Accepted Workshop Papers

Note: Papers are listed in no specific order.

CSA

A Quantitative Analysis of Offensive Cyber Operation (OCO) Automation Tools
Samuel Zurowski (University of New Haven, United States), George Lord (University of New Haven, United States) and Ibrahim Baggili (University of New Haven, Louisiana State University, United States)

VALKYRIES: Harmonization and Pre-Standardization of Technology, Training and Tactical Coordinated Operations for First Responders on EU MCI
Yantsislav Yanakiev (Bulgarian Defence Institute, Bulgaria), Marta Irene García Cid (Indra, Spain), Jorge Maestre Vidal (Indra, Spain), Nikolai Stoianov (Bulgarian Defence Institute, Bulgaria) and Marco Antonio Sotelo Monge (Indra, Spain)

Disruptive Quantum Safe Technologies
Marta Irene Garcia Cid (Indra, UPM, Spain), Jorge Álvaro González (Indra, Spain), Diego Del Río Gómez (Indra, Spain) and Laura Ortíz Martín (Indra, UPM, Spain)

CUING

Improving Performance of Machine Learning based Detection of Network Steganography in Industrial Control Systems
Tom Neubert (Brandenburg University of Applied Sciences, Germany), Antonio José Caballero Morcillo (Universitat Politècnica de València, Spain) and Claus Vielhauer (Brandenburg University of Applied Sciences, Germany)

Network Steganography Through Redundancy in Higher-Radix Floating-Point Representations
Carina Heßeling, Jörg Keller and Sebastian Litzinger (FernuUniversitaet Hagen, Germany)

Revealing MageCart-like Threats in Favicons via Artificial Intelligence
Massimo Guarascio (CNR, ICAR, Italy), Marco Zuppelli (CNR, IMATI, Italy), Nunziato Cassavia (CNR, ICAR, Italy), Luca Caviglione (CNR, IMATI, Italy) and Giuseppe Manco (CNR, ICAR, Italy)

Using Telegram as a carrier for image steganography: Analysing Telegrams API limits
Niklas Bunzel (Fraunhofer SIT, ATHENE, Germany), Tobias Chen (TU Darmstadt, Germany) and Martin Steinebach (Fraunhofer SIT, ATHENE, Germany)

A novel, refined dataset for real-time Network Intrusion Detection
Mikołaj Komisarek (ITTI Sp. z o.o. and Bydgoszcz University of Science and Technology, Poland), Marek Pawlicki (ITTI Sp. z o.o. and Bydgoszcz University of Science and Technology, Poland), Maria-Elena Mihailescu (University Politehnica of Bucharest, Romania), Darius Mihai (University Politehnica of Bucharest, Romania), Mihai Carabas, Rafał Kozik (ITTI Sp. z o.o. and Bydgoszcz University of Science and Technology, Poland) and Michał Choraś (FernUniversität in Hagen and Bydgoszcz University of Science and Technology, Poland)

A Synopsis of Critical Aspects for Darknet Research
Florian Platzer (Fraunhofer SIT, Germany) and Alexandra Lux (TU Darmstadt, Germany)

Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication
Tobias Schmidbauer (FernUniversität in Hagen, Germany), Jörg Keller (FernUniversität in Hagen, Germany) and Steffen Wendzel (Hochschule Worms and FernUniversität in Hagen, Germany)

Towards Image Hashing Robust Against Cropping and Rotation
Martin Steinebach (Fraunhofer SIT, Germany), Tiberius Berwanger (TU Darmstadt, Germany) and Huajian Liu (Fraunhofer SIT, Germany)

Limitations of Web Cryptojacking Detection: A Practical Evaluation
Pawel Rajba (University of Wroclaw, Poland) and Wojciech Mazurczyk (Warsaw University of Technology, Poland)

UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media
Vaila Leask (Royal Military Academy, Belgium), Rémi Cogranne (Université de Technologie Troyes, France), Dirk Borghys (Royal Military Academy, Belgium) and Helena Bruyninckx (Royal Military Academy, Belgium)

Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit
Luca Caviglione (CNR, Italy), Martin Grabowski (Netzfactor GmbH, Germany), Kai Gutberlet (Netzfactor GmbH, Germany), Adrian Marzecki (Orange Polska, Poland), Marco Zuppelli (CNR, Italy), Andreas Schaffhauser (FernUniversität in Hagen, Germany) and Wojciech Mazurczyk (Warsaw University of Technology, Poland)

Web Page Harvesting for Automatized Large-scale Digital Images Anomaly Detection
Marcin Kowalczyk, Agnieszka Malanowska, Wojciech Mazurczyk and Krzysztof Cabaj (Warsaw University of Technology, Poland)

Data Acquisition on a large Darknet Marketplace
York Yannikos, Julian Heeger and Martin Steinebach (Fraunhofer SIT, Germany)

ENS

We cannot trust in you: a study about the dissonance among anti-malware engines
Davide Cocca (Yoroi srl, Italy), Antonio Pirozzi (Universita’ Degli Studi Del Sannio, Italy) and Aaron Visaggio (Universita’ Degli Studi Del Sannio, Italy)

Analysis and prediction of web proxies misbehavior
Zahra Nezhadian, Enrico Branca, and Natalia Stakhanova (University of Saskatchewan, Canada)

FileUploadChecker: Detecting and Sanitizing Malicious File Uploads in Web Applications at the Request Level
Pascal Wichmann (Universität Hamburg, Security in Distributed Systems, Germany), Alexander Groddeck (Universität Hamburg, Germany) and Hannes Federrath (Universität Hamburg, Security in Distributed Systems, Germany)

Applying Machine Learning on RSRP-based Features for False Base Station Detection
Prajwol Kumar Nakarmi, Jakob Sternby and Ikram Ullah (Ericsson, Sweden)

SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET
Mohammed A. Abdelmaguid, Hossam S. Hassanein and Mohammad Zulkernine (School of Computing, Queen’s University, Canada)

Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection
Marek Pawlicki, Rafał Kozik and Michał Choraś (ITTI Sp. z o.o. Poznań, Bydgoszcz University of Science and Technology Bydgoszcz, Poland)

Sim2Testbed Transfer: NDN Performance Evaluation
Enkeleda Bardhi (Sapienza University of Rome, Italy), Mauro Conti (University of Padua, Italy), Riccardo Lazzeretti (Sapienza University of Rome, Italy), Eleonora Losiouk (University of Padua, Italy) and Ahmed Taffal (Sapienza University of Rome, Italy)

Analyzing RRC Replay Attack and Securing Base Station with Practical Method
Seongmin Park (Korea Internet & Security Agency, South Korea), Ilsun You (Kookmin University, South Korea), Hoonyong Park (Soonchunhyang University, South Korea) and Dowon Kim (Korea Internet & Security Agency, South Korea)

The cybersecurity-related ethical issues of cloud technology and how to avoid them
Aleksandra Pawlicka (ITTI Sp. z o.o. and University of Warsaw, Poland), Marek Pawlicki (ITTI Sp. z o.o. and Bydgoszcz University of Science and Technology, Poland), Rafał Renk (ITTI Sp. z o.o. and Adam Mickiewicz University, Poland), Rafał Kozik (ITTI Sp. z o.o. and Bydgoszcz University of Science and Technology, Poland) and Michal Choras (ITTI Sp. z o.o. and Bydgoszcz University of Science and Technology, Poland)

The Owner, the Provider and the Subcontractors : How to Handle Accountability and Liability Management for 5G End to End Service
Chrystel Gaber (Orange, France), Ghada Arfaoui (Orange, France), Yannick Carlinet (Orange, France), Nancy Perrot (Orange, France), Laurent Valleyre (Orange, France), Marc Lacoste (Orange, France), Jean-Philippe Wary (Orange, France), Yacine Anser (Orange,CNAM, France), Rafal Artych (Orange Polska, Poland), Aleksandra Podlasek (Orange Polska, Poland), Edgardo Montesdeoca (Montimage, France), Vinh Hoa La (Montimage, France), Vincent Lefebvre (TAGES, France), Gürkan Gür (Zurich Univeristy of Applied Sciences, Switzerland)

Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications
Karol Rzepka, Przemysław Szary, Krzysztof Cabaj and Wojciech Mazurczyk (Warsaw University of Technology, Poland)

Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion
Giorgos Agrafiotis, Eftychia Makri, Ioannis Flionis, Antonios Lalas, Konstantinos Votis and Dimitrios Tzovaras (Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece)

Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks
Arash Bozorgchenani (Lancaster University, United Kingdom), Charilaos C. Zarakovitis (National Centre for Scientific Research “Demokritos”, Greece), Su Fong Chien (MIMOS Berhad, Malaysia), Heng Siong Lim (Multimedia University, Malaysia), Qiang Ni (Lancaster University, United Kingdom), Antonios Gouglidis (Lancaster University, United Kingdom) and Wissam Mallouli (Montimage EURL, France)

EPESec

Evaluating The Cyber-Security Culture of the EPES Sector
Anna Georgiadou, Ariadni Michalitsi-Psarrou and Dimitris Askounis (National Technical University of Athens, Greece)

Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104
László Erdődi, Pallavi Kaliyar, Siv Hilde Houmb, Aida Akbarzadeh and Andre Jung Waltoft-Olsen (Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Norway)

Cyber-security measures for protecting EPES systems in the 5G area
Alexios Lekidis (Public Power Corporation, Greece)

Substation-Aware. An intrusion detection system for the IEC 61850 protocol
Jose Antonio Lopez, Iñaki Angulo and Saturnino Martinez (TECNALIA, Basque Research and Technology Alliance (BRTA), Spain)

Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification Model
Evangelos Chaskos, Jason Diakoumakos, Nicholas Kolokotronis and George Lepouras (University of the Peloponnese Department of Informatics and Telecommunications, Greece)

Demonstration of alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform to Cybersecurity policy, regulatory and legislative advancements
Dimitrios Skias (Netcompany-Intrasoft, Luxembourg), Sofia Tsekeridou (Netcompany-Intrasoft, Greece), Theodore Zahariadis (SYNELIXIS SOLUTIONS S.A, Greece.), Artemis Voulkidis (SYNELIXIS SOLUTIONS S.A., Greece) and Terpsichori-Helen Velivassaki (SYNELIXIS SOLUTIONS S.A., Greece)

A Collaborative Intelligent Intrusion Response Framework for Smart Electrical Power and Energy Systems
Konstantinos P. Grammatikakis, Ioannis Koufos and Nicholas Kolokotronis (University of the Peloponnese, Department of Informatics and Telecommunications, Greece)

Fault-Tolerant SDN Solution for Cybersecurity Applications
Athanasios Liatifis (University of Western Macedonia, Macedonia), Christos Dalamagkas (Testing Research & Standards Center of Public Power Corporation SA, Greece), Panagiotis Radoglou-Grammatikis (University of Western Macedonia, Macedonia), Thomas Lagkas (International Hellenic University, Greece), Evangelos Markakis (Hellenic Mediterranean University, Greece), Valeri Mladenov (Technical University of Sofia, Bulgaria), Panagiotis Sarigiannidis (University of Western Macedonia, Macedonia)

Classifying the factors affecting the adoption of the SDN-microSENSE innovations
Theodoros Rokkas and Ioannis Neokosmidis (inCITES Consulting, Luxembourg)

Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis
Engla Rencelj Ling (Division of Network and Systems Engineering, KTH Royal Institute of Technology, Sweden), Jose Eduardo Urrea Cabus (Division of Network and Systems Engineering, KTH Royal Institute of Technology, Sweden), Ismail Butun (Division of Network and Systems Engineering, KTH Royal Institute of Technology, Sweden), Robert Lagerström (Division of Network and Systems Engineering, KTH Royal Institute of Technology, Sweden), Johannes Olegard (Department of Computer and Systems Sciences, Stockholm University, Sweden)

ETACS

Properties for Cybersecurity Awareness Posters’ Design and Quality Assessment
Sunil Chaudhary (Norwegian University of Science and Technology, Norway), Marko Kompara (University of Maribor, Slovenia), Sebastian Pape (Goethe University, Germany), Vasileios Gkioulos (Norwegian University of Science and Technology, Norway)

Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation
Sara Ricci (Brno University of Technology, Czech Republic), Marek Sikora (Brno University of Technology, Czech Republic), Simon Parker (Deutsches Krebsforschungszentrum, Germany), Imre Lendak (University of Novi Sad, Serbia), Yianna Danidou (European University Cyprus, Cyprus), Argyro Chatzopoulou (APIROPLUS Solutions Ltd., Cyprus), Remi Badonnel (University of Lorraine, France), Donatas Alksnys (Mykolas Romeris University, Lithuania)

Adding European Cybersecurity Skills Framework into Curricula Designer
Jan Hajny (Brno University of Technology, Czech Republic), Marek Sikora (Brno University of Technology, Czech Republic), Athanasios Grammatopoulos (University of Piraeus, Greece), Fabio Di Franco (ENISA, Greece)

Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory
Thanos Papaioannou (Ionian University, Greece), Aggeliki Tsohou (Ionian University, Greece), Maria Karyda (University of the Aegean, Greece), Stylianos Karagiannis (PDM & FC, Portugal)

The Platform for Czech National Qualifications Framework in Cybersecurity
Jakub Vostoupal (Masaryk University, Faculty of Informatics, Masaryk University, Faculty of Law, Czech Republic), František Kasl (Masaryk University, Faculty of Informatics, Masaryk University, Faculty of Law, Czech Republic), Pavel Loutocký (Masaryk University, Faculty of Informatics, Masaryk University, Faculty of Law, Czech Republic), Tomáš Pitner (Masaryk University, Faculty of Informatics, Czech Republic), Patrik Valo (Masaryk University, Faculty of Informatics, Czech Republic), Adam Valalský (Masaryk University, Faculty of Informatics, Czech Republic), Damián Paranič (Masaryk University, Faculty of Informatics, Czech Republic)

Security of Smart Grid Networks in the Cyber Ranges
Tomas Lieskovan, Jan Hajny (Brno University of Technology, Czech Republic)

FARES

An Early Detection of Android Malware Using System Calls based Machine Learning Model
Xinrun Zhang (Purdue University Northwest, United States), Akshay Mathur (The University of Toledo, United States), Lei Zhao (Purdue University Northwest, United States), Safia Rahmat (The University of Toledo, United States), Quamar Niyaz (Purdue University Northwest, United States), Ahmad Javaid (The University of Toledo, United States), Xiaoli Yang (Purdue University Northwest, United States)

Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness
Tahir Ahmad (Fondazione Bruno Kessler (FBK), Italy), Umberto Morelli (Fondazione Bruno Kessler (FBK), Italy), Silvio Ranise (Fondazione Bruno Kessler (FBK), University of Trento, Italy)

Applying a cryptographic metric to post-quantum lattice-based signature algorithms
Markus Rautell (VTT Technical Research Centre of Finland, Finland), Outi-Marja Latvala (VTT Technical Research Centre of Finland, Finland), Visa Vallivaara (VTT Technical Research Centre of Finland, Finland), Kimmo Halunen (University of Oulu and National Defence University of Finland, Finland)

Scenarios for Process-Aware Insider Attack Detection in Manufacturing
Martin Macak (Masaryk University, Faculty of Informatics, Czech Republic), Radek Vaclavek (Masaryk University, Faculty of Informatics, Czech Republic), Dasa Kusnirakova (Masaryk University, Faculty of Informatics, Czech Republic), Raimundas Matulevičius (Institute of Computer Science, University of Tartu, Estonia), Barbora Buhnova (Masaryk University, Faculty of Informatics, Czech Republic)

Introducing Quantum Computing in Mobile Malware Detection
Giovanni Ciaramella (Institute for Informatics and Telematics, National Research Council of Italy (CNR), Italy), Giacomo Iadarola (Institute for Informatics and Telematics, National Research Council of Italy (CNR), Italy), Francesco Mercaldo (University of Molise, Institute for Informatics and Telematics, National Research Council of Italy (CNR), Italy), Marco Storto (University of Molise), Antonella Santone (University of Molise, Italy), Fabio Martinelli (Institute for Informatics and Telematics, National Research Council of Italy (CNR), Italy)

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations
Lukáš Sadlek, Pavel Čeleda and Daniel Tovarňák (Masaryk University)

SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes
Amir Sharif (Fondazione Bruno Kessler, Italy), Matteo Ranzi (University of Trento, Italy), Roberto Carbone (Fondazione Bruno Kessler, Italy), Giada Sciarretta (Fondazione Bruno Kessler, Italy), Silvio Ranise (Fondazione Bruno Kessler,University of Trento, Italy)

Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding
Marta Catillo, Antonio Pecchia and Umberto Villano (Università degli Studi del Sannio, Italy)

IOSec

Multi-label Classification of Cybersecurity Text with Distant Supervision
Masahiro Ishii, Kento Mori, Ryoichi Kuwana and Satoshi Matsuura (Tokyo Institute of Technology, Japan)

Improving Network, Data and Application Security for SMEs
Christos Tselios (University of Patras, Greece), Ilias Politis (University of Piraeus, Greece), Christos Xenakis (University of Piraeus, Greece)

Risk Assessments Considering Safety, Security, and Their Interdependencies in OT Environments
Siegfried Hollerer (TU Wien, Austria), Thilo Sauter (TU Wien, Danube Univ., Austria), Wolfgang Kastner (TU Wien, Austria)

IoT-SECFOR

STRIPED: A Threat Analysis Method for IoT Systems
Kamakshi Srikumar, Komal Kashish, Kolja Eggers, Nicolás E. Díaz Ferreyra, Julian Koch, Thorsten Schüppstuhl and Riccardo Scandariato (Hamburg University of Technology, Germany)

A Resilient Network Node for the Industrial Internet of Things
Lukas Jäger, Dominik Lorych and Michael Eckel (Fraunhofer Institute SIT | ATHENE, Germany)

Reactive Jamming Detection for LoRaWAN Based on Meta-Data Differencing
Henri Ruotsalainen (Institute of IT Security Research / St. Pölten University of Applied Sciences, Austria)

MalRec: A Blockchain-based Malware Recovery Framework for Internet of Things
Ahmed Lekssays, Giorgia Sirigu, Barbara Carminati and Elena Ferrari (Università degli Studi dell’Insubria, Italy)

An Investigation of PSA Certified
Seonghan Shin, Tomoyuki Ogawa, Ryo Fujita, Mari Itoh and Hirotaka Yoshida (National Institute of Advanced Industrial Science and Technology (AIST), Japan)

IWAPS

Secure Agents on Trusted Embedded Boards: A Proof of Concept based on TPM-enabled Raspberry Boards
Antonio Muñoz (University of Malaga, Spain)

MITRE ATT&CK-driven Cyber Risk Assessment
Mohamed G Ahmed (University of Greenwich, United Kingdom), Sakshyam Panda (University of Greenwich, United Kingdom), Christos Xenakis (University of Piraeus, Greece), Emmanouil Panaousis (University of Greenwich, United Kingdom)

Secret sharing a key in a distributed way, Lagrange vs Newton
Anastassios Voudouris, Ilias Politis and Christos Xenakis (University of Piraeus, Greece)

Fraudulent Activities in the Cyber Realm: DEFRAUDify Project
Razvan-Alexandru Bratulescu, Robert-Ionut Vatasoiu, Sorina-Andreea Mitroi, George Suciu, Mari-Anais Sachian, Daniel-Marian Dutu and Serban-Emanuel Calescu (Beia Consult International, Romania)

Trusted and Secure Self-Sovereign Identity framework
Vaios Bolgouras, Anna Angelogianni, Ilias Politis and Christos Xenakis (University of Piraeus, Greece)

Improving Security and Scalability in Smart Grids using Blockchain Technologies
Mandana Falahi (University POLITEHNICA of Bucharest, Romania), Andrei Vasilateanu (University POLITEHNICA of Bucharest, Romania), Nicolae Goga (University POLITEHNICA of Bucharest, Romania), George Suciu (BEIA Consult International, Romania), Mari-Anais Sachian (BEIA Consult International, Romania), Robert Florescu (University POLITEHNICA of Bucharest, Romania), Ștefan-Daniel Stanciu (University POLITEHNICA of Bucharest, Romania)

ConSenseIoT: A Consensus Algorithm for Secure and Scalable Blockchain in the IoT context
Harris Niavis and Konstantinos Loupos (Inlecom Innovation, Greece)

Analyzing Coverages of Cyber Insurance Policies Using Ontology
Markos Charalambous (Cyprus University of Technology, Cyprus), Aristeidis Farao (University of Piraeus, Greece), George Kalantzantonakis (LSTech ESPANA, Spain), Panagiotis Kanakakis (LSTech ESPANA, Spain), Nikos Salamanos (Cyprus University of Technology, Cyprus), Evangelos Kotsifakos (LSTech ESPANA, Spain), Evangellos Froudakis (University of Piraeus, Greece)

IWCC

Deep Reinforcement Learning-Based Defense Strategy Selection
Axel Charpentier (Polytechnique Montréal, IRT SystemX, Canada), Nora Boulahia Cuppens (Polytechnique Montréal, France), Frédéric Cuppens (Polytechnique Montréal, France), Reda Yaich (IRT SystemX, France)

Shedding Light on the Targeted Victim Profiles of Malicious Downloaders
François Labrèche (École Polytechnique de Montréal, Canada), Enrico Mariconti (University College London, United Kingdom), Gianluca Stringhini (Boston University, United States)

Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms
Bethany Sumner, Gokila Dorai and John Heslen (Augusta University, United States)

SASP: a Semantic web-based Approach for management of Sharable cyber security Playbooks
Mehdi Akbari Gurabi (Fraunhofer FIT,RWTH Aachen University, Germany), Avikarsha Mandal (Fraunhofer FIT, Germany), Jan Popanda (Fraunhofer FIT, Germany), Robert Rapp (University of Stuttgart, Germany), Stefan Decker (Fraunhofer FIT, RWTH Aachen University, Germany)

IWCSEC

The AssureMOSS security certification scheme
Ákos Milánkovich, Gergely Eberhardt and Dávid Lukács (Search-Lab Ltd., Hungary)

Security Maturity Self-Assessment Framework for Software Development Lifecycle
Raluca Brasoveanu (TomTom, The Netherlands), Yusuf Karabulut (TomTom, Germany) and Ivan Pashchenko (TomTom, The Netherlands)

Towards a Security Benchmark for the Architectural Design of Microservice Applications
Anusha Bambhore Tukaram (Hamburg University of Technology, Germany), Simon Schneider (Hamburg University of Technology, Germany), Nicolás E. Díaz Ferreyra (Hamburg University of Technology, Germany), Georg Simhandl (University of Vienna, Austria), Uwe Zdun (University of Vienna, Austria), Riccardo Scandariato (Hamburg University of Technology, Germany)

Explainability-based Debugging of Machine Learning for Vulnerability Discovery
Angelo Sotgiu, Maura Pintor and Battista Biggio (Pluribus One, University of Cagliari, Italy)

Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster
Clinton Cao (Delft University of Technology, The Netherlands), Agathe Blaise (Thales SIX GTS France, France), Sicco Verwer (Delft University of Technology, The Netherlands) and Filippo Rebecchi (Thales SIX GTS France, France)

Lightweight Parsing and Slicing for Bug Identification in C
Luca Mecenero (University of Trento, Italy), Ranindya Paramitha (University of Trento, Italy), Ivan Pashchenko (TomTom, The Netherlands), Fabio Massacci (University of Trento, Italy, Vrije Universiteit Amsterdam, The Netherlands)

On the feasibility of detecting injections in malicious npm packages
Simone Scalco (University of Trento, Italy), Ranindya Paramitha (University of Trento, Italy), Duc-Ly Vu (FPT University, Vietnam) and Fabio Massacci (University of Trento, Italy, Vrije Universiteit Amsterdam, The Netherlands)

IWSECC

GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments
Ioannis Kalderemidis (University of Piraeus, Greece), Aristeidis Farao (University of Piraeus, Greece), Panagiotis Bountakas (University of Piraeus, Greece), Sakshyam Panda (University of Greenwich, United Kingdom), Christos Xenakis (University of Piraeus, Greece)

Revisiting a Privacy-Preserving Location-based Service Protocol using Edge Computing
Santosh Kumar Upadhyaya and Srinivas Vivek (International Institute of Information Technology, Bangalore, India)

A Revisit of Attestable Nodes for Networked Applications
Mathias Schüpany and Martin Pirker (St.Pölten University of Applied Sciences, Austria)

IWSMA

Federated learning based IDS approach for the IoV
Amal Hbaieb (University of Technology of Troyes, France), Samiha Ayed (University of Technology of Troyes, France), Lamia Chaari (CRNS-SM@RTS (Laboratory of Signals, systeMs, aRtificial Intelligence and neTworkS) Sfax, Tunesia)

IWSMR

TaxIdMA: Towards a Taxonomy for Attacks related to Identities
Daniela Pöhn and Wolfgang Hommel (Universität der Bundeswehr München, Germany)

Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the Literature
Sanaz Adel Alipour, Rita Orji and Nur Zincir-Heywood (Faculty of Computer Science, Dalhousie University, Canada)

Cyber-Security Culture Assessment in Academia: A COVID-19 Study
Anna Georgiadou, Ariadni Michalitsi-Psarrou and Dimitris Askounis (Decision Support Systems Laboratory, School of Electrical & Computer Engineering, National Technical University of Athens, Greece)

IWSRSC

On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages
Marc Ohm (Rheinische Friedrich-Wilhelms-Universität Bonn, Germany), Felix Boes (Rheinische Friedrich-Wilhelms-Universität Bonn, Germany), Christian Bungartz (Rheinische Friedrich-Wilhelms-Universität Bonn, Germany), Michael Meier (Rheinische Friedrich-Wilhelms-Universität Bonn, Fraunhofer FKIE, Germany)

SoK: Combating threats in the digital supply chain
Arne Roar Nygård and Sokratis Katsikas (Norwegian University of Science and Technology, Norway)

PCSCI

A Methodology for enhancing Emergency Situational Awareness through Social Media
Antonios Karteris (School of Electrical and Computer Engineering, National Technical University of Athens, Greece), Georgios Tzanos (School of Electrical and Computer Engineering, National Technical University of Athens, Greece), Lazaros Papadopoulos (School of Electrical and Computer Engineering, National Technical University of Athen, Greeces), Konstantinos Demestichas (School of Electrical and Computer Engineering, National Technical University of Athens, Greece), Dimitrios Soudris (School of Electrical and Computer Engineering, National Technical University of Athens, Greece), Juliette Pauline Philibert (Instituto de Investigación Sanitaria La Fe de Valencia, Spain), Carlos López Gómez (Instituto de Investigación Sanitaria La Fe de Valencia, Spain)

Parametrization of Probabilistic Risk Models
Sandra König and Abdelkader Magdy Shaaban (AIT Austrian Institute of Technology, Austria)

SecHealth

A Critique of EU Digital COVID-19 Certificates: Do Vaccine Passports endanger privacy?
Harry Halpin (KU Leuven, Belgium)

Modelling privacy harms of compromised personal medical data – beyond data breach
Samuel Wairimu (Karlstad University, Sweden) and Lothar Fritsch (Oslo Metropolitan University, Norway)

Authentication for Operators of Critical Medical Devices: A Contribution to Analysis of Design Trade-offs
Marwa Gadala (Aston University, City, University of London, United Kingdom), Lorenzo Strigini (City, University of London, United Kingdom), Radek Fujdiak (Brno University of Technology, Czech Republic)

SECPID

Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing
Alessandro Brighente (University of Padova, Italy), Mauro Conti (University of Padova, Italy, Delft University of Technology, The Netherlands), Savio Sciancalepore (Eindhoven University of Technology (TU/e)The Netherlands)

Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers’ Perspective
Salatiel Ezennaya-Gomez, Edgar Blumenthal, Marten Eckardt, Justus Krebs, Christopher Kuo, Julius Porbeck, Emirkan Toplu, Stefan Kiltz and Jana Dittmann (Otto-von-Guericke University Magdeburg, Germany)

Towards Efficient FHE Based cPIR Schemes and Their Parameter Selection
Cavidan Yakupoglu and Kurt Rohloff (NJIT, United States)

YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC
Stefan More and Lukas Alber (Graz University of Technology, Austria)

Identity and Access Management Framework for Multi-tenant Resources in Hybrid Cloud Computing
Saurabh Deochake and Vrushali Channapattan (Twitter, United States)

All that is Solid Melts into Air: Towards Decentralized Cryptographic Access Control
Harry Halpin (K.U. Leuven, Belgium)

SP2I

CloudFL: A Zero-Touch Federated Learning Framework for Privacy-aware Sensor Cloud
Viraaji Mothukuri (Kennesaw State University, United States), Reza M. Parizi (Kennesaw State University, United States), Seyedamin Pouriyeh (Kennesaw State University, United States), Afra Mashhadi (University of Washington, United States)

Enhanced anomaly detection for cyber-attack detection in smart water distribution systems
Branka Stojanovic, Helmut Neuschmied, Martin Winter and Ulrike Kleb (JOANNEUM RESEARCH Forschungsgesellschaft mbH, Austria)

On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography
Petr Jedlicka (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Lukas Malina (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Tomas Gerlich (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Zdenek Martinasek (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Jan Hajny (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Petr Socha (Czech Technical University in Prague, Faculty of Information Technology, Dept. of Digital Design, Czech Republic)

Security Risk Management in Shared Mobility Integration
Abasi-Amefon Obot Affia and Raimundas Matulevicius (University of Tartu, Estonia)

Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card
Raúl Casanova-Marqués (Brno University of Technology, Universitat Jaume I, Czech Republic), Petr Dzurenda (Brno University of Technology, Czech Republic), Jan Hajny (Brno University of Technology, Czech Republic)

An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive Devices
Takahiro Ueda, Takayuki Sasaki, Katsunari Yoshioka and Tsutomu Matsumoto (Yokohama National University, Japan)

Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials
Petr Dzurenda (Brno University of Technology, Czech Republic), Raúl Casanova-Marqués (Brno University of Technology, Universitat Jaume I, Czech Republic), Lukas Malina (Brno University of Technology, Czech Republic)

SSE

CopypastaVulGuard – A browser extension to prevent copy and paste spreading of vulnerable source code in forum posts
Holger Schmidt, Max van Aerssen, Christian Leich, Abdulkader Benni, Salar Al Ali and Jakob Tanz (Düsseldorf University of Applied Sciences, Germany)

Design Space Exploration of DICE
Dominik Lorych and Lukas Jäger (Fraunhofer Institute SIT | ATHENE, Germany)

Safety and Security Analysis using LDA based on Case Reports: Case Study and Trust Evaluation Method
Katsuyuki Umezawa (Shonan Institute of Technology, National Institute of Advanced Industrial Science and Technology (AIST), Japan), Hiroki Koyanagi (Internet Initiative Japan Inc., Japan), Sven Wohlgemuth (SECOM Co., Ltd., Japan), Yusuke Mishina (National Institute of Advanced Industrial Science and Technology (AIST), Japan), Kazuo Takaragi (National Institute of Advanced Industrial Science and Technology (AIST), Japan)

Symbolic analysis meets federated learning to enhance malware identifier
Charles-Henry Bertrand Van Ouytsel, Khanh Huu The Dam and Axel Legay (Universite Catholique de Louvain, Belgium)

Android Permission Manager, Visual Cues, and their Effect on Privacy Awareness and Privacy Literacy
Vera Schmitt (Technische Universität Berlin, Germany), Maija Poikela (Fraunhofer Institute for Applied and Integrated Security, Germany), Sebastian Möller (Technische Universität Berlin, Germany)

A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners
Emma Lavens, Pieter Philippaerts, Wouter Joosen (imec – DistriNet, KU Leuven, Belgium)

Register Automata for Malware Specification
Tayssir Touili (LIPN, CNRS & University Paris 13, France)

DevSecOps In Embedded Systems: An Empirical Study Of Past Literature
Hasan Yasar and Sam E Teplov (Carnegie Mellon University, United States)

MetaSEnD: A Security Enabled Development Life Cycle Meta-Model
Daniele Granata, Massimiliano Rak and Giovanni Salzillo (Università della Campania Luigi Vanvitelli, Italy)

WSDF

Fast and Blind Detection of Rate-Distortion-Preserving Video Watermarks
Hannes Mareen (IDLab, Ghent University – imec, Belgium), Glenn Van Wallendael (IDLab, Ghent University – imec, Belgium), Peter Lambert (IDLab, Ghent University – imec, Belgium) and Fouad Khelifi (Department of Computer and Information Sciences, Northumbria University, United Kingdom)

WSL2 Forensics: Detection, Analysis & Revirtualization
Philipp Boigner (St. Pölten University of Applied Sciences, Austria) and Robert Luh (St. Pölten University of Applied Sciences and University of Vienna, Austria)

Forensic analysis of Tor in Windows environment: A case study
Vaia-Maria Angeli, Ahmad Atamli and Erisa Karafili (School of Electronics and Computer Science, University of Southampton, United Kingdom)