Below you can find the program of ARES / CD-MAKE 2020.
Your registration includes the virtual entrance to all ARES / CD-MAKE conference, ARES EU Workshop Symposium as well as workshop sessions! The respective Zoom room links will be included in the program short before the conference starts.
Tuesday 25.08.2020
Time (UTC +2) |
Zoom Room A
|
Zoom Room B
|
Zoom Room C
|
Zoom Room D
|
---|---|---|---|---|
09:00 - 10:30 |
NG - SOC I
Session Chair:
Ewa Piatkowska (AIT, Austria)
Zoom Room D
The SOCCRATES Project: Overview and Objectives
The SAPPAN Project: Overview and Objectives
Keynote: Semi-Automated Cyber Threat Intelligence (ACT)
|
|||
10:30 - 11:00 |
Coffe Break
|
|||
11:00 - 12:45 |
ARES Opening & Keynote
Session Chair:
Melanie Volkamer (KASTEL, Karlsruhe Institute of Technology, Germany)
Zoom Room A
ARES Opening
Keynote: Children need Cyber Security Education too
|
NG - SOC II
Session Chair:
Avikarsha Mandal (Fraunhofer FIT, Germany)
Zoom Room D
Monitoring Malicious Infrastructures to Produce Threat Intelligence
Pipeline development for Automatically Generated Domain detection
Leveraging Machine Learning for DGA Detection
Knowledge Management and Anonymization Techniques in Cyber-Threat Intelligence
Reputation Management Techniques for IP addresses, domains, and mail
|
||
12:45 - 13:45 |
Lunch Break
|
|||
13:45 - 15:15 |
WSDF I
Session Chair:
Andrew Marrington (Zayed University, UAE)
Zoom Room A
Keynote: Internet of Things (IoT)
Forensics: Challenges and Opportunities
TAVeer - An Interpretable Topic-Agnostic Authorship Verification Method
|
EPESEC I
Session Chair:
Theodoros Rokkas, inCITES Consulting, Luxembourg
Zoom Room B
Cyber-Risk Identification for a Digital Substation
Data Visualisation in Internet of Things: Tools, Methodologies, and Challenges
Threat Landscape for Smart Grid Systems
Building a testing environment for SDN networks analysis for electrical grid applications
|
IWCC I
Session Chair:
Artur Janicki (Warsaw University of Technology, Poland)
Zoom Room C
Keynote: Track me if you can: Abusing the DNS infrastructure to prevent (botnet) takedowns
|
NG - SOC III
Session Chair:
Tomas Jirsik (Masaryk University, Czechia)
Zoom Room D
Host and Application Behaviour Modelling
L-ADS: Live Anomaly Detection System
Adversarial Examples against Intrusion Detection Systems
Fast and Scalable Cybersecurity Data Processing
|
15:15 - 15:30 |
short Coffee Break
|
|||
15:30 - 17:00 |
WSDF II
Session Chair:
Virginia Franqueira (University of Kent, UK)
Zoom Room A
Post-mortem digital forensic artifacts of TikTok Android App
DFS3: Automated Distributed File System Storage State Reconstruction
4P Based Forensics Investigation Framework for Smart Connected Toys
SysGen: System State Corpus Generator
|
EPESEC II
Session Chair:
Theodoros Rokkas, inCITES Consulting, Luxembourg
Zoom Room B
Advanced Metering Infrastructures: Security Risks and Mitigations
On the Importance of cyber-security training for multi-vector energy distribution system operators
DIDEROT: An Intrusion Detection and Prevention System for DNP3-based SCADA Systems
Factors affecting the market adoption of cyber-security products in Energy and Electrical systems: The case of SPEAR
|
IWCC II
Session Chair:
Artur Janicki (Warsaw University of Technology, Poland)
Zoom Room C
Cyberspace threats: not only hackers and criminals.
Privacy-Enhanced Robust Image Hashing with Bloom Filters
Locality Sensitive Hashing for Tampering Detection in Automotive Systems
A privacy-aware digital forensics investigation in enterprises
|
NG - SOC IV
Session Chair:
Irina Chiscop (TNO, the Netherlands)
Zoom Room D
15:30-16:50
Attack Analysis with Attack Defence Graphs
Attack Graph-based Courses of Action for Defense
Visual Analytics for Cyber Security Data
An anomaly detection approach to analysis of security monitoring data from endpoints.
Dmitry Komashinskiy, David Karpuk, Samuel Marshal, Alexey Kirichenko (Fsecure, Finland) |
17:00 - 17:15 |
short Coffee Break
|
|||
17:15 - 18:45 |
ARES Full I
Human Factors in Security
Session Chair:
Alexandra Mai (SBA Research)
Zoom Room A
Attacker-Centric Thinking in Security — Perspectives from Financial Services Practitioners
SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security
Testing the Effectiveness of Tailored Phishing Techniques in Industry and Academia: a Field Experiment
A Real World Study on Employees' Susceptibility to Phishing Attacks
|
IWSMR
Session Chair:
Steffen Wendzel, Worms University of Applied Sciences, Germany
Zoom Room B
Keynote: Structural equation modeling in cybersecurity research
Generalizing the Phishing Principle - Analyzing User Behavior in Response to Controlled Stimuli for IT Security Awareness Assessment
An Overview of Limitations and Approaches in Identity Management
Framework for Automated Evaluation of Security Metrics
|
IWCC III
Session Chair:
Krzysztof Szczypiorski (Warsaw University of Technology, Poland)
Zoom Room C
Ransomware 2.0: To sell, or not to sell. A Game-theoretical Model of Data-selling Ransomware
Real-Time Stream Processing Tool for Detecting Suspicious Network Patterns Using Machine Learning
Detection and classification of Slow DoS Attacks targeting network servers
A comparison of stream mining algorithms on botnet detection
|
NG - SOC V - Panel Session
Session Chair:
Tomas Jirsik (Masaryk University, Czechia)
Zoom Room D
17:05-17:45
Panel: Discussion on Future Challenges for SOC
Speakers:
|
Wednesday 26.08.2020
Time (UTC +2) |
Zoom Room A
|
Zoom Room B
|
Zoom Room C
|
Zoom Room D
|
Zoom Room E
|
---|---|---|---|---|---|
10:30 - 18:30 |
Organizers available
|
||||
11:00 - 12:30 |
ARES Full II
Networks and Botnets
Session Chair:
Elias Bou-Harb (University of Texas at San Antonio, USA)
Zoom Room A
Cryptocurrency Networking: Context, State-of-the-Art, Challenges
|
CD-MAKE I
Session Chair:
Andreas Holzinger (Human-Centered AI Lab (Holzinger Group), Medical University Graz, Austria)
Zoom Room B
Explainable Artificial Intelligence: concepts, applications, research challenges and visions
|
CUING I
Session Chair:
Wojciech Mazurczyk (Warsaw University of Technology, Poland)
Zoom Room C
Invited Talk:
Intelligent Methods to Detect Current Cyber Threats,
Michał Choras (FernUniversitaet in Hagen, Germany)
|
CSA I
Session Chair:
Salvador Llopis Sanchez, Universidad Politecnica de Valencia, Spain
Zoom Room D
Keynote: Strengthening Cyber Security in Europe – ECHO project approach Wim Mees, Royal Military Academy, Belgium & Nikolai Stoianov, Deputy Director of the Bulgarian Defence Institute SoK: Linking Information Security Metrics to Management Success Factors
Rainer Diesch (fortiss GmbH, Germany) and Helmut Krcmar (Technical University of Munich, Germany)
Roumen Daton Medenou (Universidad Internacional de La Rioja (UNIR), INDRA, Spain), Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo Castrillo, Francisco José González Garrido(INDRA, Spain), Alvaro Morais Fernandez (Universidad Politecnica de Madrid (UPM), INDRA, Spain), David Nevado Catalán (Universidad Carlos III de Madrid (UC3M), INDRA, Spain), Ao Hu (INDRA, Spain), David Sandoval Rodríguez-Bermejo (Universidad Carlos III de Madrid (UC3M), INDRA, Spain), Jorge Maestre Vidal, Gerardo Ramis Pasqual De Riquelme INDRA, Spain), Antonio Berardi, Paolo De Santis, Francesco Torelli (Leonardo-Finmeccanica, Italy) and Salvador Llopis Sanchez (European Defence Agency (EDA), Belgium)Wim Mees, Royal Military Academy, Belgium & Nikolai Stoianov, Deputy Director of the Bulgarian Defence Institute
|
|
12:30 - 13:00 |
short Lunch Break
|
||||
13:00 - 14:30 |
ARES Keynote
Session Chair:
Edgar Weippl, SBA Research, Austria
Zoom Room A
Keynote: Security, the Elusive Goal of Privacy, and the Surprising Difficulties around Corona Tracing Thorsten Strufe, Karlsruhe Institute of Technology, Germany |
||||
14:30 - 15:00 |
Coffe Break
|
||||
15:00 - 16:30 |
ARES Full III
Best Paper Session
Session Chair:
Christian Wressnegger (Karlsruhe Institute of Technologie (KIT), Germany)
Zoom Room A
Jit Fault Detection: Increasing Availability in 1oo2 Systems Just-In-Time
|
CD-MAKE II
Session Chair:
Andreas Holzinger (Human-Centered AI Lab (Holzinger Group), Medical University Graz, Austria)
Zoom Room B
Explainable Reinforcement Learning: A Survey
|
CUING II
Session Chair:
Angelo Consoli (Scuola universitaria professionale della Svizzera italiana (SUPSI), Switzerland)
Zoom Room C
Covert Storage Caches using the NTP Protocol
|
CSA II
Session Chair:
Salvador Llopis Sanchez, Universidad Politecnica de Valencia, Spain
Zoom Room D
Dynamic Risk Management Architecture Based on Heterogeneous Data Sources for Enhancing the Cyber Situational Awareness in Organizations
|
WSDF III
Session Chair:
Andrew Marrington (Zayed University, UAE)
Zoom Room E
SoK: Exploring the State of the Art and the Future Potential of Artificial Intelligence in Digital Forensic Investigation
|
16:30 - 17:00 |
Coffee Break
|
||||
17:00 - 18:30 |
ARES Full IV
Machine Learning for Security
Session Chair:
Fabio Pierazzi (King's College London, UK)
Zoom Room A
Distinguishability of Adversarial Examples
|
CD MAKE III
Session Chair:
Shujun Li, University of Kent, Canterbury, UK
Zoom Room B
eXDiL: A Tool for Classifying and eXplaining Hospital Discharge Letters
|
CUING III
Session Chair:
Jart Armin, CUING Foundation
Zoom Room C
Non-Blind Steganalysis
|
CSA III
Panel Discussion
Zoom Room D
Discussion Board
Closing |
IoT-SECFOR
Session Chair:
Virginia Franqueira (University of Kent, UK)
Zoom Room E
Taxonomy and Challenges in Machine Learning-based Approaches to Detect Attacks in the Internet of Things
|
19:00 - 21:00 |
Social Event
Details will be announced soon |
Thursday 27.08.2020
Time (UTC +2) |
Zoom Room A
|
Zoom Room B
|
Zoom Room C
|
Zoom Room D
|
---|---|---|---|---|
10:30 - 18:30 |
Organizers available
|
|||
11:00 - 12:30 |
ARES Full V
Networks and Systems
Session Chair:
Daniel Arp (TU Braunschweig, Germany)
Zoom Room A
Enhanced Performance for the encrypted Web through TLS Resumption across Hostnames
A taxonomy for anomaly detection in wireless sensor networks focused on node-level techniques
|
CD MAKE IV
Session Chair:
Francesco Buccafurri (Mediterranean University of Reggio Calabria)
Zoom Room B
11:30
Interpretation of SVM using Data Mining Technique to Extract Syllogistic Rules
|
CUING IV
Session Chair:
Peter Kieseberg (St. Pölten University of Applied Sciences, Austria)
Zoom Room D
To Tweet or Not to Tweet: Covertly Manipulating a Twitter Debate on Vaccines Using Malware-Induced Misperceptions
|
|
12:30 - 13:15 |
Lunch Break
|
|||
13:15 - 14:45 |
CD-MAKE Keynote
Session Chair:
Andreas Holzinger (Human-Centered AI Lab (Holzinger Group), Medical University Graz, Austria)
Zoom Room A
Keynote: The “sound” of ML implementation. A round trip in the “last mile” and its challenges
|
|||
14:45 - 15:15 |
short Coffe Break
|
|||
15:15 - 16:45 |
ARES Full VI
Side-Channels and Embedded Systems
Session Chair:
Emilio Coppa (Sapienza University of Rome, Italy)
Zoom Room A
Concurrent Error Detection Revisited - Hardware Protection against Fault and Side-Channel Attacks
|
CD MAKE V
Session Chair:
Federico Cabitza (Università degli Studi di Milano-Bicocca)
Zoom Room B
Subverting Network Intrusion Detection: Crafting Adversarial Examples Accounting for Domain-Specific Constraints
|
SSE I
Secure Software Development
Session Chair:
Juha Röning (University of Oulu, Finland)
Zoom Room C
Invited Talk: Reviewing the DevSecOps community surveys: What we learned in the last 6 years on how to be a DevSecOps Elite
|
5G-NS I
Keynote
Session Chair:
Wojciech Mazurczyk (Warsaw University of Technology, Poland)
Zoom Room D
Keynote: Is 5G secure? Facts, myths, challenges and approaches to security
|
16:45 - 17:00 |
short Coffe Break
|
|||
17:00 - 18:30 |
ARES Full VII
Vulnerabilities and Attacks
Session Chair:
Sebastian Schinzel (University of Applied Sciences Münster, Germany)
Zoom Room A
Confiance: detecting vulnerabilities in Java Card applets
|
CD MAKE VI
Session Chair:
Peter Kieseberg (St. Pölten University of Applied Sciences, Austria)
Zoom Room B
Improving short text classification through global augmentation methods
|
SSE II
Managing Security on Applications
Session Chair:
Juha Röning (University of Oulu, Finland)
Zoom Room C
AntiPatterns Regarding the Application of Cryptographic Primitives by the Example of Ransomware
Towards Detection of Software Supply Chain Attacks by Forensic Artifacts
|
5G-NS II
Session Chair:
Krzysztof Cabaj (Warsaw University of Technology, Poland)
Zoom Room D
INSPIRE-5Gplus : Intelligent Security and Pervasive Trust for 5G and Beyond Networks
|
Friday 28.08.2020
Time (UTC +2) |
Zoom Room A
|
Zoom Room B
|
Zoom Room C
|
Zoom Room D
|
---|---|---|---|---|
11:00 - 18:00 |
Organizers available
|
|||
11:30 - 13:30 |
ARES Short
Session Chair:
Oksana Kulyk (IT University of Copenhagen, Denmark)
Zoom Room A
Towards using differentially private synthetic data for Machine Learning in collaborative data science projects
|
CD MAKE VII
Session Chair:
Grégoire Montavon (TU Berlin)
Zoom Room B
Applying AI in Practice: Key Challenges and Lessons Learned
|
CyberTIM
Session Chair:
Sheikh Mahbub Habib, Continental AG, Germany
Zoom Room C
Keynote: Machine learning for intelligent sensors
|
FARES
Session Chair:
Roberto Nardone, University of Reggio Calabria, Italy
Zoom Room D
Investigation into the Security and Privacy of iOS VPN Applications
Adversarial Machine Learning for Spam Filters
|
13:30 - 14:30 |
Lunch Break
|
|||
14:30 - 15:30 |
Closing Keynote: CD-MAKE
Session Chair:
Andreas Holzinger (Human-Centered AI Lab (Holzinger Group), Medical University Graz, Austria)
Zoom Room A
Keynote:
Explaining the Decisions of Deep Neural Networks and Beyond
|
|||
15:30 - 16:00 |
Coffe Break
|
|||
16:00 - 18:00 |
LPW
Zoom Room A
16:00-17:30
Keynote: An Overview of Research Directions for Protecting Privacy of Location Data
|
WISI
Session Chair:
Stefan Jaksic, AIT Austrian Institute of Technology, Austria
Zoom Room B
16:00-17:30
A Semi-Supervised Approach for Network Intrusion Detection
|
IWSMA
Session Chair:
Peter Kieseberg (St. Pölten University of Applied Sciences, Austria)
Zoom Room C
16:00 - 18:00
VisualDroid: Automatic Triage and Detection of Android Repackaged Applications
|
iPAT
Session Chair:
Aidmar Wainakh, TU Darmstadt, Germany
Zoom Room D
16:00-18:00
A Silver Bullet? A Comparison of Accountants and Developers Mental Models in the Raise of Blockchain
Ass. Prof. Ben Wagner (Vienna University of Economics and Business) Ass. Prof. Stephen Marsh (Ontario Techn University) Dr. Stefan Schiffner (University of Luxembourg) |