Program

Wednesday 14 June 2023
09:00 - 10:00IFIP SEC 2023 Reception Desk
10:00 - 10:30Conference Opening
10:30 - 11:30Invited Speaker I - Prof. Josef Pieprzyk
11:30 - 12:00Coffee break
12:00 - 14:00Applied cryptography
Jun Xu, Shengnan Zhao, Chuan Zhao, Zhenxiang Chen, Zhe Liu and Liming Fang. Practical Single-Round Secure Wildcard Pattern Matching
Sigurd Eskeland and Svetlana Boudko. Efficient non-interactive anonymous communication
Mengqing Yang, Chunxiao Ye, Yuanmu Liu, Yan Jin and Chunming Ye. PointPuff: An Ed25519 Optimization Implementation
Georgios Kornaros, Georgia Berki and Miltos Grammatikakis. Quantum-secure Communication for IoT Infrastructures
14:00 - 15:00Lunch
15:00 - 16:30Data and applications security
Pascal Wichmann, August See and Hannes Federrath. SecPassInput: Towards Secure Memory and Password Handling in Web Applications
Janaka Senanayake, Sampath Rajapaksha, Naoto Yanai, Chika Komiya and Harsha Kumara Kalutarage. MADONNA: Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis
Sven Zemanek, Sebastian Tauchert, Max J. Ufer and Lilli Bruckschen. Web Content Integrity: Tamper-proof websites beyond HTTPS
18:00 - Welcome Reception @PSNC
Thursday 15 June 2023
09:30 - 10:30Invited Speaker II - Prof. Sebastiano Battiato
10:30-11:00Coffee break
11:00-12:30Session 1 & 2
Session 1Human aspects of security and privacy
Hannes Holm and Jenni Reuben. Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises
Aikaterini Soumelidou and Aggeliki Tsohou. Towards An Information Privacy Competency Model for the Usage of Mobile Applications
Efstratios Chatzoglou, Vyron Kampourakis and Georgios Kambourakis. Bl0ck: Paralyzing 802.11 connections through Block Ack frames
Session 2Network & distributed systems security
Tino Jungebloud, Nhung H. Nguyen, Dong Seong Kim and Armin Zimmermann. Hierarchical Model-Based Cybersecurity Risk Assessment During System Design
August See, Tatjana Wingarz, Matz Radloff and Mathias Fischer. Detecting Web Bots via Mouse Dynamics and Communication Metadata
Maximilian Wittig and Dogan Kesdogan. Detecting web tracking at the network layer
12:30-13:00Coffe break
13:00-14:00Big data security and privacy
Hiroaki Kikuchi. Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP
Anting Lu, Hua Wu and Hao Luo. Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack
14:00-15:00Lunch
15:00-17:00Audit and risk analysis/ Security Management
Kéren A Saint-Hilaire, Frédéric Cuppens, Nora Cuppens-Boulahia and Joaquin Garcia-Alfaro. Ontology-based Attack Graph Enrichment
David Cordova Morales, Ahmad S. Wazan, David W. Chadwick, Romain Laborde, April R. Reyes Maramara and Kalil Cabral. Enhancing the ACME Protocol to Automate the Management of ALL X.509 Web Certificates
Koudai Hatakeyama, Daisuke Kotani and Yasuo Okabe. Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication
Vanessa Bracamonte, Sebastian Pape and Sascha Löbner. Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools
18:00 -Social event
Friday 16 June 2023
09:30 - 10:30Session 1 & 2
Session 1Human aspects of security and privacy
Dominik Soukup, Daniel Uhříček, Daniel Vašata and Tomáš Čejka. Machine Learning Metrics for Network Datasets Evaluation
Peter Hamm, Sebastian Pape, Kai Rannenberg and Frederic Tronnier. The Influence of Privacy Concerns on Cryptocurrency Acceptance
Session 2Industry networks security
Ke Liu, Rongkuan Ma, Qiang Wei, Yahui Yang, Yangyang Geng and Chongrong Fang. Next-generation ICS Honeypot Identification Approach Based on Simulating Advanced Features
Almamy Touré, Youcef Imine, Thierry Delot, Antoine Gallais, Alexis Semnont and Robin Giraudo. Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe
10:30 - 11:00Coffee Break
11:00 - 12:00Network & distributed systems security
Christos Karapapas, George C. Polyzos and Constantinos Patsakis. What’s inside a node? Malicious IPFS nodes under the magnifying glass
Jinfeng Chen, Hua Wu, Suyue Wang, Guang Cheng and Xiaoyan Hu. An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network
12:00 - 12:30Coffee Break
12:30 - 13:30Network & distributed systems security
Lukáš Sadlek and Pavel Čeleda. Cyber Key Terrain Identification Using Adjusted PageRank Centrality
Qisheng Chen and Kazumasa Omote. Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator via Malicious URLs Detection
13:30 - 14:00Closing session

Click on the selected panel to learn more

09:00 - 10:00 IFIP SEC 2023 Reception Desk

Foyer

10:00 - 10:30 Conference Opening

Room 0.26

10:30 - 11:30 Invited Speaker I - Prof. Josef Pieprzyk

Room 0.26

11:30 - 12:00 Coffee break

Foyer

12:00 - 14:00 Applied cryptography

Room 0.26

Jun Xu, Shengnan Zhao, Chuan Zhao, Zhenxiang Chen, Zhe Liu and Liming Fang - Practical Single-Round Secure Wildcard Pattern Matching

Sigurd Eskeland and Svetlana Boudko - Efficient non-interactive anonymous communication

Mengqing Yang, Chunxiao Ye, Yuanmu Liu, Yan Jin and Chunming Ye - PointPuff: An Ed25519 Optimization Implementation

Georgios Kornaros, Georgia Berki and Miltos Grammatikakisn- Quantum-secure Communication for IoT Infrastructures

14:00 - 15:00 Lunch

Foyer

15:00 - 16:30 Data and applications security

Room 0.26

Pascal Wichmann, August See and Hannes Federrath SecPassInput: Towards Secure Memory and Password Handling in Web Applications

Janaka Senanayake, Sampath Rajapaksha, Naoto Yanai, Chika Komiya and Harsha Kumara Kalutarage - MADONNA: Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis

Sven Zemanek, Sebastian Tauchert, Max J. Ufer and Lilli Bruckschen - Web Content Integrity: Tamper-proof websites beyond HTTPS

18:00 - 22:00 Welcome Reception @PSNC

Foyer

Click on the selected panel to learn more

09:30 - 10:30 Invited Speaker II - Prof. Sebastiano Battiato

Room 0.26

10:30 - 11:00 Coffee break

Foyer

11:00 - 12:30 Session 1 & 2

Session 1 - Human aspects of security and privacy - Room 0.26

Hannes Holm and Jenni Reuben - Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises

Aikaterini Soumelidou and Aggeliki Tsohou - Towards An Information Privacy Competency Model for the Usage of Mobile Applications

Efstratios Chatzoglou, Vyron Kampourakis and Georgios Kambourakis - Bl0ck: Paralyzing 802.11 connections through Block Ack frames


 

Session 2  - Network & distributed systems security - Room 0.31

Tino Jungebloud, Nhung H. Nguyen, Dong Seong Kim and Armin Zimmermann - Hierarchical Model-Based Cybersecurity Risk Assessment During System Design

August See, Tatjana Wingarz, Matz Radloff and Mathias Fischer - Detecting Web Bots via Mouse Dynamics and Communication Metadata

Maximilian Wittig and Dogan Kesdogan - Detecting web tracking at the network layer

12:30 - 13:00 Coffee break

Foyer

13:00 - 14:00 Big data security and privacy

Room 0.26

Hiroaki Kikuchi - Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP

Anting Lu, Hua Wu and Hao Luo - Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack

14:00 - 15:00 Lunch

Foyer

15:00 - 17:00 Audit and risk analysis / Security Management

Room 0.26

Kéren A Saint-Hilaire, Frédéric Cuppens, Nora Cuppens-Boulahia and Joaquin Garcia-Alfaro - Ontology-based Attack Graph Enrichment

David Cordova Morales, Ahmad S. Wazan, David W. Chadwick, Romain Laborde, April R. Reyes Maramara and Kalil Cabral - Enhancing the ACME Protocol to Automate the Management of ALL X.509 Web Certificates

Koudai Hatakeyama, Daisuke Kotani and Yasuo Okabe - Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication

Vanessa Bracamonte, Sebastian Pape and Sascha Löbner - Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools

18:00 - 22:00 Social event

TBA

Click on the selected panel to learn more

09:30 - 10:30 Session 1 & 2

Session 1 - Human aspects of security and privacy - Room 0.26

Dominik Soukup, Daniel Uhříček, Daniel Vašata and Tomáš Čejka - Machine Learning Metrics for Network Datasets Evaluation

Peter Hamm, Sebastian Pape, Kai Rannenberg and Frederic Tronnier - The Influence of Privacy Concerns on Cryptocurrency Acceptance



Session 2  - Industry networks security - Room 0.31

Ke Liu, Rongkuan Ma, Qiang Wei, Yahui Yang, Yangyang Geng and Chongrong Fang - Next-generation ICS Honeypot Identification Approach Based on Simulating Advanced Features

Almamy Touré, Youcef Imine, Thierry Delot, Antoine Gallais, Alexis Semnont and Robin GiraudoAutomated and Improved Detection of Cyber Attacks via an Industrial IDS Probe

10:30 - 11:00 Coffee break

Foyer

11:00 - 12:00 Network & distributed systems security

Room 0.26

Christos Karapapas, George C. Polyzos and Constantinos Patsakis - What’s inside a node? Malicious IPFS nodes under the magnifying glass

Jinfeng Chen, Hua Wu, Suyue Wang, Guang Cheng and Xiaoyan Hu - An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network

12:00 - 12:30 Coffee break

Foyer

12:30 - 13:30 Network & distributed systems security

Room 0.26

Lukáš Sadlek and Pavel Čeleda - Cyber Key Terrain Identification Using Adjusted PageRank Centrality

Qisheng Chen and Kazumasa Omote - Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator via Malicious URLs Detection

13:30 - 14:00 Closing session

Room 0.26

Dates are displayed in the event time zone (Europe/Poznan)

Time is displayed in 24-hour format