giovanni Ciaramella, Institute for Informatics and Telematics, National Research Council of Italy (IT)
Room: Hall 1
10:20–10:40 Explainable ransomware detection through static analysis and machine learning
G. Ciaramella, F. Martinelli, A. Santone, and F. Mercaldo
10:40–11:00 Evasive ransomware attacks using low-level behavioral adversarial examples
M. Hirano and R. Kobayashi
11:00–11:20 Evasion of deep learning malware detection via adversarial selective obfuscation
C. Greco, M. Ianni, A. Guzzo, and G. Fortino
11:20–11:40 From one network to another: Transfer learning for IoT malware detection
K. Bosinaki, D. Natsos, G. Siachamis, and A. L. Symeonidis
11:40–12:00 C2-based malware detection trough network analysis using machine learning
M. Martijan, V. Krinickij, and L. Bukauskas
10:20–12:00 Session CSR20: Security assessment
Chair: Lea Muth, Freie Universität Berlin (DE)
Room: Hall 2
10:20–10:40 A machine learning approach to automate greybox testing
A. Hijazi, D. Mezher, E. Zeidan, and C. Bassil
10:40–11:00 Large scale cyber security log classification using semi-supervised clustering
P. Cai, M. Lazarescu, S. T. Soh, and R. Ryan
11:00–11:20 An approach for a supporting multi-LLM system for automated certification based on the German IT-Grundschutz
L. Muth and M. Margraf
11:20–11:40 Classification of software vulnerability artifacts using public Internet data
L. Ambrus De Lima, E. Rabello Ussler, M. A. Santos Bicudo, D. Sadoc Menasché, A. Kocheturov, and G. Srivastava
11:40–12:00 Using topic modeling and LLMs to recommend CAPEC attack patterns: A comparative study
U. Moore, X. Yuan, and H. Moradi
10:20–12:00 Session WS15: CYBERSHIELD workshop
Chair: Sophia Karagiorgou, UBITECH Ltd (GR)
Room: Hall 3
10:20–10:40 A PUF-based root-of-trust for resource-constrained IoT devices
E. N. Sassalou, S. Vasileiadis, S. A. Kazazis, G. Protogerou, N. Varvitsiotis, D. S. Karras, A. Giannetsos, and S. Tsintzos
10:40–11:00 Trust or bust: Reinforcing trust-aware path establishment with implicit attestation capabilities
N. Fotos, S. Vasileiadis, and T. Giannetsos
11:00–11:20 CYRUS – A personalised, customised, work-based training framework for enhanced cyber-security skills across industrial sectors
E. Frumento, K. Lange, and A. Golfetti
11:20–11:40 C-Shield: A holistic solution for secure end-to-end Kubernetes multi-cluster management and online threat mitigation using LLMs
S. Kalafatidis, G. Kitsos, and N. Papageorgopoulos
11:40–12:00 Hypervisor-based double extortion ransomware detection method using Kitsune network features
M. Hirano and R. Kobayashi
10:20–12:00 Session WS16: HACS workshop
Chair: Peter Langendoerfer, IHP GmbH Leibniz Institute for High Performance Microelectronics & BTU Cottbus-Senftenberg (DE)
Room: Hall 4
10:20–10:40 A hardware-efficient AEAD stream cipher based on a hybrid nonlinear feedback register structure
A. Allahverdi and V. Mooney
10:40–11:00 SpectreShield: Design and analysis of Spectre countermeasures on RISC-V using gem5
M. Khan, M. Mushtaq, R. Pacalet, and L. Apvrille
11:00–11:20 Acceleration of McEliece cryptosystem with instruction set extension for RISC-V
S. Kennedy and B. Halak
12:00–12:40 Session KNT3: IEEE CSR keynote speakers
Chair: Nicholas Kolokotronis, University of the Peloponnese (GR)
Room: Main Hall
12:00–12:40 Adversarial bypasses on detection engines, from code to binaries
C. Patsakis
12:40–13:40 Lunch break
Location: Elia restaurant
13:40–15:00 Session CSR21: ICS attacks
Chair: Myria Bouhaddi, Université du Québec en Outaouais (CA)
Room: Hall 1
13:40–14:00 Securing DRL-based traffic signal control against experience replay manipulation attacks
M. Bouhaddi
14:00–14:20 Data manipulation attack mitigation in power systems using physics-informed neural networks
S. Falas, M. Asprou, C. Konstantinou, and M. K. Michael
14:20–14:40 Anomaly identification in power systems using dynamic state estimation and deep learning
F. Alsaeed, E. Abukhousa, S. S. F. Syed Afroz, A. Qwbaiban, and A. S. Meliopoulos
14:40–15:00 The invisible threat: Simulating and analyzing the coordinated sensor manipulation attack (CSMA) on UAVs
S. Sadeghpour and P. Madani
13:40–15:00 Session CSR22: Multi-media attacks
Chair: Seyedeh Leili Mirtaheri, University of Calabria (IT)
Room: Hall 2
13:40–14:00 ResViT: A hybrid model for robust deepfake video detection
A. Aria, S. L. Mirtaheri, S. A. Asghari, R. Shahbazian, and A. Pugliese
14:00–14:20 Audio-deepfake: Generation methods, legitimate applications and the potential for misuse
G. Bendiab, K. Zeltni, and M. Bader El Den
14:20–14:40 DFA: Dynamic frame alteration for video manipulation attack in IoT environments
B. C. Nchelem, A. K. Singh, and H. Mouratidis
13:40–15:00 Session WS17: GAIA-SEC workshop
Chair: Fiammetta Marulli, Università della Campania “Luigi Vanvitelli” (IT)
Room: Hall 3
13:40–14:00 Welcome by the chairs
F. Marulli, F. Mercaldo, and A. De Benedictis
14:00–14:20 LLM-based generation of formal specification for run-time security monitoring of ICS
G. Raptis, M. T. Khan, C. Koulamas, and D. Serpanos
14:20–14:40 Explainable malware detection by means of federated machine learning
G. Ciaramella, F. Martinelli, A. Santone, and F. Mercaldo
14:40–15:00 An explainable method for access control policies classification
L. Petrillo, F. Martinelli, A. Santone, and F. Mercaldo
13:40–15:00 Session WS18: CVC workshop
Chair: Giovanni Gaggero, University of Genova (IT)
Room: Hall 4
13:40–14:00 Welcome by the chairs
M. A. Rahman, G. Gaggero, and K.-K. R. Choo
14:00–14:20 VPTaaS: An AI-driven cybersecurity framework for connected vehicles — Concept, validation, and feasibility study
S. W. Tan, M. A. Rahman, N. Refat, and P. Pillai
14:20–14:40 Cyber threat intelligence for smart vehicles
G. Asenov and E. Apeh
14:40–15:00 CyberVehiCare: A testbed for cybersecurity of vehicle to everything (V2X) automotive systems
M. A. Rahman, T. Sze Wei, M. S. Sohail, G. B. Gaggero, F. Patrone, M. Marchese, and P. Pillai
15:00–15:20 Coffee break
15:20–17:00 Session CSR23: Autonomous cyber-defence
Chair: Clemente Izurieta, Montana State University (US)
Room: Hall 1
15:20–15:40 Accounting for the impact of real-world data and costs in autonomous cyber defence
A. Neal, A. Acuto, P. Green, C. Lear, N. Hare, and S. Maskell
15:40–16:00 Reducing human-induced label bias in SMS spam with context-enhanced clustering (CEC)
G. Shu Fuhnwi, A. M. Reinhold, and C. Izurieta
16:00–16:20 A multi-level user identity authentication scheme based on environmental detection
N. Zeeshan, L. L. Spada, and M. Bakyt
16:20–16:40 Machine learning model complexity as a mitigation strategy against industrial espionage through membership inference attacks
R. Dautov, H. Song, C. Schaefer, S. Kim, and V. Pietsch
16:40–17:00 Sunburst vapor – A cybersecurity prompted case study of national-scale organizational transformation
E. Moore, S. Fulton, T. Amador, R. Mancuso, I. Martinez, and D. Likarish
15:20–17:00 Session WS19: GAIA-SEC workshop
Chair: Fiammetta Marulli, Università della Campania “Luigi Vanvitelli” (IT)
Room: Hall 3
15:20–15:40 Efficient classification of partially faked audio using deep learning
A. Alali, G. Theodorakopoulos, and A. Emad
15:40–16:00 Data generation and cybersecurity: A major opportunity or the next nightmare?
F. Marulli, L. Campanile, M. Bifulco, S. Carbone, and G. Ragucci
16:00–16:20 Exploratory analysis of key factors for a sustainable green transition and EU regulatory compliance in companies
F. Marulli, A. Balzanella, R. Verde, R. Mattera, and G. Borrata
15:20–17:00 Session WS20: CVC workshop
Chair: Giovanni Gaggero, University of Genova (IT)
Room: Hall 4
15:20–15:40 Cybersecurity for connected vehicle networks: Leveraging sampled network traffic beyond the CAN protocol
A. Yehezkel and E. Elyashiv
15:40–16:00 Detection of C-V2X spoofing attacks using physical layer features and graph neural networks
D. Greco and M. S. Sohail
16:00–16:20 Integration of forensic analysis and event data recorders in automotive regulation: A proposed approach
F. B. Soomro, R. Caviglia, G. B. Gaggero, and M. Marchese
15:20–17:00 Session WS21: EPES-SPR workshop
Chair: Panagiotis Radoglou-Grammatikis, University of Western Macedonia (GR)
Room: Hall 2
15:20–15:20 Welcome by the chairs
P. Sarigiannidis, P. Radoglou-Grammatikis, and D. Pliatsios
15:20–15:40 Detection of masquerade attacks on protection of digital substations using real-time measurements
M. Elrawy, L. Hadjidemetriou, C. Laoudias, and M. K. Michael
15:40–16:00 Evaluating 5G-enabled EV charging infrastructure’s resilience through stealthy cyber-attacks
D. Psaltis, K. Ntouros, A. Lekidis, S. Brotsis, and N. Kolokotronis
16:00–16:20 Surrogate-guided adversarial attacks: Enabling white-box methods in black-box scenarios
D. C. Asimopoulos, P. Radoglou Grammatikis, P. Fouliras, K. Panitsidis, G. Efstathopoulos, T. Lagkas, V. Argyriou, I. Kotsiuba, and P. Sarigiannidis
16:20–16:40 Fortified control-plane encapsulation with session-key derivation for secure IP mesh routing
G. Amponis, P. Radoglou Grammatikis, T. Lagkas, V. Argyriou, A. Sarigiannidis, N. Kazakli, T. Boufikos, and P. Sarigiannidis
16:40–17:00 Neural cryptanalysis of lightweight block ciphers using residual MLPs
C. Eleftheriadis, G. Andronikidis, A. Lytos, E. Fountoukidis, P. A. Karypidis, T. Lagkas, V. Argyriou, I. Nanos, and P. Sarigiannidis

Will be made available in the coming weeks.