Title | Authors and Affiliations |
---|---|
Hardware-based Trusted Execution Environment for resource-contrained IoT devices | Anum Khurshid (RISE), Shahid Raza (RISE), Antonio Ken Iannillo (SnT) |
A Reliable Transport Mechanism for Blockchain-IoT Applications | Sina Rafati Niya, Eryk Schiller, Burkhard Stiller (University of Zurich) |
Quantification of IoT Attack Detectability | Yair Meidan (BGU), Asaf Shabtai (BGU) |
Decentralized enforcement of privacy preferences in IoT via blockchain | Barbara Carminati, Elena Ferrari, Federico Daidone (University of Insubria) |
Trustworthy IoT: An Evidence Collection Approach based on Smart Contracts | Claudio Ardagna, Ernesto Damiani (Università degli Studi di Milano) |
Hardware Security Assessment: A Machine Learning Approach | Charis Dimopoulos, Apostolos Fournaris, Odysseas Koufopavlou (University of Patras) |
Revisiting Rowhammer Attacks in Embedded Systems | Lidia Pocero Fraile , Apostolos Fournaris, Odysseas Koufopavlou (University of Patras) |
Lightweight Efficient Simeck32/64 Crypto-Core Designs and Implementations, for IoT Security | Stavros Limnaios, Nicolas Sklavos, Odysseas Koufopavlou (University of Patras) |
Title | Authors and Affiliations |
---|---|
Securing the future blockchain-based cybersecurity services | AJean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin (University of Lorraine) |
The Design and Evaluation of a Protection Services Recommender System | Muriel Franco, Bruno Rodrigues, Burkhard Stiller (University of Zurich) |
Blockchain Signaling System | Bruno Rodrigues, Burkhard Stiller (University of Zurich) |
Anomaly detection using custom threat intelligence and indicators of compromise | Pavel Minařík, Martin Holkovič (Flowmon Networks) |
Planning Anycast as Anti-DDoS (PAADDoS) | Leandro Bertholdo (University of Twente) |
A Case of Identity: Finding Homoglyph Domains in Active DNS Measurements | Ramin Yazdani (University of Twente) |
MADDVIPR: Mapping DNS DDoS Vulnerabilities to Improve Protection and Prevention | Raffaele Sommese (University of Twente) |
On-demand Generation of Encrypted Datasets for Cybersecurity Analysis | Martin Drašar, Milan Čermák, Pavel Čeleda (Masaryk University) |
Title | Authors and Affiliations |
---|---|
Threat Intelligence at the Edge of IoT - Federated Machine Learning | Han Wang, Shahid Raza (RISE, Research Institutes of Sweden), Luis Barriga(Ericsson) |
On the Service-Centric Security Mechanism Design Through Threats Modeling and Dependency Analysis | Heng Zhang, Salman Manzoor, Peter Bokor, Neeraj Suri (TU Darmstadt) |
Preventing File-less Attacks using Machine Learning Techniques | Alexandru - Gabriel Bucevschi, Gheorghe Balan, Dumitru Bogdan Prelipcean (Bitdefender) |
Morphological analysis at work: Gorille stopped LockerGoga | Guillaume Bonfante (Lorraine University), Jean-Yves Marion (Lorraine University), Fabrice Sabatier (CNRS), Laurent Werner (Cyber-Detect) |
Lateral Movement and Telco Fraud Detection | Kaiafas G., Lagraa S., State R., SnT, University of Luxembourg, Hammerschmidt C., TU Delft |
Robotic Security and Reliability | Sean Rivera, Antonio Ken Iannillo, SnT, University of Luxembourg |
Mobile App to SGX Secure Channel | Fernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes, Radu State SEDAN, SnT, University of Luxembourg |
CONFUZZIUS: A Smart Evolutionary Fuzzer for Ethereum Smart Contracts | Christof Ferreira Torres, Antonio Ken Iannillo, Radu State SnT, University of Luxembourg |
Title | Authors and Affiliations |
---|---|
Data-Centric Security: behavioral threat analysis | Mohammad Hamad, Vassilis Prevelakis. TU Braunschweig |
Improving 5G IoT With Machine Learning | Thanh van Do (Telenor), Boning Feng (OsloMet), Thuan van Do (Wolffia), Bruno Dzogovic ( OsloMet), Niels Jacot (Wolffia) and Bernardo Santos (OsloMet) |
Automating Security Enhancement for Cloud Services | Rémi Badonnel (University of Lorraine), Olivier Festor (University of Lorraine) |
Blockchain as a platform for secure inter-organizational business process | Barbara Carminati, Elena Ferrari, Christian Rondanini (University of Insubria) |
Security Assurance for Cloud Systems | Marco Anisetti, Claudio Ardagna, Nicola Bena, Ernesto Damiani (Università degli Studi di Milano) |
Using blockchains to enable Big Data analysis of private information | Konstantinos Lampropoulos (FORTH), Giorgos Georgakakos (UP), Sotiris Ioannidis (FORTH) |
A Multilayer Secure Framework for Vehicular Systems | Mohammad Hamad (TUBS), Vassilis Prevelakis (TUBS) |
Title | Authors and Affiliations |
---|---|
TALON: An automated framework for Cross-Device Tracking Detection | Kostas Solomos (FORTH), Panagiotis Ilias (UIC), Sotiris Ioannidis (FORTH), Nicolas Kourtellis (TID) |
Nothing is free in the web: Transparency on RTB with YourAdvalue tool | Michalis Pachilakis (FORTH), Panagiotis Papadopoulos (FORTH), Evangelos P. Markatos (FORTH), Nicolas Kourtellis (TID) |
No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem | Michalis Pachilakis (FORTH), Panagiotis Papadopoulos (FORTH), Evangelos P. Markatos (FORTH), Nicolas Kourtellis (TID) |
Cookie Synchronization: Everything You Always Wanted to Know but were afraid to ask | Panagiotis Papadopoulos (FORTH), Evangelos P. Markatos (FORTH), Nicolas Kourtellis (TID) |
On the Influence of Twitter Trolls during the 2016 US Presidential Election | Nikos Salamanos (CUT), Mike Jersen (University of Canberra), Xinlei He (Fudan University), Yang Chen (Fudan University), Michael Sirivianos (CUT) |
Privacy Management within a Blockchain-based solution | Blaž Podgorelec (UM), Muhamed Turkanović (UM) |
False content in Twitter | Despoina Antonakaki (FORTH), Alexander Shevtsov (FORTH), Sotiris Ioannidis (FORTH) |
Discovery and classification of Twitter bots | Alexander Shevtsov (FORTH), Maria Oikonomidou (FORTH), Despoina Antonakaki (FORTH), Polyvios Pratikakis (FORTH), Sotiris Ioannidis (FORTH), Paraskevi Fragopoulou (FORTH) |
Cross-federation identity solutions using blockchain technologies | Konstantinos Lampropoulos, Giorgos Georgakakos, Spyros Denazis (University of Patras) |
Data Security for cost effective KYC Compliance | Robert Norvill, SnT, University of Luxembourg |
Title | Authors and Affiliations |
---|---|
E-Health Sector:Privacy and Data Protection | A. Majstorovic, V.U. Ruiz Quero; eesy-innovation GmbH, Germany D. Houdeau, Infineon Technology, Germany T. Pavleska, Jozef Stefan Institute, Slovenia |
Security of Unoccupied Aerial Systems | Cora Perner, Airbus Cybersecurity |