1st Workshop on Dependability and Safety Emerging
Cloud and Fog Systems (DeSECSyS)
Participation in the workshop
Please access the workshop via Zoom - click here.
September 17, 2020




Thank you for your participation!

Programme for DeSECSys

Please access the workshop via Zoom - click here.

TIME (UK time) 10am = 11:00 CEST

Time Title & Authors Presentation
[10:00-10:15] Welcome and Instruction
[10:15-11:00] Keynote 1 By Prof. Feng Hao – University of Warwick

Title: SEAL: sealed-bid auction without auctioneers

Abstract: In this talk, I will present our recent work on e-auction. I will show how to combine standard zero-knowledge proof techniques with a novel Boolean logic to transform a simple Boolean-OR function to a MAX function. This results in a decentralized e-auction protocol that is dramatically more efficient than any previous schemes in terms of computation and communication complexity. Our work demonstrates, for the first time, that it is possible to securely and efficiently implement a Vickrey auction without involving any auctioneer. The removal of the dependence on any trustworthy auctioneers clears a major obstacle of deploying Vickrey auctions in practice, e.g., implementing them as smart contracts over an Ethereum-like blockchain.

Website: https://www.dcs.warwick.ac.uk/~fenghao/
[11:00-12:30] Session 1: Trustworthy Computing Session Chair: Christoforos Dadoyan, Ionian University
  • 11:00-11:45 "ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Modules (TPMs)": Antonio Munoz (University of Malaga), Aristeidis Farao (Neurosoft), Jordy Ryan Casas (University of Malaga), Christos Xenakis (University of Piraeus) [Abstract Presentation]: https://www.youtube.com/watch?v=tU0Td-jSXPE

  • 11:45-12:30 "CloudVaults: Integrating Trust Extensions into System Integrity Verification for Cloud-based Environment": Benjamin Larsen (DTU), Heini Bergsson (DTU), Thanassis Giannetsos (DTU) [Abstract Presentation]: https://www.youtube.com/watch?v=HDLGb2V-Z7M
[12:30-13:30] Lunch break
[13:30-14:15] Keynote 2 By Dr. Nikolaos Laoutaris, IMDEA Networks

Title: Measuring Online Behavioural Advertising and Other Adventures in Data Protection & Data Economics

Abstract: In this talk I will present our results on detecting behavioural targeting in online advertising and will cover the two families of methods that we have developed for this problem, based on 1) content-based analysis for identifying correlations between visited web-pages and obtained ads, and 2) frequency-based analysis using only impression counts to detect ads that follow a user across domains. I'll also cover my initial work on establishing transparency around online price discrimination, as well as how this work lead to the creation of the Data Transparency Lab while at Telefonica. I will complete my talk by introducing my new line of work around Human-Centric Data Economies and the related research group I am building at IMDEA Networks.

Website: http://laoutaris.info/
[14:15-15:45] Session 2: Vulnerability Management and Security Analysis Session Chair: Nikos Koutroumpouchos, University of Piraeus
  • 15:00-15:45 "Sandboxing the Cyberspace for Cybersecurity Education and Learning": Stylianos Karagiannis (Ionian University), Emmanouil Magkos (Ionian University), Christoforos Dadoyan (Ionian University), Luis Landeiro Ribeiro (PDM&FC) [Abstract Presentation]: https://www.youtube.com/watch?v=36_VLKdmeNA
[15:45-16:00] Coffee break
[16:00-16:45] Cyber Security EU-funded Projects
  • 16:00-16:09 "ASTRID – AddreSsing Threats for virtuallseD Services”
    Speaker: Matteo Reppeto, CNR, Italy
  • 16:09-16:18 "CUREX: Secure and private Health Data Exchange”
    Speaker: Eleni Veroni, University of Piraeus, Greece
  • 16:18-16:27 "FutureTPM: Future Proofing the Connected World – A Quantum-Resistant Trusted Platform Module”
    Speaker: Dimitris Papamartzivanos, UBITECH Ltd, Greece
  • 16:27-16:36 “INCOGNITO – Identity Verification with Privacy-Preserving Credentials for Anonymous Access To Online Services”
    Speaker: Christos Xenakis, University of Piraeus, Greece
  • 16:36-16:45 “SECONDO – A Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 netwOrking era“
    Speaker: Nikos Passas, University of Athens, Greece
[16:45-17:00] Closing Remarks


DeSECSys_AGENDA

Call for Papers

DeSECSyS Factsheet

Important Dates

  • Submission deadline: June 21st, 2020 July 5th, 2020
  • Notification to Authors: July 26th, 2020 August 2nd, 2020
  • Preparation of the videos: August 24, 2020
  • Pre-proceedings versions: August 24, 2020
  • Camera-ready versions: To be announced after the completion of the workshop

Overview

Information security and privacy have already been established as some of the most crucial aspects of technology especially in a world that is migrating to digital applications by the day. This has inevitably led to the emergence of technologies that support the safety and dependability of the ever-increasing sensitive data handled by these applications. Additionally, besides these technologies which target security by their design, there are other technologies, such as machine learning, which could potentially be applied to security in innovative schemes.

The goal of the DeSECSys workshop is to foster collaboration and discussion among cyber-security researchers and practitioners to discuss the various applications, opportunities and possible shortcomings of these technologies and their integration. Effectively we aim to produce a collection of state-of-the-art research about emerging security technologies, their applications, their shortcomings and their verification with a focus on their uncompromised, in terms of security, safety and dependability, integration. Industry experience reports and empirical studies are also welcome.

Topics

Topics of interest include but are not limited to:

  • Emerging security and privacy technologies and solutions
  • Next-generation trustworthy computing security solutions and attacks (e.g., TPMs, TEEs, SGX, SE), and their impact
  • Utilization of novel artificial intelligence and machine learning based technologies in the context of security
  • Blockchain / Smart contracts for auditability and accountability
  • Fog Computing
  • Runtime risk assessment
  • Vulnerability Analysis
  • Formal Verification/Validation of design
  • Advanced cryptographic techniques (e.g., homomorphic encryption, secure multi-party computation and differential privacy)
  • Impact of quantum computing on cyber-security (not limited to cryptography)
  • Novel attacks and protection solutions in mobile, IoT and Cloud
  • Standardization of cyber security and trust techniques
  • Novel schemes for Trust and Reputation in Distributed Environments
  • Policy languages for advanced Access and Usage Control
  • Consensus mechanisms
  • Security in 5G networks

Submission Guidelines

Submitted papers must not substantially overlap with papers that have been published or have been submitted, in parallel, to any other venue with formally published proceedings. The workshop proceedings will be published online by Springer (more information would become available later).

All submissions must follow the original LNCS format http://www.springeronline.com/lncs from the time they are submitted. We invite the following types of papers:

Regular paper submissions should be at most 18 pages, including the bibliography but excluding well-marked appendices. Committee members are not required to read the appendices, so the paper should be intelligible without them. Regular papers should describe original work that is not previously published or concurrently submitted elsewhere.

The workshop will also consider short research paper submissions of up to 8 pages, using the same template. Research papers aim at fostering discussion and collaboration by presenting preliminary research activities, work in progress and/or industrial innovations. Research papers may summarize research results published elsewhere or outline new emerging ideas.

Submissions must be anonymous, and authors should refer to their previous work in the third-person. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions are to be made via the following web site You will be requested to upload the file of your paper (in PDF format only). Submissions not meeting these guidelines risk rejection without consideration of their merits. Each accepted paper must be presented by an author, who will have to register by the early-bird registration deadline.

Submission are to be made on Easychair.

Committee

General Chairs:

  • Liqun Chen (University of Surrey, UK)
  • Christos Xenakis (University of Piraeus, GR)

Program Co-Chairs:

  • Thanassis Giannetsos (Technical University of Denmark, DK)
  • Chrisoforos Ntantogian (Ionian University, GR)
  • Panagiotis Gouvas (UBITECH Limited, GR)

Program Committee:

  • Linzhi Jiang (University of Surrey)
  • Ioannis Krontiris (Huwaei Technologies, Germany)
  • David Oswald (University of Birmingham)
  • Matteo Repetto (CNR)
  • Riccardo Sisto (Politecnico di Torino)
  • Emmanouil Magkos (Ionian University)
  • Aggeliki Tsohou (Ionian University)
  • Fulvio Valenza (Politecnico di Torino)
  • Stefan Covaci (Technical University of Berlin)
  • Georgios Karopoulos (European Commission Joint Research Center (JRC), Cyber & Digital Citizens)
  • Antonis Michalas (University ot Tampere in Finland)
  • Marios Anagnostopoulos (Norwegian University of Science and technology NTNU)
  • Jose Moreira (University of Birminghan)
  • Weizhi Meng (Technical _University of Denmark)

Venue

Based on careful consideration of attendees' health and safety, the organizers of the 25th European Symposium on Research in Computer Security (ESORICS '20) have decided that this years' conference and all its associated workshops will take place as a virtual event. Therefore, we look forward to meeting you virtually at the 1st DeSECSyS workshop. Please visit the main conference web page for the latest details on the virtual event and its registration: https://www.surrey.ac.uk/esorics-2020
 

Sponsors:

- FutureTPM (GA: 779391)
- INCOGNITO (GA:824015)
- SECONDO (GA:832997)
- ASTRID (GA: 786922) and
- CUREX (GA: 826404) projects.
All projects have received funding from the European Union’s Horizon 2020 research and innovation programme under the above-mentioned grant agreement numbers.