37th International Conference on ICT Systems Security and Privacy Protection – IFIP SEC 2022, 13–15 June 2022

Conference Program

Denmark Local Time (CEST / GMT +2)



13th (Monday), June 2022

09:15 - 09:30
Welcome Ceremony

09:30 - 10:30
  M1
  Carsten Schürmann
IT University, Copenhagen
  M1   Weizhi Meng

10:30 - 11:00
Coffee Break

11:00 - 12:30
David Harborth,
Sebastian Pape
A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App

Stuart Shapiro
Deriving and Using Synthetic Consequences for Privacy Risk Modeling

Alexander Richter,
Patrick Kühtreiber,
Delphine Reinhardt
Enhanced Privacy in Smart Workplaces: Employee's Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart Watches
Alexandre Dey,
Benjamin Costé,
Éric Totel
DAEMON: Dynamic Auto-Encoders for contextualised anomaly detection applied to security MONitoring

Wouter Hellemans,
Md Masoom Rabbani,
Jo Vliegen,
Nele Mentens
FOCUS: Frequency based detection of Covert Ultrasonic Signals

Florian Wilkens,
Steffen Haas,
Johanna Amann,
Mathias Fischer
Passive, Transparent and Selective TLS Decryption for Network Security Monitoring

12:30 - 13:30
Luncheon

13:30 - 15:00
Martin Fejrskov Andersen,
Emmanouil Vasilomanolakis,
Jens Myrup Pedersen
A study on the use of 3rd party DNS resolvers for malware filtering or censorship circumvention

Peishuai Sun,
Shuhao Li,
Jiang Xie,
Hongbo Xu,
Zhenyu Cheng,
Rui Qin
RAA-Model: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features

Kevin Köster,
Matthias Marx,
Anne Kunstmann,
Hannes Federrath
Evaluation of Circuit Lifetimes in Tor
Mark Vella,
Christian Colombo
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage

Supriya Adhatarao,
Cedric Lauradoux
Robust PDF Files Forensics Using Coding Style

Kunwar Saaim,
Muhamad Felemban,
Saleh Alsaleh,
Ahmad Almulhem
Lightweight File Fragments Classification using Depthwise Separable Convolution

15:00 - 15:30
Coffee Break

15:30 - 16:30
IoT Security Panel
Invited Talk:
Ross Anderson
Panels by:
Zinaida Benenson
Kai Rannenberg
Gert Læssøe Mikkelsen
  M1     Simone Fischer-Hübner

16:30 - 17:30
Davide Ferraris,
Carmen Fernandez-Gago,
Javier Lopez
Novel Approaches for the Development of Trusted IoT Entities

Vasilis Kalos,
George Polyzos
Requirements and Secure Serialization for Selective Disclosure Verifiable Credentials
Shaoqiang Wu,
Chunfu Jia,
Ding Wang
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties

Bingnan Zhong,
Zicheng Wang,
Yinggang Guo,
Qingkai Zeng
CryptKSP: A Kernel Stack Protection Model based on AES-NI Hardware Feature

17:45 -
Welcome Reception @ DTU
  Room 241, Building 324



14th (Tuesday), June 2022

09:15 - 09:30
Information about IFIP TC 11
  M1

09:30 - 10:30
Ivan Damgård
Aarhus University
  M1     Christian D. Jensen

10:30 - 11:00
Coffee Break

11:00 - 12:30
Lydia Kraus,
Matej Grabovsky,
Katarina Galanska,
Vashek Matays
Usability Insights for Establishing TLS Connections

Michael Körber,
Anatoli Kalysch,
Werner Massonne,
Zinaida Benenson
Usability of Antivirus Tools in a Threat Detection Scenario

Christian Burkert,
Johanna Ansohn McDougall,
Hannes Feberrath
Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations

12:30 - 13:30
Luncheon

13:30 - 15:00
Simeon Wuther,
Pranav Chandramouli,
Xiaobo Zhou,
Sang-Yoon Chang
Greedy Networking in Cryptocurrency Blockchain

Amshumaan Varma Pericherla,
Proteet Paul,
Shamik Sural,
Jaideep Vaidya
Vijay Atluri
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain
Steven Furnell,
Gregor Langner,
Teemu Tokola,
Kerry Andriessen, Gerald Quirchmayr,
Carmela Lucianio
Collaborative Cybersecurity Learning: Establishing Educator and Learner Expectations and Requirements

Silvia Vidor,
Carlos E. Budde
A Maturity Assessment Model for Cyber Security Education in Europe

15:00 - 15:30
Coffee Break

15:30 - 17:00
Ardalan Foroughi Pour,
Natalia Stakhanova,
Farzaneh Abazari,
Bahman Sistany
AndroClonium: Bytecode Level Clone Detection for Obfuscated Android Apps

Efi Siapati,
Ioanna Dionysiou,
Harald Gjermundroid
One Light, One App: Tackling A Common Misperception Causing Breach of User Privacy

Wenjuan Li,
Jiao Tan,
Nan Zhu
Double-X: Towards Double-Cross-based Unlock Mechanism on Smartphones
Ida Ngambeki,
Matt Bishop,
Jun Dai,
Phillip Nico,
Shiven Mian,
Ong Thao,
Tran Ngoc Bao Huynh,
Zed Chance,
Isslam Alhasan,
Motunrola Afolabi
SecTutor: An Intelligent Tutoring System for Security Programming

Sabrina Friedl,
Magdalena Glas,
Ludwig Englbrecht,
Fabian Boehm,
Günther Pernul
ForCyRange: An educational IoT Cyber Range for Live Digital Forensics

Konstantin Knorr
Analyzing Error Rates in Cryptological Programming Assignments

18:00 -
  Peter Lieps Hus



15th (Wednesday), June 2022

09:30 - 10:30
Lene Sørensen
Aalborg University
  M1     Erik Moore

10:30 - 11:00
Coffee Break

11:00 - 12:30
Lin Zhu, Changlu Lin,
Fuchun Lin, Liang Feng Zhang
Post-Quantum cheating Detectable Private Information Retrieval

Vasco Guita, Daniel Andrade,
João Silva, Miguel Correia
Anonymous Trusted Data Relocation for TEEs

Tianci Li, Jiaojiao Wu, and Jianfeng Wang
Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries
Petrus Duvenage,
Victor Jaquire,
Basie von Solms
South Africa's taxi industry as a cybersecurity-awareness game changer: why and how?

--
--

Georgios Potamos,
Savvas Theodoulou,
Eliana Stavrou,
Stavros Stavrou
Maritime Cyber Threats Detection Framework: Building Capabilities


12:30 - 13:30
Luncheon

13:30 - 14:30
Bogdan Covrig,
Enrique Barrueco Mikelarena,
Constanta Rosca,
Catalina Goanta,
Gerasimos Spanakis,
Apostolis Zarras
Upside Down: Exploring the Ecosystem of Dark Web Data Markets

Yue Yu,
Xiaoqi Jia,
Xun An,
Shengzhi Zhang
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification
TC11.8 Meeting

14:30 - 15:00
Closing Session
Best Student Paper Award
  M1

15:00 - 15:30
Farewell Coffee
  M1



Social Event


Peter Liep's Hus

Peter Lieps Hus offers storytelling, fresh local produce and warm atmosphere in abundance under mighty trees in the heart of the Dyrehaven woods north of Copenhagen. Situated in the middle of the royal family’s old hunting grounds, Peter Lieps’ restaurants, a Hansel and Gretel-like thatched house between tall trees, stands out.

When you enter the house, it’s not hard to see why there is a fairytale feel to the place that emanates the beauty of times gone by. Guests can enjoy fresh berries and mushrooms from the surrounding forest and just like the old days, a hunter brings back fresh deer and roebucks.

- Scan Magazine 2020

  Peter Liep's Hus Website


From DTU:

We have prepare free buses from DTU Mødecenter(Meeting Center) to Peter Liep's Hus.
If you like to catch the free bus to Peter Liep's Hus, please come to DTU Mødecenter(Meeting Center) at:

17:00 (No later than 17:10)

If you like to go to Peter Liep's Hus by public transportation, please choose a time you would like to reach there.


From Copenhagen (København V/K & Indre By):

If you would like to go Peter Leip's Hus from your hotel, you can arrive at DTU and catch the free buses there. Or, you can go there directly from the nearest public transportation stop. You can choose a place and time that is both nearest and most convenient for you.


Or you can :
Call a Taxi




Accepted Paper


Davide Ferraris, Carmen Fernandez-Gago and Javier Lopez
Novel Approaches for the Development of Trusted IoT Entities

David Harborth and Sebastian Pape
A Privacy Calculus Model for Contact Tracing Apps: Analyzing the German Corona-Warn-App

Alexandre Dey, Benjamin Costé and Éric Totel
DAEMON: Dynamic Auto-Encoders for contextualised anomaly detection applied to security MONitoring

Stuart Shapiro
Deriving and Using Synthetic Consequences for Privacy Risk Modeling

Alexander Richter, Patrick Kühtreiber and Delphine Reinhardt
Enhanced Privacy in Smart Workplaces: Employees' Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart Watches

Martin Fejrskov Andersen, Emmanouil Vasilomanolakis and Jens Myrup Pedersen
A study on the use of 3rd party DNS resolvers for malware filtering or censorship circumvention

Wouter Hellemans, Md Masoom Rabbani, Jo Vliegen and Nele Mentens
FOCUS: Frequency based detection of Covert Ultrasonic Signals

Peishuai Sun, Shuhao Li, Jiang Xie, Hongbo Xu, Zhenyu Cheng and Rui Qin
RAA-Model: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features

Bogdan Covrig, Enrique Barrueco Mikelarena, Constanta Rosca, Catalina Goanta, Gerasimos Spanakis and Apostolis Zarras
Upside Down: Exploring the Ecosystem of Dark Web Data Markets

Tianci Li, Jiaojiao Wu and Jianfeng Wang
Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries

Lin Zhu, Changlu Lin, Fuchun Lin and Liang Feng Zhang
Post-Quantum Cheating Detectable Private Information Retrieval

Mark Vella and Christian Colombo
D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage

Florian Wilkens, Steffen Haas, Johanna Amann and Mathias Fischer
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring

Ardalan Foroughi Pour, Natalia Stakhanova, Farzaneh Abazari and Bahman Sistany
AndroClonium: bytecode level clone detection for obfuscated Android apps

Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou and Sang-Yoon Chang
Greedy Networking in Cryptocurrency Blockchain

Efi Siapati, Ioanna Dionysiou and Harald Gjermundrod
One Light, One App: Tackling A Common Misperception Causing Breach of User Privacy

Yue Yu, Xiaoqi Jia, Xun An and Shengzhi Zhang
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification

Shaoqiang Wu, Chunfu Jia and Ding Wang
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties

Vasco Guita, Daniel Andrade, JoAo Silva and Miguel Correia
Anonymous Trusted Data Relocation for TEEs

Bingnan Zhong, Zicheng Wang, Yinggang Guo and Qingkai Zeng
CryptKSP:A Kernel Stack Protection Model based on AES-NI Hardware Feature

Kunwar Saaim, Muhamad Felemban, Saleh Alsaleh and Ahmad Almulhem
Light-Weight File Fragments Classification using Depthwise Separable Convolutio

Kevin KAjster, Matthias Marx, Anne Kunstmann and Hannes Federrath
Evaluation of Circuit Lifetimes in Tor

Wenjuan Li, Jiao Tan and Nan Zhu
Double-X: Towards Double-Cross-based Unlock Mechanism on Smartphones

Supriya Adhatarao and Cedric Lauradoux
Robust PDF Files Forensics Using Coding Style

Amshumaan Varma Pericherla, Proteet Paul, Shamik Sural, Jaideep Vaidya and Vijay Atluri
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain

Christian Burkert, Johanna Ansohn McDougall and Hannes Federrath
Data Minimisation Potential for Timestamps in Git: An Empirical Analysis of User Configurations

Vasilis Kalos and George Polyzos
Requirements and Secure Serialization for Selective Disclosure Verifiable Credentials

Lydia Kraus, Matej Grabovsky, Martin Ukrop, Katarina Galanska and Vashek Matyas
Usability Insights from Establishing TLS Connections

Michael Körber, Anatoli Kalysch, Werner Massonne and Zinaida Benenson
Usability of Antivirus Tools in a Threat Detection Scenario


Last Page Update : 13. Jun, 2022 12:57 +2:00