


default search action
15th ARES 2020: Virtual Event, Ireland
- Melanie Volkamer, Christian Wressnegger:

ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020. ACM 2020, ISBN 978-1-4503-8833-7
ARES 2020 program: Human factors in security
- Caroline Moeckel:

Attacker-centric thinking in security: perspectives from financial services practitioners. 1:1-1:10 - Martin Husák

, Tomás Jirsík, Shanchieh Jay Yang:
SoK: contemporary issues and challenges to enable cyber situational awareness for network security. 2:1-2:10 - Pavlo Burda

, Tzouliano Chotza, Luca Allodi, Nicola Zannone
:
Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment. 3:1-3:10 - Marco De Bona, Federica Paci:

A real world study on employees' susceptibility to phishing attacks. 4:1-4:10
ARES 2020 program: Networks and botnets
- Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid

, Saar Tochner, Aviv Zohar:
SOK: cryptocurrency networking context, state-of-the-art, challenges. 5:1-5:13 - Marta Catillo, Antonio Pecchia, Massimiliano Rak, Umberto Villano:

A case study on the representativeness of public DoS network traffic data for cybersecurity research. 6:1-6:10 - Rui Tanabe

, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, Katsunari Yoshioka, Tsutomu Matsumoto, Carlos Gañán, Michel van Eeten
:
Disposable botnets: examining the anatomy of IoT botnet infrastructure. 7:1-7:10 - Harm Griffioen, Christian Doerr:

Quantifying autonomous system IP churn using attack traffic of botnets. 8:1-8:10
ARES 2020 program: Best paper session
- Leo Botler, Nermin Kajtazovic, Konrad Diwold, Kay Römer

:
Jit fault detection: increasing availability in 1oo2 systems just-in-time. 9:1-9:10 - Jacob Leon Kröger

, Jens Lindemann
, Dominik Herrmann:
How do app vendors respond to subject access requests?: a longitudinal privacy study on iOS and Android Apps. 10:1-10:10 - Michael Pfeiffer, Franz Girlich, Michael Rossberg, Guenter Schaefer:

Vector packet encapsulation: the case for a scalable IPsec encryption protocol. 11:1-11:10
ARES 2020 program: Machine learning for security
- Yi Qin, Ryan Hunt, Chuan Yue:

Distinguishability of adversarial examples. 12:1-12:10 - Taichi Ishikawa, Yu-Lu Liu, David Lawrence Shepard, Kilho Shin:

Machine learning for tree structures in fake site detection. 13:1-13:10 - Fabian Boemer, Rosario Cammarota, Daniel Demmler

, Thomas Schneider
, Hossein Yalame:
MP2ML: a mixed-protocol machine learning framework for private inference. 14:1-14:10 - Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert:

Analyzing the real-world applicability of DGA classifiers. 15:1-15:11
ARES 2020 program: Networks and systems
- Erik Sy, Moritz Moennich, Tobias Mueller, Hannes Federrath, Mathias Fischer:

Enhanced performance for the encrypted web through TLS resumption across hostnames. 16:1-16:10 - Dominik Widhalm

, Karl M. Göschka
, Wolfgang Kastner:
SoK: a taxonomy for anomaly detection in wireless sensor networks focused on node-level techniques. 17:1-17:10 - Marietheres Dietz

, Manfred Vielberth
, Günther Pernul:
Integrating digital twin security simulations in the security operations center. 18:1-18:9 - Giovanni Maria Riva, Alexandr Vasenev, Nicola Zannone

:
SoK: engineering privacy-aware high-tech systems. 19:1-19:10
ARES 2020 program: Side-channels and embedded systems
- Jan Richter-Brockmann

, Pascal Sasdrich
, Florian Bache, Tim Güneysu
:
Concurrent error detection revisited: hardware protection against fault and side-channel attacks. 20:1-20:11 - Sepideh Pouyanrad, Jan Tobias Mühlberg

, Wouter Joosen:
SCFMSP: static detection of side channels in MSP430 programs. 21:1-21:10 - Thomas Given-Wilson, Axel Legay:

Formalising fault injection and countermeasures. 22:1-22:11 - Michael Pucher

, Christian Kudera, Georg Merzdovnik
:
AVRS: emulating AVR microcontrollers for reverse engineering and security testing. 23:1-23:10
ARES 2020 program: Vulnerabilities and attacks
- Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet:

Confiance: detecting vulnerabilities in Java Card applets. 24:1-24:10 - Christoph Saatjohann, Fabian Ising, Luise Krings, Sebastian Schinzel:

STALK: security analysis of smartwatches for kids. 25:1-25:10 - Clément Elbaz, Louis Rilling, Christine Morin:

Fighting N-day vulnerabilities with automated CVSS vector prediction at disclosure. 26:1-26:10 - Felix Bohling, Tobias Mueller, Michael Eckel

, Jens Lindemann
:
Subverting Linux' integrity measurement architecture. 27:1-27:10
ARES 2020 program: Short papers
- Michael Holmes, George Theodorakopoulos:

Towards using differentially private synthetic data for machine learning in collaborative data science projects. 28:1-28:6 - Mazen Mohamad

, Alexander Åström
, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato:
Security assurance cases for road vehicles: an industry perspective. 29:1-29:6 - Andreas Meyer-Berg, Rolf Egert, Leon Böck, Max Mühlhäuser:

IoT dataset generation framework for evaluating anomaly detection mechanisms. 30:1-30:6 - Kazuhide Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon:

Feasibility study of a camera-based PUF in a realistic scenario. 31:1-31:6 - Anatoli Kalysch, Mark Deutel, Tilo Müller:

Template-based Android inter process communication fuzzing. 32:1-32:6 - Andreas Fuchs, Dustin Kern

, Christoph Krauß
, Maria Zhdanova
:
HIP: HSM-based identities for plug-and-charge. 33:1-33:6 - Harry Halpin:

SoK: why Johnny can't fix PGP standardization. 34:1-34:6
FARES 2020 program: Security and privacy modelling
- Fanny Rivera-Ortiz, Liliana Pasquale:

Automated modelling of security incidents to represent logging requirements in software systems. 35:1-35:8 - Olga Villagrán-Velasco, Eduardo B. Fernández

, Jorge L. Ortega-Arjona:
Refining the evaluation of the degree of security of a system built using security patterns. 36:1-36:7 - Vincenzo Mangini, Irina Tal, Arghir-Nicolae Moldovan:

An empirical study on the impact of GDPR and right to be forgotten - organisations and users perspective. 37:1-37:9
FARES 2020 program: Attacks and countermeasures
- Bhargav Kuchipudi, Ravi Teja Nannapaneni, Qi Liao:

Adversarial machine learning for spam filters. 38:1-38:6 - Franck Jeveme Panta, André Péninou

, Florence Sèdes
:
Negative filtering of CCTV Content - forensic video analysis framework. 39:1-39:10 - Jack Wilson, David McLuskie

, Ethan Bayne
:
Investigation into the security and privacy of iOS VPN applications. 40:1-40:9
WSDF 2020 program
- Oren Halvani, Lukas Graner

, Roey Regev:
TAVeer: an interpretable topic-agnostic authorship verification method. 41:1-41:10 - Patrício Domingues

, Ruben Nogueira, José Carlos Francisco, Miguel Frade
:
Post-mortem digital forensic artifacts of TikTok Android App. 42:1-42:8 - Edward Harshany, Ryan Benton

, David Bourrie, Michael Black, William Bradley Glisson
:
DFS3: automated distributed file system storage state reconstruction. 43:1-43:10 - Benjamin Yankson, Farkhund Iqbal, Patrick C. K. Hung:

4P based forensics investigation framework for smart connected toys. 44:1-44:9 - Ben Lenard, James Wagner, Alexander Rasin, Jonathan Grier:

SysGen: system state corpus generator. 45:1-45:6 - Xiaoyu Du, Chris Hargreaves

, John Sheppard
, Felix Anda, Asanka P. Sayakkara
, Nhien-An Le-Khac
, Mark Scanlon:
SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation. 46:1-46:10 - Raphael Antonius Frick, Huajian Liu, Martin Steinebach:

Detecting double compression and splicing using benfords first digit law. 47:1-47:9 - Liza Ahmad, Salam Ismail Rasheed Khanji, Farkhund Iqbal, Faouzi Kamoun:

Blockchain-based chain of custody: towards real-time tamper-proof evidence management. 48:1-48:8 - Richard E. Overill:

Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations? 49:1-49:6
IWSMA 2020 program
- Rosangela Casolare, Carlo De Dominicis, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:

VisualDroid: automatic triage and detection of Android repackaged applications. 50:1-50:7 - Mauro Conti

, Giulio Rigoni
, Flavio Toffalini:
ASAINT: a spy App identification system based on network traffic. 51:1-51:8 - Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:

Towards the performance evaluation of a clustering and trust based security mechanism for VANET. 52:1-52:6 - Fabian Fleischer

, Marcel Busch
, Phillip Kuhrt:
Memory corruption attacks within Android TEEs: a case study based on OP-TEE. 53:1-53:9 - Lukas Jäger, Richard Petri

:
DICE harder: a hardware implementation of the device identifier composition engine. 54:1-54:8
IWCC 2020 program
- Aleksandra Pawlicka, Michal Choras, Marek Pawlicki

:
Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective. 55:1-55:11 - Uwe Breidenbach, Martin Steinebach, Huajian Liu:

Privacy-enhanced robust image hashing with bloom filters. 56:1-56:10 - Roland Bolboaca, Teri Lenard

, Béla Genge, Piroska Haller:
Locality sensitive hashing for tampering detection in automotive systems. 57:1-57:7 - Ludwig Englbrecht, Günther Pernul:

A privacy-aware digital forensics investigation in enterprises. 58:1-58:10 - Zhen Li, Qi Liao:

Ransomware 2.0: to sell, or not to sell a game-theoretical model of data-selling Ransomware. 59:1-59:9 - Mikolaj Komisarek, Michal Choras, Rafal Kozik

, Marek Pawlicki
:
Real-time stream processing tool for detecting suspicious network patterns using machine learning. 60:1-60:7 - Enrico Cambiaso, Maurizio Aiello, Maurizio Mongelli, Ivan Vaccari

:
Detection and classification of slow DoS attacks targeting network servers. 61:1-61:7 - Guilherme Henrique Ribeiro, Elaine Ribeiro de Faria Paiva

, Rodrigo Sanches Miani:
A comparison of stream mining algorithms on botnet detection. 62:1-62:10
SSE 2020 program: Secure software development
- Jose Andre Morales, Thomas P. Scanlon, Aaron Volkmann, Joseph Yankel, Hasan Yasar:

Security impacts of sub-optimal DevSecOps implementations in a highly regulated environment. 63:1-63:8
SSE 2020 program: Managing security on applications
- Michael P. Heinl

, Alexander Giehl, Lukas Graif:
AntiPatterns regarding the application of cryptographic primitives by the example of ransomware. 64:1-64:10 - Marc Ohm

, Arnold Sykosch, Michael Meier
:
Towards detection of software supply chain attacks by forensic artifacts. 65:1-65:6 - Caine Silva, Sylvain Guérin

, Raúl Mazo, Joël Champeau:
Contract-based design patterns: a design by contract approach to specify security patterns. 66:1-66:9
CUING 2020 program: Keynote session
- Tobias Schmidbauer, Steffen Wendzel

:
Covert storage caches using the NTP protocol. 67:1-67:10 - Przemyslaw Szary, Wojciech Mazurczyk

, Steffen Wendzel
, Luca Caviglione:
Design and performance evaluation of reversible network covert channels. 68:1-68:8 - Piotr Nowakowski

, Piotr Zórawski
, Krzysztof Cabaj
, Wojciech Mazurczyk
:
Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study. 69:1-69:10 - Daniel Vogel, Ulugbek Akhmedjanov, Marc Ohm

, Michael Meier
:
An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique. 70:1-70:10 - Niklas Bunzel, Martin Steinebach, Huajian Liu:

Non-blind steganalysis. 71:1-71:7 - Pawel Rajba

, Wojciech Mazurczyk
:
Exploiting minification for data hiding purposes. 72:1-72:9 - Damian Puchalski, Luca Caviglione, Rafal Kozik

, Adrian Marzecki, Slawomir Krawczyk, Michal Choras:
Stegomalware detection through structural analysis of media files. 73:1-73:6 - Amir Khaleghi Moghaddam, Nur Zincir-Heywood:

Exploring data leakage in encrypted payload using supervised machine learning. 74:1-74:10 - Andrea Tundis

, Gaurav Mukherjee, Max Mühlhäuser:
Mixed-code text analysis for the detection of online hidden propaganda. 76:1-76:7 - Florian Platzer

, Marcel Schäfer, Martin Steinebach:
Critical traffic analysis on the tor network. 77:1-77:10 - Sean Rivera, Vijay K. Gurbani, Sofiane Lagraa, Antonio Ken Iannillo

, Radu State:
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries. 78:1-78:10
IoT-SECFOR 2020 program
- Omair Faraj, David Megías

, Abdel-Mehsen Ahmad, Joaquín García-Alfaro
:
Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things. 79:1-79:10 - Niccolò Maltoni

, Antonio Magnani, Luca Calderoni
:
Privacy threats in low-cost people counting devices. 80:1-80:7 - Robert P. Markiewicz, Daniele Sgandurra:

Clust-IT: clustering-based intrusion detection in IoT environments. 81:1-81:9 - Calvin Brierley, Jamie Pont, Budi Arief

, David J. Barnes, Julio C. Hernandez-Castro:
PaperW8: an IoT bricking ransomware proof of concept. 82:1-82:10
iPAT 2020 program
- Rose Esmander, Pascal Lafourcade

, Marius Lombard-Platet, Claudia Negri-Ribalta
:
A silver bullet?: a comparison of accountants and developers mental models in the raise of blockchain. 83:1-83:10 - Angela Borchert

, Nicolás E. Díaz Ferreyra, Maritta Heisel:
Balancing trust and privacy in computer-mediated introduction: featuring risk as a determinant for trustworthiness requirements elicitation. 84:1-84:10
CyberTIM 2020 program
- Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert:

Making use of NXt to nothing: the effect of class imbalances on DGA detection classifiers. 85:1-85:9 - Andrea Calesso, Mauro Conti

, Martino Grasselli:
CyberWolf: assessing vulnerabilities of ICT-intensive financial markets. 86:1-86:7 - Dmitrii Vekshin

, Karel Hynek, Tomás Cejka
:
DoH Insight: detecting DNS over HTTPS by machine learning. 87:1-87:8
IWSMR 2020 program
- Arnold Sykosch, Christian Doll, Matthias Wübbeling, Michael Meier

:
Generalizing the phishing principle: analyzing user behavior in response to controlled stimuli for IT security awareness assessment. 88:1-88:10 - Matthew Zaber, Suku Nair:

A framework for automated evaluation of security metrics. 89:1-89:11 - Daniela Pöhn

, Wolfgang Hommel:
An overview of limitations and approaches in identity management. 90:1-90:10
LPW 2020 program
- Jana Medková

:
Anonymization of geosocial network data by the (k, l)-degree method with location entropy edge selection. 91:1-91:8 - Jack K. Fitzsimons, Atul Mantri, Robert Pisarczyk, Tom Rainforth

, Zhikuan Zhao:
A note on blind contact tracing at scale with applications to the COVID-19 pandemic. 92:1-92:6
WISI 2020 program
- Radoslava Svihrová

, Christian Lettner:
A semi-supervised approach for network intrusion detection. 93:1-93:6 - Gerald Palfinger

, Bernd Prünster
:
AndroPRINT: analysing the fingerprintability of the Android API. 94:1-94:10 - Georgios N. Selimis

, Rui Wang, Roel Maes
, Geert Jan Schrijen
, Mario Münzer, Stefan Ilic, Frans M. J. Willems, Lieneke Kusters:
RESCURE: a security solution for IoT life cycle. 95:1-95:10 - Fabio Martinelli, Oleksii Osliak, Paolo Mori, Andrea Saracino:

Improving security in industry 4.0 by extending OPC-UA with usage control. 96:1-96:10 - Hannes Sochor, Flavio Ferrarotti, Rudolf Ramler:

Automated security test generation for MQTT using attack patterns. 97:1-97:9
CSA 2020 program
- Rainer Diesch

, Helmut Krcmar:
SoK: linking information security metrics to management success factors. 98:1-98:10 - Dmytro V. Lande

, Andrei Snarskii, Oleh O. Dmytrenko, Igor Subach
:
Relaxation time in complex network. 99:1-99:6 - Xavier Larriva-Novo, Mario Vega-Barbas

, Víctor A. Villagrá, Diego Rivera, Mario Sanz Rodrigo, Manuel Alvarez-Campana:
Dynamic risk management architecture based on heterogeneous data sources for enhancing the cyber situational awareness in organizations. 100:1-100:9 - David Sandoval Rodríguez-Bermejo, Roumen Daton Medenou, Gerardo Ramis Pasqual De Riquelme, Jorge Maestre Vidal, Francesco Torelli, Salvador Llopis Sánchez:

Evaluation methodology for mission-centric cyber situational awareness capabilities. 101:1-101:9 - Roumen Daton Medenou, Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo Castrillo, Francisco José González Garrido, Álvaro Luis Martínez, David Nevado Catalán, Ao Hu, David Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Gerardo Ramis Pasqual De Riquelme, Antonio Berardi, Paolo De Santis, Francesco Torelli, Salvador Llopis Sánchez:

CYSAS-S3: a novel dataset for validating cyber situational awareness related tools for supporting military operations. 102:1-102:9 - Álvaro Luis Martínez, Víctor A. Villagrá González:

A novel automatic discovery system of critical assets in cyberspace-oriented military missions. 103:1-103:8 - Jorge Maestre Vidal, Marco Antonio Sotelo Monge:

Denial of sustainability on military tactical clouds. 104:1-104:9
5G-NS 2020 program
- Jordi Ortiz

, Ramon Sanchez-Iborra, Jorge Bernal Bernabé
, Antonio F. Skarmeta, Chafika Benzaid
, Tarik Taleb, Pol Alemany, Raul Muñoz
, Ricard Vilalta, Chrystel Gaber, Jean-Philippe Wary, Dhouha Ayed, Pascal Bisson, Maria Christopoulou
, George Xilouris
, Edgardo Montes de Oca, Gürkan Gür
, Gianni Santinelli, Vincent Lefebvre, Antonio Pastor, Diego R. López:
INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networks. 105:1-105:10 - Piotr Nowakowski

, Piotr Zórawski
, Krzysztof Cabaj
, Marcin Gregorczyk, Maciej Purski, Wojciech Mazurczyk
:
Distributed packet inspection for network security purposes in software-defined networking environments. 106:1-106:7 - Joo Yeon Cho, Andrew Sergeev:

Post-quantum MACsec key agreement for ethernet networks. 107:1-107:6 - Dayu Shi, Xun Zhang

, Andrei Vladimirescu, Lina Shi, Yanqi Huang, Yourong Liu:
A device identification method based on LED fingerprint for visible light communication system. 108:1-108:7
EPESec 2020 program
- Athar Khodabakhsh

, Sule Yildirim Yayilgan
, Mohamed Abomhara
, Maren Istad, Nargis Hurzuk:
Cyber-risk identification for a digital substation. 109:1-109:7 - Antonis Protopsaltis

, Panagiotis G. Sarigiannidis, Dimitrios Margounakis, Anastasios Lytos
:
Data visualization in internet of things: tools, methodologies, and challenges. 110:1-110:11 - Christos-Minas Mathas, Konstantinos-Panagiotis Grammatikakis

, Costas Vassilakis, Nicholas Kolokotronis
, Vasiliki-Georgia Bilali
, Dimitris Kavallieros
:
Threat landscape for smart grid systems. 111:1-111:7 - Toni Cantero-Gubert, Alba Colet-Subirachs

, Pol Paradell
, José Luis Domínguez-García:
Building a testing environment for SDN networks analysis for electrical grid applications. 112:1-112:6 - Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis

, Ioannis Koufos
, Nicholas Kolokotronis
, Stavros Shiaeles
:
Advanced metering infrastructures: security risks and mitigation. 113:1-113:8 - Dimitrios Vozikis

, Eleni Darra, Tanel Kuusk, Dimitris Kavallieros, Aare Reintam, Xavier J. A. Bellekens
:
On the importance of cyber-security training for multi-vector energy distribution system operators. 114:1-114:6 - Panagiotis I. Radoglou-Grammatikis

, Panagiotis G. Sarigiannidis, George Efstathopoulos, Paris-Alexandros Karypidis, Antonios Sarigiannidis:
DIDEROT: an intrusion detection and prevention system for DNP3-based SCADA systems. 115:1-115:8 - Theodoros Rokkas

, Ioannis Neokosmidis:
Factors affecting the market adoption of cyber-security products in energy and electrical systems: the case of SPEAR. 116:1-116:8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














