MONDAY, 2 SEPTEMBER 2024 OTHER 8:40-9:00 WelcomeChair: IEEE CSR Chairs TRACK1 9:00-10:20 CSR 1Chair: Ali Ismail Awad United Arab Emirates University Tower Suite A 09:00-09:20 A Hybrid Ensemble Learning-based Intrusion Detection System For The Internet Of Things Mohammed M. Alani, Toronto Metropolitan University, Ali Ismail Awad, United Arab Emirates University, Ezedin Barka, United Arab Emirates University 09:20-09:40 Verifying The Robustness Of Machine Learning Based Intrusion Detection Against Adversarial Perturbation Ehsan Nowroozi, Ravensbourne University London, Rahim Taheri, University of Portmouth, Mehrdad Hajizadeh, Technische Universitat Chemnitz, Thomas Bauschert, Technische Universitat Chemnitz 09:40-10:00 Rebotdetector: A Detection Model With Lstm Feature Extractor For Session-replay Web Bot Attacks Shadi Sadeghpour, The Citadel, Natalija Vlajic, York University 10:00-10:20 Explainable Federated Learning For Botnet Detection In Iot Networks Rajesh Kalakoti, Taltech, Hayretdin Bahsi, Taltech and Northern Arizona University, United States, Sven Nomm, TaltechTRACK1 9:00-10:20 CSR 2Chair: Gabor Visky Tallinn University of Technology Tower Suite C 09:00-09:20 A Version-based Algorithm For Quality Enhancement Of Automatically Generated Vulnerability Inventories Silvia Bonomi, Sapienza Universita di Roma, Marco Cuoci, Sapienza Universita di Roma, Simone Lenti, Sapienza Universita di Roma 09:20-09:40 Asset-centric Threat Modeling For Ai-based Systems Jan von der Assen, Jamo Sharif, Chao Feng 09:40-10:00 When Rewards Deceive: Counteracting Reward Poisoning On Online Deep Reinforcement Learning Myria Bouhaddi, Universite du Quebec en Outaouais, kamel Adi, Universite du Quebec en OutaouaisTRACK2 9:00-10:20 2P-DPA1Chair: Salvatore D’Antonio University of Naples Parthenope (IT) More London Suite 09:00-09:20 Dscs: Towards An Extensible Secure Decentralised Distributed Computation Protocol Alexander Dalton, Imperial College London, David Thomas, University of Southampton, Peter Cheung, Imperial College London 09:20-09:40 A Novel Approach For Securing Federated Learning: Detection And Defense Against Model Poisoning Attacks Giovanni Maria Cristiano, Salvatore D'Antonio, University of Napoli Parthenope, Federica Uccello 09:40-10:00 Secure And Transparent Data Sharing Among Connected Devices: Integrating Data Spaces And Provenance Roberto Nardone, Univ. of Naples Parthenope, Alfredo Petruolo, Univ. of Naples Parthenope, Federica Uccello, Univ. of Naples Parthenope 10:00-10:20 Enhancing Healthcare Data Confidentiality Through Decentralized Tee Attestation Salvatore D'Antonio, Jonah Giglio, Giovanni Mazzeo, Federica Uccello, Teresa Mannarino 10:20-10:40 Coffee BreakChair: IEEE CSR Chairs Tower Foyer TRACK1 10:40-12:00 CSR 3Chair: Valeria Rossi Universita degli Studi dell’Insubria Tower Suite A 10:40-11:00 Are Ids Violating Segmentation In Industrial Networks? Giovanni Battista Gaggero, University of Genova, Roberto Caviglia, HWG Sababa Security s.p.a., Paola Girdinio, University of Genova, Mario Marchese, University of Genova 11:00-11:20 New Approach To Shorten Feature Set Via Tf-idf For Machine Learning-based Webshell Detection Viet Anh Phan, Department of Telecommunications, Brno University of Technology, Jan Jerabek, Department of Telecommunications, Brno University of Technology, Dinh Khanh Le, Center 286, Cyber Command, Tomas Gotthans, Department of Radio Electronics 11:20-11:40 Anomaly Detection In Operational Technology Systems Using Non-intrusive Load Monitoring Based On Supervised Learning Adam Schroeder, Naval Postgraduate School, Patrick McClure, Naval Postgraduate School, Preetha Thulasiraman, Naval Postgraduate School 11:40-12:00 Can Deep Learning Detect Fake News Better When Adding Context Features? Rachel Ladouceur, Quebec University of Chicoutimi, Abubakr Hassan, Computer Science and Software Engineering, Fehmi Jaafar, Quebec University of Chicoutimi, Mohamed Mejri, Computer Science and Software EngineeringTRACK1 10:40-12:00 CSR 4Chair: Cyprien De La Vergne De Cerval Institut de Radioprotection et de Surete Nucleaire Tower Suite C 10:40-11:00 Building A Use Case-driven Adversarial Threat Matrix: A Comprehensive Approach Prodromos Kiriakidis, CERTH-ITI, Efi Kafali, CERTH-ITI, Georgios Rizos, CERTH-ITI, Antonis Voulgaridis, CERTH-ITI, Theodoros Semertzidis, CERTH-ITI, Stephane Gazut, CEA, Petros Daras, CERTH-ITI, Konstantinos Votis, CERTH-ITI 11:00-11:20 Third-party Cloud Risk Management Breno Pinto 11:20-11:40 A Trust Management Delegation Protocol For Fog Computing Applications Phongsathon Fongta, University of Strathclyde, Sotirios Terzis, University of Strathclyde 11:40-12:00 Ai-based Attacker Models For Enhancing Multi-stage Cyberattack Simulations In Smart Grids Using Co-simulation Environments Omer Sen, Digital Energy at Fraunhofer FIT, Christoph Pohl, IAEW at RWTH Aachen Univserity, Immanuel Hacker, Digital Energy at Fraunhofer FIT, Markus Stroot, IAEW at RWTH Aachen Univserity, Andreas Ulbig, IAEW at RWTH Aachen UnivserityTRACK2 10:40-12:00 2P-DPA2Chair: Salvatore D’Antonio University of Naples Parthenope (IT) More London Suite 10:40-11:00 Simplifying Differential Privacy For Non-experts: The Encrypt Project Approach Stelios Erotokritou, Eight Bells Ltd, Ioannis Giannoulakis, Eight Bells Ltd, Emmanouil Kafetzakis, Eight Bells Ltd, Konstantinos Kaltakis, Eight Bells Ltd 11:00-11:20 Zadig: A Novel Extended Detection And Response System Stefano Perone, Universita Campus Bio-Medico di Roma, Luca Faramondi, Universita Campus Bio-Medico di Roma, Simone Guarino, Universita Campus Bio-Medico di Roma, Roberto Setola, Universita Campus Bio-Medico di Roma, Martina Nobili, Universita Campus Bio-Medico di Roma, Ernesto del Prete, INAIL, Giovanni Patruno, bitCorp, Luca Piccirillo, bitCorp, Annunziata Laurenda, bitCorp 11:20-11:40 Towards Gpu Accelerated Fhe Computations Orion Papadakis, The University of Manchester, Michail Papadimitriou, The University of Manchester, Athanasios Stratikopoulos, The University of Manchester, Maria Xekalaki, The University of Manchester, Juan Fumero, The University of Manchester, Nikos Foutris, The University of Manchester, Christos Kotselidis, The University of Manchester 11:40-12:00 Towards A Generic Framework For Knowledge Graph Construction: The Healthcare Domain Christina Karalka, School of Informatics, Aristotle University of Thessaloniki, \\ Thessaloniki, Georgios Meditskos, School of Informatics, Aristotle University of Thessaloniki, \\ Thessaloniki, Maria Papoutsoglou, School of Informatics, Aristotle University of Thessaloniki, \\ Thessaloniki, Nick Bassiliades, School of Informatics, Aristotle University of Thessaloniki, \\ Thessaloniki 12:00-13:00 Keynote Lecture - Building cyber security resilience through educationChair: Stavros Shiaeles University of Portsmouth Tower Suite A 13:00-14:00 Lunch BreakChair: IEEE CSR Chairs Tower Foyer TRACK1 14:00-15:40 CSR 5Chair: Sven Glatzer University of Portsmouth Tower Suite A 14:00-14:20 Navigating (in)security Of Ai-generated Code Sri Haritha Ambati, University of Saskatchewan, Norah Ridley, University of Saskatchewan, Enrico Branca, University of Saskatchewan, Natalia Stakhanova, University of Saskatchewan 14:20-14:40 Enabling Cyber Threat Intelligence Sharing For Resource Constrained Iot August Karlsson, RISE Research Institutes of Sweden AB, Rikard Hoglund, RISE Research Institutes of Sweden AB, Han Wang, RISE Research Institutes of Sweden AB, Alfonso Iacovazzi, RISE Research Institutes of Sweden AB, Shahid Raza, RISE Research Institutes of Sweden AB 14:40-15:00 Unraveling The Threat Landscape Of Cps: Modbus Tcp Vulnerabilities In The Era Of I4.0 Georgios Lazaridis, CERTH & IHU, Anastasios Drosou, Centre for Research and Technology Hellas, Periklis Chatzimisios, International Hellenic University & University of New Mexico - USA, Dimitrios Tzovaras, Centre for Research and Technology Hellas 15:00-15:20 Zero To Trust? Bringing Application-level Intelligence At Scale To Detection Engineering Fatih Gey, SAP SE, Cedric Hebert, Holger Mack 15:20-15:40 Novel Approach To Tor User De-anonymization: Client-side Generated Watermark Natalija Vlajic, York University, Daniel Brown, York UniversityTRACK1 14:00-15:40 CSR 6Chair: Soraya Harding University of Portsmouth Tower Suite C 14:00-14:20 Deep Graph Learning For Ddos Detection And Multi-class Classification Ids Braden Saunders, Brock University, Robson E. De Grande, Brock University, Glaucio Carvalho, Brock University, Isaac Woungang, Toronto Metropolitan University 14:20-14:40 Use Of Visibility Graphs For The Early Detection Of Dos Attacks João Lopes, Instituto Politecnico de Viana do Castelo, Pedro Pinto, Instituto Politecnico de Viana do Castelo, Alberto Partida, Data, Complex Networks and Cybersecurity Sciences Technological Institute, Rey Juan Carlos University, Antonio Pinto, CIICESI, ESTG, Instituto Politecnico do Porto 14:40-15:00 A2hd: Adaptive Adversarial Training For Hyperdimensional Computing-based Intrusion Detection Against Adversarial Attacks Onat Gungor, University of California, San Diego, Tajana Rosing, University of California, San Diego, Baris Aksanli, San Diego State University 15:00-15:20 Emerging Trends In 5g Malicious Traffic Analysis: Enhancing Incremental Learning Intrusion Detection Strategies Zihao Wang, Singapore Technologies Engineering Cybersecurity Strategic Technology Centre, Kar Wai Fok, Singapore Technologies Engineering Cybersecurity Strategic Technology Centre, Vrizlynn Thing, Singapore Technologies Engineering Cybersecurity Strategic Technology Centre 15:20-15:40 Multi-blockchain Model For Iot Devices Forensic Investigations On Spidernet Soraya Harding, University of PortsmouthTRACK2 14:00-15:40 SPARCChair: Neetesh Saxena Cardiff University (UK) More London Suite 14:00-14:20 Active Honeyfiles For Ransomware Encryption Mitigation Ioannis Stamelos, Technical University of Crete, George Hatzivasilis, Technical University of Crete, Sotiris Ioannidis, Technical University of Crete 14:20-14:40 Adversarial Attacks In Intrusion Detection Systems: Triggering False Alarms In Connected And Autonomous Vehicles Fatimah Aloraini, Cardiff University, Amir Javed, Cardiff University 14:40-15:00 Towards Developing An Asset-criticality Identification Framework In Smart Grids Yazeed Alrowaili, Cardiff University, UK, Neetesh Saxena, Cardiff University, UK, Pete Burnap, Cardiff University, UK 15:00-15:20 Foundations For Modelling Conscientious Attacking In Electromagnetic Cyberspace Nigel Davies, Bournemouth University, Huseyin Dogan, Bournemouth University, Duncan Ki-Aries, Bournemouth University, Nan Jiang, Bournemouth University, Chris Williams, DSTL 15:20-15:40 The Impact Of Gps Interference In The Middle East Vasilis Ieropoulos, Cardiff University 15:40-16:00 Coffee BreakChair: IEEE CSR Chairs Tower Foyer TRACK1 16:00-17:20 CSR 7Chair: Utku Budak Technical University of Munich Tower Suite A 16:00-16:20 A Forensic Framework For Screen Capture Validation In Legal Contexts Claudia Greco, Michele Ianni, Giuseppe Seminara, Antonella Guzzo, Giancarlo Fortino 16:20-16:40 A Systematic Review Of Cybersecurity Audit Frameworks For The Internet Of Things Danielle Hanson, North Dakota State University, Jeremy Straub, North Dakota State University 16:40-17:00 A Survey Of Digital Forensic Tools For Android And Ios Smart Phones Sthembile Ntshangase, Csir, Norman Nelufule, Csir, David Mulihase, Csir, Mamello Mtshali, CSIR, Chantel Mokoena, CSIR, Palesa Moloi, CSIR 17:00-17:20 Active Learning-based Mobile Malware Detection Utilizing Auto-labeling And Data Drift Detection Zhe Deng, Tallinn University of Technology, Arthur Hubert, University of Luxembourg, Sadok Ben Yahia, Tallinn University of Technology, Hayretdin Bahsi, Tallinn University of TechnologyTRACK1 16:00-17:20 CSR 8Chair: Alessandro Zamponi Politecnico di Torino Tower Suite C 16:00-16:20 Rigorous Evaluation Of Machine Learning-based Intrusion Detection Against Adversarial Attacks Onat Gungor, University of California San Diego, Elvin Li, University of California San Diego, Zhengli Shang, University of California San Diego, Yutong Guo, University of California San Diego, Jing Chen, University of California San Diego, Johnathan Davis, University of California San Diego, Tajana Rosing, University of California San Diego 16:20-16:40 A Hybrid Anomaly Detection Approach For Obfuscated Malware Gerard Shu Fuhnwi, Montana State University, Matthew Revelle, Montana State University, Clemente Izurieta, Montana State University 16:40-17:00 Ransomware Detection: Ensemble Machine Learning Models Using Disjoint Data Charles Michael Ribeiro da Silva, Tecnological Institute of Aeronautics, Paulo Andre Lima de Castro, Tecnological Institute of Aeronautics, Cecilia de Azevedo Castro Cesar, Tecnological Institute of Aeronautics 17:00-17:20 Towards Live Detection Of Ransomware Attacks Kumar Thummapudi, University of Texas at San Antonio, Rajendra Boppana, University of Texas at San Antonio, Palden Lama, University of Texas at San AntonioTRACK2 16:00-17:20 SDGCPChair: Samira Maghool & Faiza Allah Bukhsh More London Suite 16:00-16:20 Synthetic Data For Identifying Inclusive Language (case Study: Job Descriptions In Italian) Tommaso Romano', University of Milan, Fatemeh Mohammadi, University of Milan, Paolo Ceravolo, University of Milan 16:20-16:40 Active Learning Methodology In Large Language Models Fine-tuning Paolo Ceravolo, University of Milan, Fatemeh Mohammadi, University of Milan, Marta Annamaria Tamborini, University of MilanTUESDAY, 3 SEPTEMBER 2024 TRACK2 9:00-10:20 CRE 1Chair: Nicholas J. Multari & Rosalie McQuaid More London Suite 09:00-09:20 Cyber Resilience In Ot: Characteristics And Security Challenges Marius Cotiga, Terma A/S, Jens Myrup Pedersen, Aalborg University, Edlira Dushku, Aalborg University 09:20-09:40 Framework For Quantitative Evaluation Of Resilience Solutions: An Approach To Determine The Value Of Resilience For A Particular Site Mark Weimar, Pacific Northwest National Laboratory 09:40-10:00 Pentestai An Llm-powered Multi-agent Framework For Penetration Testing Automation Leveraging Mitre Attack Stanislas G. Bianou, Independent Researcher, Rodrigue G. Batogna, School of Science University of Namibia 10:00-10:20 Taxonomy Of Cyber Risk Mitigation Cost Benefit Analysis Methods For Energy Infrastructure Yvonne Kam, University of Plymouth, Kimberly Tam, University of Plymouth, Kevin Jones, University of Plymouth, Robert Rawlinson-Smith, University of PlymouthTRACK1 9:00-10:20 CSR 10Chair: Georgios Lazaridis CERTH-ITI Tower Suite C 09:00-09:20 Vehicular Network Security Against Rf Jamming: An Lstm Detection System Mubashir Murshed, Brock University, Afrin Jubaida, Brock University, Robson E. De Grande, Brock University, Glaucio Haroldo Silva de Carvalho, Brock University 09:20-09:40 From Data To Defense: Real-time Detection Of Botnets In Iot Using Lstm Networks Shadi Sadeghpour, The Citadel, Farhath Zareen, The Citadel, William Johnson, The Citadel 09:40-10:00 Harnessing Ti Feeds For Exploitation Detection Kajal Patel, Zubair Shafiq, Mateus Nogueira, Daniel Sadoc Menasche, Enrico Lovat, Taimur Kashif, Ashton Woiwood, University of Iowa, Matheus Martins, Siemens 10:00-10:20 Attack-specific Feature Construction To Detect Malicious Tcp Flows Vasudha Vedula, University of Texas at San Antonio, Rajendra Boppana, University of Texas at San Antonio, Palden Lama, University of Texas at San AntonioTRACK1 9:00-10:20 CSR 9Chair: Zhe Deng Tallinn University of Technology Tower Suite A 09:00-09:20 Automatic Discovery Of Cyberattacks Guillaume Hutzler, IBISC, Univ. Evry, Universite Paris-Saclay, Hanna Klaudel, Univ. d’Evry Val d'Essonne, Witold Klaudel, SafeTech Cybernetics / IRT SystemX, Franck Pommereau, IBISC, Univ. Evry, Universite Paris-Saclay, Artur Rataj, IRT SystemX 09:20-09:40 Leveraging Threat Modelling For Effective Penetration Testing In 5g Systems Luca Chianese, Daniele Granata, University of Campania Luigi Vanvitelli, Paolo Palmiero, University of Campania Luigi Vanvitelli, Massimiliano RAK, University of Campania Luigi Vanvitelli 09:40-10:00 The Danger Within: Insider Threat Modeling Using Business Process Models Jan von der Assen, Jasmin Hochuli, Thomas Grubl 10:00-10:20 Data Siphoning In Icss: Attack Tree And Role Of Cryptoperiods Natalija Vlajic, York University, Gabriele Cianfarani, York University, Robert Noce, SAP, Cloud-Native Architecture, Innovation, & Research 10:20-10:40 Coffee BreakChair: IEEE CSR Chairs Tower Foyer TRACK1 10:40-12:00 CSR 11Chair: Maryam Zahid Malardalen University Tower Suite A 10:40-11:00 Defencerank – Ranking Based Attack Graph Analysis And Defence Prioritization Rajendra Shivaji Patil, KTH Royal Institute of Technology Stockholm, Sweden, Markus Dypbukt Kallman, KTH Royal Institute of Technology Stockholm, Sweden, Viktoria Fodor, KTH Royal Institute of Technology Stockholm, Sweden 11:00-11:20 On The Iso Compliance Of Model-based Risk Assessment For Autonomous Cyber-physical Production Systems Maryam Zahid, Malardalen University, Alessio Bucaioni, Malardalen University, Francesco Flammini, Malardalen University 11:20-11:40 Empirical Analysis And Practical Assessment Of Ransomware Attacks To Data In Motion Raul Reinosa Simon, Universitat Politecnica de Valencia, Clara I. Valero, Universitat Politecnica de Valencia, Jose A. Martinez Cadenas, Universitat Politecnica de Valencia, Elisa R. Heymann, University of Wisconsin, Ignacio Lacalle, Universitat Politecnica de Valencia, Barton P. Miller, University of Wisconsin, Carlos E. Palau, Universitat Politecnica de Valencia 11:40-12:00 Investigating The Health State Of X.509 Digital Certificates Simone Orlando, Politecnico di Milano, Alessandro Barenghi, Politecnico di Milano, Gerardo Pelosi, Politecnico di MilanoTRACK1 10:40-12:00 CSR 12Chair: Alfonso Iacovazzi RISE Research Institutes of Sweden AB Tower Suite A 10:40-11:00 Rot: Retention And Operation Limitation Using Tee Sumit Paul, D.A Knox 11:00-11:20 Energy-efficient Hardening Of The Sediment Methodology For Scalable Iot Network Security David Shur, Giovanni DiCrescenzo, Ta Chen, Zahir Patni, YaoJian Lin, Scott Alexander, Benjamin Flin, Rob Levonas 11:20-11:40 Detecting Covert Channels In Cloud Access Control Policies Using Large Language Models Hrishikesh Karmarkar, TCS Research, Vaibhavi Joshi, TCS Research, R Venkatesh, TCS Research 11:40-12:00 An End-to-end Framework For Cybersecurity Taxonomy And Ontology Generation And Updating Anna Kougioumtzidou, CERTH - ITI, Angelos Papoutsis, CERTH - ITI, Dimitrios Kavallieros, CERTH - ITI, Thanassis Mavropoulos, CERTH - ITI, Theodora Tsikrika, CERTH - ITI, Stefanos Vrochidis, CERTH - ITI, Ioannis Kompatsiaris, CERTH - ITITRACK2 10:40-12:00 CRE 2Chair: Nicholas J. Multari & Rosalie McQuaid More London Suite 10:40-11:00 Invited Talk: Engineering Cyber Risk And Resiliency Paul Nielsen, Software Engineering Institute 11:00-11:20 Invited Talk: How To Enhance The Secure Development And Operations Lifecycle With Ai Volkmar Lotz, SAP Labs France 11:20-11:40 Invited Talk: Automated Reasoning For High Assurance Systems Paul Rowe 11:40-12:00 Invited Talk: Osint-based Knowledge Graphs And Link Analysis For Threat Actors Discovery George Sharkov, Director, European Software Institute – Center Eastern Europe 12:00-13:00 Keynote Lecture - Strategic Resilience: Safeguarding Critical Infrastructures in a Geostrategic LandscapeChair: Emanuele Bellini University of Roma Tre Tower Suite A 13:00-14:00 Lunch BreakChair: IEEE CSR Chairs Tower Foyer TRACK2 14:00-14:40 CRE 3Chair: Nicholas J. Multari & Rosalie McQuaid More London Suite 14:00-14:20 Invited Talk: On The Resilience Of Distributed Systems Marco Carvalho, Florida Institute of Technology 14:20-14:40 Question And Answer Period Rosalie McQuaidTRACK1 14:00-15:40 CSR 13Chair: Fahad Ahmad University of Portsmouth Tower Suite A 14:00-14:20 The Need For Cyber-resilience In Complex Systems Sezen Acur, TNO, Teun Hendriks, TNO 14:20-14:40 A Lightweight Firmware Resilience Engine For Iot Devices Leveraging Minimal Processor Features Utku Budak, Technical University of Munich (TUM), Fabrizio De Santis, Siemens AG, Corporate Technology, Georg Sigl, Technical University of Munich (TUM) 14:40-15:00 Advancing Security In 5g Core Networks Through Unsupervised Federated Time Series Modeling Saeid Sheikhi, University of Oulu, Panos Kostakos, University of Oulu 15:00-15:20 Using A Sensor-health-aware Resilient Fusion For Localization In The Presence Of Gps Spoofing Attacks Samin Moosavi, Texas A&M University, Isabel Moore, Texas A&M University, Swaminathan Gopalswamy, Texas A&M UniversityTRACK1 14:00-15:40 CSR 14Chair: Marco Cuoci Sapienza Universita di Roma Tower Suite C 14:00-14:20 Application Of Robotic Exploration Principles To The Challenge Of Cybersecurity Penetration Testing Jeremy Straub, North Dakota State University 14:20-14:40 Leveraging Reinforcement Learning In Red Teaming For Advanced Ransomware Attack Simulations Cheng Wang, Deloitte & Touche LLP, Christopher Redino, Deloitte & Touche LLP, Ryan Clark, Deloitte & Touche LLP, Abdul Rahman, Deloitte & Touche LLP, Sal Aguinaga, Deloitte & Touche LLP, Sathvik Murli, Deloitte & Touche LLP, Dhruv Nandakumar, Roland Rao, Deloitte & Touche LLP, Lanxiao Huang, Virginia Tech, Daniel Radke, Deloitte & Touche LLP, Edward Bowen, Deloitte & Touche LLP 14:40-15:00 Autonomous Cyberattack With Security-augmented Generative Artificial Intelligence Jonathan Gregory, Central Michigan University, Qi Liao, Central Michigan University 15:00-15:20 Toward A Unified Security Framework For Digital Twin Architectures Sani Abdullahi, University of Southern Denmark, Sanja Lazarova-Molnar, University of Southern Denmark & Karlsruhe Institute of Technology, Germany 15:20-15:40 A Looping Process For Cyberattack Mitigation Daniele Bringhenti, Politecnico di Torino, Francesco Pizzato, Politecnico di Torino, Riccardo Sisto, Politecnico di Torino, Fulvio Valenza, Politecnico di TorinoTRACK2 14:40-15:40 EPES-SPRChair: Dimitrios Pliatsios University of Western Macedonia More London Suite 14:40-15:00 Ai-driven Anomaly And Intrusion Detection In Energy Systems: Current Trends And Future Direction Georgios Andronikidis, Sidroco Holdings LTD, Charis Eleftheriadis, Sidroco Holdings LTD, Zisis Batzos, Sidroco Holdings LTD, Konstantinos Kyranou, Sidroco Holdings LTD, Panagiotis Radoglou Grammatikis, University of Western Macedonia, Nikolaos Maropoulos, University of Western Macedonia, Gohar Sargsyan, Celesta Advice, Panagiotis Sarigiannidis, University of Western Macedonia 15:00-15:20 Ai4collab: An Ai-based Threat Information Sharing Platform Christos Dalamagkas, Dimitrios Asimopoulos, Panagiotis Radoglou-Grammatikis, University of Western Macedonia, Nikolaos Maropoulos, Univeristy of Western Macedonia, Thomas Lagkas, Democritus University of Thrace, Vasileios Argyriou, Kingston University London, Gohar Sargsyan, Celesta Advice, Panagiotis Sarigiannidis, University of Western Macedonia 15:20-15:40 Sdn-based Reconfiguration Of Distributed And Cooperative Microgrid Control Systems For Mitigating Synchronization Attacks Aurelie Kpoze, University of Abomey Calavi, Institute of Mathematics and Physical Science (IMSP), Abdelkader Lahmadi, University of Lorraine, French National Institute for Research in Digital Science and Technology (INRIA), Isabelle Chrisment, University of Lorraine, French National Institute for Research in Digital Science and Technology (INRIA), Jules Degila, University of Abomey Calavi, Institute of Mathematics and Physical Science (IMSP) 15:40-16:00 Coffee BreakChair: IEEE CSR Chairs Tower Foyer TRACK2 16:00-16:40 DR-DCHEChair: Emanuele Bellini University of Rome Tre (IT) More London Suite 16:00-16:20 Towards A Reputational-based Trustworthy Archaeological Information System Emanuele Bellini, University of Roma Tre, Margherita Bottoni, University of Roma Tre, Emeri Farinetti, University of Roma Tre 16:20-16:40 Transitioning Ssh European Research Infrastructures To Critical Infrastructure Through Resilience Emanuele Bellini, Emiliano Innocenti, CNR-OVITRACK1 16:00-17:20 CSR 15Chair: Norbert Tihanyi Technology Innovation Institute Tower Suite A 16:00-16:20 Structural Generalization In Autonomous Cyber Incident Response With Message-passing Neural Networks And Reinforcement Learning Jakob Nyberg, KTH Royal Institute of Technology, Pontus Johnson, KTH Royal Institute of Technology 16:20-16:40 Ineffectiveness Of Digital Transformations For Detecting Adversarial Attacks Against Quantized And Approximate Cnns Salvatore Della Torca, University of Napoli Federico II, Salvatore Barone, University of Napoli Federico II, Valentina Casola, University of Napoli Federico II 16:40-17:00 Cybermetric: A Benchmark Dataset Based On Retrieval-augmented Generation For Evaluating Llms In Cybersecurity Knowledge Norbert Tihanyi, Technology Innovation Institute, Mohamed Amine Ferrag, Technology Innovation Institute, Ridhi Jain, Technology Innovation Institute, Tamas Bisztray, University of Oslo, Merouane Debbah Debbah, Khalifa University 17:00-17:20 Secure Ai/ml-based Control In Intent-based Management System Leyli Karaçay, Ericsson Araştirma Geliştirme ve Bilişim Hizmetleri A.Ş, Ahmet Cihat Baktir, Ericsson Araştirma Geliştirme ve Bilişim Hizmetleri A.Ş, Ramin Fuladi, Ericsson Araştirma Geliştirme ve Bilişim Hizmetleri A.Ş, Elham Dehghan Biyar, Ericsson Araştirma Geliştirme ve Bilişim Hizmetleri A.Ş, Ömer Faruk Tuna, Ericsson Araştirma Geliştirme ve Bilişim Hizmetleri A.Ş, IPEK Arikan, Ericsson Araştirma Geliştirme ve Bilişim Hizmetleri A.ŞTRACK1 16:00-17:20 CSR 16Chair: Kushal Srivastava Fraunhofer Institute for High-Speed Dynamics Tower Suite C 16:00-16:20 Identifying Novelty In Network Traffic Joshua Sylvester, University of Kent, Rogerio de Lemos, University of Kent 16:20-16:40 A Time-series And Density-based Filter For Dns Log Reduction And Analysis Taylor Perkins, Deloitte Canada, Brian Lachine, Royal Military College of Canada 16:40-17:00 A Security Analysis Of A Deterministic Key Generation Scheme Dennis Song, Yuping Yan, Geroge Shao, Feida Zhu, Mason Song 17:00-17:20 Detecting Cryptographic Functions For String Obfuscation pierre mondon, University of kent, Rogerio De LemosTRACK2 16:40-17:20 ACSICSChair: Christopher Rouff Johns Hopkins University (US) More London Suite 16:40-17:00 Sok: Autonomic Computing Based Methods For Ics/scada And Iiot Security Christopher Rouff, Johns Hopkins University Applied Physics Laboratory, Ali Tekeoglu, Leidos & Johns Hopkins University Whiting School of Engineering 17:00-17:20 Autonomic Passive It-ot Device Classification In Ics/scada Networks Benny Rubin, Cornell University, Ali Tekeoglu, Leidos & Johns Hopkins University, Christopher Rouff, Johns Hopkins University Applied Physics Laboratory 19:20-20:00 AwardsChair: IEEE CSR Chairs Tower Suite 20:00-22:00 Gala DinnerChair: IEEE CSR Chairs Tower Suite WEDNESDAY, 4 SEPTEMBER 2024 TRACK2 9:00-10:20 IOSEC 1Chair: Kostas Lampropoulos & Vasileios Mavroeidis More London Suite 09:00-09:20 Developing A Robust Communication Infrastructure For A Distributed Smart Grid Ids Verena Menzel, University of Twente, Jan Speckamp, Anne Remke 09:20-09:40 Secureexecutor: An Automated Way To Leverage Scone To Enhance Application Security Christos Spyridakis, Technical University of Crete, Angeliki Aktypi, Technical University of Crete, Thomas Kyriakakis, Technical University of Crete, Sotiris Ioannidis, Technical University of Crete 09:40-10:00 Composite Inspection And Certification (cic) System For Cybersecuity Assessment Of Ict Products, Services, And Processes Spyridon Papastergiou, Research and Innovation Maggiolli SPA,, Shareeful Islam, Department of Computing and Information Science, Anglia Ruskin University, Eleni Maria Kalogeraki, Security Lab Consulting 10:00-10:20 A Deep Learning Framework For Safety Monitoring Of A Railway Section Fatima Chriki, Universitat Politecnica de Catalunya, Ester Simo, Universitat Politecnica de Catalunya, Francesc Aguilo, Universitat Politecnica de Catalunya, Ignasi Garcia-Mila, Worldsensing, Barcelona, Xavier Masip, Universitat Politecnica de CatalunyaTRACK1 9:00-10:20 CSR 18Chair: Alkistis-Aikaterini Sigourou IHP GmbH - Leibniz Institute for High Performance Microelectronics Tower Suite C 09:00-09:20 Identifying Android Banking Malware Through Measurement Of User Interface Complexity Sean McElroy, Dakota State University 09:20-09:40 Forensic Analysis Of Android Notifications’ History Evangelos Dragonas, University of Piraeus Research Center, EL090037284, Costas Lambrinoudakis, Department of Digital Systems, University of Piraeus, Attica, Greece 09:40-10:00 Building A Secure Cross-device Communication Channel For Smart Devices Based On App Accounts Lanlan Pan, University of Science and Technology of China, Ruonan Qiu, Guangdong OPPO Mobile Telecommunications Corp. Ltd., Chuan Zhang, Guangdong OPPO Mobile Telecommunications Corp. Ltd., Minghui Yang, Guangdong OPPO Mobile Telecommunications Corp. Ltd. 10:00-10:20 A Privacy-preserving And Secure Scheme For Online Payment In The Realm Of Mobile Commerce Mohammad Rasool Momeni, Concordia University, Abdollah Jabbari, Concordia University, Carol Fung, Concordia UniversityTRACK1 9:00-10:20 CSR 17Chair: Alessandro Zamponi Politecnico di Torino Tower Suite A 09:00-09:20 Dynamic Security Provisioning For Cloud-native Networks: An Intent-based Approach Francesco Settanni, Politecnico di Torino, Alessandro Zamponi, Politecnico di Torino, Cataldo Basile, Politecnico di Torino 09:20-09:40 Enhancing Atm Security Management In The Post-quantum Era With Quantum Key Distribution Fahad Ahmad, University of Portsmouth, Aikaterini Kanta, University of Portsmouth, Stavros Shiaeles, University of Portsmouth, Afia Naeem, Kinnaird College for Women, Zarnab Khalid, Kinnaird College for Women, Kainaat Mahboob, Kinnaird College for Women 09:40-10:00 Peer-to-peer Meets Onion: The Veilid Framework Sven Glatzer, University of Portsmouth, Stavros Shiaeles, Rinat Khusainov, Rahim Taheri 10:00-10:20 Understanding & Mitigating The Challenges Of Securing Jupyter Notebooks Online Adrian Ramsingh, Sia Fusion Ltd, Pradeep Verma, Sia Fusion Ltd 10:20-10:40 Coffee BreakChair: IEEE CSR Chairs Tower Foyer TRACK1 10:40-12:00 CSR 19Chair: Amalia Damianou CERTH-ITI Tower Suite A 10:40-11:00 Safety Analysis For Cyber-physical Systems Under Cyber Attacks Using Digital Twin Ruizhe Wang, University of Bristol, Sarad Venugopalan, University of Bristol, Sridhar Adepu, University of Bristol 11:00-11:20 Dionysus: Leveraging Digital-twin Deception Networks For The Cybersecurity Of Physical Protection Systems Cyprien De La Vergne De Cerval, Institut de Radioprotection et de Surete Nucleaire, William Stout, Sandia National Laboratories, Eric Perret, Institut de Radioprotection et de Surete Nucleaire, Jonathan Sarrazin, Institut de Radioprotection et de Surete Nucleaire, Olivier Fichot, Institut de Radioprotection et de Surete Nucleaire, Vincent Urias, Sandia National Laboratories, Shadya Maldonado Rosado, Sandia National Laboratories 11:20-11:40 Enhancing Cyber-physical Security: Integrating Virtual Fences Within Digital Twins Ali Aghazadeh Ardebili, HSPI - Roma, Antonella Longo, University of Salento, Antonio Ficarella, University of Salento 11:40-12:00 Situational Awareness Scoring System In Cyber Range Platforms Amalia Damianou, CERTH-ITI, Mariana S. Mazi, CERTH-ITI, Georgios Rizos, CERTH-ITI, Antonios Voulgaridis, CERTH-ITI, Konstantinos Votis, CERTH-ITITRACK1 10:40-12:00 CSR 20Chair: Daniel Spiekermann FH Dortmund Tower Suite C 10:40-11:00 Ipv6 Connection Shuffling For Moving Target Defense (mtd) In Sdn Nicholas Mayone, Zurich University of Applied Sciences (ZHAW), Pascal Kunz, Zurich University of Applied Sciences (ZHAW), Beytullah Yigit, Bogazici University, Wissem Soussi, Zurich University of Applied Sciences (ZHAW), Burkhard Stiller, University of Zurich (UZH), Gurkan Gur, Zurich University of Applied Sciences (ZHAW) 11:00-11:20 Evaluating Few-shot Learning Generative Honeypots In A Live Deployment Jarrod Ragsdale, University of Texas at San Antonio, Rajendra Boppana, University of Texas at San Antonio 11:20-11:40 A Modular Generative Honeypot Shell Saul Johnson, NHL Stenden University of Applied Sciences, Remco Hassing, NHL Stenden University of Applied Sciences, Jeroen Pijpker, NHL Stenden University of Applied Sciences, Rob Loves, NHL Stenden University of Applied Sciences 11:40-12:00 Can A Llama Be A Watchdog? Exploring Llama 3 And Code Llama For Static Application Security Testing Claudio Curto, Universita degli studi di Catania, Daniela Giordano, Universita degli studi di Catania, Daniel Gustav Indelicato, Darwin Technologies S.r.l., Vladimiro Patatu, EHT S.c.p.A.TRACK2 10:40-12:00 IOSEC 2Chair: Kostas Lampropoulos & Vasileios Mavroeidis More London Suite 10:40-11:00 Quantifying The Odds In Real World Attack Scenarios Paul Tavolato, University of Vienna, Sebastian Eresheim, University of Vienna, Robert Luh, University of Applied Science St. Polten, Simon Gmeiner, University of Vienna, Sebastian Schrittwieser, Universitat Wien: Universitat Wien 11:00-11:20 Ontohunt - A Semantic Reasoning Approach To Cyber Threat Hunting With Indicators Of Behaviour Robert Chetwyn, University Of Oslo, Martin Eian, mnemonic AS, Audun Josang, University of Oslo 11:20-11:40 Uncovering Hidden Threats: Automated, Machine Learning-based Discovery & Extraction Of Cyber Threat Intelligence From Online Sources Rafail A. Ellinitakis, Sphynx Hellas S.A., Konstantinos Fysarakis, Sphynx Analytics Ltd, Panagiotis Bountakas, Sphynx Technology Solutions AG, Georgios Spanoudakis, Sphynx Hellas S.A. 11:40-12:00 Did:ring: Ring Signatures Using Decentralised Identifiers For Privacy-aware Identity Proof Dimitrios Kasimatis, Edinburgh Napier University, Sam Grierson, Edinburgh Napier University, William J. Buchanan, Edinburgh Napier University, Chris Eckl, Condatis Group Limited, Pavlos Papadopoulos, Edinburgh Napier University, Nikolaos Pitropakis, Edinburgh Napier University, Christos Chrysoulas, Edinburgh Napier University, Craig Thomson, Edinburgh Napier University, Baraq Ghaleb, Edinburgh Napier University 12:00-13:00 Keynote Lecture - Cybersecurity as a Backbone for SustainabilityChair: Nikolas Kolokotronis University of Peloponnese Tower Suite A 13:00-14:00 Lunch BreakChair: IEEE CSR Chairs Tower Foyer TRACK2 14:00-14:40 CFATIChair: Chris Lane, Preeti Patel, Ahmed Elmesiry London Metropolitan University (UK) More London Suite 14:00-14:20 Challenges Of Digital Investigations In Nowadays Communication Networks Daniel Spiekermann, FH Dortmund, Jorg Keller, Fernuniversitat in Hagen 14:20-14:40 Forensic Communication Analysis: Challenges And Opportunities Jian Xi, University of Applied Sciences Mittweida, Lukas Jaeckel, University of Applied Sciences Mittweida, Michael Spranger, University of Applied Sciences Mittweida, Melanie Siegel, University of Applied Sciences Darmstadt, Dirk Labudde, University of Applied Sciences MittweidaTRACK1 14:00-15:40 CSR 21Chair: Norman Nelufule CSIR Tower Suite A 14:00-14:20 Lightweight Testbed For Iec61162-450-related Cyber Security Research Gabor Visky, Tallinn University of Technology, Sokratis Katsikas, Norwegian University of Science and Technology, Maennel Olaf, The University of Adelaide, School of Computer and Mathematical Sciences 14:20-14:40 Hybrid Cybersecurity Research And Education Environment For Maritime Sector Gabor Visky, Tallinn University of Technology, Aleksei Siganov, Tallinn University of Technology, Ur Rehman Muaan, Tallinn University of Technology, Risto Vaarandi, Tallinn University of Technology, Hayretdin Bahsi, Tallinn University of Technology, Leonidas Tsiopoulos, Tallinn University of Technology 14:40-15:00 Assessment Of The Impact Of Cyber-attacks And Security Breaches In Diagnostic Systems On The Healthcare Sector Kushal Srivastava, Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut, EMI, Katja Faist, Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut, EMI, Benjamin Lickert, Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut, EMI, Karen Neville, University College Cork, Nora McCarthy, University College Cork, Mirjam Fehling-Kaschek, Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut, EMI, Alexander Stolz, Albert-Ludwig-Universitat 15:00-15:20 A Sdr-based Framework For Cybersecurity Assessment Of Vehicle-to-everything (v2x) Systems. Muhammad Saad Sohail, University of Genoa, Fabio Patrone, University of Genoa, Giancarlo Portomauro, University of Genoa, Mario Marchese Marchese, University of GenoaTRACK1 14:00-15:40 CSR 22Chair: Saeid Sheikhi University of Oulu Tower Suite C 14:00-14:20 Video-based Abnormal Human Behaviour Detection For Video Forensics. Intissar Ziani, MISC Laboratory, Department of Computer Science and its Applications, Faculty of NTIC, University of Constantine 2 - Abdelhamid Mehri, Constantine 25000, Algeria, Gueltoum Bendiab, LIRE laboratory, Department of Electronics, University of Freres Mentouri, Constantine 25000, Algeria, Mourad Bouzenada, MISC Laboratory, Department of Computer Science and its Applications, Faculty of NTIC, University of Constantine 2 - Abdelhamid Mehri, Constantine 25000, Algeria, Stavros Shiaeles, Cyber Security Research Group, University of Portsmouth, PO1 2UP, Portsmouth, UK sshiaele 14:20-14:40 On Impact Of Video Motion On Image Encryption/decryption. Comparative Results. Mourad Oussalah, University of Oulu, Anastasiia Voitenko, University of Oulu, Faculty of Information Technology and Electrical Engineering, Centre for Machine Vision and Signal Processing, 90014 OULU, FINLAND 14:40-15:00 The Affordability Of Cybersecurity Costs In Developing Countries: A Systematic Review Chinazunwa Uwaoma, CGU, Ayush Enkhtaivan, CGU 15:00-15:20 The Effect Of Privacy Concerns, Interaction, Trust, Age, And Gender On Self-disclosure Behaviours On Social Networking Sites Alexis Coca , School of Computing University of Portsmouth Portsmouth, UK, Fudong Li, Bournemouth University, Stavros Shiaeles, University of Portsmouth, Dehao Wu, Bournemouth University, Fan Liu, Cyber Security Division, Morgan Stanley Asia 15:20-15:40 Strengthening The Digital Ecosystem: Effects Of The Cyber Resilience Act (cra) On Open-source Software Matija Kikelj, University North, Ivan Sabic, University NorthTRACK2 14:40-15:40 HACS 1Chair: Nicolas Sklavos University of Patras (GR) More London Suite 14:40-15:00 Static Power Consumption As A New Side-channel Analysis Threat To Elliptic Curve Cryptography Implementations Ievgen Kabin, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Zoya Dyka, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Alkistis-Aikaterini Sigourou, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Peter Langendoerfer, IHP GmbH - Leibniz Institute for High Performance Microelectronics 15:00-15:20 Communication Architecture Under Siege: An In-depth Analysis Of Fault Attack Vulnerabilities And Countermeasures Hongwei Zhao, Univ. Bretagne Sud, UMR 6285, Lab-STICC, Lorient, France, Vianney Lapotre, Univ. Bretagne Sud, UMR 6285, Lab-STICC, Lorient, France, Guy Gogniat, Univ. Bretagne Sud, UMR 6285, Lab-STICC, Lorient, France 15:20-15:40 On-line Anomaly Detection And Qualification Of Random Bit Streams Cesare Caratozzolo, Valeria Rossi, Kamil Witek, AGH University of Krakow, Alberto Trombetta, uninsubria, Massimo Caccia, uninsubria 15:40-16:00 Coffee BreakChair: IEEE CSR Chairs Tower Foyer TRACK1 16:00-17:20 CSR 23Chair: Adrian Ramsingh Sia Fusion Ltd Tower Suite A 16:00-16:20 Static Detection Of Missing Validations In Solidity Smart Contracts Sundas Munir, Halmstad University, Walid Taha, Halmstad University, Mirza Sanam Iqbal Baig, Eagle Games Sweden AB 16:20-16:40 Designing Trustworthy Decentralized Cross-chain Marketplaces: A 6g Network Of Networks Perspective Lalita Jagadeesan, Nokia Bell Labs, Shushu Liu, Nokia Bell Labs, Lizette Velazquez, Nokia Cloud and Network Services 16:40-17:00 Strengthening Cybersecurity Certifications Through Robust Chain Of Custody Practices Jasmin Cosic, DEKRA SE, Admir Jukan, AEGIS Research, Miroslav Baca, University of North 17:00-17:20 Seaguard: A Blockchain-based Security Framework For Iot Maritime Transportation Systems Panagiotis Leonis, University of the Peloponnese, Konstantinos Ntouros, University of the Peloponnese, Antonio I. Mazilu, University of the Peloponnese, Sotirios Brotsis, University of the Peloponnese, Nicholas Kolokotronis, University of the PeloponneseTRACK1 16:00-17:20 CSR 24Chair: Viet Anh Phan Brno University of Technology Tower Suite C 16:00-16:20 Investigating Cyber Risks In A Surgical Process For Healthcare Cyber Resilience Mahdad Pourmadadkar, Marianna Lezzi, Ali Aghazedeh Ardebili 16:20-16:40 Renyi Differential Privacy Analysis Of Skellam Under Federated Learning In Internet Of Health Things Mohamed Amjath, Atlantic Technological University, Shagufta Henna, Atlantic Technological University 16:40-17:00 Cybersecurity For Safety: Risk Assessment Of Autonomous Cyber-physical Systems Stefano Perone, Luca Faramondi, Simone Guarino, Roberto Setola, Martina Nobili, Francesco Flammini, Franca Corradini 17:00-17:20 Software Security Testing Lifecycle For Automotive Products Anupriya Pandey, Kamal Singh, Bharg Cybersecurity Private LimitedTRACK2 16:00-17:20 HACS 2Chair: Nicolas Sklavos University of Patras (GR) More London Suite 16:00-16:20 Stealth Attacks On Pcbs: An Experimental Plausibility Analysis Ievgen Kabin, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Jan Schaeffner, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Alkistis Sigourou, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Dmytro Petryk, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Zoya Dyka, IHP GmbH - Leibniz Institute for High Performance Microelectronics, Dominik Klein, Bundesamt fur Sicherheit in der Informationstechnik, Sven Freud, Bundesamt fur Sicherheit in der Informationstechnik, Peter Langendoerfer, IHP GmbH - Leibniz Institute for High Performance Microelectronics 16:20-16:40 Fpga-based Cloud Security For 5g Networks Marios Papadopoulos, University of the Peloponnese, Kostas Lampropoulos, University of Patras, Paris Kitsos, University of Patras - University of the Peloponnese 16:40-17:00 Minimizing Area Footprint Of Uav Communication Security Using Fpgas Evangelia Konstantopoulou, u-blox Athens S.A. & University of Patras, George Athanasiou, u-blox Athens S.A., Nicolas Sklavos, University of Patras