Find the full program of the ARES 2016 here.
To find all details about each session, you can either click in the overview below on the session you are interested in or scroll down.

ARES Conference ARES EU Symposium Plenary Sessions Workshops CD-ARES Conference
WEDNESDAY, August 31, 2016
LH C  LH D LH E LH F LH G LH A LH B
08:00 – 18:00 Registration
09:00 – 09:15 Opening, LH A
09:15 – 10:15 Keynote, LH A
Koen Hermans,  EUROJUST, The European Union’s Judicial Cooperation Unit, The Netherlands
International Judicial Cooperation in the Fight against Cybercrime
10:00 – 10:30 Short Coffee Break
10:30 – 12:00 SECODIC I SECPID I SOCOTUD I FASES I E-CRIME I 10:30 – 12:00 ARES Full I – Best Paper Session, LH A
12:00 – 13:00 Lunch – Poster Session & Get2Gether
13:00 – 14:00 SECODIC II SECPID II SOCOTUD II FASES II E-CRIME II 13:00 – 14:30 ARES Full II CD-ARES I
14:00 – 14:30 Coffee Break 14:30 – 15:00 Coffee Break
14:30 – 15:15 ARES EU Symposium Keynote LH H
Thomas C. Stubbings,  TS Management Consulting eU, Austria
Cyber-Legislation, Standardisation and Pan-European Cooperation as strategic drivers to strengthen Cybersecurity across Europe
15:00 – 16:30 ARES Full III CD-ARES II
15:15 – 16:45 SECODIC III SENCEC I RESIST I FASES III MUININ I
16:30 – 17:00 Coffee Break
16:45 – 17:00 Break – Poster Session & Get2Gether
17:00 – 18:00 SECODIC IV   RESIST II   MUININ II 17:00 – 18:00 ARES Full IV CD-ARES III
18:00 – 22:00
Wednesday, August 31, 2016
08:00 – 18:00 Registration desk open
09:00 – 09:15 Plenary Session
Opening
 09:15 – 10:15 Plenary Session
Keynote 

Koen Hermanns, EUROJUST, The European Union’s Judicial Cooperation Unit
International Judicial Cooperation in the Fight against Cybercrime

10:15 – 10:30 short Coffee Break
10:30 – 12:00 Parallel Sessions
SECODIC I – Private and Secure Data Storage in the Cloud I

Detailed Workshop Abstracts

1. “Empowering privacy and security in non-trusted environments”: a WITDOM overview (presentation only)
Elsa Prieto
2. “Trust-aware, reliable and distributed information security in the Cloud”: a TREDISEC Overview (presentation only)
Ghassan Karame
3. Keynote: Securing Cloud-assisted Services
N. Asokan
Abstract
4. Talk on Data Masking  (presentation only)
Eduarda Freire

SECPID I – Security and Privacy in the Cloud I

1. PRISMACLOUD Tools: A cryptographic toolbox for increasing security in cloud services
Thomas Lorünser, Daniel Smalanig, Thomas Länger, and Henrich Pöhls
2. CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing
Felix Hörandner, Stephan Krenn, Andrea Migliavacca, Florian Thiemer and Bernd Zwattendorfer
3. Towards Secure Collaboration in Federated Cloud Environments
Bojan Suzic and Andreas Reiter
4. Keynote: Building a Secure and Resilient Cloud Architecture: Theoretical and Practical Challenges behind the SafeCloud Project
Hugues Mercier
Abstract

SOCOTUD I – Talks and discussions on recent trends in user involvement and social collaboration

1. Workshop Introduction
Sebastian Franken and Sotiris Koussouris
2. Involving Users into Collaborative Software Development – The Case of CloudTeams
Sebastian Franken, Sabine Kolvenbach, and Wolfgang Gräther
3. Social Analytics in an Enterprise Context: From Manufacturing to Software Development
Angelos Arvanitakis, Michael Petychakis, Evmorfia Biliri, Ariadni Michalitsi-Psarrou, Panagiotis Kokkinakos, Fenareti Lampathaki, and Dimitris Askounis
4. SmartNet: Secure content sharing for peer to peer smart group spaces
Brian Greaves and Marijke Coetzee

FASES I – Data Protection, Privacy Preservation and Discrimination Discovery

1. From discrimination discovery to preventing algorithmic bias (Invited Talk)
Sara Haijan
2. Privacy preserving computations for viral marketing: the case of rational players
Rica Gonen and Tamir Tassa.
3. Protecting sensitive information in the volatile memory from disclosure attacks
Stefanos Malliaros, Christoforos Ntantogian and Christos Xenakis.

E-CRIME I – The economic impacts of cyber crime I

1. E-CRIME: Is measuring cyber crime elusive ?  (presentation only)
Monica Lagazio
2. A view from the frontline on pursuing, apprehending and prosecuting cyber criminals (presentation only)
Charlie McMurdie
3. E-CRIME: Discussing the cyber criminal journeys  (presentation only)
Bil Hallaq

12:00 – 13:00 Lunch – Poster Session & Get2Gether
13:00 – 14:00 Parallel Sessions
SECODIC II – Private and Secure Data Storage in the Cloud II

Detailed Workshop Abstracts

1. Data Sharing in the cloud with Proxy-Re-Encryption and Malleable Signature  (presentation only)
Florian Thiemer
2. Data-centric security is the right approach for Digital Single Market  (presentation only)
Jose Ruiz
3. Networking session with panellists

SECPID II – Security and Privacy in the Cloud II

1. Cryptographically Enforced Four-Eyes Principle
Arne Bilzhause, Manuel Huber, Henrich C. Pöhls, and Kai Samelin
2. Co-Creating Security-and-Privacy-by-Design Systems
Sauro Vicini, Francesco Alberti, Nicolás Notario, Alberto Crespo, Juan Ramón Troncoso Pastoriza, and Alberto Sanna
3. Tackling the cloud adoption dilemma – A user centric concept to control cloud migration processes by using machine learning technologies
Michael Diener, Leopold Blessing and Nina Rappel

SOCOTUD II – Demonstration, talks, and discussion on social collaboration in software development

1. Geographic Localization of an Anonymous Social Network Message Data Set
Alexander Böhm, Benjamin Taubmann, and Hans P. Reiser
2. Using crowdsourced and anonymized Personas in the requirements elicitation and software development phases of software engineering information
Iosif Alvertis, Dimitris Papaspyros, Sotiris Koussouris, Spyros Mouzakitis, and Dimitris Askounis

FASES II – Economic value of Personal Information

1.The Value of Online Users: Empirical Evaluation of the Price of Personalized Ads
Miriam Marciel, Jose Gonzalez, Yonas Mitike Kassa, Roberto Gonzalez and Mohamed Ahmed.
2. Your Data in the Eyes of the Beholders: Design of a unified data valuation portal to estimate value of personal information from market perspective
Yonas Mitike Kassa, Jose González, Ángel Cuevas, Rubén Cuevas, Miriarm Marciel and Roberto González.

E-CRIME II – The economic impacts of cyber crime  II

1. E-CRIME: Opportunities for effective countermeasures to fight cyber crime (presentation only)
Bil Hallaq
2. Lessons learned on the fight against fraud and the protection of digital identities I (presentation only)
tba, UK Cabinet Office
3. Lessons learned on the fight against fraud and the protection of digital identities II (presentation only)
tba, UK Cabinet Office

14:00 – 14:30 Coffee Break
14:30 – 15:15 Plenary Session
ARES EU Symposium Keynote 

Thomas C. Stubbings,  Thomas Stubbings Management Consulting eU, Austria
Cyber-Legislation, Standardisation and Pan-European Cooperation as strategic drivers to strengthen Cybersecurity across Europe
Abstract

15:15 – 16:45 Parallel Sessions
SECODIC III – Private and Secure Processing in the Cloud

1. Challenges for Isolating Computational Resources in Cloud Software Stacks (presentation only)
Matthias Neugschwandtner
2. Hardware Assisted Fully Homomorphic Function Evaluation (presentation only)
Sujoy Sinha Roy
3. Malleable Cryptography for Security and Privacy in the Cloud (presentation only)
Daniel Slamanig
4. Networking session with panellists

SENCEC I – Strengthening Cooperation of European Network Centres of Excellence in Cybercrime

Abstract

1. Possibilities for Synergies: SENTER project (presentation only)
Evaldas Bruze
2. SENTER: the way to better cooperation (presentation only)
Evaldas Bruze
3. Partnership with key stakeholders (presentation only)
Evaldas Bruze

RESIST I

1. Risk Assessment for Socio-technical Security Models (presentation only)
Christian W Probst
2. Modelling Socio-Technical Systems (presentation only)
Christian W Probst
3. Data Collection (presentation only)
Axel Tanner
4. Quantitative Analysis of Attacks (presentation only)
Jaco van de Pol
5. The TREsPASS Process for Risk Assessment (presentation only)
Jan Willemson

FASES III – Novel methods for authentication, identification and certificates issuance

1.Ensuring the Authenticity and Fidelity of Captured Photos Using Trusted Execution and Mobile Application Licencing Capabilities
Kwstantinos Papadamou, Riginos Samaras and Michael Sirivianos
2. FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication
Luigi Stammati, Claudio Pisa, Tooska Dargahi, Alberto Caponi and Giuseppe Bianchi.
3. Automated issuance of digital certificates through the use of federations
Thaís Bardini Idalino, Marina Da Silva Coelho and Jean Everson Martina.

MUININ I

1. Introduction (project overview and current status):
Shane Finan: Slándáil Project, Emergency Management and Social Media Monitor
2. Emergency Management and Social Media Monitor Implementation:
The Slandail Monitor Real-time Processing and Visualisation of Social Media Data for Emergency Management
Xiubo Zhang, Stephen Kelly and Khurshid Ahmad
3. Legal and Ethical Use of Data in Emergency Response:
a. Ensuring Security of Data and Information Flow in Emergency Response Decision Support
Damian Jackson and Paul Hayes
b. Legal Implications of Using Social Media in Emergency Response
Christian Berger, Paolo De Stefani and Taiwo Oriola
4. End User Communication Practice:
Disaster-related Public Speeches: The Role of Emotions
Maria Spyropoulou and Khurshid Ahmad

16:45 – 17:00 Coffee Break
17:00 – 18:00 Parallel Sessions
SECODIC IV – Integrity and Verifiability of Outsourced Data/Computation

1. Verifiable Polynomial Evaluation & Matrix Multiplication (presentation only)
Melek Önen
2. Verifiable searchable encryption (presentation only)
James Alderman
3.Workshop wrap-up

RESIST II

1. The TREsPASS Attack Navigator including Demonstration (presentation only)
Christian W Probst
2. Wrap-up

MUININ II

1. Advanced Image and Text Analysis: Project Progress:
a. The Application of Social Media Image Analysis to an Emergency Management System
Min Jing, Bryan Scotney, Sonya Coleman and Martin McGinnity
b. Computational, Communicative, and Legal Conditions for Using Social Media in Disaster Management in Germany
Sabine Gründer-Fahrer, Christian Berger, Antje Schlaf and Gerhard Heyer
2. Conclusion:
Final notes from Project Coordinator, Khurshid Ahmad

18:00 – 22:00 Welcome Reception