EICC 2020 Nov. 18, 2020 to Nov. 18, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Raising Security Awareness on Mobile Systems through Gamification Kris Heid , Jens Heider , Kasra Qasempour Smartphones are more and more included into our personal and business environment. A data leakage ...
AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research Paul Smith , Florian Skopik , Gregor Langner , Wolfgang Hotwagner , Maria Leitner , Maximilian Frank , Oliver Maurhart , Timea Pahi , Lenhard Reuter , Manuel Warum With the evolution of threats and attacks and the speed of automation, new modern training ...
Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend Analysis Sanchari Das , Sayar Karmakar COVID-19's impact has surpassed from personal and global health to our social life. In terms ...
Privacy-Preserving Warning Management for an Identity Leakage Warning Network Michael Meier , Saffija Kasem-madani , Timo Malderle , Felix Boes Identity leakage is the public disclosure of user accounts that were stolen from an online ...
Shadow-Heap: Preventing Heap-based Memory Corruptions by Metadata Validation Johannes Bouché , Lukas Atkinson , Martin Kappes In the past, stack smashing attacks and buffer overflows were some of the most insidious ...
Covert Channels in Transport Layer Security Wojciech Mazurczyk , Corinna Heinz , Luca Caviglione Network covert channels embedded within network conversations are becoming widely adopted to enforce privacy of ...
FAP: Design of an Architecture of a Forensic Access Point to Perform Online Access in a Forensically Sound Manner Daniel Spiekermann The forensic investigation of data stored on mobile devices is a common option to analyze ...
Cross-domain meta-learning for bug finding in the source codes with a small dataset Jongho Shin In terms of application security, detecting security vulnerabilities in prior and fixing them is one ...
What Brings Women to Cybersecurity?: A Qualitative Study of Women's Pathways to Cybersecurity in Norway Hilde G. Corneliussen The proportion of women in information technology (IT) work is low, however, the growing field ...
The role of information sensitivity in adoption of E2EE communication software Damjan Fujs , Luka Jelovčan , Simon Vrhovec , Anže Mihelič This poster reports on an exploratory study of E2EE communication software adoption factors among academics ...
Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires Mario Kahlhofer , Michael Hölzl , Andreas Berger Rapidly-changing cloud environments that consist of heavily interconnected components are difficult to secure. Existing solutions ...
A Novel Approach for Acquiring Training and Software Security Requirements Damjan Fujs , Simon Vrhovec , Damjan Vavpotič Security is an important software quality attribute albeit, as a nonfunctional requirement, often overlooked. Although ...
Covert Channels in One-Time Passwords Based on Hash Chains Steffen Wendzel , Jorg Keller We present a covert channel between two network devices where one authenticates itself with Lamport's ...
Anomaly Detection in ICS based on Data-history Analysis Steffen Wendzel , Laura Hartmann Data of industrial control systems (ICS) are increasingly subject to cyber attacks which should be ...
Data hiding: New opportunities for security and privacy? David Megias Data hiding provides a collection of techniques that can be used within a wider cybersecurity ...