15-16  June 2022

European Interdisciplinary Cybersecurity Conference

Universitat Oberta de Catalunya, Can Jaumandreu - Carrer Perú 52, Barcelona, Spain

EICC 2023 will be held on 14-15 June 2023 in Stavanger (Norway).
You can check out the presentation of the venue here.

About EICC 2022

The European Interdisciplinary Cybersecurity Conference – EICC 2022 aims at establishing a venue for the exchange of information on cybersecurity and its many aspects between academics and practitioners in Europe. EICC was until 2019 known as the Central European Cybersecurity Conference – CECC and has been rebranded to underscore the interdisciplinarity of the conference and broaden its reach. EICC 2022 encourages the dialogue between computer scientists and researchers in all other fields related to cybersecurity, such as behavioral sciences, sociology, criminology, investigations and law. Interdisciplinary contributions are especially welcome.

EICC 2022 is planned as a face-to-face conference with the possibility for remote participation.

Special Session on Advanced and Reliable Solutions to Counter Malware and Stegomalware - DETONATOR 2022

Security in Open Cloud Infrastructures - SOCI 2022

Complex network analysis for cybersecurity - CNACYS 2022


Josep Domingo-Ferrer

Josep Domingo-Ferrer

Ethics by design in decentralized computing

In our days, decentralized computing is a marked trend. Beyond its advantages in terms of scalability and fault tolerance, it is better adapted to ethical constraints than centralized computation (where a single party enjoys dictatorial power). I will sketch an approach based on coutility to make ethical behavior the rational choice of participants. Next, I will describe some applications of this approach to problems in decentralized computing and decentralized machine learning.

Josep Domingo-Ferrer is a Distinguished Professor of Computer Science and an ICREA-Acadèmia Research Professor at Universitat Rovira i Virgili, Tarragona, Catalonia. He is the founder and the director of CYBERCAT-Center for Cybersecurity Research of Catalonia. He also founded and led the UNESCO Chair in Data Privacy. He is an associated researcher at the VP-IP Chair of Institut Mines-Télécom, Paris, France. His research interests include security and privacy technologies, and in particular, anonymization/statistical disclosure control, anti-discrimination in machine learning and data mining, and cryptography. More generally, he is interested in ethics by design in information technology. He is an IEEE Fellow, an ACM Distinguished Scientist and an Elected Member of Academia Europaea and the International Statistical Institute. He has received several research awards.

Fulvio Valenza

Fulvio Valenza

Next generation of hybrid threats

Nowadays, cyber-physical systems are ubiquitously present in our everyday life. Their usage spans many applications, like industrial control systems, modern buildings, homes, transportation, and critical infrastructures. Novel paradigms and technologies such as the Internet of Things (IoT), Software Defined Network (SDN), Cloud and Edge Computing, made all of these devices and environments become "intelligent", interconnected, dynamic, and flexible, thus also sometimes known simply as "smart". The increasing use of these smart devices and environments is bringing a novel technological revolution, that generates new business opportunities across industry sectors from healthcare to transport and from agriculture to manufacturing and new functionality for consumers. However, these opportunities come with their own new threats. Determining the potential vulnerabilities that new malwares may exploit in these smart systems and providing an adequate amount of protection is more challenging than in traditional computer systems for a variety of reasons that include low computational power, inadequate software quality, and also more importantly the fact that such environments combine human, physical and digital (cyber) aspects to the system design and implementation.

Fulvio Valenza is an assistant professor with time contract at Politecnico di Torino. His main research interests are in the areas of cybersecurity and network management, with a special focus on the analysis, verification, and refinement of Security and Access Control Policies. He has also been working on modeling and automatically configuring Network Security Functions (NSF), security orchestration in virtualized networks, and modeling, analysis, and mitigation of threats in smart and distributed systems. He served also as workshop co-chair of the 2nd, 3rd, and 4th edition of SecSoft, as Guest Editor for Elsevier Computer Network and IEEE Transactions on Network and Service Management, as a TPC member in several international conferences and workshops on computer and network security (e.g., Netsoft, NOMS, Mobisec, SN, Globecom), and as also reviewer for several international journals on network and computer security. He has been also involved in different EU projects: FP7 SECURED, H2020 SHIELD, H2020 Rainbow, H2020 ASTRID, of which he serves as leader on the Security Orchestration working package.

Bart Preneel

Bart Preneel

Proximing and presence tracing in a pandemic: lessons learned

The corona pandemic is the first major pandemic in times of big data, AI and smart devices. Some nations have deployed these technologies a large scale to support a trace/quarantine/test/isolate strategy in order to contain a pandemic. However, concerns have been raised w.r.t. some solutions that are not compatible with the privacy regimes in some jurisdictions including the European Union. Fortunately, a range of cryptographic techniques allows performing proximity and presence tracing based on data minimization. This talk will compare several protocols including the solutions developed by the DP-3T (Distributed Privacy-Preserving Proximity Tracing) consortium. Apps based on this protocol have been rolled out in more than 40 countries and states, with support of Google and Apple; in the EU, these apps have been interconnected to work as a single virtual app using the European Federated Gateway Service, which has linked 17 EU countries and reached approximately 100 million users. The talk will discuss the lessons learned from this large-scale deployment in which the principles of privacy-by-design and data minimization have played a central role.

Bart Preneel received the Electr. Eng. and Ph.D. degrees from the KU Leuven (Belgium). He is a Full Professor at the KU Leuven where he heads the COSIC research group. He was visiting professor at five universities in Europe. He has authored more than 400 scientific publications and is inventor of 4 patents. Bart Preneel has participated to more than 50 EU funded projects and has coordinated ten of those including the EU NoE ECRYPT. He has served as panel member and chair for the European Research Council. Since 1997 he is serving on the Board of Directors of the IACR (International Association for Cryptologic Research), from 2002-2007 as vice president and from 2008-2013 as president. He is a member of the Permanent Stakeholders group of ENISA and of the Academia Europaea. He received the European Information Security Award in the area of academic research (2003), an honorary Certified Information Security Manager(CISM) designation by the Information Systems Audit and Control Association (ISACA) (2003), the RSA Award for Excellence in the Field of Mathematics (2014), the IFIP TC11 Kristian Beckman award (2015) and the ESORICS Outstanding Research Award (2017). In 2015 he was elected as fellow of the IACR and in 2021 he received the IT Person of the Year award from Computable. He frequently consults for industry and government about security and privacy technologies. He was involved in the design of the Belgian eID Card and the Belgian evoting scheme and he is technical lead of the development of the Belgian Coronalert app. He is co-founder and Board Member of the start-up nextAuth, Board member of Approach and member of the Advisory Board of Tioga Capital Partners and Nym Technologies.

Conference Program

Wednesday, 15th of June

  1. EICC 2022 Opening

  2. Keynote speaker: Bart Preneel

    Proximing and presence tracing in a pandemic: lessons learned.

  3. Session 1 Main track

    Aykan Inan
    Method for Approximating RSA Prime Factors

    Jan Wohlwender, Rolf Huesmann, Andreas Heinemann, Alexander Wiesmaier
    Cryptolib: Comparing and Selecting Cryptography Libraries

  4. Coffee break

  5. Session 2 Main track

    Eileen Köhler, Daniel Spiekermann
    Smart Home as a Silent Witness - A Survey

    Daniel Bub, Laura Hartmann, Zdravko Bozakov, Steffen Wendzel
    Towards Passive Identification of Aged Android Devices in the Home Network

    Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just
    The Unique Dressing of Transactions: Wasabi CoinJoin Transaction Detection

    Best Paper Award
  6. Session 3 Main track

    Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson
    Russian Federal Remote E-voting Scheme of 2021 - Protocol Description and Analysis

    Inger Anne Tøndel, Gunnar Brataas
    SecureScale: Exploring Synergies between Security and Scalability in Software Development and Operation

    Venkata Sai Charan Putrevu, Gowtham Ratnakaram, Sandeep Shukla
    DARK-KERNEL: Design and Implementation of a Kernel Level Active Darknet Sensor

  7. Session 4 CNACYS

    Martin Atzmueller, Rushed Kanawati
    Explainability in Cyber-Security Using Complex Network Analysis: A Brief Methodological Overview

  8. Lunch

  9. Social event + dinner

Thursday, 16th of June

  1. Keynote speaker: Josep Domingo

    Ethics by design in decentralized computing

  2. Coffee break

  3. DETONATOR. Keynote speaker: Fluvio Valenza

    Next generation of hybrid threats

  4. Session 5 DETONATOR

    Marek Pawlicki, Rafał Kozik, Michał Choraś
    Comparison of Neural Network Paradigms for Their Usefulness in a Real-World Network Intrusion Detection Deployment and a Proposed Optimised Approach

    Agathe Blaise, Elena Mihailescu, Bruno Vidalenc, Laurent Aufrechter, Darius Mihai, Mihai Carabas
    Learning Model Generalisation for Bot Detection

    Sławomir Matelski
    Human-Computable OTP Generator as an Alternative of the Two-Factor Authentication

    Pawel Szumelda, Natan Orzechowski, Mariusz Rawski, Artur Janicki
    VHS-22 - A Very Heterogeneous Set of Network Traffic Data for Threat Detection

    Carina Heßeling, Jörg Keller
    Pareto-Optimal Covert Channels in Sensor Data Transmission

  5. Lunch

  6. Session 6 SOCI

    Febrianti Wibawa, Ferhat Ozgur Catak, Murat Kuzlu, Salih Sarp, Umit Cali
    Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case

  7. Poster session (online speakers)

    Aleksandar Velinov; Aleksandra Mileva
    Launching a ZIP Bomb on the DICOM-Enabled Devices

    Steffen Wendzel; Luca Caviglione; Bernhard Fechner
    Steganography Hiding Patterns: A Brief Review

  8. Online closing EICC 2022

  9. Poster session + coffee break

    Marek Janiszewski, Marcin Rytel, Piotr Lewandowski, Hubert Romanowski
    Creating Vulnerabilities and Exploits Database of IoT Devices

    Andraž Hovnik, Luka Jelovčan, Anže Mihelič, Simon Vrhovec
    Exploring the Associations between Website Trustworthiness, Cookie Consent and Taking an Online Survey

    Ena Barcic, Petra Grd, Igor Tomicic, Bogdan Okresa Duric
    Age Estimation of Occluded Faces Using EfficientNet-B3 CNN Model

    Alberto Pedrouzo-Ulloa, Fernando Pérez-González, David Vázquez-Padín
    Secure Collaborative Camera Attribution

    Best Poster Award

    Christian Oliva, Santiago Palmero Muñoz, Luis F. Lago-Fernández, David Arroyo
    Improving LSTMs’ Under-Performance in Authorship Attribution for Short Texts

    Aleksandar Velinov, Aleksandra Mileva
    Launching a ZIP Bomb on the DICOM-Enabled Devices

    Gerhard Steinke, Ryan C LaBrie, Satadipa Sarkar
    Recommendation for Continuous Ethical Analysis of AI Algorithms

    Steffen Wendzel, Luca Caviglione, Bernhard Fechner
    Steganography Hiding Patterns: A Brief Review

    Carina Heßeling, Jörg Keller, Sebastian Litzinger
    Kleptography in Authentication Protocols: Why is it Still Possible?

  10. End of conference


On-site participation

Regular registration

350 EUR

400 EUR

Co-author registration

250 EUR

300 EUR

Student attendee

175 EUR

200 EUR

Social event
(additional ticket)

80 EUR

Online participation

Regular registration

75 EUR

100 EUR

(without accepted paper)

30 EUR

45 EUR

Student authors of full papers, short papers and posters are not eligible for the student registration fee and must pay the regular registration fee.

Early-bird registration fees must be paid on 25 April 2022 or earlier.

Exposition of accepted posters is mandatory for both online and on-site participants. We offer the service of printing and hanging the posters for 43 EUR (see the "Register now" link; authors who have previously registered can "re-register" only for Poster printing). Posters must be submitted by email to eicc@um.si for printing on or before 7 June 2022.

Media partnerships

Journal of Cybersecurity and Privacy (ISSN 2624-800X) is an online, open access, peer-reviewed journal which provides a forum for the dissemination of research related to all technical areas of cybersecurity. This includes information, computer and network security, cryptography, cyber–physical system security, digital forensics, etc. In addition, the journal also includes interdisciplinary articles that cover the privacy, ethical, legal, and economic aspects of cybersecurity.

Cryptography (ISSN 2410-387X) is a scientific peer-reviewed open access journal of cryptography published quarterly online by MDPI. It is covered by Scopus (Elsevier), Emerging Sources Citation Index (ESCI-Web of Science), etc.


Conference chair

David Megías Jiménez, Internet Interdisciplinary Institute (IN3) / Universitat Oberta de Catalunya (Spain)

Program committee co-chairs

Joaquín Garcia-Alfaro, Institut Polytechnique de Paris (France)
Roberto di Pietro, HBKU College of Science and Engineering (Qatar)

Program committee

Kevin Allix, University of Luxembourg (Luxembourg)
Rafael Asorey Cacheda, Universidad Politécnica de Cartagena (Spain)
Laurent Aufrechter, Thales, (France)
Jurlind Budurushi, Cloudical Deutschland GmbH (Germany)
Krzysztof Cabaj, Warsaw University of Technology (Poland)
Luca Caviglione, IMATI - CNR (Italy)
Michal Choras, ITTI Ltd. (Poland)
Mehdi Chourib, FernUni Hagen (Germany)
Michele Colajanni, University of Modena (Italy)
Igino Corona, Pluribus One (Italy)
Salvatore D'Antonio, University of Naples "Parthenope" (Italy)
Boštjan Delak, Faculty of Information studies in Novo mesto (Slovenia)
Pavlos Efraimidis, Democritus University of Thrace (Greece)
Tobias Eggendorfer, University of Applied Sciences Ravensburg-Weingarten (Germany)
Virginia Franqueira, University of Kent (UK)
Dieter Gollmann, Hamburg University of Technology (Germany)
Mordechai Guri, Ben-Gurion University (Israel)
Piroska Haller, University of Medicine, Pharmacy, Sciences and Technology of Tg. Mures (Romania)
Marko Hölbl, University of Maribor (Slovenia)
Xinyi Huang, Fujian Normal University (China)
Pedro Inácio, Universidade da Beira Interior (Portugal)
Martin Gilje Jaatun, SINTEF Digital (Norway)
Petra Grd, University of Zagreb (Croatia)
Georgios Karopoulos, European Commission, Joint Research Centre (Greece)
Stefan Katzenbeisser, University of Passau (Germany)
Peter Kieseberg, St. Pölten University of Applied Sciences (Austria)
Oksana Kulyk, ITU Copenhagen (Denmark)
Romain Laborde, University Paul Sabatier Toulouse III (France)
Jean-Francois Lalande, CentraleSupélec / Inria (France)
Gabriele Lenzini, SnT/University of Luxembourg (Luxembourg)
Albert Levi, Sabanci University (Turkey)
Shujun Li, University of Kent (UK)
Olaf Maennel, Tallinn University of Technology (Estonia)
Brad Malin, Vanderbilt University (US)
Rodrigo Miani, Universidade Federal de Uberlândia (Brazil)
Anže Mihelič, University of Maribor (Slovenia)
Aleksandra Mileva, University Goce Delcev (North Macedonia)
Caroline Moeckel, Royal Holloway, University of London (UK)
Pal-Stefan Murvay, Politehnica University of Timisoara (Romania)
Sebastian Pape, Goethe University Frankfurt (Germany)
Marek Pawlicki, UTP Bydgoszcz, (Poland)
Fernando Pérez-González, Universidade de Vigo (Spain)
Kaja Prislan, University of Maribor (Slovenia)
Helena Rifà-Pous, Universitat Oberta de Catalunya (Spain)
Anderson Santana De Oliveira, SAP (Germany)
Lynsay Shepherd, Abertay University (UK)
Gerardo Simari, Universidad Nacional del Sur and CONICET (Argentina)
Kai Simon, Fraunhofer-Gesellschaft (Germany)
Florian Skopik, AIT Austrian Institute of Technology (Austria)
Daniel Spiekermann, Polizeiakademie Niedersachsen (Germany)
Mark Strembeck, WU Wien (Austria)
Hung-Min Sun, National Tsing Hua University (Taiwan)
Yuqiong Sun, Facebook (US)
Igor Tomičić, University of Zagreb (Croatia)
Damian Weber, HTW Saarland (Germany)
Edgar Weippl, University of Vienna (Austria)
Steffen Wendzel, Worms University of Applied Sciences (Germany)
Dirk Westhoff, Offenburg University of Applied Sciences (Germany)
Christos Xenakis, University of Piraeus (Greece)
Nicola Zannone, Eindhoven University of Technology (Netherlands)
Aleš Završnik, Institute of Criminology at the Faculty of Law Ljubljana (Slovenia)

Organizing chair

Helena Rifà-Pous, Universitat Oberta de Catalunya (Spain)

Steering committee

Igor Bernik, University of Maribor (Slovenia)
Bela Genge, University of Medicine, Pharmacy, Sciences and Technology of Tg. Mures (Romania)
Joerg Keller, FernUniversitaet in Hagen (Germany)
Blaž Markelj, University of Maribor (Slovenia)
Wojciech Mazurczyk, Warsaw University of Technology (Poland)
Simon Vrhovec, University of Maribor (Slovenia)

Important dates

Paper submission deadline

15 Feb 2022

Author notification

15 Mar 2022

Poster submission deadline

20 Mar 2022


15 Apr 2022

Call for papers


The conference is devoted to exploring and presenting original innovative applications, scientific and technological advancements in the field of cybersecurity. Topics for this conference include, but are not limited to:


EICC 2022 proceedings will be published by Association for Computer Machinery (ACM) in the ACM Digital Library within its International Conference Proceedings Series (ICPS).

Proceedings from the previous conferences are available here:

Authors of accepted papers will be invited to submit extended versions to the Special Issue entitled Conference Issue: Interdisciplinary and Sustainable Cybersecurity for Security and Communication Networks.

Submission guidelines

The official language of the conference is English. Papers are limited to 6 pages.

All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:

The conference will offer a Best paper award and Best poster award. The awards will be announced and bestowed at the conference closing session. The award will be conferred to the author(s) of awarded papers who will be present at the conference. The decision criterion will consider both the paper/poster quality and the oral presentation quality.

Papers submitted to EICC 2022 have to use the ACM SigConf template. Please, read template instructions carefully before submitting the paper. The use of the Latex template is strongly encouraged. Non-proficient Latex users are encouraged to use the Overleaf online collaborative Latex platform (ACM Latex template on Overleaf).

Word users: For peer review, use the two-column template. Keep in mind that you will need to submit the paper in the one-column template to TAPS after acceptance. The final paper will be published in a two-column format.

Latex users: Use only the two-column template (first line in the document: \documentclass[sigconf]{acmart}). Keep in mind that TAPS supports only specific packages.

The quality of the research papers will be assessed based on its originality, significance and clarity.

All submitted research papers will undergo a double-blind reviewing process. Please, make sure that submitted papers do not contain author names or obvious self-references. Please note that the page limit applies to camera-ready papers with author names included and not the submitted anonymized version.

Each paper will be reviewed by 2-3 reviewers. Afterwards, a discussion will be held by the chairs and reviewers to determine the outcomes of the peer-review.

Authors of accepted posters should prepare A1 sized posters (portrait or landscape) for the poster exhibition. Other designs may be considered. Note that posters will be printed in 36″x48″ (approx. A0 portrait). Titles of poster submissions should be prefixed with POSTER (e.g., POSTER: The role of information sensitivity in adoption of E2EE communication software ).

Submission of a paper / poster implies that at least one of the authors will register and present the paper / poster at the conference if the paper / poster is accepted. If an author has more than one accepted paper / poster, each additional accepted paper / poster costs the same as online regular registration fee.

Submit papers using EICC 2022 submission system.

Full papers can exceed the page limit by a maximum of 2 pages. Each additional page above the page limit will be charged 20 EUR on top of the registration fee.

Call for special sessions

EICC 2022 is inviting proposals for Special Sessions. The typical goal of a special session is to present and discuss in a thorough and more narrow manner a specific aspect of cybersecurity and its interdisciplinary nature. EICC 2022 provides special session organizers with the opportunity to publish accepted special session papers as part of its conference proceedings. To be included in the EICC 2022 proceedings, special session papers must follow the conference submission guidelines and undergo the same rigorous reviewing process as conference papers.

Important dates

Proposal submission deadline

15 Jan 2022

Acceptance notification

Within 7 days after submission

Submission guidelines

The official language of EICC 2022 and its special sessions is English. EICC 2022 and its special sessions welcome the same paper categories (i.e., full/short papers, posters).

Special session proposals should include:

Submit special session proposals using the submission form.