Program
Registration
Opening Session
Prof. Sanjay Goel, SUNY Albany
Prof. Imrich Chlamtac, President of European Alliance for Innovation
Prof. Dragan Perakovic, University of Zagreb
Keynote Talk
Prof. Ivan Martinovic, Oxford University
Coffee Break
Session 1: Artificial Intelligence & Security
Hacking Mobile Biometrics with the Photograph of a Fingerprint - Sarah Dill (Rochester Institute of Technology); Joseph Hommel (Rochester Institute of Technology); Justin Kennedy (Rochester Institute of Technology); Vaughn Woerpel (Rochester Institute of Technology); Justin Pelletier (Rochester Institute of Technology
Multi-tool Approach for Advanced Quantum Key Distribution Network Modeling - Ivan Cvitic (Faculty of Transport and Traffic Sciences, University of Zagreb); Dragan Peraković (University of Zagreb); Josip Vladava (University of Zagreb); Karlo Gavrilović (University of Zagreb)
Deep Learning Methods for Intrusion Detection Systems on the CSE-CIC-IDS2018 Dataset: A Review - Erdal BAÅžARAN (Agri Ibrahim Cecen University); Sanjay Goel (Information Security and Digital Forensics University at Albany); Yuksel Celik (University at Albany)
CTIMiner: Cyber Threat Intelligence Mining Using Adaptive Multi-Task Adversarial Active Learning - Chunyan Ma (Chinese Academy of Sciences); Zhengwei Jiang (Chinese Academy of Sciences); Kai Zhang (Chinese Academy of Sciences); Jun Jiang (Chinese Academy of Sciences); Peian Yang (Chinese Academy of Sciences); Bo Xu (People's Public Security University of China); Huamin Feng (Beijing Electronic Science and Technology Institute)
Lunch
Session 2: Multimedia Forensics
Toward Forensic Friendly AI Integrating Blockchain with Federated Learning to Enhance AI Trustworthiness - Safiia Mohammed (University of Windsor)
The Hidden Realms of Router Apps: Forensic Analysis of TP-Link Tether and ASUS Router - Akif Ozer (Purdue University); Umit Karabiyik (Purdue University)
ENF Match with Masking: a new method for searching with sparse signal - Nicola Landro (European Commission - Joint Research Centre); Lorenzo Schiavone (European Commission - Joint Research Centre); Anselmo Castelo Branco Ferreira (European Commission - Joint Research Centre); Laurent Beslay (European Commission - Joint Research Centre)
Lightweight Multi-Tier IDS for UAV Security: Enhancing UAV Zero-Day Attacks with Honeypot Threat Intelligence - Abdul Majid Jamil (Wuhan University); Yue Cao (Wuhan University); Hassan Jalil Hadi (Wuhan University); Naveed Ahmad (Prince Sultan University); Aduwati Sali (University Putra Malaysia); Mohammed Ali Alshare (Prince Sultan University); Long Chen (BEIJING UNIVERSITY OF CHEMICAL TECHNOLOGY)
Session 3: Intrusion Detection
Reducing False Positives in Intrusion Detection System Alerts: A Novel Aggregation and Correlation Model -Hassan Jalil Hadi (Wuhan University); Yue Cao (Wuhan University); Faisal Bashir Hussain (Bahria University); Naveed Ahamad (Prince Sultan University); Mohammed ali Alshara (Prince Sultan University); Insaf Ullah (University of Essex); Yasir Javed (Prince Sultan University); Yinglong He (University of Surrey)
APTChaser: Cyber Threat Attribution via Attack Technique Modeling - Zhang Yiming (Chinese Academy of Sciences); Yang Peian (Chinese Academy of Sciences); Jiang Zhengwei (Chinese Academy of Sciences); Ma Chunyan (Chinese Academy of Sciences); Cui Mengjiao (Chinese Academy of Sciences); You Yizhe (Chinese Academy of Sciences)
What Do We Know About the Psychology of Insider Threats? - Jukka Ruohonen (University of Southern Denmark); Mubashrah Saddiqa (University of Southern Denmark)
A Digital Profiling Triage Model for Industrial Espionage - Jieun Dokko (Texas Tech University); Michael Shin (Texas Tech University)
Coffee Break
Session 4: Intrusion and Fraud Detection
Uncovering Fraudulent Patterns in USDT Transactions on the TRON Blockchain with EDA and Machine Learning - Yi Anson Lam (The University of Hong Kong); Kam Pui Chow (The University of Hong Kong); Siu Ming Yiu (The University of Hong Kong)
Sky-Eye: Detect Multi-Stage Cyber Attacks at the Bigger Picture - Pengcheng Bi (University of Chinese Academy of Sciences); Qi Wang (National Computer Network Emergency Response Technical Team Coordination Center of China); Zhuohang Lv (National Computer Network Emergency Response Technical Team Coordination Center of China); Xiaochun Yun (Zhongguancun National Laboratory); Tianning Zang (Chinese Academy of Sciences)
ATKHunter: Towards Automated Attack Detection by Behavior Pattern Learning - Yuedong Pan (Institute of Information Engineering, Chinese Academy of Sciences);
Lixin Zhao (Institute of Information Engineering, Chinese Academy of Sciences); Chaofei Li (Institute of Information Engineering,Chinese Academy of Sciences); Tao Leng (Institute of Information Engineering, Chinese Academy of Sciences); Aimin Yu (Institute of Information Engineering, Chinese Academy of Sciences); Lijun Cai (Institute of Information Engineering, Chinese Academy of Sciences); Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences);
Social Program - Cruise around Dubrovnik
Keynote Talk by Prof. Srdjan Capkun, ETH Zurich
Keynote Talk by Prof. Enes Sukić, University Union- Nikola Tesla, Belgrade, Serbia
Industry Presentations
INsig2 Croatia, DCSO Germany, Ventura ERM Brazil
Coffee Break
Session 5: Large Language Models, Advances in Security and Forensics
Investigating the Effectiveness of Bayesian Spam Filters in Detecting LLM-modified Spam Mails - Malte Josten (University of Duisburg-Essen); Torben Weis (University of Duisburg-Essen)
SecureSem: Sensitive Text Classification based on Semantic Feature Optimization -Kangyuan Qin (Institute of Information Engineering, Chinese Academy of Sciences); Ran Liu (Institute of Information Engineering, Chinese Academy of Sciences); Min Yu (Institute of Information Engineering, Chinese Academy of Sciences); Gang Li (School of Information Technology, Deakin University); Mingqi Liu (Institute of Information Engineering, Chinese Academy of Sciences); Jiangyuan Li (Department of Computer Science, Beijing Technology and Business University); Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences); Jianguo Jiang (Institute of Information Engineering, Chinese Academy of Sciences)
The Hidden Dangers of Publicly Accessible LLMs: A Case Study on Gab AI - Lakshika Vaishnav (University at Albany), Sakshi Singh, Kimberly Cornell
Session 6: Advances in Security and Fotrensics
Biologically Sustainable Cyber-Physical Spaces: a Systematic Literature Review - Mirella Sangiovanni (Tilburg University, Jads); George Manias (Tilburg University, Jads); Willem-Jan J.A.M. van den Heuvel (Tilburg University,Jads)
Detecting Criminal Networks via Non-Content Communication Data Analysis Techniques from the TRACY Project - Pradeep Rangappa (Idiap Research Institute); Amanda Muscat (Idiap Research Institute); Alejandra Sanchez Lara (Idiap Research Institute); Petr Motlicek (Idiap Research Institute); Michaela Antonopoulou (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Ioannis Fourfouris (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Antonios Skarlatos (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Nikos Avgerinos (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece); Manolis Tsangaris (Performance Technologies, Anonymos Etairia Pliroforikis, Athens, Greece)
The lecture: Executive Summary of cyber breaches and cyber crime in Brazil: what we’ve seen in the past 5 years. Domingo Montanaro CEO and Cofounder Ventura Enterprise Risk Management
Lunch
Online Session: Security Analytics, Threat Intelligence,Multimedia Forensics
Assessing Threats: Security Boundary and Side-channel Attack Detection in the Metaverse - Ruiyuan Yang (Xidian University); Guohao Li (Xidian University); Li Yang (Xidian University); Hao Zhang (Xidian University); Jiangyu Wang (Xidian University); Anyuan Sang (Xidian University)
EG-SAN: Evolving Graph Self-Attention Networks for Detecting Illicit Activities in Cryptocurrency - Bo Cui (Inner Mongolia University); Jia Zhang (Inner Mongolia University)
Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security - Junjiang He (Sichuan University); Jiayan Wang (Sichuan University); Jiangchuan Chen (Sichuan University); Wenbo Fang (Sichuan University); Lei Zhang (Sichuan University); Tao Li (Sichuan University)
Improved Federated Learning Model Against Poisoning Attacks by Using Iterative Blockchain Validators - Song Ding (Nanjing University of Information Science and Technology); Fuya Xu (Nanjing University of Information Science and Technology); Peiyun Zhang (Nanjing University of Information Science and Technology); Zhangjie Fu (Nanjing University of Information Science and Technology); Kezhong Lu (Chizhou University)
ThreatResponder: Dynamic Markov-based Defense Mechanism for Real-time Cyber Threats - Zhiling Zhu (Zhejiang University of Technology); Tieming Chen (Zhejiang University of Technology); Qijie Song (Zhejiang University of Technology); Yiheng Lu (Zhejiang University of Technology); Yulin Zheng (Zhejiang University of Technology)
Social Media Threat Intelligence: A Framework for Collecting and Categorizing Threat-Related Data - Ikuesan, Richard Adeyemi (Zayed University); Obojo, Victor (Cyber Threat Intelligence Division, CyberDome); Galadima, Haula (Cyber Threat Intelligence Division, CyberDome)
A Comprehensive Survey on Basic Safety Message Attacks and Their Detection - Mohamed, Ahmed (University of Tennessee at Chattanooga); Xie, Mengjun (University of Tennessee at Chattanooga)
BGETC: An Encrypted Traffic Classification Method Based on BERT and GRU - Yang, Xiaotong (Xinjiang University); Luktarhan, Nurbol (Xinjiang University); Meng, Yi (Xinjiang University); Mei, Yihe (Xinjiang University); Zhao, Guodong (xinjiang university)
AnGSL: Graph-Based Android Malware Detection Method - Zhao, Guodong (Xinjiang University); Luktarhan, Nurbol (Xinjiang University); Mei, Yihe (Xinjiang University); Meng, Yi (Xinjiang University); Yang, Xiaotong (Xinjiang University)
Auto-TFCE: Automatic Traffic Feature Code Extraction Method and Its Application in Cyber Security - He, Junjiang (Sichuan University); Wang, Jiayan (Sichuan University); Chen, Jiangchuan (Sichuan University); Fang, Wenbo (Sichuan University); Zhang, Lei (Sichuan University); Li, Tao (Sichuan University)
MSP: A Zero-latency Lightweight Website Fingerprinting Defense for Tor Network - Lu, Tianbo (Beijing University of Posts and Telecommunications); Tao, Xiaohan (Beijing University of Posts and Telecommunications); Li, Yanfang (Beijing University of Posts and Telecommunications); Shang, Jiaze (Beijing University of Posts and Telecommunications)
An IP Anti-Geolocation Method Based on Constructed Landmarks - Lu, Enshang (Information Engineering University); Ding, Shichang (Henan Key Laboratory of Cyberspace Situation Awareness); Yang, Chunfang (Information Engineering University); Gong, Daofu (Information Engineering University); Li, Ruixiang (Henan Key Laboratory of Cyberspace Situation Awareness); Zhu, Kaijie (Zhongguancun Laboratory); Luo, Xiangyang (Information Engineering University)
Burst Sequence Based Graph Neural Network for Video Traffic Identification - xiong, jian (university of jinan/Shandong Provincial Key Laboratory of Network Based Intelligent Computing); bao, yingshuo (University of Jinan/ Shandong Provincial Key Laboratory of Network Based Intelligent Computing); peng, lizhi (Quancheng Laboratory/University of Jinan); li, shengbao (School of Cyber Security, University of Chinese Academy of Sciences/Shandong Branch of National Computer Network Emergency Response Technical Team/Coordination Center of China); zhao, kun (Inspur Computer Technology Co., Ltd)
KP-WF: Cross-domain Few-shot Website Fingerprinting - Liu, Lin (College of Computer, National University of Defense Technology, Changsha, China); Wei, Ziling (College of Computer, National University of Defense Technology, Changsha, China); Chen, Shuhui (College of Computer, National University of Defense Technology, Changsha, China); su, jinshu (College of Computer, National University of Defense Technology, Changsha, China); Yuan, Yong (College of Computer, National University of Defense Technology, Changsha, China)
Coffee Break
Online Session: Generative AI, Emerging Threats
Pixel-level Face Correction Task for More Generalized Deepfake Detection - Li, Xiang (Beijing University of Posts and Telecommunications); You, Weike (Beijing University of Posts and Telecommunications); Lin, Qingran (Beijing University of Posts and Telecommunications); Zhou, Linna (Beijing University of Posts and Telecommunications)
Securing Social Relationships: An Algorithm for Privacy Preservation Targeting Vulnerable Nodes of Social Networks - Shen, Jiawei (Hebei University); Tian, Junfeng (Hebei University); Wang, Ziyuan (Hebei University)
Evaluating and Extending Techniques for Fine-Grained Text-Topic Prediction for Digital Forensic Data - Farabi, Khan Mohammad Al (University of Georgia); Agrawal, Gagan (University of Georgia); Dorai, Gokila (Augusta University); Bardhan, Rajon (Augusta University); Maleki, Hoda (Augusta University); Kadri, Thomas E. (University of Georgia)
Driven to Evidence: The Digital Forensic Trail of Vehicles - McKay, Catherine (University College Dublin); Le-Khac, Nhien-An (University College Dublin)
Autonomous Driving System Configuration Defect Detection Method Based on Fuzzing - Liu, Jinzhao (Shandong University of Technology); Yu, Xiao (Shandong University of Technology); Zhang, Li (Communication University of Zhejiang); Zhang, Yanqiu (Shandong University of Technology); Li, YuanZhang (Beijing Institute of Technology); Tan, Kun (Shandong Institute of Information Technology Industry Development); Tan, Yuan (Beijing Institute of Technology)
Research on Minimum Receptive Field of Convolutional Neural Networks for Energy Analysis Attack - Jin, Jifang (Beijing Electronic Science and Technology Institute); nie, ziran (Beijing Electronic Science and Technology Institute); Wang, Yuting (Beijing Electronic Science and Technology Institute); Xie, Bingqi (Beijing Electronic Science and Technology Institute); Huang, Xiaobing (Qianghua Times (Chengdu) Technology Co., Ltd); duan, xiaoyi (Beijing Electronic Science and Technology Institute)
Heaker: Exfiltrating Data from Air-Gapped Computers via Thermal Signals - Jin, Jifang (Beijing Electronic Science and Technology Institute); su, yonghua (beijing electronic science and technology institute); Wang, Zunyang (Beijing Electronic Science and Technology Institude); li, Pengyu (Beijing Electronic Science and Technology Institute); Huang, Zhan (Beijing Electronic Science and Technology Institute); duan, xiaoyi (Beijing Electronic Science and Technology Institute)