Wednesday, 21 May 2025 | ||
---|---|---|
Time | ||
08:00-09:00 | Registration | |
09:00-09:30 |
Conference Opening Hall City A |
|
09:30-10:30 |
Invited Speaker Nastja Cepak, CREAPLUS, Slovenia Post-Quantum Cryptography and the Decade of Transition Hall City A |
|
10:30-11:00 | Coffee break ☕ | |
11:00-12:40 |
IFIP SEC session 1: Privacy-enhancing technologies Hall City A |
WISE SESSION session 1: Workforce and Curriculum Development Hall City B |
Advanced strategies for privacy preserving data publishing to improve multi-class classification. |
WISE Opening Remarks | |
COLIBRI: Optimizing Multi-Party Secure Neural Network Inference Time for Transformers. |
Expanding the Cybersecurity Workforce: Challenges, Current Practices and Future Directions in Attracting and Cultivating Multidisciplinary Talent. |
|
SAAFL: Secure Aggregation for Label-Aware Federated Learning. |
INFER: Enhancing Digital Forensics Education through Ready-to-Use Hands-on Labs with Portable Operating Environments. |
|
“We’ve met some problems”: Developers’ Issues With Privacy-Preserving Computation Techniques on Stack Overflow. |
An Evaluation Process for Tools that Build or Evidence Competency in Cybersecurity: Development and Lessons Learned. |
|
12:40-13:40 | Lunch 🍝 | |
13:40-15:20 |
IFIP SEC session 2: Emerging Threats and Countermeasures Hall City A |
WISE session 2: Innovative Approaches to Cybersecurity Awareness Hall City B |
CoolTest: Improved Randomness Testing Using Boolean Functions. |
The Cyber Range Lite |
|
Uncovering Robot Joint-Level Controller Actions from Encrypted Network Traffic. |
A Car Hacking Mini-Unit for High School Cybersecurity Education |
|
Generating and Attacking Passwords with Misspellings by Leveraging Homophones. |
Invited talk Steven Furnell Cybersecurity Awareness via Physical Games |
|
Facing the Challenge of Leveraging Untrained Humans in Malware Analysis. |
||
15:20-15:50 | Coffee break ☕ | |
15:50-16:10 |
WISE Workshop Intro: Advancing Digital Privacy Education: A Global Curriculum Initiative Hall City A |
|
16:10-17:50 |
IFIP SEC session 3: Industrial and Critical Infrastructure Security Hall City A |
WISE session 3: Gamification in Cybersecurity Education Hall City B |
Artefact Provenance Graphs for Anomaly Inference in Industrial Control Systems. |
Loss Aversion and Fixed Reward in Gamified Cyber Security Training. |
|
Certified Secure Updates for IoT Devices. |
Improving Cyber Security Incident Response: A Collaborative Tabletop Game Approach. |
|
LSAST: Enhancing Cybersecurity through LLM-supported Static Application Security Testing. |
Gamified Defence: Practical Guidelines for Combating Social Engineering Attacks. |
|
FRAMICS: Functional Risk Assessment Methodology for Industrial Control Systems. |
Lucky the Fish Teaches Children About Phishing. |
|
18:00-19:00 | City tour 🏫 | |
19:00-21:00 | Welcome Reception at the Oldest Vine House – Wine tasting 🍷 |
Thursday, 22 May 2025 | |||
---|---|---|---|
Time | |||
08:00-09:00 | Registration | ||
09:00-10:00 |
Invited Speaker Jaideep Vaidya, Rutgers University, USA – KBA award winner AI and Conceptions of Privacy Hall City A |
||
10:00-10:30 | Coffee Break ☕ | ||
10:30-12:10 |
IFIP SEC session 4: Privacy protection Hall City A |
WISE session 4: Workshop Hall City B |
|
Post-Processing in Local Differential Privacy: An Extensive Evaluation and Benchmark Platform. |
Workshop Advancing Digital Privacy Education: A Global Curriculum Initiative. |
||
Rubber Ducky Station: Advancing HID Attacks with Visual Data Exfiltration. |
|||
PrivTru: A Privacy-by-Design Data Trustee Minimizing Information Leakage. |
|||
Towards a lightweight and privacy-friendly Architecture for Online Advertising. |
|||
12:10-12:40 | Light lunch 🍝 | ||
12:40-13:30 |
IFIP SEC session 5: IoT security Hall City A |
IFIP SEC session 6: Risk Management Hall City C |
WISE session 3: Gamification in Cybersecurity Education Hall City B |
Future-Proof Asynchronous IoT Backups: An Evaluation of Secure IoT Data Recovery Considering Post-Quantum Threats. |
Time is money: A temporal model of cybersecurity. |
Regulatory Challenges in Cybersecurity – A Critical Analysis of the EU AI Act. |
|
Checking the Impact of Security Standardization – A Case Study on Bluetooth LE Pairing of Internet-of-Things Devices. |
Update at Your Own Risk: Analysis and Recommendations for Update-related Vulnerabilities. |
Exposing the Gaps: The State of Supply Chain Coverage in Current Security Standards. |
|
14:00-22:00 | Half-day excursion to Ptuj and conference dinner at the Dominican Monastery in Ptuj 🏰 |
Friday, 23 May 2025 | |||
---|---|---|---|
Time | |||
08:00-09:00 | Registration | ||
09:00-10:40 |
IFIP SEC session 7: Industrial and Critical Infrastructure Security Hall City A |
WISE session 6: Curriculum and Research Development Hall City B |
WNDSS: Opening, Keynote, Session 1 Hall City C |
Data Transformation for IDS: Leveraging Symbolic and Temporal Aspects. |
A Transdisciplinary Approach to Embedding Cybersecurity Across the Curriculum of an Undergraduate Computing Degree Program in South Africa. |
Opening | |
SAFARI: a Scalable Air-gapped Framework for Automated Ransomware Investigation. |
Using Attack Trees for Security Education and Training: Simplifying Threat Analysis. |
Keynote Matt Bishop (University of California Davis, USA) Security Issues with Networked and Distributed Systems |
|
SAVA Deployment for Spoofed Source Attacks. |
Integrating Security Concepts into Introductory Programming Courses. |
WNDSS Session 1: Security of Industrial Control Systems | |
Lightweight and Persistent Remote Attestation: Leveraging a Continuous Chain of Trust in Software Integrity Measurements. |
CSEC Foundations Guidelines. |
A Novel Evidence-Based Threat Enumeration Methodology for ICS. |
|
10:40-11:10 | Coffee break ☕ | ||
11:10-12:10 |
Invited Speaker Reinhard Posch, Institute of Applied Information Processing and Communications at Graz University of Technology, Austria eIDAS2 – a milestone for security in public services? Hall City A |
WNDSS Session 2: Binary Protocols and Security of Smart Grids Hall City C |
|
Flatdc: Automatic Schema Reverse Engineering of FlatBuffers. |
|||
Security Metrics for False Data Injection in Smart Grids. |
|||
12:10-13:10 | Lunch 🍝 | ||
13:10-14:50 |
IFIP SEC session 8: Data and Application Security Hall City A |
WISE session 7: IFIP 11.8 WG AGM and closing session Hall City B |
WNDSS Session 3: Resilience, Anonymity Networks, and Liveness Detection Hall City C |
How stealthy is stealthy? Studying the Efficacy of Black-Box Adversarial Attacks in the Real World. |
Annual working group AGM open to all members and WISE participants. |
A Quantum Algorithm for Assessing Node Importance in the st-Connectivity Attack. |
|
Certifiably robust malware detectors by design. |
BERMUDA: A BPSec-Compatible Key Management Scheme for DTNs. |
||
“You still have to study” – On the Security of LLM generated code. |
Impact Analysis of Sybil Attacks in the Tor Network. |
||
Identifying and Analyzing Vulnerabilities and Exploits in On-Premises Kubernetes. |
Time-Aware Face Anti-Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning. |
||
14:50-15:20 |
Yves Deswarte Best Student Paper Award Closing session IFIP SEC 2026 Hall City A |
WNDSS Session 4: IFIP WG11.4 Meeting & Closing Remarks Hall City C |
|
15:20-15:50 | Farewell refreshments and last chats 🥪 |