PROGRAM
Days: Monday, December 9th Tuesday, December 10th Wednesday, December 11th
Monday, December 9th
View this program: with abstractssession overviewtalk overview
10:30-12:05 Session 1: Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications
Chair:
10:30 | The Perfect Victim? Family Offices as Targets for Cybercriminals (abstract) |
10:50 | Advanced Real-Time Detection of Cyber Threat Information from Tweets (abstract) |
11:10 | Mitigating spillover effects of ransomware in financial markets: Lessons from the LockBit attacks (abstract) |
11:25 | Exploring Smart Speaker Disclosure and Adoption Intentions: A Privacy Adoption Calculus Perspective (abstract) |
11:45 | ICoSSiuM: an Integrated Communication Security Simulator for Maritime operations (abstract) |
13:30-15:00 Session 2: Automating and enhancing security mechanisms in software systems and data management
Chair:
13:30 | Lowering the Barrier: An Automatic Attack Flow Generation Framework for Non-Security Experts (abstract) |
13:50 | An Approach to Determine a System's Behavioural Security Posture (abstract) |
14:10 | Secure Data Traceability for Mobile DataCollectors (abstract) |
14:30 | Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy (abstract) |
16:20-17:35 Session 3: Cybersecurity and AI when applied to emerging technologies
Chair:
16:20 | Light-SABRE: A lightweight encrypted data distribution system for Internet of Things (abstract) |
16:40 | Evaluating Large Language Models on Cybersecurity Knowledge and Skills: A Comparative Analysis (abstract) |
17:00 | Drone Anomaly Detection: Dataset and Unsupervised Machine Learning (abstract) PRESENTER: Zhuo Chen |
17:20 | A Tool for Enabling Scalable Automation in Security Control Selection (abstract) PRESENTER: Dylan Leveille |
Tuesday, December 10th
View this program: with abstractssession overviewtalk overview
10:30-12:00 Session 4: Cybersecurity and Ethics
*includes a paper nominated for Best Paper Award
Chair:
10:30 | A Systematic Evaluation of Non-SDK Interface Restrictions in Android: Bridging the Gap Between Guidelines and Practice (abstract) |
10:50 | An Approach for Handling Missing Attribute Values in Attribute-Based Access Control Policy Mining (abstract) |
11:05 | Does Gender Matter? Examining and Mitigating Gender Bias in Fake News Detection (abstract) PRESENTER: Dorsaf Sallami |
11:25 | ProFineLlama: A Prompt and Fine-Tuned Transfer Learning Approach for Multi-Domain Fake News Detection (abstract) PRESENTER: Mohammad Q. Alnabhan |
11:40 | Parametric Automata for Dynamic Access Control Policies (abstract) |
13:30-15:00 Session 5: Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and critical infrastructure
Chair:
13:30 | Fingerprinting Connected Wi-Fi Devices Using Per-network MAC Addresses (abstract) |
13:45 | Privacy Guard: Empowering Users with Privacy Labels and Intuitive Apps (abstract) |
14:05 | Actively Secure Authenticated Data Acquisition Protocols: Advancing Substation Automation Security (abstract) |
14:25 | Enhancing Autonomy of Context-Aware Self-Healing in Fog Native Environments (abstract) PRESENTER: Rasel Chowdhury |
14:45 | Detecting Cyber Attacks on Electric Vehicles Charging Stations (abstract) |
16:20-17:20 Session 6: New trends in advanced cryptographic protocols
Chair:
16:20 | Secure Voting Protocol Using Balance Scale (abstract) PRESENTER: Shohei Kaneko |
16:40 | Monitoring the execution of cryptographic functions (abstract) |
17:00 | RouterORAM: An O(1)-latency and client-work ORAM (abstract) |
Wednesday, December 11th
View this program: with abstractssession overviewtalk overview
09:10-10:45 Session 7: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace
*includes a paper nominated for Best Paper Award
Chair:
09:10 | Another Walk for Monchi (abstract) |
09:25 | An Innovative DSSE Framework: Ensuring Data Privacy and Query Verification in Untrusted Cloud Environments (abstract) |
09:45 | Privacy-Preserving Machine Learning Inference for Intrusion Detection (abstract) |
10:05 | Priv-IoT: Privacy-preserving Machine Learning in IoT Utilizing TEE and Lightweight Ciphers (abstract) |
10:25 | Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map (abstract) |
13:30-15:00 Session 8: Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats
*includes a paper nominated for Best Paper Award
Chair:
13:30 | LocalIntel: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge (abstract) |
13:50 | Intelligent Green Efficiency for Intrusion Detection (abstract) |
14:10 | A Privacy-Preserving Behavioral Authentication System (abstract) PRESENTER: Md Morshedul Islam |
14:25 | Automated Exploration of Optimal Neural Network Structures for Deepfake Detection (abstract) |
14:40 | An Empirical Study of Black-box based Membership Inference Attacks on a Real-World Dataset (abstract) PRESENTER: Yujeong Kwon |
15:15-16:45 Session 9: New trends of machine leaning and AI applied to cybersecurity
Chair:
15:15 | ModelForge: Using GenAI to Improve the Development of Security Protocols (abstract) PRESENTER: Martin Duclos |
15:35 | Detecting Energy Attacks in the Battery-less Internet of Things (abstract) |
15:55 | Is Expert-Labeled Data Worth the Cost? Exploring Active and Semi-Supervised Learning Across Imbalance Scenarios in Financial Crime Detection (abstract) |
16:10 | ExploitabilityBirthMark: An Early Predictor of the Likelihood of Exploitation (abstract) |
16:25 | "You still have to study" - On the Security of LLM generated code. (abstract) |