European Interdisciplinary Cybersecurity Conference
Darmstadt University of Applied Sciences [h_da]
Darmstadt, Germany
Conference Program
The conference program will include a mix of keynote speeches and paper presentations. We are excited to bring together the EICC community to share their research and insights.
The conference will take place at:
Lecture Hall Building C20 (Central Campus)
Schöfferstraße 3
64295 Darmstadt
Germany
Wednesday, 17 June 2026
08.00h - 09.00h
Conference registration and welcome coffee
09.00h - 09.15h
Conference opening
Andreas Heinemann
Keynote
(Session Chair: Andreas Heinemann)
09.15h - 10.15h
Cognitive Bias as a Cybersecurity Vector
Ganna Pogrebna
10.15h - 11.00h
Coffee break
Human-centered security
(Session Chair: to be announced)
11.00h - 11.20h
Managing Learning and Difficulty Satisfaction in Cybersecurity Training Challenges
Lovisa Nyholm, Teodor Sommestad, Henrik Karlzén and Hanna Kvist
11.20h - 11.40h
When Trust Backfires: How Manipulative Cookie Designs Shape User Consent Under GDPR
Florian Mercks, Sandra Kostic and Maija Poikela
11.40h - 12.00h
Cybersecurity Guidance for Smart Homes: A Cross-National Review of Government Sources
Victor Jüttner and Erik Buchmann
Security governance and media
(Session Chair: to be announced)
12.00h - 12.20h
Negative by Design: Media Frames of Hackers in Germany
Raphael Morisco
12.20h - 12.40h
Digital Control: National Tactics of Internet Censorship
Julia Lenz, Simon Volpert, Sebastian Zillien, Philip Rünz, Luca Caviglione and Steffen Wendzel
12.40h - 13.00h
Modelling the Stages of an Organisational Whistleblower's Journey
Karen Renaud, Karl Van der Schyff and Merrill Warkentin
13.00h - 14.15h
Lunch break
Security and AI
(Session Chair: to be announced)
14.15h - 14.35h
Cyber Resilience through LLM-Enhanced Vulnerability Reports
Mario Hoffmann and Erik Buchmann
14.35h - 14.55h
SecGrad-XAI: Secure and Accurate Explainable AI with Secure Multi-Party Image Classification
Daphnee Chabal, Dolly Sapra and Zoltán Á Mann
14.55h - 15.15h
Cybersecurity Specialists' Perspectives on the Use of Generative AI in Professional Practice
Alexander Lindström, Leonardo Martucci, Simone Fischer-Hübner and Matthias Beckerle
15.15h - 16.00h
Coffee break
Hardware and IoT security
(Session Chair: to be announced)
16.00h - 16.20h
From RAM to Topology: Forensic Analysis of ZeroTier One-Systems
Daniel Spiekermann and Sven-Maurice Althoff
16.20h - 16.40h
From Scores to Alarms: NP-Calibrated Event-Level Detection with a Multi-Horizon Digital Twin for ICS
Hoda Mehrpouyan
16.40h - 17.00h
Spectre Attacks Detection in RISC-V Processors Using Hardware-Level Machine Learning Models
Mustafa Şirin and Ebu Yusuf Güven
Social activities
18.00h
Guided tour of Mathildenhöhe (UNESCO World Heritage)
19.30h
Conference dinner at Designhaus Darmstadt
Thursday, 18 June 2026
08.30h - 09.30h
Conference registration and welcome coffee
09.30h - 09.35h
Conference opening - 2nd day
Andreas Heinemann
Code and binary analysis
(Session Chair: to be announced)
09.35h - 09.55h
Static Detection of Compromised Java Components by Topological Anomalies
Oscar de Paiva, Wilson Ruggiero and Marcos Simplicio Jr.
09.55h - 10.15h
Verification of Security Properties of Cryptographic Protocols Through Model Checking Execution Traces
Simona Bernardi and Joaquín Ezpeleta
10.15h - 11.00h
Coffee break
Monitoring and forensics
(Session Chair: to be announced)
11.00h - 11.20h
Seeing Threats Without Looking: An Encrypted Anomaly Detection Framework for Privacy-Aware Intrusion Detection
Jero Mario Schäfer and Lena Wiese
11.20h - 11.40h
OSINT Monitoring in German Organizations: A Benchmark Study
Thomas Fritzler, Toni Le and Michael Massoth
11.40h - 12.00h
Forensic Examination of the Withings Body Smart Weight Scale
Felix Fischer, Patrick Stjepanovic and Dirk Labudde
Keynote
(Session Chair: Andreas Heinemann)
12.00h - 13.00h
TBA
Dominik Herrmann
13.00h - 14.15h
Lunch break
CyFRP 2026 – part I
(Session Chair: to be announced)
14.15h - 14.35h
PERUN: Protecting Sensitive Cyber Ecosystems from Upcoming Next Generation and AI-generated Malware Threats
Marek Pawlicki, Aleksandra Pawlicka, Jörg Keller, Wojciech Mazurczyk, Rafał Kozik and Michał Choraś
14.35h - 14.55h
Privacy-Preserving Identity Management and Software Bill of Materials Vulnerability Detection:
Practical Use Cases from the PRIVIDEMA Project
Mariya Belorgey Georgieva, Benoit Cogliati, Lois Huguenin-Dumittan, Özcan Öztürk, Salma Rasti Samiei, Oana Stan and Simon Demarty
14.55h - 15.15h
Optimizing the Scalability of Cyber Range Deployments Using Architectural Patterns
Richard Stöckl, Tobias Pfaller, Lenhard Reuter, Florian Skopik and Edgar Weippl
15.15h - 16.00h
Coffee break
CyFRP 2026 – part II
(Session Chair: to be announced)
16.00h - 16.20h
Generalization of Tree-Based Machine Learning Models for Obfuscated Zero-Day Malware Detection
Selene Falchetti, Gabriele Lenzini and Christian Hennig
16.20h - 16.40h
Implementation and Benchmarking of Privacy Techniques in the Project PrivacyUmbrella
Lena Wiese, Jürgen Riegel, Torsten Panholzer, Sai Chintha, Hayate Sato, Kai Wo Yau, Despina Tawadros, Pronaya Prosun Das, Mohan Xu, Axel Zieschank and Holger Storf
16.40h - 17.00h
Conference closing
Andreas Heinemann