Find the full program of ARES 2016 here.
To find all details about each session, you can either click in the overview below on the session you are interested in or scroll down to find the detailed program of every day.
ARES Conference | ARES EU Symposium | Plenary Sessions | Workshops | CD-ARES Conference | Social Events |
WEDNESDAY, August 31, 2016 | ||||||||
---|---|---|---|---|---|---|---|---|
LH C | LH D | LH E | LH F | LH G | LH A | LH B | ||
08:00 – 18:00 | Registration | |||||||
09:00 – 09:15 | Opening, LH A | |||||||
09:15 – 10:15 | Keynote, LH A Koen Hermans, EUROJUST, The European Union’s Judicial Cooperation Unit, The Netherlands International Judicial Cooperation in the Fight against Cybercrime |
|||||||
10:00 – 10:30 | Short Coffee Break | |||||||
10:30 – 12:00 | SECODIC I | SECPID I | SOCOTUD I | FASES I | E-CRIME I | 10:30 – 12:00 | ARES Full I – Best Paper Session, LH A | |
12:00 – 13:00 | Lunch – Poster Session & Get2Gether | |||||||
13:00 – 14:00 | SECODIC II | SECPID II | SOCOTUD II | FASES II | E-CRIME II | 13:00 – 14:30 | ARES Full II | CD-ARES I |
14:00 – 14:30 | Coffee Break | 14:30 – 15:00 | Coffee Break | |||||
14:30 – 15:15 | ARES EU Symposium Keynote LH H Thomas C. Stubbings, TS Management Consulting eU, Austria Cyber-Legislation, Standardisation and Pan-European Cooperation as strategic drivers to strengthen Cybersecurity across Europe |
15:00 – 16:30 | ARES Full III | CD-ARES II | ||||
15:15 – 16:45 | SECODIC III | SENCEC I | RESIST I | FASES III | MUININ I | |||
16:30 – 17:00 | Coffee Break | |||||||
16:45 – 17:00 | Break – Poster Session & Get2Gether | |||||||
17:00 – 18:00 | SECODIC IV | RESIST II | MUININ II | 17:00 – 18:00 | ARES Full IV | CD-ARES III | ||
18:00 – 22:00 | Welcome Reception |
THURSDAY, September 1, 2016 | |||||
---|---|---|---|---|---|
LH A | LH C | LH D | LH E | LH B | |
08:30 – 17:30 | Registration | ||||
09:30 – 11:00 | ARES Full V | SAW I | ASSD I | ISPM I | CD-ARES IV |
11:00 – 11:30 | Coffee Break | ||||
11:30 – 13:00 | ARES Full VI | SAW II | ASSD II | ISPM II | PAML I |
13:00 – 14:00 | Lunch | ||||
14:00 – 16:00 | ARES Full VII | SAW III | ASSD III | ISPM III | PAML II |
16:00 – 16:30 | Coffee Break | ||||
16:30 – 17:30 | Keynote, LH A Bernhard Schölkopf Max-Planck-Campus Tübingen, Germany Toward Causal Machine Learning |
||||
17:30 – 23:00 | Conference Dinner |
FRIDAY, September 2, 2016 | SATURDAY, September 3, 2016 | ||||||||
---|---|---|---|---|---|---|---|---|---|
LH B | LH C | LH D | LH E | LH F | LH G | 08:30 – 18:00 | Excursion / Day – Trip (optional – not included in the fee) Option 1: Hallstatt Option 2: Berchtesgarden & Königssee (“King’s lake”) More information on the website |
||
08:30 – 17:30 | Registration | ||||||||
09:30 – 10:30 | Keynote, LH A Negar Kiyavash, University of Illinois at Urbana-Champaign, USA Data Analytic in Anonymized Networks: Is There Hope for Privacy? |
||||||||
10:30 – 11:00 | Coffee Break | ||||||||
11:00 – 12:30 | ARES Short I | IWCC | WSDF I | SecATM I | IWSMA I | WMA I | |||
12:30 – 13:30 | Lunch | ||||||||
13:30 – 15:00 | ARES Short II | FARES | WSDF II | SecATM II | IWSMA II | WMA II | |||
15:00 – 15:30 | Coffee Break | ||||||||
15:30 – 17:00 | ARES Short III | ARES Short IV | SecATM III | WMA III | |||||
17:00 – 19:30 | Sightseeing Tour |
Wednesday, August 31, 2016 | |
---|---|
08:00 – 18:00 | Registration desk open |
09:00 – 09:15 | Plenary Session |
Opening | |
09:15 – 10:15 | Plenary Session |
Keynote
Koen Hermanns, EUROJUST, The European Union’s Judicial Cooperation Unit, the Netherlands International Judicial Cooperation in the Fight against Cybercrime |
|
10:15 – 10:30 | short Coffee Break |
10:30 – 12:00 | Parallel Sessions |
ARES Full I – Best Paper Session
1. A recommender-based system for assisting non-technical users in managing Android permissions |
|
12:00 – 13:00 | Lunch – Poster Session & Get2Gether |
13:00 – 14:30 | Parallel Sessions |
ARES Full II – Cryptography
1. Role Mining with Missing Values CD ARES I – Web and Semantics 1. Algebra of RDF Graphs for Querying Large-Scale Distributed Triple-Store |
|
14:30 – 15:00 | Coffee Break |
15:00 – 16:30 | Parallel Sessions |
ARES Full III – Network and Software Security
1. POTR: Practical On-the-fly Rejection of Injected and Replayed 802.15.4 Frames CD ARES II – Diagnosis, Prediction and Machine Learning 1. Diagnosis of complex active systems with uncertain temporal observations |
|
16:30 – 17:00 | Coffee Break |
17:00 – 18:00 | Parallel Sessions |
ARES Full IV – Privacy-Enhancing Technologies
1. Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System CD ARES III – Security and Privacy 1. A threat to friendship privacy in Facebook |
|
18:00 – 22:00 | Welcome Reception |
Thursday, September 1, 2016 | |
08:30 – 17:30 | Registration desk open |
09:30 – 11:00 | Parallel Sessions |
ARES Full V – Applications
1. ARTIST: The Android Runtime Instrumentation Toolkit Workshop SAW I 1. Towards a Unified Secure Cloud Service Development and Deployment Life-cycle Workshop ASSD I – Secure DevOps 1. Invited talk: How to include Security into Software Lifecycle: Secure DevOps! Workshop ISPM I – Challenges, Threats and Solutions 1. Invited paper: The Strategic Trends in Cybersecurity CD ARES IV – Visualization and Risk Management 1. Visualization Model for Monitoring of Computer Networks Security based on the Analogue of Voronoi Diagrams |
|
11:00-11:30 | Coffee Break |
11:30 – 13:00 | Parallel Sessions |
ARES Full VI – Intrusion Detection and Incident Response
1. Selection of Mitigation Actions Based on Financial and Operational Impact Assessments Workshop SAW II 1. How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and Detection Workshop ASSD II – Experiences in agile development of secure software 1. An Empirical Study on the Relationship between Software Security Skills, Usage and Training needs in Agile Settings Workshop ISPM II – Models and Communication 1. Privacy Impact Assessment Template for Provenance PAML I 1. Data Anonymization as a Vector Quantization Problem: Control over Privacy for Health Data |
|
13:00 – 14:00 | Lunch |
14:00 – 16:00 | Parallel Sessions |
ARES Full VII – Security Models and Architectures
1. Byzantine Set-Union Consensus using Efficient Set Reconciliation Workshop SAW III 1. Authentication Techniques in the Context of E-participation: Current Practice, Challenges, and Recommendations Workshop ASSD III – Assessment of research on agile development of secure software 1. Misuse, Abuse, and Reuse: Economic utility functions for characterising security requirements Workshop ISPM III – Panel Discussion on Arising Challenges for Infrmation Security Management Panel discussion on Challenges for Information Security Management PAML II 1. An Open-Source Object-Graph-Mapping Framework for Neo4j and Scala: renesca |
|
16:00 – 16:30 | Coffee Break |
16:30 – 17:30 | Plenary Session |
Keynote
Bernhard Schölkopf, Max-Planck-Campus Tübingen, Germany |
|
17:30 – 23:00 | Conference Dinner |
Friday, September 2, 2016 | |
08:30 – 17:30 | Registration desk open |
09:30 – 10:30 | Plenary Session |
Keynote
Negar Kiyavash, University of Illinois at Urbana-Champaign, US |
|
10:30 – 11:00 | Coffee Break |
11:00 – 12:30 | Parallel Sessions |
ARES Short I – Cloud Security
1.Access Control and Data Separation Metrics in Cloud Infrastructures Workshop IWCC – International Workshop on Cyber Crime 1. Keynote: Steganography in the Internet Telephony Workshop WSDF I – Mobile and OS Forensics 1. Keynote: Behavioural profiling for forensic attribution of attacks 2. Identification and Analysis of Email and Contacts Artefacts on iOS and OS X 3. Extraction and analysis of volatile memory in Android systems: an approach focused on trajectory reconstruction based on NMEA 0183 standard 4. Digital Forensic Artifacts of the Cortana Device Search Cache on Windows 10 Desktop Workshop SecATM I – ATM Security Research and Development 1. Air Traffic Management Security Research in SESAR Workshop IWSMA I – International Workshop on Security of Mobile Applications I 1. Welcome and Keynote “Reclaiming Digital Privacy – The Evolution of Secure Mobile Messaging” by Sebastian Schrittwieser Workshop WMA I 1. Keynote: Learning from examples in the presence of adversaries for malware detection and classification |
|
12:30 – 13:30 | Lunch |
13:30 – 15:00 | Parallel Sessions |
ARES Short II – Applications
1. A Hazus-based method for assessing robustness of electricity supply to critical smart grid consumers during flood events Workshop FARES 1. Caller-Centrality: Identifying SPIT caller in a VoIP Network Workshop WSDF II – Cloud Forensics 1. A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment Workshop SecATM II – Risk Assessment and Incident Management 1. Security Risk Assessment and Risk Treatment for Integrated Modular Communication Workshop IWSMA II 1. Lightweight Encryption for Smart Home Workshop WMA II 1. What’s your major threat? On the differences between the network behavior of targeted and commodity malware |
|
15:00 – 15:30 | Coffee Break |
15:30 – 17:00 | Parallel Sessions |
ARES Short III – Cryptography
1. Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services ARES Short IV – Security Methods 1. Usable Privacy-aware Logging for Unstructured Log Entries Workshop SecATM III – Testing and Validation 1. Security Testing With Controller-Pilot Data Link Communications Workshop WMA III 1. Ransomware Inside Out |
|
17:00 – 19:30 | Sightseeing Tour |
Saturday, September 3, 2016 | |
---|---|
08:30 – 18:00 | Excursion / Day – Trip (optional – not included in the fee) |
Option 1: Hallstatt
Option 2: Berchtesgarden & Königssee (“King’s lake) More information see here. |