Accepted papers

Towards the Development of Cryptocurrencies Forensics Process Model (CFPM)
Taylor, Sarah Khadijah (CyberSecurity Malaysia); Zainol Ariffin, Khairul Akram (Universiti Kebangsaan Malaysia); Ariffin, Aswami (CyberSecurity Malaysia); Sheikh Abdullah, Siti Norul Huda (Universiti Kebangsaan Malaysia)

Quantifying Paging on Recoverable Data from Windows User-Space Modules
Martín-Pérez, Miguel (University of Zaragoza, Spain); Rodríguez, Ricardo J. (University of Zaragoza)

Android Malware Detection Based on Hybrid Analysis and Multimodal Deep Learning
Oliveira, Angelo (Universidade Nove de Julho); Sassi, Renato (Universidade Nove de Julho)

Forensic Investigations of Google Meet and Microsoft Teams – Two Popular Conferencing Tools in the Pandemic
Azhar, Hannan (Canterbury Christ Church University); Timms, Jake (Canterbury Christ Church University); Tilley, Benjamin (Canterbury Christ Church University)

On Establishing The Sub-Domain of ArtificialIntelligence (AI) Model Forensics
Edwards, Tiffanie (University of New Haven); McCullough, Syria (University of New Haven); Nassar, Mohamed (University of New Haven); Baggili, Ibrahim (University of New Haven)

Auto-Parser: Android Auto & Apple CarPlay
Mahr, Andrew (University of New Haven); Serafin, Robert (University of New Haven); Grajeda, Cinthya (University of New Haven); Baggili, Ibrahim (University of New Haven)

Find my IoT Device — An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows
Göbel, Thomas (Universität der Bundeswehr München); Uhlig, Frieder (Technische Universität Darmstadt); Baier, Harald (Universität der Bundeswehr München)

Accessing secure data on Android through application analysis
Le Khac, Nhien An (University College Dublin); Buurke, Richard (University College Dublin)

Research On The Method Of Selecting The Optimal Feature Subset In Big Data For Energy Analysis Attack
Duan, Xiaoyi (Beijing Electronic Science And Technology Institute); Li, You (Beijing Electronic Science And Technology Institute); Liu, Chengyuan (Beijing Electronic Science And Technology Institute); Li, Xiuying (Beijing Electronic Science And Technology Institute); Liu, Wenfeng (Beijing Electronic Science And Technology Institute); Li, Guoqian (Beijing Electronic Science And Technology Institute)

Cheating sensitive security quantum bit commitment with security distance function
Huang, Weicong (Nanjing University); Guang, Qisheng (Nanjing University); Chen, Lijun (Nanjing University)

Towards Mitigation of Data Exfiltration Techniques using the MITRE ATT&CK Framework
Mundt, Michael (Esri Deutschland GmbH); Baier, Harald (Bundeswehr University Munich)

PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality
Kanta, Aikaterini (University College Dublin); Coisel, Iwen (European Commission Joint Research Centre (DG JRC)); Scanlon, Mark (University College Dublin)

No Pie in The Sky: The Digital Currency Fraud Website Detection
Ou, Haoran (Sichuan University); Guo, Yongyan (Sichuan University); Huang, Chaoyi (Sichuan University); Zhao, Zhiying (Sichuan University); Guo, Wenbo (Sichuan University); Fang, Yong (Sichuan University); Huang, Cheng (Sichuan University)

Understanding the Brains and Brawn of IllicitStreaming App
Huang, Kong (Chinese University of Hong Kong); Zhang, Ke (Chinese University of Hong Kong); Chen, Jiong Yi (National University of Defence Technology); Sun, Meng Han (Chinese University of Hong Kong); Sun, Wei (Chinese University of Hong Kong); Tang, Di (Chinese University of Hong Kong); Zhang, Ke Huan (Chinese University of Hong Kong)

Fine-grained Obfuscation Scheme Recognition on Binary Code
Tian, Zhenzhou (Xi’an University of Posts and Telecommunications, Xi’an, China.); Mao, Hengchao (Xi’an University of Posts and Telecommunications, Xi’an, China.); Huang, Yaqian (Xi’an University of Posts and Telecommunications, Xi’an, China.); Tian, Jie (Xi’an University of Posts and Telecommunications, Xi’an, China.); Li, Jinrui (Xi’an University of Posts and Telecommunications, Xi’an, China.)

Backdoor Investigation and Incident Response: From Zero to Profit
LAI, Anthony Cheuk Tung (Hong Kong University of Science and Technology); Wong, Ken Wai Kin (Hong Kong University of Science and Technology); Wong, Johnny Tsz Wun (Valkyrie-X Security Research Group (VXRL)); Lau, Austin Tsz Wai (Valkyrie-X Security Research Group (VXRL)); Ho, Alan Po Lun (Valkyrie-X Security Research Group (VXRL)); Wang, Shuai (Hong Kong University of Science and Technology); Muppala, Jogesh K. (HKUST)

Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention
Li, Na (Artificial Intelligence Research Center, National Innovation Institute of Defense Technology); Zhang, Haoyu (Artificial Intelligence Research Center, National Innovation Institute of Defense Technology); Hu, Zhihui (Artificial Intelligence Research Center, National Innovation Institute of Defense Technology); Kou, Guang (Artificial Intelligence Research Center, National Innovation Institute of Defense Technology); Dai, Huadong (Artificial Intelligence Research Center, National Innovation Institute of Defense Technology)

Cybercrime in the Age of Cryptocurrencies
Chawki, Mohamed (International Association of Cybercrime Prevention)

IoT Forensics: Device Identification and Investigation Routines
Scheidt, Nancy (University of Portsmouth); Adda, Mo (University of Portsmouth)

A CNN-based HEVC Video Steganalysis Against DCT/DST-Based Steganography
Zhang, Zhenzhen (Beijing Institute of Graphic Communication); Shi, Henan (Shanghai Jiao Tong University); Jiang, Xinghao (Shanghai Jiao Tong University); Li, Zhaohong (Beijing JiaoTong University); Liu, Jindou (Beijing JiaoTong University)

Do Dark Web and Cryptocurrencies Empower Cybercriminals?
Taleby Ahvanooey, Milad (School of Information Management, Nanjing University (NJU), P.R. China); Zhu, Mark Xuefang (School of Information Management, Nanjing University (NJU), P.R. China); Mazurczyk, Wojciech (Institute of Computer Science, Faculty of Electronics and Information Technology, Warsaw University of Technology (WUT), Poland.); Kilger, Max (Department of Information Systems and Cyber Security, University of Texas at San Antonio (UTSA), San Antonio, USA.); Choo, Kim-Kwang Raymond (Department of Information Systems and Cyber Security, University of Texas at San Antonio (UTSA), San Antonio, USA.)

Lightweight On-demand Honeypot Deployment for Cyber Deception
Acosta, Jaime (DEVCOM Army Research Laboratory); Basak, Anjon (DEVCOM Army Research Laboratory); Kiekintveld, Christopher (The University of Texas at El Paso); Kamhoua, Charles (Army Research Lab)

Gotta Catch’em All! Improving P2P Network Crawling Strategies
Mühle, Alexander (Hasso Plattner Institute, University of Potsdam, Germany); Grüner, Andreas (Hasso Plattner Institute, University of Potsdam, Germany); Meinel, Christoph (Hasso Plattner Institute, University of Potsdam, Germany)

Parcae: A Blockchain-Based PRF Service for Everyone
Wyss, Elizabeth (University of Kansas); Davidson, Drew (University of Kansas)

A Hybrid Cloud Deployment Architecture For Privacy-preserving Collaborative Genome-Wide Association Studies
Boujdad, Fatima-zahra (IMT Atlantique, LS2N); Niyitegeka, David (IMT Atlantique); Bellafqira, Reda (IMT Atlantique); Coatrieux, Gouenou (IMT Atlantique); Genin, Emmanuelle (INSERM); Südholt, Mario (IMT Atlantique, LS2N)