Detailed Program

Below you can find the program of ARES / CD-MAKE 2022.

All time designations refer to CEST (UTC+2).

  • 23.08.2022
  • 24.08.2022
  • 25.08.2022
  • 26.08.2022
  • Tuesday 23.08.2022 Detailed

    Time (UTC +2)
    HS 01
    SR 03
    SR 04
    SR 05
    SR 06
    SR 07
    SR 08
    08:00 - 19:00
    Organizers available
    08:45 - 09:00
    ARES Opening
    Edgar Weippl, Mathias Fischer
    HS 01

    Edgar Weippl (SBA Research and University of Vienna, Austria) , Mathias Fischer (Universität Hamburg, Germany)

    09:00 - 09:05
    EU Workshop Pitch Session
    Session Chair:
    Florian Skopik (AIT, Austria)
    HS 01

    Short Pitch of each EU Symposium Workshop

    09:05 - 10:30
    ARES Keynote
    Steve Furnell
    HS 01

    The strange world of the password

    Steve Furnell (University of Nottingham, United Kingdom)

    Abstract: Despite years of evidence of poor practice, people continue to choose weak passwords and continue to be allowed to do so. Normally, if something is broken then the answer is to fix or replace it. However, with passwords the problem seems able to persist unchecked and we continue to use them extensively despite the flaws. Adding further evidence of the issue, this presentation reports on the fifth run of a study into the provision of password guidance and the enforcement of password rules by a series of leading websites. The investigation has been conducted every 3-4 years since 2007 and the latest findings continue to reveal areas of notable weakness. This includes many sites still offering little or no meaningful guidance, and still permitting users to choose passwords that ought to be blocked at source. It seems that while we remain ready to criticise users for making poor choices, we repeatedly fail to take steps that would help them to do better.

    10:30 - 10:45
    Short Coffee Break
    10:45 - 12:45
    ARES I
    Best Paper
    Session Chair:
    Mathias Fischer (University of Hamburg, Germany)

    VMIFresh: Efficient and Fresh Caches for Virtual Machine  Introspection

    Thomas Dangl (University of Passau, Germany), Stewart Sentanoe (University of Passau, Germany) and Hans P. Reiser (Reykjavík University, Iceland)

    Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence

    Davy Preuveneers and Wouter Joosen (imec-DistriNet, KU Leuven, Belgium)

    Distance-based Techniques for Personal Microbiome Identification

    Markus Hittmeir, Rudolf Mayer and Andreas Ekelhart (SBA Research, Austria)

    SOAR4IoT: Securing IoT Assets with Digital Twins

    Philip Empl, Daniel Schlette, Daniel Zupfer and Günther Pernul (University of Regensburg, Germany)

    EPESec I
    Session Chair:
    Theodoros Rokkas (inCITES Consulting, Luxembourg)

    Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104

    László Erdődi, Pallavi Kaliyar, Siv Hilde Houmb, Aida Akbarzadeh and Andre Jung Waltoft-Olsen (Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Norway)

    Substation-Aware. An intrusion detection system for the IEC 61850 protocol

    Jose Antonio Lopez, Iñaki Angulo and Saturnino Martinez (TECNALIA, Basque Research and Technology Alliance (BRTA), Spain)

    Cyber-security measures for protecting EPES systems in the 5G area

    Alexios Lekidis (Public Power Corporation, Greece)

    Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification Model

    Evangelos Chaskos, Jason Diakoumakos, Nicholas Kolokotronis and George Lepouras (University of the Peloponnese Department of Informatics and Telecommunications, Greece)

    Fault-Tolerant SDN Solution for Cybersecurity Applications

    Athanasios Liatifis (University of Western Macedonia, Macedonia), Christos Dalamagkas (Testing Research & Standards Center of Public Power Corporation SA, Greece), Panagiotis Radoglou-Grammatikis (University of Western Macedonia, Macedonia), Thomas Lagkas (International Hellenic University, Greece), Evangelos Markakis (Hellenic Mediterranean University, Greece), Valeri Mladenov (Technical University of Sofia, Bulgaria), Panagiotis Sarigiannidis (University of Western Macedonia, Macedonia)

    Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis

    Engla Rencelj Ling (Division of Network and Systems Engineering, KTH Royal Institute of Technology, Sweden), Jose Eduardo Urrea Cabus (Division of Network and Systems Engineering, KTH Royal Institute of Technology, Sweden), Ismail Butun (Division of Network and Systems Engineering, KTH Royal Institute of Technology, Sweden), Robert Lagerström (Division of Network and Systems Engineering, KTH Royal Institute of Technology, Sweden), Johannes Olegard (Department of Computer and Systems Sciences, Stockholm University, Sweden)

    IWCSEC I
    Fast-Paced And Secure Code Development And Deployment
    Session Chair:
    Péter Hegedűs (FrontEndART Szoftver Kft., Hungary)

    Explainability-based Debugging of Machine Learning for Vulnerability Discovery

    Angelo Sotgiu, Maura Pintor and Battista Biggio (Pluribus One, University of Cagliari, Italy)

    Lightweight Parsing and Slicing for Bug Identification in C

    Luca Mecenero (University of Trento, Italy), Ranindya Paramitha (University of Trento, Italy), Ivan Pashchenko (TomTom, The Netherlands), Fabio Massacci (University of Trento, Italy, Vrije Universiteit Amsterdam, The Netherlands)

    On the feasibility of detecting injections in malicious npm packages

    Simone Scalco (University of Trento, Italy), Ranindya Paramitha (University of Trento, Italy), Duc-Ly Vu (FPT University, Vietnam) and Fabio Massacci (University of Trento, Italy, Vrije Universiteit Amsterdam, The Netherlands)

    Towards a Security Benchmark for the Architectural Design of Microservice Applications

    Anusha Bambhore Tukaram (Hamburg University of Technology, Germany), Simon Schneider (Hamburg University of Technology, Germany), Nicolás E. Díaz Ferreyra (Hamburg University of Technology, Germany), Georg Simhandl (University of Vienna, Austria), Uwe Zdun (University of Vienna, Austria), Riccardo Scandariato (Hamburg University of Technology, Germany)

    Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster

    Clinton Cao (Delft University of Technology, The Netherlands), Agathe Blaise (Thales SIX GTS France, France), Sicco Verwer (Delft University of Technology, The Netherlands) and Filippo Rebecchi (Thales SIX GTS France, France)

    Security Maturity Self-Assessment Framework for Software Development Lifecycle

    Raluca Brasoveanu (TomTom, The Netherlands), Yusuf Karabulut (TomTom, Germany) and Ivan Pashchenko (TomTom, The Netherlands)

    NG - SOC I
    Session Chair:
    Irina Chiscop (TNO, The Netherlands)

    Attack graphs as digital twins for managing breach prevention, detection, and reaction

    Giuseppe Nebbione and Mathias Ekstedt (KTH Royal Institute of Technology, Sweden)

    Methodological improvement of the Cyber Security of Energy Data Services: the CyberSEAS way

    Luigi Cappolino (University of Naples “Parthenope”, Italy)

    A joint approach to cybersecurity for Energy operators: the CyberEPES cluster

    Paolo Roccetti (Engineering R&D Labs, Italy)

    SP2I I
    Applied Cryptography, Security And Privacy
    Session Chair:
    Lukas Malina (Brno University of Technology, Czech Republic)

    Security-by-Design in Intelligent Infrastructures: the HAII-T orchestrator

    Gabriele Costa , IMT School for Advanced Studies Lucca

    Abstract : In the last years Security-by-Design has emerged as the main methodology for securing the life cycle of software and systems. Its effectiveness is the result of a strong integration with all the development phases, from the earliest conceptualization and design to the final disposal. Large scale, critical infrastructures can benefit the most from this approach. Nevertheless, they also carry an extreme degree of complexity that must be dealt with. In this talk we will consider the SPARTA perspective on the definition and implementation of a secure orchestrator for making intelligent infrastructures Secure-by-Design.

    Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card

    Raúl Casanova-Marqués (Brno University of Technology, Universitat Jaume I, Czech Republic), Petr Dzurenda (Brno University of Technology, Czech Republic), Jan Hajny (Brno University of Technology, Czech Republic)

    Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials

    Petr Dzurenda (Brno University of Technology, Czech Republic), Raúl Casanova-Marqués (Brno University of Technology, Universitat Jaume I, Czech Republic), Lukas Malina (Brno University of Technology, Czech Republic)

    ETACS I
    Cybersecurity Education, Training And Awareness
    Session Chair:
    Jan Hajny (SPARTA, Brno University of Technology, Czech Republic)

    Cybersecurity Skills Gap: ENISA Analysis and Actions

    Fabio Di Franco, ENISA

    Abstract: Fabio will provide a holistic view on the nature and characteristics of the skills gap in Europe and the results of the joint effort done with other EU players (eg. the pilots of the EU Competence Network). He will report on the European Cybersecurity Skills Framework (ECSF) which aims to close the cybersecurity skills’ gap on the European labour market, building comprehensive bridges between European workplace context and learning environment through an EU skills framework.  He will also provide insights on the cybersecurity higher education database (CyberHEAD), an initiative to allow young talents to make informed decisions on the variety of possibilities offered by higher education in cybersecurity through an easy-to-use web portal.

    Properties for Cybersecurity Awareness Posters’ Design and Quality Assessment

    Sunil Chaudhary (Norwegian University of Science and Technology, Norway), Marko Kompara (University of Maribor, Slovenia), Sebastian Pape (Goethe University, Germany), Vasileios Gkioulos (Norwegian University of Science and Technology, Norway)

    Security of Smart Grid Networks in the Cyber Ranges

    Tomas Lieskovan, Jan Hajny (Brno University of Technology, Czech Republic)

    Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory

    Thanos Papaioannou (Ionian University, Greece), Aggeliki Tsohou (Ionian University, Greece), Maria Karyda (University of the Aegean, Greece), Stylianos Karagiannis (PDM & FC, Portugal)

    CyBOK - The Cyber Security Body Of Knowledge

    Dr. Yulia Cherdantseva, Senior Lecturer at the School of Computer Science & Informatics at Cardiff University

    Abstract : Cyber Security Body of Knowledge (CyBOK) is a major project sponsored by the UK National Cyber Security Centre with the aim of developing a substantial resource offering a guide to the Cyber Security as a discipline and as a field of professional practice.  CyBOK codifies the foundational knowledge in cyber security for education and professional training.  It is an open and freely accessible resource (www.cybok.org) developed by the Community for the Community with contributions from over 115 experts across the world since 2017. CyBOK v1.1 is constituted by 21 knowledge areas. There are also free supplementary resources for students, educators and trainers, e.g. podcasts, resources for developing programmes based on CyBOK, lab materials, case studies for use in classroom, etc. This presentation will describe the process of developing CyBOK and maintaining it up to date, discuss the role of the international community in this process, outline the use cases of CyBOK and the future directions of the CyBOK project evolution.

    SECPID I
    Session Chair:
    Sebastian Ramacher (AIT Austrian Institute of Technology GmbH, Austria)

    Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing

    Alessandro Brighente (University of Padova, Italy), Mauro Conti (University of Padova, Italy, Delft University of Technology, The Netherlands), Savio Sciancalepore (Eindhoven University of Technology (TU/e)The Netherlands)

    Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers’ Perspective

    Salatiel Ezennaya-Gomez, Edgar Blumenthal, Marten Eckardt, Justus Krebs, Christopher Kuo, Julius Porbeck, Emirkan Toplu, Stefan Kiltz and Jana Dittmann (Otto-von-Guericke University Magdeburg, Germany)

    Towards Efficient FHE Based cPIR Schemes and Their Parameter Selection

    Cavidan Yakupoglu and Kurt Rohloff (NJIT, United States)

    12:45 - 13:45
    Lunch Break
    13:45 - 15:15
    IWPSMTS I
    Session Chair:
    Roland Rieke (Fraunhofer Institute for Secure Information Technology SIT, Germany)

    Introduction to the International Workshop on Privacy and Security of Multi-Modal Transport Systems

    Roland Rieke (Fraunhofer SIT | ATHENE, Germany)

    Challenges and solutions for security and seamless authentication services in airport-train multimodal travels

    Stefano Sebastio (Collins ART, Ireland)

    SECurity Test and Evaluation platform for Autonomous driving

    Daniel Zelle (Fraunhofer SIT | ATHENE, Germany)

    Security Operations Center for Multi-Modal Transport Systems

    Ali Recai Yekta (Yekta IT GmbH, Germany)

    Collaborative Security Pattern for Automotive Electrical/Electronic (E/E) Architectures

    Florian Fenzl (Fraunhofer SIT | ATHENE, Germany)

    EPESec II
    Session Chair:
    Theodoros Rokkas (inCITES Consulting, Luxembourg)

    Demonstration of alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform to Cybersecurity policy, regulatory and legislative advancements

    Dimitrios Skias (Netcompany-Intrasoft, Luxembourg), Sofia Tsekeridou (Netcompany-Intrasoft, Greece), Theodore Zahariadis (SYNELIXIS SOLUTIONS S.A, Greece.), Artemis Voulkidis (SYNELIXIS SOLUTIONS S.A., Greece) and Terpsichori-Helen Velivassaki (SYNELIXIS SOLUTIONS S.A., Greece)

    A Collaborative Intelligent Intrusion Response Framework for Smart Electrical Power and Energy Systems

    Konstantinos P. Grammatikakis, Ioannis Koufos and Nicholas Kolokotronis (University of the Peloponnese, Department of Informatics and Telecommunications, Greece)

    Evaluating The Cyber-Security Culture of the EPES Sector

    Anna Georgiadou, Ariadni Michalitsi-Psarrou and Dimitris Askounis (National Technical University of Athens, Greece)

    Classifying the factors affecting the adoption of the SDN-microSENSE innovations

    Theodoros Rokkas and Ioannis Neokosmidis (inCITES Consulting, Luxembourg)

    IWCSEC II
    Software Certification
    Session Chair:
    Maura Pintor (Pluribus One s.r.l., Italy and University of Cagliari, Italy)

    The AssureMOSS security certification scheme

    Ákos Milánkovich, Gergely Eberhardt and Dávid Lukács (Search-Lab Ltd., Hungary)

    Panel discussion

    Panel on delta certification - challenges and possible solutions

    Panelists: Eric Vetillard (ENISA), Kai Rannenberg (GUF, Cybersec4Europe), Isaac Dangana (CyberSEAS, Engineering), Luna Garcia Jesus (BOSCH, MEDINA)

    NG - SOC II
    Session Chair:
    Francesca Soro (AIT, Austria)

    Toward Automated Playbook Generation through Natural Language Processing

    Zsolt - Levente Kucsván (University of Twente, The Netherlands)

    Algorithms for detecting automatically generated domain names

    Irina Chiscop (TNO, the Netherlands) and Francesca Soro (AIT, Austria)

    Analysis of anomalies detected on endpoints

    Dmitriy Komashinskiy (F-secure, Finland)

    SP2I II
    Security And Machine Learning In Intelligent Infrastructures
    Session Chair:
    Raimundas Matulevicius (University of Tartu, Estonia)

    Artificial Intelligence-Assisted Side Channel Attacks

    Xiaolu Hou , Faculty of Informatics and Information Technologies, Slovak University of Technology

    Abstract: Deep neural networks (DNN) have gained popularity in the last decade due to advances in available computational resources. In particular, side-channel attacks (SCA) have received the most attention as being a classification problem, DNN comes as a natural candidate. In this talk, we will first provide the basics of SCA and explain how it can recover the secret key of a cryptographic implementation. Then, we will present the recent literature on applications of DNN to SCA. As a demonstration, we will detail a work that aims to propose a general framework that helps users with the overall trace analysis aided by DNN, minimizing the necessity for architecture adjustments by the user.

    CloudFL: A Zero-Touch Federated Learning Framework for Privacy-aware Sensor Cloud

    Viraaji Mothukuri (Kennesaw State University, United States), Reza M. Parizi (Kennesaw State University, United States), Seyedamin Pouriyeh (Kennesaw State University, United States), Afra Mashhadi (University of Washington, United States)

    Enhanced anomaly detection for cyber-attack detection in smart water distribution systems

    Branka Stojanovic, Helmut Neuschmied, Martin Winter and Ulrike Kleb (JOANNEUM RESEARCH Forschungsgesellschaft mbH, Austria)

    ETACS II
    Cybersecurity Skills Frameworks And Tools
    Session Chair:
    Jan Hajny (SPARTA, Brno University of Technology, Czech Republic)

    Adding European Cybersecurity Skills Framework into Curricula Designer

    Jan Hajny (Brno University of Technology, Czech Republic), Marek Sikora (Brno University of Technology, Czech Republic), Athanasios Grammatopoulos (University of Piraeus, Greece), Fabio Di Franco (ENISA, Greece)

    The Platform for Czech National Qualifications Framework in Cybersecurity

    Jakub Vostoupal (Masaryk University, Faculty of Informatics, Masaryk University, Faculty of Law, Czech Republic), František Kasl (Masaryk University, Faculty of Informatics, Masaryk University, Faculty of Law, Czech Republic), Pavel Loutocký (Masaryk University, Faculty of Informatics, Masaryk University, Faculty of Law, Czech Republic), Tomáš Pitner (Masaryk University, Faculty of Informatics, Czech Republic), Patrik Valo (Masaryk University, Faculty of Informatics, Czech Republic), Adam Valalský (Masaryk University, Faculty of Informatics, Czech Republic), Damián Paranič (Masaryk University, Faculty of Informatics, Czech Republic)

    Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation

    Sara Ricci (Brno University of Technology, Czech Republic), Marek Sikora (Brno University of Technology, Czech Republic), Simon Parker (Deutsches Krebsforschungszentrum, Germany), Imre Lendak (University of Novi Sad, Serbia), Yianna Danidou (European University Cyprus, Cyprus), Argyro Chatzopoulou (APIROPLUS Solutions Ltd., Cyprus), Remi Badonnel (University of Lorraine, France), Donatas Alksnys (Mykolas Romeris University, Lithuania)

    Panel Discussio n

    CCN: CONCORDIA (Felicia Cutas), ECHO (Pavel Varbanov), SPARTA (Jan Hajny)

    SECPID II
    Session Chair:
    Stephan Krenn (AIT Austrian Institute of Technology GmbH, Austria)

    YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC

    Stefan More and Lukas Alber (Graz University of Technology, Austria)

    Identity and Access Management Framework for Multi-tenant Resources in Hybrid Cloud Computing

    Saurabh Deochake and Vrushali Channapattan (Twitter, United States)

    All that is Solid Melts into Air: Towards Decentralized Cryptographic Access Control

    Harry Halpin (K.U. Leuven, Belgium)

    15:15 - 15:45
    Coffee Break
    15:45 - 17:15
    IWPSMTS II
    Session Chair:
    Roland Rieke (Fraunhofer Institute for Secure Information Technology SIT, Germany)

    Identity management for a seamless authentication in the transportation sector

    Piotr Sobonski (Collins ART, Ireland)

    Attribute-based authorization for a transaction between a transport company and a passenger

    Jean-Paul Bultel (CEA, France)

    An authentication and data sharing framework in the mobility service domain

    Henry Gadacz (Fraunhofer SIT | ATHENE, Germany)

    Utilizing the Trusted Platform Module in automotive networks to secure car sharing applications

    Lukas Jäger, Christian Plappert (Fraunhofer SIT | ATHENE, Germany)

    EPESec III
    Session Chair:
    Theodoros Rokkas (inCITES Consulting, Luxembourg)

    Panel disccusion with representatives from EPES projects

    ENS I
    Session Chair:
    Prof. Wojciech Mazurczyk (Warsaw University of Technology, Poland & FernUniversitaet in Hagen, Germany)

    Distributed Key Management in Microgrids

    Christos Xenakis, University of Piraeus

    Abstract: Security for smart industrial systems is prominent due to the proliferation of cyber threats threatening national critical infrastructures. Smart grid comes with intelligent applications that can utilize the bidirectional communication network among its entities. Microgrids are small-scale smart grids that enable Machine-to-Machine (M2M) communications as they can operate with some degree of independence from the main grid. In addition to protecting critical microgrid applications, an underlying key management scheme is needed to enable secure M2M message transmission and authentication. Existing key management schemes are not adequate due to microgrid special features and requirements. We propose the Micro sElf-orgaNiSed mAnagement (MENSA), which is the first hybrid key management and authentication scheme that combines Public Key Infrastructure (PKI) and Web-of-Trust concepts in micro-grids. Our experimental results demonstrate the efficiency of MENSA in terms of scalability and swiftness.

    The cybersecurity-related ethical issues of cloud technology and how to avoid them

    Aleksandra Pawlicka (ITTI Sp. z o.o. and University of Warsaw, Poland), Marek Pawlicki (ITTI Sp. z o.o. and Bydgoszcz University of Science and Technology, Poland), Rafał Renk (ITTI Sp. z o.o. and Adam Mickiewicz University, Poland), Rafał Kozik (ITTI Sp. z o.o. and Bydgoszcz University of Science and Technology, Poland) and Michal Choras (ITTI Sp. z o.o. and Bydgoszcz University of Science and Technology, Poland)

    PCSCI I
    Critical Infrastructures And Interdependencies
    Session Chair:
    Stefan Schauer (Austrian Insitute of Technology, Austria)

    The PRAETORIAN Project in a Nutshell

    Eva María Muñoz Navarro (ETRA I+D) and Frederic Guyomard (Électricité de France)

    The PRECINCT Project in a Nutshell

    Jenny Rainbird (Inlecom Pathways)

    CI Interdependencies and Cascading Effects

    Stefan Schauer and Sandra König (AIT Austrian Institute of Technology)

    Resilience Management Framework for Interdependent CIs

    Lorcan Connolly (Research Driven Solutions)

    Parametrization of Probabilistic Risk Models

    Sandra König and Abdelkader Magdy Shaaban (AIT Austrian Institute of Technology)

    Response Coordination for Complex Scenarios

    Lazaros Papadopoulos (Institute of Communication and Computer Systems)

    SP2I III
    Security And Trust In Intelligent Infrastructures
    Session Chair:
    Zdenek Martinasek (Brno University of Technology, Czech Republic)

    On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography

    Petr Jedlicka (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Lukas Malina (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Tomas Gerlich (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Zdenek Martinasek (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Jan Hajny (Brno University of Technology, FEEC, Department of Telecommunications, Czech Republic), Petr Socha (Czech Technical University in Prague, Faculty of Information Technology, Dept. of Digital Design, Czech Republic)

    Securing Shared Mobility Integration into Public Transport Infrastructure

    Abasi-Amefon Obot Affia and Raimundas Matulevicius

    An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive Devices

    Takahiro Ueda, Takayuki Sasaki, Katsunari Yoshioka and Tsutomu Matsumoto (Yokohama National University, Japan)

    CyberSane I
    Session Chair:
    Jorge Manuel Martins (Project Manager, PDMFC)

    CyberSANE project: concept, background, objectives, consortium (15 min)

    Jorge Manuel Martins, Project Manager, PDMFC

    CyberSANE architecture: : Core & 5 components (45 min)

    Luis Landeiro Ribeiro, Head of PMO at PDMFC, Project Manager for the CyberSANE project

    Thanos Karantjias, Chief Technology Officer, Maggioli

    CyberSANE Business models (30 min)

    Armend Duzha, Maggioli

    CS-EDU
    Session Chair:
    Gregor Langner (AIT, Austria)

    Challenges of cybersecurity education from a learner and educator perspective

    COLTRANE project overview

    Gregor Langner (Austrian Institute of Technology (AIT), Vienna, Austria)

    Steve Furnell (University of Nottingham, Nottingham, United Kingdom)

    17:15 - 17:30
    Short Coffee Break
    17:30 - 19:00
    IWPSMTS III
    Session Chair:
    Roland Rieke (Fraunhofer Institute for Secure Information Technology SIT, Germany)

    Ticket based lightweight security solution for small car E/E-components

    Claus-Henning Friederichs (AVL, Germany)

    Practical guidelines to configure homomorphic encryption schemes: An application to machine learning

    Antoine Choffrut (CEA, France)

    Homomorphic Encryption Based Pattern Search for Privacy Preserving Analytics

    Hoang-Gia NGUYEN (CEA, France)

    DRIVES: Android App for Automotive Customized Services

    Marco de Vincenzi (CNR, Italy)

    ENS II
    Session Chair:
    Prof. Krzysztof Cabaj (Warsaw University of Technology, Poland)

    SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET

    Mohammed A. Abdelmaguid, Hossam S. Hassanein and Mohammad Zulkernine (School of Computing, Queen’s University, Canada)

    Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection

    Marek Pawlicki, Rafał Kozik and Michał Choraś (ITTI Sp. z o.o. Poznań, Bydgoszcz University of Science and Technology Bydgoszcz, Poland)

    Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion

    Giorgos Agrafiotis, Eftychia Makri, Ioannis Flionis, Antonios Lalas, Konstantinos Votis and Dimitrios Tzovaras (Centre for Research and Technology Hellas/ Information Technologies Institute (CERTH/ITI), Greece)

    Applying Machine Learning on RSRP-based Features for False Base Station Detection

    Prajwol Kumar Nakarmi, Jakob Sternby and Ikram Ullah (Ericsson, Sweden)

    PCSCI II
    Technologies And Use Cases
    Session Chair:
    Stefan Schauer (Austrian Institute of Technology, Austria)

    Physical and Cyber Situational Awareness for CI

    Juan José Hernández Montesino (ETRA I+D) and Stephane Paul (Thales)

    Hybrid Situational Awareness

    Israel Perez Llopis and Javier Hingant Gómez (Universitat Politecnica de Valencia)

    Serious Games in Crisis Situations

    Daniel McCrum and Páraic Carroll (University College Dublin)

    A Methodology for Enhancing Emergency Situational Awareness through Social Media

    Antonios Karteris, Georgios Tzanos, Lazaros Papadopoulos, Konstantinos Demestichas, Dimitrios Soudris, Juliette Pauline Philibert and Carlos López Gómez

    The PRAETORIAN Use Cases in a Nutshell

    Eva María Munoz Navarro (ETRA I+D), Frederic Guyomard (Électricité de France) and
    Tamara Hadjina (KONCAR)

    The PRECINCT Living Labs in a Nutshell

    Isabel Verwee and Shirley Delannoy (VIAS Institute)

    CyberSane II
    Session Chair:
    Luis Landeiro Ribeiro (Head of PMO at PDMFC, Project Manager for the CyberSANE project)

    CyberSANE pilots: use cases and lessons learnt (60 min)

    Pablo Giménez Salazar, CyberSANE Pilot Coordinator and CyberSANE Transport Pilot Manager at Fundacion Valenciaport

    Robert Bordianu, Senior DevOps Engineer & IoT Evangelist in Lightsource Labs Limited and CyberSANE Energy pilot Manager

    Andrius Patapovas, CyberSANE Health Pilot, Healthcare Information Processing at Klinikum Nuremberg

    Guillermo Yuste, Cybersecurity Specialist and Data Analytics Consultant, Atos

    CyberSANE Standardisation activities (15 min)

    Manos Athanathos, Technical Project Manager, ICS Forth

    Q&A (15 min)

    Chaired by Luis Landeiro Ribeiro, Head of PMO at PDMFC, Project Manager for the CyberSANE project

    19:15 - 23:30
    Evening Reception And “Welcome back to ARES” Party