1-IA and cyber security |
P1 |
76 |
João Vitorino, Miguel Silva, Eva Maia and Isabel Praça |
An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection |
P2 |
42 |
Sadaf Md Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen and Youki Kadobayashi |
Securing Smart Vehicles through Federated Learning |
P3 |
18 |
Daniel Fentham, David Parker and Mark Ryan |
Using Reed-Muller Codes for Classification with Rejection and Recovery |
P4 |
51 |
Victor Aurora, Christopher Neal, Alexandre Proulx, Nora Boulahia-Cuppens and Frédéric Cuppens |
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection |
2-Security Analysis |
P5 |
6 |
Mohamed Mekkouri and Christine Hennebert |
Practices for Assessing the Security Level of Solidity Smart Contracts |
P6 |
25 |
Ruturaj Kiran Vaidya and Prasad Kulkarni |
Effectiveness of Binary-Level CFI Techniques |
P7 |
79 |
Maxwel Bar-On, Bruhadeshwar Bezawada, Indrakshi Ray and Indrajit Ray |
A Small World –Privacy Preserving IoT Device-type Fingerprinting with Small Datasets |
P8 |
55 |
Pierre-Victor Besson, Valérie Viet Triem Tong, Gilles Guette, Guillaume Piolle and Erwan Abgrall |
URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures |
3-Phishing & Social Network |
P9 |
17 |
Yukiko Sawaya, Ayane Sano, Takamasa Isohara, Akira Yamada and Ayako Komatsu |
Does the Anchoring Effect Influence Individuals’ Anti-Phishing Behavior? |
P10 |
44 |
Eric Dzeha and Guy-Vincent Jourdan |
IntelliTweet: a Multifaceted Feature Approach to Detect Malicious Tweets |
P11 |
26 |
Emad Badawi, Guy-Vincent Jourdan and Iosif-Viorel Onut |
Web Scams Detection System |
4-Vulnerabilities, Exploits, and Threats |
P12 |
8 |
Mahmoud Zamani, Saquib Irtiza, Latifur Khan and Kevin Hamlen |
VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes |
P13 |
2 |
Raphael Khoury, Bolduc Jérémy, Jason Lafrenière and Abdel-Gany Junior Odedele |
Analysis of Cryptographic CVEs: Lessons Learned and Perspectives |
P14 |
24 |
Mohamed El Amine Bekhouche and Kamel Adi |
A BERT-Based Framework for Automated Extraction of Indicators of Compromise from Security Incident Reports. |
P15 |
74 |
Norah Ridley, Enrico Branca, Jadyn Kimber and Natalia Stakhanova |
Enhancing Code Security Through Open-source Large Language Models: A Comparative Study |
P16 |
66 |
Seyed Behnam Andarzian, Cristian Daniele and Erik Poll |
Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations |
P17 |
71 |
Farnood Faghihi, Mohammad Zulkernine and Steven Ding |
Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware |
P18 |
52 |
Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens and Alexandre Proulx |
Automated Attacker Behaviour Classification Using Threat Intelligence Insights |
P19 |
61 |
Wassim Koribeche, David Espes and Cédric Morin |
UDP state manipulation: description of a Packet Filtering vulnerability in Stateful firewalls |
5- Malware Analysis |
P20 |
16 |
Julien Cassagne, Ettore Merlo, Guy-Vincent Jourdan and Iosif Viorel Onut |
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code |
P21 |
29 |
Charles-Henry Bertand Van Ouytsel, Christophe Crochet, Axel Legay and Serena Lucca |
On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr |
P22 |
46 |
Thanh-Hung Pham and Mizuhito Ogawa |
Original Entry Point detection based on graph similarity |
P23 |
59 |
Martin Brisfors, Michail Moraitis, Gabriel Klasson Landin and Truls Jilborg |
Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure |
7-Security Design |
P24 |
22 |
John Breton, Jason Jaskolka and George O. M. Yee |
Hardening Systems Against Data Corruption Attacks at Design Time |
P25 |
37 |
Ludovic Paillat, Claudia-Lavinia Ignat, Davide Frey, Mathieu Turuani and Amine Ismail |
Design of an Efficient Distributed Delivery Service for Group Key Agreement Protocols |
P26 |
20 |
Ruize Wang and Elena Dubrova |
A shared key recovery attack on a masked implementation of CRYSTALS-Kyber’s encapsulation algorithm |
P27 |
30 |
Sayan Biswas, Kangsoo Jung and Catuscia Palamidessi |
Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Short paper 1 |
SP1 |
58 |
Denis Obrezkov and Karsten Sohr |
UCAT: the Uniform Categorization for Access Control |
SP2 |
39 |
Markus Dahlmanns, Roman Matzutt, Chris Dax and Klaus Wehrle |
Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing Approach |
SP3 |
57 |
Jan Eske Gesell, Robin Buchta, Kilian Dangendorf, Pascal Franzke, Felix Heine and Carsten Kleiner |
Comparative Analysis of Reduction Methods on Provenance Graphs for APT Attack Detection |
SP4 |
49 |
Mohammad Alnabhan and Paula Branco |
Evaluating Deep Learning for Cross-Domains Fake News Detection |
Short paper 2 |
SP5 |
50 |
Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi and Mourad Debbabi |
Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting |
SP6 |
27 |
Ryosuke Kobayashi and Rie Yamaguchi Shigetomi |
Trade-off between Authentication Performance and Detection Time for Zero-effort Attack in Location-based Authentication |
SP7 |
73 |
paper withdrawn |
paper withdrawn |
SP8 |
21 |
Awaleh Houssein Meraneh, Fabien Autrel, Hélène Le Bouder and Marc Oliver Pahl |
SADIS: real-time sound-based anomaly detection for industrial systems |
SP9 |
32 |
Valeria Valdés Ríos, Fatiha Zaidi, Ana Rosa Cavalli and Wissam Mallouli |
A resilience Component for a Digital Twin |