Home // SECURWARE

SECURWARE 2025, The Nineteenth International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Notes: IARIA Conference.

Editors:
Alexander Lawall, IU International University of Applied Science, Germany
Fan Wu, Tuskegee University, USA

ISSN: 2162-2116

ISBN: 978-1-68558-306-4

Location: Barcelona, Spain

Dates: from October 26, 2025 to October 30, 2025

Articles: there are 22 articles

Optimizing Certificate Validation in OT Environments
Steffen Fries, Rainer Falk, and Andreas Guettinger
keywords: credential; digital certificate; public-key infrastructure; device authentication, industrial security; power system automation.

Threat-Based Vulnerability Management: Mapping CVEs to the MITRE ATT&CK Framework
Logan McMahon and Oluwafemi Olukoya
keywords: MITRE ATT&CK; CVE; Vulnerability; Machine Learning; Data Augmentation; Threat Intelligence.

Secure Software Brownfield Engineering – Sequence Diagram Identification
Aspen Olmsted
keywords: cyber-security; software engineering; secure software development.

Measurability: Toward Integrating Metrics into Ratings for Scalable Proactive Cybersecurity Management
William Yurcik, Stephen North, Rhonda O'Kane, Sami Saydjari, Fabio Roberto de Miranda, Rodolfo da Silva Avelino, and Gregory Pluta
keywords: cybersecurity risk quantification, cybersecurity risk management, cybersecurity investment, cybersecurity metrics.

Identification of Dual Processes Using Power Side-channels
Jakob Sternby, Niklas Lindskog, and Håkan Englund
keywords: Security; Side-channel Monitoring; Dual-core.

General Conversion Scheme of Card-based Protocols for Two-colored Cards to Updown Cards ― the number of cards for computing an arbitrary function
Takumi Sakurai and Yuichi Kaji
keywords: Card-based cryptography; Secure multi-party computation; Updown cards.

From ECU to VSOC: UDS Security Monitoring Strategies
Ali Recai Yekta, Nicolas Loza, Jens Gramm, Michael Peter Schneider, and Stefan Katzenbeisser
keywords: Automotive Networks, Automotive Security, UDS, Security Monitoring, VSOC, UN R155.

DeepAuthVerify - A Modular Framework for Deepfake Detection in Facial Authentication Systems
Domenico Di Palma, Alexander Lawall, and Kristina Schaaff
keywords: Deepfake Detection; Facial Recognition; Authentication Systems; Large Language Models.

Comparison of Password-Authenticated Key Exchange Schemes on Android
Jörn-Marc Schmidt and Alexander Lawall
keywords: PAKE; post-quantum cryptography; Android; password-based authentication; mobile security.

Towards Automated Penetration Testing Using Inverse Soft-Q Learning
Dongfang Song, Yuhong Li, Ala Berzinji, and Elias Seid
keywords: penetration testing; deep reinforcement learning; imitation learning; inverse soft-Q learning; PT-ISQL.

Hidden-Non-Malicious-Dummies for Evaluation of Defense Mechanisms of Industrial Control System against Steganographic Attacks
Robert Altschaffel, Stefan Kiltz, Jana Dittmann, Tom Neubert, Laura Buxhoidt, Claus Vielhauer, Matthias Lange, and Rüdiger Mecke
keywords: SCADA; hidden-non-malicious-dummy; cyber-security.

The Balanced Chance & Cyber‑Risk Card: Extending Reichmann's Multidimensional Controlling Framework for C‑Level Steering in SMEs
Alexander Lawall and Maik Drozdzynski
keywords: Cyber Risk Management; Enterprise Risk Management (ERM); Risk Controlling in SMEs; Management Control Systems; Cybersecurity Metrics; Balanced Scorecard.

Supporting the Security Modelling in Operational Technology by identifying capacities of Hidden Channels in ICS protocols
Robert Altschaffel, Sönke Otten, Stefan Kiltz, and Jana Dittmann
keywords: security modeling; iot; hidden channels.

Artificial Intelligence or Artificial Stupidity? The Inability of Small LLMs to Reason, Even Given the Correct Answer!
Salvatore Vella, Salah Sharieh, and Alex Ferworn
keywords: large language models; bias; threat.

Improving Crypto-Agility in Operational Technology through Exchangeable Smart Cards
Tobias Frauenschläger and Jürgen Mottok
keywords: Crypto-Agility; Smart Cards; Operational Technology; Post-Quantum Cryptography; Key Management; Security.

A Modular and Flexible OPC UA Testbed Prototype for Cybersecurity Research
Sebastian Kraust, Peter Heller, and Jürgen Mottok
keywords: testbed; OPC UA; cybersecurity; penetration testing.

Towards Post-Quantum-Ready Automated Certificate Lifecycle Management in Operational Technology
Ayham Alhulaibi, Tobias Frauenschläger, and Jürgen Mottok
keywords: Post-Quantum Cryptography; Public Key Infrastructure; Automated Device Onboarding; BRSKI; Security Token; Operational Technology Security.

Quantifying Persuasion - A Comparative Analysis of Cialdini's Principles in Phishing Attacks
Alexander Lawall
keywords: Phishing; Social Engineering; Cialdini's Principles of Influence; Behavioral Security; Cyber Security.

A Modified Schnorr Sigma Protocol and Its Application to Isogeny-Based Identification
Mahdi Mahdavi, Zaira Pindado, Amineh Sakhaie, and Helena Rifà-Pous
keywords: Schnorr Protocol; Zero-knowledge proofs; Discrete Logarithm Problem; Isogeny-based cryptography; Post-Quantum Cryptography.

Evaluating User Perceptions of Privacy Protection in Smart Healthcare Services
Huan Guo, Elias Seid, Yuhong Li,  and Fredrik Blix
keywords: Privacy protection measures; privacy-preserving techniques; smart healthcare; users’ perception.

Cloud Security Misconfigurations and Compliance: An Empirical Model for DORA Readiness in Financial Environments
Ali Ferzali, Naol Mengistu, Elias Seid, and Fredrik Blix
keywords: Cloud Security; DORA Compliance; Financial Institutions; AWS Misconfigurations; Operational Resilience; Regulatory Technology (RegTech); Cybersecurity Governance Identity and Access Management (IAM).

A Comparative Study of Machine Learning and Quantum Models for Spam Email Detection
Cameron Williams, Taieba Tasnim, Berkeley Wu, Mohammad Rahman, and Fan Wu
keywords: KNN; FNN; CNN; SVM; QCNN; Machine Learning; Deep Learning; Quantum Computing.