Conference Program

Registration

Tutorial by Prof. Gian Luca Marcialis and Roberto Casula, University of Cagliari, Italy: "Fingerprint Spoofing"

Lunch

Tutorial by Emilio Coppa, Sapienzia University Rome: "Software Fuzzing: How to Find Bugs One Step at a Time"

Welcome Reception at Mautkeller

Registration

Conference welcome

Break / Fingerprint Spoofing Results

Lunch

Break

Optional visit to the Christmas market

Registration

Break

Lunch / IEEE IFS TC Meeting (hybrid)

Break

Social Dinner: "Knights Dinner" at Alte Küch'n

Registration

Break

Lunch

Boots on the Cyber Ground: A Survival Playbook to Digital Sovereignty

Keynote by Prof. Roberto Baldoni

Session Chair: Riccardo Lazzeretti

Closing and Awards

Choice of social offers

Visit to the historic Nazi party rally grounds or the medieval old town and castle

Keynotes

Prof. Selcuk Uluagac:
Security and Privacy of IoT Technologies – Complementary Approaches to Traditional Problems with a Forensics Lens

Director of the Cyber-Physical Systems Security Lab, Florida International University

Prof. Roberto Baldoni:
Boots on the Cyber Ground: A Survival Playbook to Digital Sovereignty

Former Director of the Italian National Cybersecurity Agency

Accepted Papers

  • An Explainable Model-Agnostic Algorithm for CNN-based Biometrics Verification (Tuesday 11:00 - 12:30)
    Fernando Alonso-Fernandez (Halmstad University)*; Kevin Hernandez-Diaz (Halmstad University); Jose M Buades (University of Balearic Islands); Prayag Tiwari (Halmstad University); Josef Bigun (Halmstad University, Sweden)
  • Optimizing Key-Selection for Face-based One-Time Biometrics via Morphing (Tuesday 11:00 - 12:30)
    Daile Osorio Roig (Hochschule Darmstadt)*; Mahdi Ghafourian (Universidad Autónoma de Madrid); Christian Rathgeb (Hochschule Darmstadt); Ruben Vera-Rodriguez (Universidad Autónoma de Madrid); Christoph Busch (Hochschule Darmstadt); Julian Fierrez (Universidad Autonoma de Madrid)
  • Reversing Deep Face Embeddings with Probable Privacy Protection (Tuesday 11:00 - 12:30)
    Daile Osorio Roig (Hochschule Darmstadt)*; Paul-Anton Gerlitz (Hochschule Darmstadt); Christian Rathgeb (Hochschule Darmstadt); Christoph Busch (Hochschule Darmstadt)
  • MT-PRO: Multibiometric Template Protection Based On Homomorphic Transciphering (Tuesday 11:00 - 12:30)
    Pia Bauspieß (Hochschule Darmstadt)*; Chiara-Marie Zok (Hochschule Darmstadt); Anamaria Costache (NTNU - Norwegian University of Science and Technology); Christian Rathgeb (Hochschule Darmstadt); Jascha Kolberg (Hochschule Darmstadt); Christoph Busch (Hochschule Darmstadt)

  • Observing Bag Gain in JPEG Batch Steganography (Tuesday 14:00 - 15:30)
    Edgar Kaziakhmedov (Binghamton University)*; Jessica Fridrich ("SUNY, Binghamton"); Eli Dworetzky (Binghamton University)
  • Leveraging Data Geometry to Mitigate CSM in Steganalysis (Tuesday 14:00 - 15:30)
    Rony ABECIDAN (CNRS)*; Patrick Bas (CNRS); Vincent Itier (Univ. Montpellier); Jeremie Boulanger (Cristal); Tomas Pevny (Czech Technical University in Prague)
  • JPEG Steganalysis Using Leaked Cover Thumbnails (Tuesday 14:00 - 15:30)
    Martin Beneš (Universität Innsbruck)*; Benedikt Lorch (Universität Innsbruck); Rainer Böhme (Universität Innsbruck)
  • Practical Wiretap Code Design by Concatenated Autoencoder and LDPC Codes (Tuesday 14:00 - 15:30)
    Shangxuan Lyu (TU Braunschweig); Ramprasad Raghunath (TU Braunschweig); Luca Kunz (TU Braunschweig); Karl Besser (Princeton University); Pin-Hsun Lin (TU Braunschweig)*; Eduard Jorswieck (TU Braunschweig)

  • Protecting Voice-Controlled Devices against LASER Injection Attacks (Tuesday 16:00 - 17:15)
    Hashim Ali (University of Michigan)*; Hafiz Malik (University of Michigan - dearborn); Dhimant Khuttan (University of Michigan Dearborn); Rafi Ud Daula Refat (University of Michigan-Dearborn)
  • Advancing Audio Phylogeny: A Neural Network Approach for Transformation Detection (Tuesday 16:00 - 17:15)
    Milica Gerhardt (Fraunhofer IDMT)*; Luca Cuccovillo (Fraunhofer IDMT); Patrick Aichroth (Fraunhofer IDMT)
  • An Open Dataset of Synthetic Speech (Tuesday 16:00 - 17:15)
    Artem Yaroshchuk (Fraunhofer Institute for Digital Media Technology)*; Christoforos Papastergiopoulos (CERTH/ITI); Luca Cuccovillo (Fraunhofer IDMT); Patrick Aichroth (Fraunhofer IDMT); Konstantinos Votis (Centre for Reasearch and Technology Hellas / Information Technologies Institute); Dimitrios Tzovaras (Centre for Research and Technology Hellas)

  • Robust Retraining-free GAN Fingerprinting via Personalized Normalization (Wednesday 9:00 - 10:30)
    Jianwei Fei (Jinan University)*; Zhihua Xia (Jinan University); Benedetta Tondi (University of Siena); Mauro Barni (University of Siena)
  • Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-based Codes (Wednesday 9:00 - 10:30)
    Elena Rodríguez-Lois (atlanTTic Research Center, University of Vigo)*; Fernando Perez-Gonzalez (Universidad de Vigo)
  • Three Bricks to Consolidate Watermarks for Large Language Models (Wednesday 9:00 - 10:30)
    Pierre Fernandez (Meta AI)*; Antoine Chaffin (IRISA/IMATAG); Karim TIT (Inria); Vivien Chappelier (Imatag); Teddy Furon (Inria)
  • Recoverable Active Protection Framework for Neural Network Models (Wednesday 9:00 - 10:30)
    Lin Huang (university of ShangHai for Science and Technology); Gejian Zhao (USST); Chuan Qin (University of Shanghai for Science and Technology)*

  • One Standard to Rule Them All? Assessing the Disruptive Potential of Jamming Attacks on Matter Networks (Wednesday 11:00 - 12:30)
    Felix Klement (University of Passau)*; Emily Vorderwülbeke (University of Passau); Stefan Katzenbeisser (University of Passau)
  • Distribution-Agnostic Database De-Anonymization Under Synchronization Errors (Wednesday 11:00 - 12:30)
    Serhat Bakirtas (New York University)*; Elza Erkip (elza@nyu.edu)
  • Stochastic Digital Twin for Copy Detection Patterns (Wednesday 11:00 - 12:30)
    Yury Belousov (University of Geneva)*; Olga Taran (Geneva University); Vitaliy Kinakh (University of Geneva); Slava Voloshynovskiy (University of Geneva)
  • CDP-Sim: Similarity metric learning to identify the fake Copy Detection Patterns (Wednesday 11:00 - 12:30)
    Hédi Zeghidi (LIRIS); Carlos F Crispim-Junior (Univ Lyon, Lyon 2, LIRIS); Iuliia Tkachenko (LIRIS)*

  • Enhancement Strategies For Copy-Paste Generation and Localization in RGB Satellite Imagery (Wednesday 14:00 - 15:15)
    Edoardo Daniele Cannas (Politecnico di Milano); Sriram Baireddy (Purdue University); Paolo Bestagini (Politecnico di Milano)*; Stefano Tubaro (Politecnico di Milano, Italy); Edward J. Delp (Purdue University)
  • PRNU-based source camera statistical certification (Wednesday 14:00 - 15:15)
    Marina Gardella (École normale superieure Paris-Saclay)*; Pablo Musé (Universidad de la República, Uruguay); Miguel Colom (ENS Paris-Saclay); Jean-Michel Morel (Centre Borelli ENS Paris-Saclay); Denis Perraud (Laboratoire Central de Criminalistique Numérique, Sous-Direction de la Criminalistique, Service National de Police Scientifique)
  • The Automotive BlackBox: Towards a Standardization of Automotive Digital Forensics (Wednesday 14:00 - 15:15)
    Kim Strandberg (Volvo Cars)*; Ulf Arnljung (Volvo Cars); Tomas Olovsson (Chalmers University of Technology)

  • A First Look at Shill Looping in NFT Ecosystem (Wednesday 15:45 - 17:00)
    Ankit Gangwal (IIIT Hyderabad)*; Apoorva Thirupathi (IIIT Hyderabad); Alessandro Brighente (University of Padova); Mauro Conti (University of Padua)
  • Private Variable-Length Coding with Non-zero Leakage (Wednesday 15:45 - 17:00)
    Amirreza Zamani (KTH Royal Institute of Technology)*; Tobias Oechtering (KTH Royal Institute of Technology); Mikael Skoglund (KTH Royal Institute of Technology)
  • Private Variable-Length Coding with Zero Leakage (Wednesday 15:45 - 17:00)
    Amirreza Zamani (KTH Royal Institute of Technology)*; Tobias Oechtering (KTH Royal Institute of Technology); Deniz Gunduz (Imperial College London); Mikael Skoglund (KTH Royal Institute of Technology)

  • Are you Really Alone? Detecting the use of Speech Separation Techniques on Audio Recordings (Thursday 9:00 - 10:30)
    Davide Salvi (Politecnico di Milano); Mirco Pezzoli (Politecnicno di Milano); Sara Mandelli (Politecnico di Milano); Paolo Bestagini (Politecnico di Milano)*; Stefano Tubaro (Politecnico di Milano, Italy)
  • Single and Multi-Speaker Cloned Voice Detection: From Perceptual to Learned Features (Thursday 9:00 - 10:30)
    Sarah Barrington (University of California, Berkeley); Romit Barua (UC Berkeley); Gautham Koorma (University of California, Berkeley); Hany Farid (University of California, Berkeley)*
  • Audio Spectrogram Transformer for Synthetic Speech Detection via Speech Formant Analysis (Thursday 9:00 - 10:30)
    Luca Cuccovillo (Fraunhofer IDMT)*; Milica Gerhardt (Fraunhofer IDMT); Patrick Aichroth (Fraunhofer IDMT)
  • On Exploring Audio Anomaly in Speech (Thursday 9:00 - 10:30)
    Tiago Roxo (Universidade da Beira Interior)*; Joana C. Costa (Universidade da Beira Interior); Pedro R. M. Inácio (Universidade da Beira Interior); Hugo Proenca (U-Beira Interior)

  • Securing Voice Biometrics: One-Shot Learning Approach for Synthetic Deepfake Detection (Thursday 11:00 - 12:30)
    awais khan (oakland university); Khalid Mahmood Malik (Oakland University)*
  • Fully Homomorphic Encryption Operators for Score and Decision Level Fusion (Thursday 11:00 - 12:30)
    Tilak Sharma (University at Buffalo ); Mahika Wason (University at Buffalo); Vishnu Boddeti (Michigan State University); Arun Ross (Michigan State University); Nalini Ratha (SUNY Buffalo)*
  • To Impute or Not: Recommendations for Multibiometric Fusion (Thursday 11:00 - 12:30)
    Melissa R Dale (Michigan State University)*; Elliot Singer (MIT Lincoln lab); Jonas Borgstrom (MIT Lincoln Laboratory); Arun Ross (Michigan State University)
  • AlphaNet: Single Morphing Attack Detection using Multiple Contributors (Thursday 11:00 - 12:30)
    Juan Tapia (hda)*; Christoph Busch (Hochschule Darmstadt)