Home // SECURWARE

SECURWARE 2023, The Seventeenth International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Notes: IARIA Conference.

Editors:
Erik Buchmann, ScaDS.AI, Leipzig University, Germany
Eric Veith, Carl von Ossietzky University Oldenburg, Germany
Dirceu Cavendish, Kyushu Institute of Technology/UCLA, Japan/USA

ISSN: 2162-2116

ISBN: 978-1-68558-092-6

Location: Porto, Portugal

Dates: from September 25, 2023 to September 29, 2023

Articles: there are 15 articles

Lightweight Fine-grained Access Control Mechanism Based on Zero Trust in CPS
Nakul Ghate, Shohei Mitani, and Hirofumi Ueda
keywords: Cyber physical systems; zero trust; fine-grained; workload; distributed access control.

ChatIDS: Explainable Cybersecurity Using Generative AI
Victor Jüttner, Martin Grimmer, and Erik Buchmann
keywords: Intrusion Detection; ChatGPT; Networks

Privacy-preserving Vehicle Tracking Using Homomorphic Encryption
Hoang Anh Bui, Simy Chacko, and Duc Cuong Nguyen
keywords: Homomorphic encryption; privacy preserving; location tracking; trajectory monitoring

Virtual Sessions for Forensic Analysis of Video Conferencing Systems: A Novel Methodology
Jaykumar Soni, Tom Neubert, Benjamin Dietrich, and Claus Vielhauer
keywords: Privacy, Video Conferencing Systems, Media Security, Forensic Analysis

Electric Vehicle Authentication and Secure Metering in Smart Grids
Yutaka Yamaguchi, Dirceu Cavendish, and Hiroshi Koide
keywords: Smart Grids; Electric Vehicle Charging; Authentication and Key Agreement

Heterogeneous Network Inspection in IoT Environment with FPGA based Pre-Filter and CPU based LightGBM
Zhenguo Hu, Hirokazu Hasegawa, Yukiko Yamaguchi, and Hajime Shimada
keywords: Malicious Traffic Detection; Machine Learning; FPGA; LightGBM

Stego-Malware Attribution: Simple Signature and Content-based Features Derived and Validated from Classical Image Steganalysis on Five Exemplary Chosen Algorithms
Bernhard Birnbaum, Christian Kraetzer, and Jana Dittmann
keywords: stego-malware communication scenario; multi-class steganalysis and attribution

Joining of Data-driven Forensics and Multimedia Forensics for Deepfake Detection on the Example of Image and Video Data
Dennis Siegel, Christian Kraetzer, and Jana Dittmann
keywords: forensics, media forensics, DeepFake detection, machine learning

AI-driven Approach for Access Control List Management
Nader Shahata, Hirokazu Hasegawa, and Hiroki Takakura
keywords: Access Control; Cyber Security; Network; Artificial Intelligence.

Drivers for a Secure Mobile App Development Framework
Christoff Jacobs and Marijke Coetzee
keywords: mobile application; secure software development frameworks, cybersecurity

Quantum Threats to the TLS 1.3 Protocol
Luiz Filipi Anderson de Sousa Moura, Alexandre Augusto Giron, and Ricardo Felipe Custódio
keywords: Quantum Computing; Transport Layer Security (TLS) 1.3; Store-Now-Decrypt-Later.

Long-distance Remote Security Diagnostics during Maintenance Testing: A Practical Application and Evaluation
Kazutaka Matsuzaki, Masatoshi Enomoto, and Kenji Sawada
keywords: Industrial Control Systems (ICS), Remote Security Diagnostics, Maintenance Testing

Coordination of Controllers and Switches in Software Defined Networks (SDN) for Multiple Controllers
Stavroula Lalou, Georgios Spathoulas, and Sokratis Katsikas
keywords: Software Defined Networks, multiple controllers, coordination, load balancing.

Leveraging Attack Graphs in Automotive Threat Analysis and Risk Assessment
Mera Nizam-Edden Saulaiman, Miklos Kozlovszky, and Akos Csilling
keywords: TARA, threat and risk analysis, automotive network, connected vehicles

Science-Tracker Fingerprinting with Uncertainty: Selected Common Characteristics of Publishers from Network to Application Trackers on the Example of Web, App and Email
Stefan Kiltz, Robert Altschaffel, and Jana Dittmann
keywords: Security, trust and privacy metrics; IT forensics; Attribution