Accepted Paper
Davide Ferraris, Carmen Fernandez-Gago and Javier Lopez
Novel Approaches for the Development of Trusted IoT Entities
David Harborth and Sebastian Pape
A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App
Alexandre Dey, Benjamin Costé and Éric Totel
DAEMON: Dynamic Auto-Encoders for contextualised anomaly detection applied to security MONitoring
Stuart Shapiro
Deriving and Using Synthetic Consequences for Privacy Risk Modeling
Alexander Richter, Patrick Kühtreiber and Delphine Reinhardt
Enhanced Privacy in Smart Workplaces: Employees' Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart Watches
Martin Fejrskov Andersen, Emmanouil Vasilomanolakis and Jens Myrup Pedersen
A study on the use of 3rd party DNS resolvers for malware filtering or censorship circumvention
Wouter Hellemans, Md Masoom Rabbani, Jo Vliegen and Nele Mentens
FOCUS: Frequency based detection of Covert Ultrasonic Signals
Peishuai Sun, Shuhao Li, Jiang Xie, Hongbo Xu, Zhenyu Cheng and Rui Qin
RAA-Model: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features
Bogdan Covrig, Enrique Barrueco Mikelarena, Constanta Rosca, Catalina Goanta, Gerasimos Spanakis and Apostolis Zarras
Upside Down: Exploring the Ecosystem of Dark Web Data Markets
Tianci Li, Jiaojiao Wu and Jianfeng Wang
Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries
Lin Zhu, Changlu Lin, Fuchun Lin and Liang Feng Zhang
Post-Quantum Cheating Detectable Private Information Retrieval
Mark Vella and Christian Colombo
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage
Florian Wilkens, Steffen Haas, Johanna Amann and Mathias Fischer
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring
Ardalan Foroughi Pour, Natalia Stakhanova, Farzaneh Abazari and Bahman Sistany
AndroClonium: bytecode level clone detection for obfuscated Android apps
Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou and Sang-Yoon Chang
Greedy Networking in Cryptocurrency Blockchain
Efi Siapati, Ioanna Dionysiou and Harald Gjermundrod
One Light, One App: Tackling A Common Misperception Causing Breach of User Privacy
Yue Yu, Xiaoqi Jia, Xun An and Shengzhi Zhang
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification
Shaoqiang Wu, Chunfu Jia and Ding Wang
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties
Vasco Guita, Daniel Andrade, JoAo Silva and Miguel Correia
Anonymous Trusted Data Relocation for TEEs
Bingnan Zhong, Zicheng Wang, Yinggang Guo and Qingkai Zeng
CryptKSP:A Kernel Stack Protection Model based on AES-NI Hardware Feature
Kunwar Saaim, Muhamad Felemban, Saleh Alsaleh and Ahmad Almulhem
Light-Weight File Fragments Classification using Depthwise Separable Convolutio
Kevin KAjster, Matthias Marx, Anne Kunstmann and Hannes Federrath
Evaluation of Circuit Lifetimes in Tor
Wenjuan Li, Jiao Tan and Nan Zhu
Double-X: Towards Double-Cross-based Unlock Mechanism on Smartphones
Supriya Adhatarao and Cedric Lauradoux
Robust PDF Files Forensics Using Coding Style
Amshumaan Varma Pericherla, Proteet Paul, Shamik Sural, Jaideep Vaidya and Vijay Atluri
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain
Christian Burkert, Johanna Ansohn McDougall and Hannes Federrath
Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations
Vasilis Kalos and George Polyzos
Requirements and Secure Serialization for Selective Disclosure Verifiable Credentials
Lydia Kraus, Matej Grabovsky, Martin Ukrop, Katarina Galanska and Vashek Matyas
Usability Insights from Establishing TLS Connections
Michael Körber, Anatoli Kalysch, Werner Massonne and Zinaida Benenson
Usability of Antivirus Tools in a Threat Detection Scenario
Last Page Update : 13. Jun, 2022 12:57 +2:00
Social Event
Peter Liep's Hus
Peter Lieps Hus offers storytelling, fresh local produce and warm atmosphere in abundance under mighty trees in the heart of the Dyrehaven woods north of Copenhagen. Situated in the middle of the royal family’s old hunting grounds, Peter Lieps’ restaurants, a Hansel and Gretel-like thatched house between tall trees, stands out.
When you enter the house, it’s not hard to see why there is a fairytale feel to the place that emanates the beauty of times gone by. Guests can enjoy fresh berries and mushrooms from the surrounding forest and just like the old days, a hunter brings back fresh deer and roebucks.
From DTU:
We have prepare free buses from DTU Mødecenter(Meeting Center) to Peter Liep's Hus.
If you like to catch the free bus to Peter Liep's Hus, please come to DTU Mødecenter(Meeting Center) at:
If you like to go to Peter Liep's Hus by public transportation, please choose a time you would like to reach there.
From Copenhagen (København V/K & Indre By):
If you would like to go Peter Leip's Hus from your hotel, you can arrive at DTU and catch the free buses there. Or, you can go there directly from the nearest public transportation stop. You can choose a place and time that is both nearest and most convenient for you.
Location