skip to main content
10.1145/3424954acmotherconferencesBook PagePublication PageseiccConference Proceedingsconference-collections
EICC '20: Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
EICC 2020: European Interdisciplinary Cybersecurity Conference Rennes France 18 November 2020
ISBN:
978-1-4503-7599-3
Published:
12 January 2021

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Research papers
research-article
Raising Security Awareness on Mobile Systems through Gamification

Smartphones are more and more included into our personal and business environment. A data leakage of personal data violates our privacy, leaked business data might even mean a huge financial loss. Thus, many companies provide IT-security training to ...

research-article
Open Access
AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research

With the evolution of threats and attacks and the speed of automation, new modern training and learning environments are needed to support the challenges of digital organizations and societies. In recent years, cyber ranges, i.e., virtual environments ...

research-article
Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend Analysis

COVID-19's impact has surpassed from personal and global health to our social life. In terms of digital presence, it is speculated that during pandemic, there has been a significant rise in cyberbullying. In this paper, we have examined the hypothesis ...

research-article
Privacy-Preserving Warning Management for an Identity Leakage Warning Network

Identity leakage is the public disclosure of user accounts that were stolen from an online service provider, e.g. email adresses and passwords. Identity leakage is an emerging threat to the security of user accounts because the number of online ...

research-article
Shadow-Heap: Preventing Heap-based Memory Corruptions by Metadata Validation

In the past, stack smashing attacks and buffer overflows were some of the most insidious data-dependent bugs leading to malicious code execution or other unwanted behavior in the targeted application. Since reliable mitigations such as fuzzing or static ...

research-article
Covert Channels in Transport Layer Security

Network covert channels embedded within network conversations are becoming widely adopted to enforce privacy of users or bypass censorship attempts as well as by malware to remain unnoticed while exfiltrating data or coordinating an attack. As a ...

research-article
FAP: Design of an Architecture of a Forensic Access Point to Perform Online Access in a Forensically Sound Manner

The forensic investigation of data stored on mobile devices is a common option to analyze and solve cyber-crime cases. The analysis of the installed applications extracts and collects information to clarify unknown conditions and might provide ...

research-article
Cross-domain meta-learning for bug finding in the source codes with a small dataset

In terms of application security, detecting security vulnerabilities in prior and fixing them is one of the effective ways to prevent malicious activities. However, finding security bugs is highly reliant upon human experts due to its complexity. ...

POSTER SESSION: Posters
poster
What Brings Women to Cybersecurity?: A Qualitative Study of Women's Pathways to Cybersecurity in Norway

The proportion of women in information technology (IT) work is low, however, the growing field of cybersecurity attracts even fewer women. This paper reports from a study exploring what motivates women to enter IT in general and cybersecurity in ...

poster
The role of information sensitivity in adoption of E2EE communication software

This poster reports on an exploratory study of E2EE communication software adoption factors among academics at five Slovenian universities (N = 367). The results of the study suggest that information sensitivity plays an important role in adoption of ...

poster
Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires

Rapidly-changing cloud environments that consist of heavily interconnected components are difficult to secure. Existing solutions often try to correlate many weak indicators to identify and reconstruct multi-step cyber attacks. The lack of a true, ...

poster
A Novel Approach for Acquiring Training and Software Security Requirements

Security is an important software quality attribute albeit, as a nonfunctional requirement, often overlooked. Although several approaches for security requirements engineering exist, it is not clear how to adapt security requirements to software end ...

poster
Covert Channels in One-Time Passwords Based on Hash Chains

We present a covert channel between two network devices where one authenticates itself with Lamport's one-time passwords based on a cryptographic hash function. Our channel enables plausible deniability. We also present countermeasures to detect the ...

poster
Anomaly Detection in ICS based on Data-history Analysis

Data of industrial control systems (ICS) are increasingly subject to cyber attacks which should be detected by approaches such as anomaly detection before they can take effect. However, examples such as Stuxnet, Industroyer or Triton show that, despite ...

SESSION: Invited talks
invited-talk
Data hiding: New opportunities for security and privacy?

Data hiding provides a collection of techniques that can be used within a wider cybersecurity or privacy framework, making it possible, for example, to protect the users' privacy in streaming or broadcasting of multimedia contents or to detect ...

Recommendations