Title |
Speakers |
Summary |
Topic Types |
JavaScript malware detection using locality sensitive hashing |
Stefan Carl Peiser
,
Ludwig Scandariato
|
N/A |
|
CONCORIDA: A Cybersecurity Competence Network with leading research, technology, industrial and public compete |
Sotiris Ioannidis
|
N/A |
|
Women in cyber – CONCORDIA H2020 contribution |
Barbara Carminati
|
N/A |
|
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding |
Jian Liu
,
Can Yang
,
Mengxia Luo
,
Xiaorui Liu
|
N/A |
|
Influence of “Dark Patterns” on Opting-out in Cookie Banner Design |
Michael Toth
|
N/A |
|
ECHO: Strengthening Cyber Defence in Europe through efficient multi-sector and multi-domain collaboration |
Matteo Merialdo
|
N/A |
|
Code between the Lines: Semantic Analysis of Android Applications |
Johannes Gruber
|
N/A |
|
A Serious Game on the GDPR, and Privacy and Security Awareness |
Ahad Pape
|
N/A |
|
Assisting users to create stronger passwords using ContextBased MicroTraining |
Joakim Nohlberg
|
N/A |
|
This is SPARTA: Towards European Strategic Autonomy |
Augustin Lemesle
|
N/A |
|
Facilitating Privacy Attitudes & Behaviors with Affective Visual Design |
Agnieszka Kitkowska
,
Yefim Shulman
,
Leonardo Wästlund
|
N/A |
|
CyberSec4Europe – Aiming to safeguard values through excellence in cybersecurity |
Kai Rannenberg
|
N/A |
|
Privacy CURE: Consent Comprehension Made Easy |
Olha Kirrane
|
N/A |
|
Keynote: “Data Security and Privacy in the IoT” |
Elisa Bertino
|
N/A |
|
Revisiting Security Vulnerabilities in Commercial Password Managers |
Michael Shahandashti
|
N/A |
|
Learning and Grading Cryptology via Automated Test Driven Software Development |
Konstantin Knorr
|
N/A |
|
What is the Role of Control over Personal Information for Privacy Cynicism and Personal Data Disclosure? |
Thao Ngo
,
Ina Krämer
|
N/A |
|
Evaluation of Risk-based Re-Authentication Methods |
Stephan Wiefling
,
Tanvi Patil
,
Markus Iacono
|
N/A |
|
An Institutional Risk Reduction Model for Teaching Cybersecurity |
Erik Moore
,
Daniel Likarish
,
Bobbie Brooks
|
N/A |
|
e-Health as a target in Cyberwar: Expecting the worst |
Samuel Wairimu
|
N/A |
|
Fuzzy Vault for Behavioral Authentication System |
Md Safavi-naini
|
N/A |
|
The ethics of ethical hacking – abstract |
Fredrik Heiding
|
N/A |
|
IMShell-Dec :Pay More Attention to External Links in PowerShell |
Chao Yang
,
Jianfeng Ma
,
Siqi Ma
,
Ruidong Han
,
Yunbo Li
|
N/A |
|
A serious game-based peer-instruction digital forensics workshop |
Ludwig Pernul
|
N/A |
|
Combination of differential privacy mechanisms for continuous collection of mobile data |
Héber H. Arcolezi
,
Jean-françois Couchot
,
Béchara Xiao
|
N/A |
|
Secure Attestation of Virtualized Environments |
Markus Springer
,
Michael Eckel
,
Andreas Repp
|
N/A |
|
Threat Poker: Gamification of Secure Agile |
Audun Jøsang
,
Viktoria Rygge
|
N/A |
|
Privacy-preserving IDS for In-Car-Networks with Local Differential Privacy |
Peter Franke
,
Michael Fhom
|
N/A |
|
Security and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor |
Asya Mitseva
,
Marharyta Aleksandrova
,
Thomas Panchenko
|
N/A |
|
How to Teach the Undecidability of Malware Detection Problem and Halting Problem |
Pascal Lafourcade
,
Malika More
,
Léo Robert
,
Journault Poulain
|
N/A |
|
Security in e-payments: two-factor authentication under PSD2 and GDPR |
Danaja Fabcic
|
N/A |
|
Actively Probing Routes for Tor AS-level Adversaries with RIPE Atlas |
Wilfried Mayer
,
Georg Weippl
|
N/A |
|
Enlivening Port Scanning Exercises with Capture the Flag and Deduction |
Frans F. Blauw
|
N/A |
|
Privacy in Payment in the Age of Central Bank Digital Currency |
Frédéric Tronnier
|
N/A |
|
zeek-osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection |
Steffen Haas
,
Robin Fischer
|
N/A |
|
Encouraging Equivocal Forensic Analysis through the Use of Red Herrings |
Wai Sze Leung
|
N/A |
|
An Evaluation of the Trust Assumptions and Privacy Guarantees of Electronic Payment Systems |
Peter Hamm
|
N/A |
|
Keynote: “How to Fix Vulnerability Fixing” |
Stanka Kolšek
|
N/A |
|
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems |
Konstantinos Markantonakis
,
Benjamin Semal
,
Raja Kalbantner
|
N/A |
|
An Analysis and Evaluation of Open-source CTF Platforms as Cybersecurity e-Learning Tools |
Stylianos Magkos
|
N/A |
|
Analysing drivers’ preferences for privacy enhancing car-to-car communication systems |
Simone Fischer-hübner
,
Lejla Islami
,
Eunice Eloff
|
N/A |
|
Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels |
Thomas Jaskolka
|
N/A |
|
Quality Criteria for Cyber Security MOOCs |
Simone Fischer-hübner
,
Matthias Beckerle
,
Alberto Lluch Lafuente
,
Antonio Ruiz Martínez
,
Karo Saharinen
,
Antonio Sterlin
|
N/A |
|
Learning Analytics and Privacy – Respecting Privacy in Digital Learning Scenarios |
Marvin Priedigkeit
,
Andreas Schiering
|
N/A |
|
IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks through Indirect Eviction |
Muhammad Asim Mukhtar
,
Muhammad Gogniat
|
N/A |
|
Education for the multifaith community of cybersecurity |
Steven Bishop
|
N/A Improvements of the Balance Discovery Attack on Lightning Network Payment ChannelsGijs van Dam, Rabiah ... |
|
Designing Competency Models for Cybersecurity Professionals for the Banking Sector |
Natalia Tolstoy
,
Andrey Vybornov
|
N/A |
|
Preserving Privacy in Caller ID applications |
Tamara Ghilezan
|
N/A |
|
CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin |
Weizheng Su
|
N/A |
|
Exploring the Value of a Cyber Threat Intelligence Function in an Organization |
Jacques Berndt
|
N/A |
|
“Identity management by design” with a technical Mediator under the GDPR |
Anne Steinbrueck
|
N/A |
|
Privacy-friendly Monero transaction signing on a hardware wallet |
Dusan Matyas
|
N/A |
|
Automating the Communication of Cybersecurity Knowledge: Multi-Case Study |
Alireza Shojaifar
,
Samuel Gwerder
|
N/A |
|
Open about the open-rate? State of email tracking and its effects on user’s privacy |
Shirin Kalantari
|
N/A |
|
Escaping Backdoor Attack Detection of Deep Learning |
Fengyuan Xu
,
Yayuan Xiong
,
Sheng Li
|
N/A |
|
Refined detection of SSH brute-force attackers using machine learning. |
Karel Hynek
,
Tomáš Beneš
,
Tomáš Kubátová
|
N/A |
|
Don’t Tell Them now (or at all) – End User Notification Duties under GDPR and NIS Directive |
Sandra Schiffner
|
N/A |
|
FDFtNet: Facing Off Fake Images using Fake DetectionFine-tuning Network |
Hyeonseong Jeon
,
Youngoh Woo
|
N/A |
|
MultiTLS: Secure communication channel with cipher suite diversity |
Miguel Correia
,
David R. Matos
,
Ricardo Moura
|
N/A |
|
Privacy-Enhancing Technologies – where are we after 25 years? |
Marit Hansen
|
N/A |
|
Correlations-Preserving Fingerprinting Technique for Categorical Data in Relational Databases |
Tanja Mayer
|
N/A |
|
Improving Big Data Clustering for Jamming Detection in Smart Mobility |
Hind Bangui
,
Mouzhi Buhnova
|
N/A |
|
A Matter of Life and Death: Analyzing the Security of Healthcare Networks |
Elisa Costante
,
Daniel Santos
,
Guillaume Dupont
,
Jerry Etalle
|
N/A |
|
Privacy Respecting Data Sharing and Communication in mHealth: A Case Study |
Michael Schiering
|
N/A |
|
Establishing a Strong Baseline for Privacy Policy Classification |
Najmeh Mousavi Nejad
,
Pablo Jabat
,
Rostislav Nedelchev
,
Simon Graux
|
N/A |
|
Privacy-preserving Analytics for Data Markets |
Stephan Krenn
,
Karl Koch
,
Donato Ramacher
|
N/A |
|
Cross-Platform File System Activity Monitoring and Forensics – A Semantic Approach |
Kabul Kurniawan
,
Andreas Ekelhart
,
Fajar Kiesling
|
N/A |
|