Program
Day 1 - July 12th
Day 2 - July 13th
Day 3 - July 14th
Day 1: July 12th
10:30-11:00 Welcome Coffee
11:00 Conference Opening
11:30 Keynote 1 (Giovanni Vigna) - Session Chair: Daniel Gruss
Title: Make It or Take It: The Quest for Value Extraction in Decentralized Finance
12:45 Lunch
14:15 Paper Session #1: Side Channels are Everywhere - Session Chair: Daniel Gruss
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V
Jan Wichelmann, Anna Pätschke, Florian Sieck, Christopher Peredy, Thomas Eisenbarth (University of Lübeck)The Finger in the Power: How to Fingerprint PCs by Monitoring their Power Consumption
Marina Botvinnik (Ben-Gurion University of the Negev and Intel Corporation); Tomer Laor (Ben-Gurion University of the Negev); Thomas Rokicki (Univ Rennes, CNRS, IRISA); Clémentine Maurice (Univ Lille, CNRS, Inria); Yossi Oren (Ben-Gurion University of the Negev and Intel Corporation)PWRLEAK: Exploiting Power Reporting Interface for Side-channel Attacks on AMD SEV
Wubing Wang, Mengyuan Li (The Ohio State University); Yinqian Zhang (Southern University of Science and Technology); Zhiqiang Lin (The Ohio State University)
15:30 Break
16:00-18:00 Panel: Security of Generative AI and Generative AI in Security - Session Chair: Yossi Oren
Panelists: Sahar Abdelnabi, Andrea Continella, Konrad Rieck, Vasilios Mavroudis, Giovanni Vigna
19:00 Reception at the Guest House of the Hamburg Senate
The Senate of the Free and Hanseatic City of Hamburg invites to a reception on the occasion of the 20th Conference on Detection of Intrusions and Malware & Vulnerability Assessment at the Guest House of the Hamburg Senate.
The reception will be opened by Katharina Fegebank, Second Mayor of the Free and Hanseatic City of Hamburg and Senator in the Office for Science, Research, Equal Opportunities and Districts
The reception is sponsored in equal parts by the City of Hamburg and the Genua GmbH.
To get to the reception, we have organised a bus transfer. The bus will leave at 6:15 pm directly from the hotel.
Day 2 - July 13th
09:30 Keynote 2 (Robin Sommer) - Session Chair: Mathias Fischer
10:45 Break
11:00 Paper Session #2: Security and Machine Learning - Session Chair: Konrad Rieck
- Madvex: Instrumentation-based Adversarial Attacks on Machine
Learning Malware Detection
Nils Loose, Felix Mächtle (Universität zu Lübeck); Claudius Pott, Volodymyr Bezsmertnyi, Thomas Eisenbarth (University of Lübeck) - Honey, I Chunked the Passwords: Generating Semantic Honeywords
Resistant to Targeted Attacks using Pre-Trained Language Models
Fangyi Yu, Miguel Vargas Martin (Ontario Tech University)
11:45 Break
12:00 Paper Session #3: Security and the Physical World - Session Chair: Mario Polino
White-box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems
Alessandro Erba, Nils Ole Tippenhauer (CISPA Helmholtz Center for Information Security)A Security Analysis of CNC Machines in Industry 4.0
Marco Balduzzi (Trend Micro); Francesco Sortino, Fabio Castello, Leandro Pierguidi (Celada)
12:45 Lunch
14:30 Tools Demo Session / DIMVA Arsenal / DIMVA Tools Arsenal
AI VPN: A Free-Software AI-Powered Network Forensics Tool
Veronica Valeros, Sebastian Garcia (Czech Technical University in Prague)FACT – Firmware Analysis and Comparison Tool
Johannes vom Dorp, Jörg Stucke, Peter Weidenbach, Marten RingwelskiMicrowalk
Jan WichelmannMISP
Gerard Wagener, CIRCLSigmaTau Tool
Paolo Di Prodi (Priam Cyber AI ltd)Slips: A Free-Software network IPS with Behavioral Machine Learning Detection
Alya Gomaa, Sebastian Garcia (Stratosphere Laboratory, AIC, FEL, CTU)
16:00 Break
16:30 Paper Session #4: Security Issues when Dealing with Users - Session Chair: Sven Dietrich
A Deep Dive into the VirusTotal File Feed
Kevin van Liebergen, Juan Caballero (IMDEA Software Institute); Platon Kotzias (Norton Research Group); Chris Gates (NortonLifeLock Research Group)Attackers as Instructors: Using Container Isolation to Reduce Risk and Understand Vulnerabilities
Yunsen Lei, Julian P. Lanson, Craig A. Shue (Worcester Polytechnic Institute); Timothy W. Wood (George Washington University)
17:45 Break
19:00 Conference Dinner at Restaurant Störtebecker, Elbphilharmonie
Day 3 - July 14th
09:30 Keynote 3 (Konrad Rieck) - Session Chair: Michael Meier
Title: When Papers Choose their Reviewers: Adversarial Machine Learning in Peer Review
10:45 Break
11:00 Awards
11:15 Paper Session #5: Security Issues when Dealing with Users - Session Chair: Zhiqiang Lin
Towards Reliable and Scalable Linux Kernel CVE Attribution in Automated Static Firmware Analyses
René Helmke, Johannes vom Dorp (Fraunhofer FKIE)Divak: Non-invasive Characterization of Out-Of-Bounds Write Vulnerabilities
Linus Hafkemeyer (TU Delft); Jerre Starink, Andrea Continella (University of Twente)
12:00 Break
12:15 Paper Session #6: Go with the Flow Integrity - Session Chair: Daniel Gruss
CEFI: Command Execution Flow Integrity for Embedded Devices
Anni Peng (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China); Dongliang Fang (Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Wei Zhou (School of Cyber Science and Engineering, Huazhong University of Science and Technology); Erik van der Kouwe (Vrije Universiteit Amsterdam); Yin Li (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China); Yuqing Zhang (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences)Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation
Alessandro Bertani, Marco Bonelli, Lorenzo Binosi, Michele Carminati, Stefano Zanero, Mario Polino (Politecnico di Milano)
13:00 Conference Closing + Lunch
14:00 Tours in Hamburg - Please vote in case you want to attend