IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11

                                                                  

IFIP SEC 2020 - Conference Program

Keynotes

- Data Security and Privacy in the IoT - Prof. Elisa Bertino, Purdue University West Lafayette

- How to Fix Vulnerability Fixing - Stanka Šalamun and Mitja Kolšek, 0patch by ACROS Security 

Paper presentation

PAPER #

PAPER TITLE

AUTHORS

1

A Matter of Life and Death:   Analyzing the Security of Healthcare

Guillaume Dupont, Daniel Ricardo   dos Santos, Elisa Costante, Jerry den Hartog and Sandro Etalle

2

Actively Probing Routes for Tor   AS-level Adversaries with RIPE Atlas

Wilfried Mayer, Georg Merzdovnik   and Edgar Weippl

3

Assisting users to create   stronger passwords using ContextBased MicroTraining

Joakim Kävrestad and Marcus   Nohlberg

4

CCBRSN: A System with High   Embedding Capacity for Covert Communication in Bitcoin

Weizheng Wang and Chunhua Su

5

Code between the Lines: Semantic   Analysis of Android Applications

Johannes Feichtner and Stefan   Gruber

6

Correlations-Preserving   Fingerprinting Technique for Categorical Data in Relational Databases

Tanja Šarčević and Rudolf Mayer

7

Cross-Platform File System   Activity Monitoring and Forensics – A Semantic Approach

Kabul Kurniawan, Andreas   Ekelhart, Fajar J. Ekaputra and Elmar Kiesling

8

Escaping Backdoor Attack   Detection of Deep Learning

Yayuan Xiong, Fengyuan Xu, Sheng   Zhong and Qun Li

9

Establishing a Strong Baseline   for Privacy Policy Classification

Najmeh Mousavi Nejad, Pablo   Jabat, Rostislav Nedelchev, Simon Scerri and Damien Graux

10

Evaluation of Risk-based   Re-Authentication Methods

Stephan Wiefling, Tanvi Patil,   Markus Dürmuth and Luigi Lo Iacono

11

Evaluation of Statistical Tests   for Detecting Storage-Based Covert Channels

Thomas Sattolo and Jason   Jaskolka

12

Facilitating Privacy Attitudes   & Behaviors with Affective Visual Design

Agnieszka Kitkowska, Yefim   Shulman, Leonardo A. Martucci and Erik Wästlund

13

FDFtNet: Facing Off Fake Images   using Fake DetectionFine-tuning Network

Hyeonseong Jeon, Youngoh Bang   and Simon Woo

14

Fuzzy Vault for Behavioral   Authentication System

Md Morshedul Islam and Reihaneh   Safavi-Naini

15

IE-Cache: Counteracting   Eviction-Based Cache Side-Channel Attacks through Indirect Eviction

Muhammad Asim Mukhtar, Muhammad   Khurram Bhatti and Guy Gogniat

16

Improvements of the Balance   Discovery Attack on Lightning Network Payment Channels

Gijs van Dam, Rabiah Abdul   Kadir, Puteri N.E. Nohuddin and Halimah Badioze Zaman

17

Improving Big Data Clustering   for Jamming Detection in Smart Mobility

Hind Bangui, Mouzhi Ge and   Barbora Buhnova

18

IMShell-Dec :Pay More Attention   to External Links in PowerShell

Ruidong Han, Chao Yang, Jianfeng   Ma, Siqi Ma, Yunbo Wang and Feng Li

19

JavaScript malware detection   using locality sensitive hashing

Stefan Carl Peiser, Ludwig   Friborg and Riccardo Scandariato

20

Leaky Controller: Cross-VM   Memory Controller Covert Channel on Multi-Core Systems

Benjamin Semal, Konstantinos   Markantonakis, Raja Naeem Akram and Jan Kalbantner

21

MultiTLS: Secure communication   channel with cipher suite diversity

Ricardo Moura, Miguel Pardal and   Miguel Correia

22

Privacy-friendly Monero   transaction signing on a hardware wallet

Dusan Klinec and Vashek Matyas

23

Privacy CURE: Consent   Comprehension Made Easy

Olha Drozd and Sabrina Kirrane

24

Refined detection of SSH   brute-force attackers using machine learning.

Karel Hynek, Tomáš Beneš, Tomáš   Čejka and Hana Kubátová

25

Revisiting Security   Vulnerabilities in Commercial Password Managers

Michael Carr and Siamak   Shahandashti

26

RouAlign: Cross-Version Function   Alignment and Routine Recovery with Graphlet Edge Embedding

Can Yang, Mengxia Luo, Jian Liu,   Xiaorui Gong and Baoxu Liu

27

Secure Attestation of   Virtualized Environments

Michael Eckel, Markus Springer,   Andreas Fuchs and Jürgen Repp

28

Security and Performance   Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor

Asya Mitseva, Marharyta   Aleksandrova, Thomas Engel and Andriy Panchenko

29

zeek-osquery: Host-Network   Correlation for Advanced Monitoring and Intrusion Detection

Steffen Haas, Robin Sommer and   Mathias Fischer