Posters - COD 2019

Device-Centric Security IoT Security Analytics

Title Authors and Affiliations
Hardware-based Trusted Execution Environment for resource-contrained IoT devices Anum Khurshid (RISE), Shahid Raza (RISE), Antonio Ken Iannillo (SnT)
A Reliable Transport Mechanism for Blockchain-IoT Applications Sina Rafati Niya, Eryk Schiller, Burkhard Stiller (University of Zurich)
Quantification of IoT Attack Detectability Yair Meidan (BGU), Asaf Shabtai (BGU)
Decentralized enforcement of privacy preferences in IoT via blockchain Barbara Carminati, Elena Ferrari, Federico Daidone (University of Insubria)
Trustworthy IoT: An Evidence Collection Approach based on Smart Contracts Claudio Ardagna, Ernesto Damiani (Università degli Studi di Milano)
Hardware Security Assessment: A Machine Learning Approach Charis Dimopoulos, Apostolos Fournaris, Odysseas Koufopavlou (University of Patras)
Revisiting Rowhammer Attacks in Embedded Systems Lidia Pocero Fraile , Apostolos Fournaris, Odysseas Koufopavlou (University of Patras)
Lightweight Efficient Simeck32/64 Crypto-Core Designs and Implementations, for IoT Security Stavros Limnaios, Nicolas Sklavos, Odysseas Koufopavlou (University of Patras)

Network-Centric Security

Title Authors and Affiliations
Securing the future blockchain-based cybersecurity services AJean-Philippe Eisenbarth, Thibault Cholez, Olivier Perrin (University of Lorraine)
The Design and Evaluation of a Protection Services Recommender System Muriel Franco, Bruno Rodrigues, Burkhard Stiller (University of Zurich)
Blockchain Signaling System Bruno Rodrigues, Burkhard Stiller (University of Zurich)
Anomaly detection using custom threat intelligence and indicators of compromise Pavel Minařík, Martin Holkovič (Flowmon Networks)
Planning Anycast as Anti-DDoS (PAADDoS) Leandro Bertholdo (University of Twente)
A Case of Identity: Finding Homoglyph Domains in Active DNS Measurements Ramin Yazdani (University of Twente)
MADDVIPR: Mapping DNS DDoS Vulnerabilities to Improve Protection and Prevention Raffaele Sommese (University of Twente)
On-demand Generation of Encrypted Datasets for Cybersecurity Analysis Martin Drašar, Milan Čermák, Pavel Čeleda (Masaryk University)

Software/System-centric Security

Title Authors and Affiliations
Threat Intelligence at the Edge of IoT - Federated Machine Learning Han Wang, Shahid Raza (RISE, Research Institutes of Sweden), Luis Barriga(Ericsson)
On the Service-Centric Security Mechanism Design Through Threats Modeling and Dependency Analysis Heng Zhang, Salman Manzoor, Peter Bokor, Neeraj Suri (TU Darmstadt)
Preventing File-less Attacks using Machine Learning Techniques Alexandru - Gabriel Bucevschi, Gheorghe Balan, Dumitru Bogdan Prelipcean (Bitdefender)
Morphological analysis at work: Gorille stopped LockerGoga Guillaume Bonfante (Lorraine University), Jean-Yves Marion (Lorraine University), Fabrice Sabatier (CNRS), Laurent Werner (Cyber-Detect)
Lateral Movement and Telco Fraud Detection Kaiafas G., Lagraa S., State R., SnT, University of Luxembourg, Hammerschmidt C., TU Delft
Robotic Security and Reliability Sean Rivera, Antonio Ken Iannillo, SnT, University of Luxembourg
Mobile App to SGX Secure Channel Fernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes, Radu State SEDAN, SnT, University of Luxembourg
CONFUZZIUS: A Smart Evolutionary Fuzzer for Ethereum Smart Contracts Christof Ferreira Torres, Antonio Ken Iannillo, Radu State SnT, University of Luxembourg

Data/Application-centric Security

Title Authors and Affiliations
Data-Centric Security: behavioral threat analysis Mohammad Hamad, Vassilis Prevelakis. TU Braunschweig
Improving 5G IoT With Machine Learning Thanh van Do (Telenor), Boning Feng (OsloMet), Thuan van Do (Wolffia), Bruno Dzogovic ( OsloMet), Niels Jacot (Wolffia) and Bernardo Santos (OsloMet)
Automating Security Enhancement for Cloud Services Rémi Badonnel (University of Lorraine), Olivier Festor (University of Lorraine)
Blockchain as a platform for secure inter-organizational business process Barbara Carminati, Elena Ferrari, Christian Rondanini (University of Insubria)
Security Assurance for Cloud Systems Marco Anisetti, Claudio Ardagna, Nicola Bena, Ernesto Damiani (Università degli Studi di Milano)
Using blockchains to enable Big Data analysis of private information Konstantinos Lampropoulos (FORTH), Giorgos Georgakakos (UP), Sotiris Ioannidis (FORTH)
A Multilayer Secure Framework for Vehicular Systems Mohammad Hamad (TUBS), Vassilis Prevelakis (TUBS)

User-Centric Security

Title Authors and Affiliations
TALON: An automated framework for Cross-Device Tracking Detection Kostas Solomos (FORTH), Panagiotis Ilias (UIC), Sotiris Ioannidis (FORTH), Nicolas Kourtellis (TID)
Nothing is free in the web: Transparency on RTB with YourAdvalue tool Michalis Pachilakis (FORTH), Panagiotis Papadopoulos (FORTH), Evangelos P. Markatos (FORTH), Nicolas Kourtellis (TID)
No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem Michalis Pachilakis (FORTH), Panagiotis Papadopoulos (FORTH), Evangelos P. Markatos (FORTH), Nicolas Kourtellis (TID)
Cookie Synchronization: Everything You Always Wanted to Know but were afraid to ask Panagiotis Papadopoulos (FORTH), Evangelos P. Markatos (FORTH), Nicolas Kourtellis (TID)
On the Influence of Twitter Trolls during the 2016 US Presidential Election Nikos Salamanos (CUT), Mike Jersen (University of Canberra), Xinlei He (Fudan University), Yang Chen (Fudan University), Michael Sirivianos (CUT)
Privacy Management within a Blockchain-based solution Blaž Podgorelec (UM), Muhamed Turkanović (UM)
False content in Twitter Despoina Antonakaki (FORTH), Alexander Shevtsov (FORTH), Sotiris Ioannidis (FORTH)
Discovery and classification of Twitter bots Alexander Shevtsov (FORTH), Maria Oikonomidou (FORTH), Despoina Antonakaki (FORTH), Polyvios Pratikakis (FORTH), Sotiris Ioannidis (FORTH), Paraskevi Fragopoulou (FORTH)
Cross-federation identity solutions using blockchain technologies Konstantinos Lampropoulos, Giorgos Georgakakos, Spyros Denazis (University of Patras)
Data Security for cost effective KYC Compliance Robert Norvill, SnT, University of Luxembourg

Industrial use cases

Title Authors and Affiliations
E-Health Sector:Privacy and Data Protection A. Majstorovic, V.U. Ruiz Quero; eesy-innovation GmbH, Germany D. Houdeau, Infineon Technology, Germany T. Pavleska, Jozef Stefan Institute, Slovenia
Security of Unoccupied Aerial Systems Cora Perner, Airbus Cybersecurity