ARES 2022 Full Research Papers
Compiler-Aided Development of Trusted Enclaves with Rust
Felix Dreissig (noris network AG, Germany), Jonas Röckl (FAU Erlangen-Nürnberg, Germany) and Tilo Müller (Hof University of Applied Sciences, Germany)
Reviewing review platforms: a privacy perspective
Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon and Vincent Naessens (imec-DistriNet, Belgium)
SOAR4IoT: Securing IoT Assets with Digital Twins
Philip Empl, Daniel Schlette, Daniel Zupfer and Günther Pernul (University of Regensburg, Germany)
Model-Based Incident Response Playbooks
Avi Shaked, Yulia Cherdantseva and Pete Burnap (School of Computer Science and Informatics, Cardiff University, United Kingdom)
Web Cryptography API: Prevalence and Possible Developer Mistakes
Pascal Wichmann, Maximilian Blochberger and Hannes Federrath (University of Hamburg, Germany)
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS
Soundes Marzougui (Technical University of Berlin, Germany), Nils Wisiol (Technical University of Berlin, Germany), Patrick Gersch (Technical University of Berlin, Germany), Juliane Krämer (University of Regensburg, Germany) and Jean-Pierre Seifert (Technical University of Berlin, Germany)
Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence
Davy Preuveneers and Wouter Joosen (imec-DistriNet, KU Leuven, Belgium)
Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing
Angeliki Aktypi (Department of Computer Science, University of Oxford, United Kingdom), Dimitris Karnikis (Aarno Labs, United States), Nikos Vasilakis (Massachusetts Institute of Technology, United States) and Kasper Rasmussen (Department of Computer Science, University of Oxford, United Kingdom)
Distance-based Techniques for Personal Microbiome Identification
Markus Hittmeir, Rudolf Mayer and Andreas Ekelhart (SBA Research, Austria)
Multi-Account Dashboard for Authentication Dependency Analysis
Daniela Pöhn (Universität der Bundeswehr München, FI CODE, Germany), Nils Gruschka (University of Oslo, Norway) and Leonhard Ziegler (Universität der Bundeswehr München, Germany)
Improved Integer-wise Homomorphic Comparison and Division based on Polynomial Evaluation
Koki Morimura, Daisuke Maeda and Takashi Nishide (University of Tsukuba, Japan)
Detecting Unknown DGAs without Context Information
Arthur Drichel, Justus von Brandt and Ulrike Meyer (RWTH Aachen University, Germany)
HybridDAD: Detecting DDoS Flooding Attack using Machine Learning with Programmable Switches
Mostafa Roshani (ACM Member, Iran) and Mehdi Nobakht (University of New South Wales (UNSW), Australia)
Towards Verifiable Differentially-Private Polling
Gonzalo Munilla Garrido (SEBIS, Technical University of Munich, Germany), Johannes Sedlmeir (Fraunhofer FIT, Branch Business and Information Systems Engineering, Germany) and Matthias Babel (FIM Research Center, University of Bayreuth, Germany)
Web Bot Detection Evasion Using Deep Reinforcement Learning
Christos Iliou (Information Technologies Institute, CERTH, Greece and BU-CERT, Bournemouth University, United Kingdom), Theodoros Kostoulas (Department of Information and Communication Systems Engineering, University of the Aegean, Greece), Theodora Tsikrika (Information Technologies Institute, CERTH, Greece), Vasilios Katos (Bournemouth University, United Kingdom), Stefanos Vrochidis (Information Technologies Institute, CERTH, Greece) and Ioannis Kompatsiaris (Information Technologies Institute, CERTH, Greece)
Analysis and Evaluation of Hardware Trust Anchors in the Automotive Domain
Christian Plappert (Fraunhofer Institute SIT, ATHENE, Germany), Andreas Fuchs (Fraunhofer Institute SIT, ATHENE, Germany) and Ronald Heddergott (CARIAD SE, Germany)
Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns
Vincent Drury, Luisa Lux and Ulrike Meyer (RWTH Aachen University, Germany)
FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks
Emilie Bout (Inria, France), Alessandro Brighente (University of Padova, Italy), Mauro Conti (University of Padova, Italy) and Valeria Loscri (Inria, France)
VMIFresh: Efficient and Fresh Caches for Virtual Machine Introspection
Thomas Dangl (University of Passau, Germany), Stewart Sentanoe (University of Passau, Germany) and Hans P. Reiser (Reykjavík University, Iceland)
ZEKRO: Zero-Knowledge Proof of Integrity Conformance
Heini Bergsson Debes (Technical University of Denmark, Denmark) and Thanassis Giannetsos (Ubitech Ltd., Greece)
Automatic online quantification and prioritization of data protection risks
Sascha Sven Zmiewski (University of Duisburg-Essen, Germany), Jan Laufer (University of Duisburg-Essen, Germany) and Zoltán Ádám Mann (University of Amsterdam, The Netherlands)
Cookie Disclaimers: Impact of Design and Users’ Attitude
Benjamin Maximilian Berens (Karlsruhe Institut of Technology, Germany), Heike Dietmann (Karlsruhe Institut of Technology, Germany), Chiara Krisam (Karlsruhe Institut of Technology, Germany), Oksana Kulyk (IT University of Copenhagen, Denmark) and Melanie Volkamer (Karlsruhe Institut of Technology, Germany)
A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale
Joseph Khoury (The University of Texas at San Antonio, United States), Morteza Safaei Pour (San Diego State University, United States) and Elias Bou-Harb (The University of Texas at San Antonio, United States)
Precise Analysis of Purpose Limitation in Data Flow Diagrams
Hanaa Alshareef (Chalmers University of Technology, Sweden), Katja Tuma (Vrije Universiteit Amsterdam, The Netherlands), Sandro Stucki (Chalmers University of Technology, Sweden), Gerardo Schneider (University of Gothenburg, Sweden) and Riccardo Scandariato (Hamburg University of Technology, Germany)
Bridging the Gap Between Certification and Software Development
Claudio A. Ardagna (Department of Computer Science, Università degli Studi di Milano, Italy), Nicola Bena (Department of Computer Science, Università degli Studi di Milano, Italy) and Ramon Martín de Pozuelo (CaixaBank, Spain)
ARES 2022 Short Research Papers
SMODIC: A Model Checker for Self-modifying Code
Tayssir Touili and Xin Ye (LIPN, CNRS, France)
BISCUIT – Blockchain Security Incident Reporting based on Human Observations
Benedikt Putz, Manfred Vielberth and Günther Pernul (University of Regensburg, Germany)
Secure Services for Standard RISC-V Architectures
Davide Bove (Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany)
Combining Variational Autoencoders and Transformer Language Models for Improved Password Generation
David Biesner (Fraunhofer IAIS and University of Bonn, Germany), Kostadin Cvejoski (Fraunhofer IAIS, Germany) and Rafet Sifa (Fraunhofer IAIS, Germany)
Assessing discrepancies between network traffic and privacy policies of public sector web services
Timi Heino, Robin Carlsson, Sampsa Rauti and Ville Leppänen (University of Turku, Finland)
Rumor and clickbait detection by combining information divergence measures and deep learning techniques
Christian Oliva (ITEFI-CSIC and UAM, Spain), Ignacio Palacio-Marín (UAM, Spain), Luis F. Lago-Fernández (UAM, Spain) and David Arroyo (ITEFI-CSIC, Spain)
Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks
Mohamed Amine Merzouk (Polytechnique Montréal, Canada and IRT SystemX, France), Joséphine Delas (Polytechnique Montréal, Canada and IRT SystemX, France), Christopher Neal (Polytechnique Montréal, Canada and IRT SystemX, France), Nora Boulahia-Cuppens (Polytechnique Montréal, Canada), Frédéric Cuppens (Polytechnique Montréal, Canada) and Reda Yaich (IRT SystemX, France)
Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy
Samuel Šuľan (Faculty of Informatics, Masaryk University, Czech Republic) and Martin Husák (Institute of Computer Science, Masaryk University, Czech Republic)
RIPEMB: A framework for assessing hardware-assisted software security schemes in embedded systems
Stefan Tauner (TU Wien, Austria)
ARES 2022 SoK Research Papers
SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy Techniques
Simin Ghesmati (SBA Research, Austria), Walid Fdhila (SBA Research, Austria) and Edgar Weippl (University of Vienna and SBA Research, Austria)
SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools
Emmanouil Samanis, Joseph Gardiner and Awais Rashid (Bristol Cyber Security Group, University of Bristol, United Kingdom)
SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response
Martin Husák and Milan Čermák (Institute of Computer Science, Masaryk University, Czech Republic)
SoK: Security of Microservice Applications: A Practitioners’ Perspective on Challenges and Best Practices
Priyanka Billawa (Hamburg University of Technology, Germany), Anusha Bambhore Tukaram (Hamburg University of Technology, Germany), Nicolás E. Díaz Ferreyra (Hamburg University of Technology, Germany), Jan-Philipp Steghöfer (Chalmers University of Technology, University of Gothenburg, Sweden), Riccardo Scandariato (Hamburg University of Technology, Germany) and Georg Simhandl (University of Vienna, Austria)
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays
Reyhan Düzgün (Karlsruhe Institute of Technology, Germany), Naheem Noah (University of Denver, United States), Peter Mayer (Karlsruhe Institute of Technology, Germany), Sanchari Das (University of Denver, United States) and Melanie Volkamer (Karlsruhe Institute of Technology, Germany)