IFIPSEC 2020 Sept. 21, 2020 to Sept. 23, 2020, Virtual, Virtual

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
JavaScript malware detection using locality sensitive hashing Stefan Carl Peiser , Ludwig Scandariato N/A
CONCORIDA: A Cybersecurity Competence Network with leading research, technology, industrial and public compete Sotiris Ioannidis N/A
Women in cyber – CONCORDIA H2020 contribution Barbara Carminati N/A
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding Jian Liu , Can Yang , Mengxia Luo , Xiaorui Liu N/A
Influence of “Dark Patterns” on Opting-out in Cookie Banner Design Michael Toth N/A
ECHO: Strengthening Cyber Defence in Europe through efficient multi-sector and multi-domain collaboration Matteo Merialdo N/A
Code between the Lines: Semantic Analysis of Android Applications Johannes Gruber N/A
A Serious Game on the GDPR, and Privacy and Security Awareness Ahad Pape N/A
Assisting users to create stronger passwords using ContextBased MicroTraining Joakim Nohlberg N/A
This is SPARTA: Towards European Strategic Autonomy Augustin Lemesle N/A
Facilitating Privacy Attitudes & Behaviors with Affective Visual Design Agnieszka Kitkowska , Yefim Shulman , Leonardo Wästlund N/A
CyberSec4Europe – Aiming to safeguard values through excellence in cybersecurity Kai Rannenberg N/A
Privacy CURE: Consent Comprehension Made Easy Olha Kirrane N/A
Keynote: “Data Security and Privacy in the IoT” Elisa Bertino N/A
Revisiting Security Vulnerabilities in Commercial Password Managers Michael Shahandashti N/A
Learning and Grading Cryptology via Automated Test Driven Software Development Konstantin Knorr N/A
What is the Role of Control over Personal Information for Privacy Cynicism and Personal Data Disclosure? Thao Ngo , Ina Krämer N/A
Evaluation of Risk-based Re-Authentication Methods Stephan Wiefling , Tanvi Patil , Markus Iacono N/A
An Institutional Risk Reduction Model for Teaching Cybersecurity Erik Moore , Daniel Likarish , Bobbie Brooks N/A
e-Health as a target in Cyberwar: Expecting the worst Samuel Wairimu N/A
Fuzzy Vault for Behavioral Authentication System Md Safavi-naini N/A
The ethics of ethical hacking – abstract Fredrik Heiding N/A
IMShell-Dec :Pay More Attention to External Links in PowerShell Chao Yang , Jianfeng Ma , Siqi Ma , Ruidong Han , Yunbo Li N/A
A serious game-based peer-instruction digital forensics workshop Ludwig Pernul N/A
Combination of differential privacy mechanisms for continuous collection of mobile data Héber H. Arcolezi , Jean-françois Couchot , Béchara Xiao N/A
Secure Attestation of Virtualized Environments Markus Springer , Michael Eckel , Andreas Repp N/A
Threat Poker: Gamification of Secure Agile Audun Jøsang , Viktoria Rygge N/A
Privacy-preserving IDS for In-Car-Networks with Local Differential Privacy Peter Franke , Michael Fhom N/A
Security and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor Asya Mitseva , Marharyta Aleksandrova , Thomas Panchenko N/A
How to Teach the Undecidability of Malware Detection Problem and Halting Problem Pascal Lafourcade , Malika More , Léo Robert , Journault Poulain N/A
Security in e-payments: two-factor authentication under PSD2 and GDPR Danaja Fabcic N/A
Actively Probing Routes for Tor AS-level Adversaries with RIPE Atlas Wilfried Mayer , Georg Weippl N/A
Enlivening Port Scanning Exercises with Capture the Flag and Deduction Frans F. Blauw N/A
Privacy in Payment in the Age of Central Bank Digital Currency Frédéric Tronnier N/A
zeek-osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection Steffen Haas , Robin Fischer N/A
Encouraging Equivocal Forensic Analysis through the Use of Red Herrings Wai Sze Leung N/A
An Evaluation of the Trust Assumptions and Privacy Guarantees of Electronic Payment Systems Peter Hamm N/A
Keynote: “How to Fix Vulnerability Fixing” Stanka Kolšek N/A
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems Konstantinos Markantonakis , Benjamin Semal , Raja Kalbantner N/A
An Analysis and Evaluation of Open-source CTF Platforms as Cybersecurity e-Learning Tools Stylianos Magkos N/A
Analysing drivers’ preferences for privacy enhancing car-to-car communication systems Simone Fischer-hübner , Lejla Islami , Eunice Eloff N/A
Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels Thomas Jaskolka N/A
Quality Criteria for Cyber Security MOOCs Simone Fischer-hübner , Matthias Beckerle , Alberto Lluch Lafuente , Antonio Ruiz Martínez , Karo Saharinen , Antonio Sterlin N/A
Learning Analytics and Privacy – Respecting Privacy in Digital Learning Scenarios Marvin Priedigkeit , Andreas Schiering N/A
IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks through Indirect Eviction Muhammad Asim Mukhtar , Muhammad Gogniat N/A
Education for the multifaith community of cybersecurity Steven Bishop N/A Improvements of the Balance Discovery Attack on Lightning Network Payment ChannelsGijs van Dam, Rabiah ...
Designing Competency Models for Cybersecurity Professionals for the Banking Sector Natalia Tolstoy , Andrey Vybornov N/A
Preserving Privacy in Caller ID applications Tamara Ghilezan N/A
CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin Weizheng Su N/A
Exploring the Value of a Cyber Threat Intelligence Function in an Organization Jacques Berndt N/A
“Identity management by design” with a technical Mediator under the GDPR Anne Steinbrueck N/A
Privacy-friendly Monero transaction signing on a hardware wallet Dusan Matyas N/A
Automating the Communication of Cybersecurity Knowledge: Multi-Case Study Alireza Shojaifar , Samuel Gwerder N/A
Open about the open-rate? State of email tracking and its effects on user’s privacy Shirin Kalantari N/A
Escaping Backdoor Attack Detection of Deep Learning Fengyuan Xu , Yayuan Xiong , Sheng Li N/A
Refined detection of SSH brute-force attackers using machine learning. Karel Hynek , Tomáš Beneš , Tomáš Kubátová N/A
Don’t Tell Them now (or at all) – End User Notification Duties under GDPR and NIS Directive Sandra Schiffner N/A
FDFtNet: Facing Off Fake Images using Fake DetectionFine-tuning Network Hyeonseong Jeon , Youngoh Woo N/A
MultiTLS: Secure communication channel with cipher suite diversity Miguel Correia , David R. Matos , Ricardo Moura N/A
Privacy-Enhancing Technologies – where are we after 25 years? Marit Hansen N/A
Correlations-Preserving Fingerprinting Technique for Categorical Data in Relational Databases Tanja Mayer N/A
Improving Big Data Clustering for Jamming Detection in Smart Mobility Hind Bangui , Mouzhi Buhnova N/A
A Matter of Life and Death: Analyzing the Security of Healthcare Networks Elisa Costante , Daniel Santos , Guillaume Dupont , Jerry Etalle N/A
Privacy Respecting Data Sharing and Communication in mHealth: A Case Study Michael Schiering N/A
Establishing a Strong Baseline for Privacy Policy Classification Najmeh Mousavi Nejad , Pablo Jabat , Rostislav Nedelchev , Simon Graux N/A
Privacy-preserving Analytics for Data Markets Stephan Krenn , Karl Koch , Donato Ramacher N/A
Cross-Platform File System Activity Monitoring and Forensics – A Semantic Approach Kabul Kurniawan , Andreas Ekelhart , Fajar Kiesling N/A