18  November 2020

European Interdisciplinary Cybersecurity Conference

Couvent des Jacobins, Rennes, France
Co-located with European Cyber Week 2020

About EICC 2020

The European Interdisciplinary Cybersecurity Conference – EICC 2020 aims at establishing a venue for the exchange of information on cybersecurity and its many aspects between academics and practitioners in Europe. EICC was formerly known as the Central European Cybersecurity Conference – CECC and has been rebranded to underscore the interdisciplinarity of the conference and broaden its reach. EICC 2020 encourages the dialogue between computer scientists and researchers in all other fields related to cybersecurity, such as behavioral sciences, sociology, criminology, investigations and law. Interdisciplinary contributions are especially welcome.

COVID-19 Update

The EICC 2020 steering committee is carefully watching the COVID-19 situation around the globe and will take all possible measures to ensure the safety of participants on one side and the success of the conference on the other:

  • Authors that cannot present at the conference due to the pandemic will be allowed to present their work virtually.
  • Conference proceedings will be published by ACM ICPS even if we have to switch to an all-virtual conference.

COVID-19 Update 2

EICC 2020 switched to a fully virtual conference due to the worsening COVID-19 situation in Europe.

News

14 January 2021
The conference proceedings have been published in ACM DL.

18 September 2020
Our keynote speaker David Megías will speak about data hiding and related new opportunities for security and privacy.

17 September 2020
ICC 2020 has switched to a one-day conference. It will be held on 18 November 2020.

16 June 2020
Submission deadline has been extended to 5 July 2020.

29 April 2020
The Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications will publish a special issue on Multidisciplinary Solutions to Modern Cybersecurity Challenges with extended versions of EICC 2020 papers.

Important dates

Sumbission deadline extended to

5 Jul 2020

Author notification

29 Jul 2020

Poster submission

23 Aug 2020

Camera-ready

20 Sep 2020

Keynote

David Megías

David Megías

Data hiding: New opportunities for security and privacy?

Dr. David Megías is full Professor and the Principal Investigator of the KISON research group of the Internet Interdisciplinary Institute (IN3), at the Universitat Oberta de Catalunya (UOC). He received the Ph.D. degree in computer science from the Universitat Autònoma de Barcelona (UAB) in July 2000. Since October 2001, he has been at the UOC with a permanent position (currently as Professor). At the UOC, he has held several academic positions, until he was appointed director of the IN3 in April 2015. His current teaching is mostly related to computer networks, information security (watermarking and steganography), and research techniques and methodologies in the field of network and information technologies. His current research interests focus on information security and privacy, and include the security and privacy in multimedia content distribution (mainly in the watermarking and fingerprinting topics), steganography and steganalysis, and privacy concerns in different applications of decentralized networks. He has published research papers in numerous international journals and conferences and has participated in several national joint research projects both as a contributor and as principal investigator. He is also a member of the editorial board and programme committees of several journals and conferences in the area of security and privacy.

CONFERENCE PROGRAM

Opening

9.00

Welcome Message from Organizers
J.-F. Lalande, L. Caviglione, A. Mileva, S. Wendzel

Talk
9.10

Data hiding: New opportunities for security and privacy?
D. Megías Jiménez

Keynote Speech
10.00

Raising Security Awareness on Mobile Systems through Gamification
K. Heid, J. Heider and K. Qasempour

Full Paper
10.30

Coffee Break

Session I - Training and Behavioural Aspects for Security

11.00

AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research
M. Leitner, M. Frank, W. Hotwagner, G. Langner, O. Maurhart, T. Pahi, L. Reuter, F. Skopik, P. Smith, and M. Warum

Full Paper
11.30

Impact of COVID-19 on Cyberbullying
S. Karmakar and S. Das

Full Paper
12.00

Privacy-Preserving Warning Management for an Identity Leakage Warning Network
S. Kasem-Madani, T. Malderle, F. Boes and M. Meier

Full Paper
 

Lunch

Poster Session

13.30

What Brings Women to Cybersecurity? A Qualitative Study of Women's Pathways to Cybersecurity in Norway
H. G. Corneliussen

Poster
13.45

The Role of information sensitivity in adoption of E2EE communication software
L. Jelovčan, D. Fujs, S. Vrhovec and A. Mihelič

Poster
14.00

Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires
M. Kahlhofer, M. Hölzl and A. Berger

Poster
14.15

A Novel Approach for Acquiring Training and Software Security Requirements
D. Fujs, S. Vrhovec and D. Vavpotič

Poster
14.30

Covert Channels in One-Time Passwords Based on Hash Chains
S. Wendzel and J. Keller

Poster
14.45

Anomaly Detection in ICS based on Data-history Analysis
L. Hartmann and S. Wendzel

Poster
15.00

Coffee Break and Buffer Time

Session II - Multidisciplinary Security

15.30

Shadow-Heap: Preventing Heap-based Memory Corruptions by Metadata Validation
J. Bouché, L. Atkinson and M. Kappes

Best Paper Award Full Paper
16.00

Covert Channels in Transport Layer Security
C. Heinz, W. Mazurczyk and L. Caviglione

Full Paper
16.30

FAP - Design of an Architecture of a Forensic Access Point to Perform Online Access in a Forensically Sound Manner
D. Spiekermann

Full Paper
17.00

Cross-domain meta-learning for bug finding in the source codes with a small dataset
J. Shin

Full Paper

Conference Wrap-up and Best Paper Award

17.30

Best Paper Award, Wrap-up and Information on EICC 2021
J.-F. Lalande, S. Vrhovec

Talk

Registration

Regular registration

295 EUR
(until 27 Sep 2020)

345 EUR
(after 28 Sep 2020)

Student registration

170 EUR
(until 27 Sep 2020)

195 EUR
(after 28 Sep 2020)

The regular registration fee includes entrance to all EICC, workshops and ECW events from 17 to 19 November 2020, lunches on all three days, and cocktail on 18 November 2020. Registration fees do not include the accommodation.

Attending the ECW dinner on 17 November 2020 is optional and increases the fee by 60 €.

Students have to show a valid student ID at the conference site. Student authors are not eligible for the student registration fee and must pay the regular registration fee.

Call for papers

Scope

The conference is devoted to exploring and presenting original innovative applications, scientific and technological advancements in the field of cybersecurity. Topics for this conference include, but are not limited to:

Publication

EICC 2020 proceedings will be published by Association for Computer Machinery (ACM) in the ACM Digital Library within its
International Conference Proceedings Series (ICPS).

Proceedings from the previous conferences are available here:

Authors of accepted papers will be invited to submit an extended version to the special issue on Multidisciplinary Solutions to Modern Cybersecurity Challenges of the Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA).

Submission guidelines

The official language of the conference is English. Papers are limited to 6 pages.

All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:

Papers submitted to EICC 2020 have to use the ACM SigConf template. Please, read template instructions carefully before submitting the paper. The use of the Latex template is strongly encouraged. Non-proficient Latex users are encouraged to use the Overleaf online collaborative Latex platform (ACM Latex template on Overleaf).

Authors of accepted posters should prepare A1 sized posters (portrait or landscape) for the poster exhibition. Other designs may be considered.

The quality of the research papers will be assessed based on its originality, significance and clarity.

All submitted research papers will undergo a double-blind reviewing process. Please, make sure that submitted papers do not contain author names or obvious self-references. Please note that the page limit applies to papers with authors and not the submitted anonymized version.

Each paper will be reviewed by 2-3 reviewers. Afterwards, a discussion will be held by the chairs and reviewers to determine the outcomes of the peer-review.

Submission of a paper implies that at least one of the authors will register and present the paper at the conference if the paper is accepted. If an author has more than one accepted paper, each additional accepted paper costs the same fee as the first.

Submit papers using the EICC 2020 submission system.

Committees

Conference chair

Luca Caviglione, IMATI - CNR (Italy)

Program committee co-chairs

Aleksandra Mileva, University Goce Delcev (North Macedonia)
Steffen Wendzel, Worms University of Applied Sciences (Germany)

Organizing chair

Jean-Francois Lalande, CentraleSupélec / Inria (France)

Steering committee

Igor Bernik, University of Maribor (Slovenia)
Bela Genge, University of Medicine, Pharmacy, Sciences and Technology of Tg. Mures (Romania)
Joerg Keller, FernUniversitaet in Hagen (Germany)
Blaž Markelj, University of Maribor (Slovenia)
Wojciech Mazurczyk, Warsaw University of Technology (Poland)
Simon Vrhovec, University of Maribor (Slovenia)

Program committee

Rafael Cacheda, Universidad Politécnica de Cartagena (Spain)
Michal Choras, University of Science and Technology (Poland)
Marijke Coetzee, University of Johannesburg (South Africa)
Boštjan Delak, Faculty of Information studies in Novo mesto (Slovenia)
Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten (Germany)
Virginia Franqueira, University of Kent (UK)
Danilo Gligoroski, Norwegian university of science and technology (Norway)
Petra Grd, University of Zagreb (Croatia)
Mordechai Guri, Ben-Gurion University of the Negev (Israel)
Piroska Haller, University of Medicine, Pharmacy, Sciences and Technology of Tg. Mures (Romania)
Marko Hölbl, University of Maribor (Slovenia)
Christian Hummert, ZITiS (Germany)
Pedro R. M. Inácio, University Beira Interior (Portugal)
Martin Gilje Jaatun, University of Stavanger (Norway)
Georgios Karopoulos, Joint Research Centre (Italy)
Stefan Katzenbeisser, University of Passau (Germany)
Peter Kieseberg, St. Pölten University of Applied Sciences (Austria)
Oksana Kulyk, ITU Copenhagen (Denmark)
Romain Laborde, University of Toulouse (France)
Gabriele Lenzini, University of Luxembourg (Luxembourg)
Shujun Li, University of Kent (UK)
Olaf Maennel, Tallinn University of Technology (Estonia)
Brad Malin, Vanderbilt University (USA)
Rodrigo Miani, Universidade Federal de Uberlândia (Brazil)
Caroline Moeckel, Royal Holloway, University of London (UK)
Pal-Stefan Murvay, Politehnica University of Timisoara (Romania)
Sebastian Pape, Goethe University Frankfurt (Germany)
Tal Pavel, CyBureau (Israel)
Kaja Prislan, University of Maribor (Slovenia)
Matteo Repetto, CNR - IMATI (Italy)
Ruben Rios, University of Malaga (Spain)
Peter Y. A. Ryan, University of Luxembourg (Luxembourg)
Gerardo Simari, Universidad Nacional del Sur in Bahía Blanca and CONICET (Argentina)
Daniel Spiekermann, Polizeiakademie Niedersachsen (Germany)
Edgar Weippl, SBA Research (Austria)
Dirk Westhoff, Offenburg University of Applied Sciences (Germany)
Christos Xenakis, University of Piraeus (Greece)
Nicola Zannone, Eindhoven University of Technology (Netherlands)
Aleš Završnik, Institute of Criminology at the Faculty of Law Ljubljana (Slovenia)

Workshops CANCELED

Advanced and Reliable Solutions to Counter Malware and Stegomalware (DETONATOR 2020)