Accepted Papers

ARES 2020 Full Research Papers (in no specific order):

A taxonomy for anomaly detection in wireless sensor networks focused on node-level techniques
Dominik Widhalm, Karl M. Goeschka (University of Applied Sciences Technikum Wien; Vienna, Austria) and Wolfgang Kastner (Automation Systems Group, Vienna University of Technology; Vienna, Austria)

Watch the video here: https://vimeo.com/443282642

Disposable Botnets: Examining the Anatomy of IoT Botnet Infrastructure
Rui Tanabe, Tatsuya Tamai (Yokohama National University, Japan), Akira Fujita, Ryoichi Isawa (National Institute of Information and Communications technology, Japan), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National University, Japan), Carlos Ganan and Michel Van Eeten (Delft University of Technology, Netherlands)

Watch the video here: https://vimeo.com/444491210

Analyzing the Real-World Applicability of DGA Classifiers
Arthur Drichel, Ulrike Meyer (RWTH Aachen University, Germany), Samuel Schüppen and Dominik Teubert (Siemens CERT, Germany)

Watch the video here: https://vimeo.com/443368684

Testing the Effectiveness of Tailored Phishing Techniques in Industry and Academia: a Field Experiment
Pavlo Burda, Tzouliano Chotza, Luca Allodi and Nicola Zannone (Eindhoven University of Technology, Netherlands)

Watch the video here: https://vimeo.com/443282649

Confiance: detecting vulnerabilities in Java Card applets
Léopold Ouairy (INRIA, France), Hélène Le Bouder (IMT-Atlantique, France) and Jean-Louis Lanet (INRIA, France)

Machine Learning for Tree Structures and Its Application to Detect Fake Sites
Taichi Ishikawa (Carnegie Mellon University, United States), Kilho Shin (Gakushuin University, Japan), Liu Yu-Lu (Rakuten, Inc., Japan) and David Shepard (Evidation Health, United States)

STALK: Security Analysis of Smartwatches for Kids
Christoph Saatjohann, Fabian Ising, Luise Krings and Sebastian Schinzel (Münster University of Applied Sciences, Germany)

Watch the video here: https://vimeo.com/443286364

Fighting N-Day Vulnerabilities with Automated CVSS Vector Prediction at Disclosure
Clément Elbaz (Univ Rennes, Inria, CNRS, IRISA, France), Louis Rilling (DGA, France) Christine Morin (Inria, France)

Watch the video here: https://vimeo.com/443286377

Integrating Digital Twin Security Simulations in the Security Operations Center
Marietheres Dietz, Manfred Vielberth and Günther Pernul (Department of Information Systems, University of Regensburg, Germany)

Distinguishability of Adversarial Examples
Yi Qin, Ryan Hunt and Chuan Yue (Colorado School of Mines, Golden, CO, USA)

A Case Study on the Representativeness of Public DoS Network Traffic Data for Cybersecurity Research
Marta Catillo (Università degli Studi del Sannio, Italy), Antonio Pecchia (Università degli Studi del Sannio, Italy), Massimiliano Rak (Università degli Studi della Campania Luigi Vanvitelli, Italy) and Umberto Villano (Università degli Studi del Sannio, Italy)

Watch the video here: https://vimeo.com/444156715

Cryptocurrency Networking: Context, State-of-the-Art, Challenges
Maya Dotan (The Hebrew University of Jerusalem, Israel), Yvonne-Anne Pignolet (DFINITY, Switzerland), Saar Tochner (The Hebrew University of Jerusalem, Israel), Stefan Schmid (Faculty of Computer Science, University of Vienna, Austria) and Aviv Zohar (The Hebrew University of Jerusalem, Israel)

Watch the video here https://vimeo.com/447411840

MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference
Fabian Boemer (Intel AI, USA), Rosario Cammarota (Intel Labs, USA), Daniel Demmler (University of Hamburg, Germany), Thomas Schneider and Hossein Yalame (TU Darmstadt, Germany)

Watch the video here: https://vimeo.com/444156718

Concurrent Error Detection Revisited – Hardware Protection against Fault and Side-Channel Attacks
Jan Richter-Brockmann, Pascal Sasdrich, Florian Bache and Tim Güneysu (Ruhr-Universität Bochum, Horst-Görtz Institute for IT-Security, DFKI, Germany)

Watch the video here: https://vimeo.com/443286605

Formalising Fault Injection and Countermeasures
Thomas Given-Wilson and Axel Legay (Universite Catholique de Louvain, Belgium)

SCF-MSP: Static Detection of Side Channels in MSP430 Programs
Sepideh Pouyanrad, Jan Tobias Muehlberg and Wouter Joosen (imec-DistriNet, KU Leuven, Belgium)
Quantifying Autonomous System IP Churn using Attack Traffic of Botnets
Harm Griffioen and Christian Doerr (Hasso Plattner Institute, Germany)

Watch the video here: https://vimeo.com/444158680

A Real World Study on Employees’ Susceptibility to Phishing Attacks
Marco De Bona and Federica Paci (University of Verona, Italy)

Watch the video here: https://vimeo.com/443286637

Jit Fault Detection: Increasing Availability in 1oo2 Systems Just-In-Time
Leo Botler (Graz University of Technology, Austria), Konrad Diwold (Graz University of Technology and Pro2Future, Austria), Nermin Kajtazovic (Siemens Austria, Austria), and Kay Römer (Graz University of Technology, Austria)

Watch the video here: https://vimeo.com/444491178

How do App Vendors Respond to Subject Access Requests? A Longitudinal Privacy Study on iOS and Android Apps
Jacob Leon Kröger (Technical University of Berlin, Germany / Weizenbaum Institute, Berlin, Germany), Jens Lindemann and Dominik Herrmann (University of Bamberg, Germany)

Watch the video here: https://vimeo.com/444158701

Subverting Linux’ Integrity Measurement Architecture
Felix Bohling (Uni Hamburg, Germany), Tobias Mueller (Uni Hamburg, Germany), Michael Eckel (Fraunhofer SIT, Germany )and Jens Lindemann (Uni Hamburg, Germany)

Watch the video here: https://vimeo.com/447413640

Vector Packet Encapsulation: The Case for a Scalable IPsec Encryption Protocol
Michael Pfeiffer), Michael Rossberg, Franz Girlich and Guenter Schaefer (Technische Universität Ilmenau, Germany)

Watch the video here: https://vimeo.com/444161745

SoK: Engineering privacy-aware high-tech systems
Giovanni Maria Riva (ABOUTYOU GmbH, Germany), Alexandr Vasenev (ESI-TNO, The Netherlands), Nicola Zannone (Eindhoven University of Technology, The Netherlands)

Watch the video here: https://vimeo.com/444161755

SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security
Martin Husák, Tomáš Jirsík (Masaryk University, Czech Republic) and Shanchieh Jay Yang (Rochester Institute of Technology, USA)

Watch the video here: https://vimeo.com/444165136

AVRS: Emulating AVR Microcontrollers for Reverse Engineering and Security Testing
Michael Pucher, Christian Kudera and Georg Merzdovnik (SBA Research, Austria)

Watch the video here: https://vimeo.com/444165163

Attacker-Centric Thinking in Security — Perspectives from Financial Services Practitioners
Caroline Moeckel (Royal Holloway, University of London, United Kingdom)

Enhanced Performance for the encrypted Web through TLS Resumption across Hostnames
Erik Sy , Moritz Mönnich, Tobias Mueller (University of Hamburg, Germany), Hannes Federrath (Uni Hamburg, Germany), and Mathias Fischer (Uni Hamburg, Germany)

Watch the video here: https://vimeo.com/444165186

ARES 2020 Short Research papers (in no specific order):

Towards using differentially private synthetic data for Machine Learning in collaborative data science projects
Michael Holmes and George Theodorakopoulos (Cardiff University, United Kingdom)

Watch the video here: https://vimeo.com/444488586

Security Assurance Cases for Road Vehicles: an Industry Perspective
Mazen Mohamad (University of Gothenburg, Sweden), Alexander Åström (Volvo Cars, Sweden), Örjan Askerdal (AB Volvo, Sweden), Jörgen Borg (Volvo Cars, Sweden) and Riccardo Scandariato (University of Gothenburg, Sweden)

Watch the video here: https://vimeo.com/444156710

IoT Dataset Generation Framework for Evaluating Anomaly Detection Mechanisms
Andreas Meyer-Berg, Rolf Egert, Leon Böck and Max Mühlhäuser (TU Darmstadt, Germany)

Watch the video here: https://vimeo.com/443286352

Feasibility Study of a Camera-based PUF in a Realistic Scenar
Kazuihde Fukushima (KDDI Research, Inc., Japan), Thomas Perianin (Secure-IC, Japan), Victor Dyseryn (Secure-IC, France), Shinsaku Kiyomoto (KDDI Research, Inc. Japan), Sylvain Guilley (Secure-IC, France) and Adrien Facon (Département d’informatique/École normale supérieure/CNRS/PSL Research University, France)

Template-based Android Inter Process Communication Fuzzing
Anatoli Kalysch, Mark Deutel and Tilo Müller (Friedrich-Alexander University Erlangen-Nürnberg, Germany)

Watch the video here: https://vimeo.com/443286649

HIP: HSM-based Identities for Plug-and-Charge
Andreas Fuchs , Dustin Kern, Christoph Krauß and Maria Zhdanova (Fraunhofer SIT, Germany)

Watch the video here: https://vimeo.com/444491200

SoK: Why Johnny Can’t Fix PGP Standardization
Harry Halpin (Inria, France)

Watch the video here: https://vimeo.com/448480206