SECURWARE 2025 - The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
October 26, 2025 - October 30, 2025
SECURWARE 2025: Awards
Onsite and Online Options: In order to accommodate various situations, we are offering the option for either physical presence or virtual participation (pdf slides or pre-recorded videos).
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.
Awarded Papers (also Invited for IARIA Journals)
Optimizing Certificate Validation in OT Environments
Steffen Fries, Rainer Falk, Andreas Guettinger
From ECU to VSOC: UDS Security Monitoring Strategies
Ali Recai Yekta, Nicolas Loza, Jens Gramm, Michael Peter Schneider, Stefan Katzenbeisser
Quantifying Persuasion - A Comparative Analysis of Cialdini's Principles in Phishing Attacks
Alexander Lawall
Supporting the Security Modelling in Operational Technology by identifying capacities of Hidden Channels in ICS protocols
Robert Altschaffel, Sönke Otten, Stefan Kiltz, Jana Dittmann
Identification of Dual Processes Using Power Side-channels
Jakob Sternby, Niklas Lindskog, Håkan Englund
A Modular and Flexible OPC UA Testbed Prototype for Cybersecurity Research
Sebastian Kraust, Peter Heller, Jürgen Mottok
A Comparative Study of Machine Learning and Quantum Models for Spam Email Detection
Cameron Williams, Taieba Tasnim, Berkeley Wu, Mohammad Rahman, Fan Wu
Evaluating User Perceptions of Privacy Protection in Smart Healthcare Services
Huan Gua, Elias Seid, Yuhong Li, Fredrik Blix
Towards Post-Quantum-Ready Automated Certificate Lifecycle Management in Operational Technology
Ayham Alhulaibi, Tobias Frauenschläger, Jürgen Mottok
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.
Papers Invited for IARIA Journals
Threat-Based Vulnerability Management: Mapping CVEs to the MITRE ATT&CK Framework
Logan McMahon, Oluwafemi Olukoya
Secure Software Brownfield Engineering – Sequence Diagram Identification
Aspen Olmsted
Measurability: Toward Integrating Metrics into Ratings for Scalable Proactive Cybersecurity Management
William Yurcik, Stephen North, Rhonda O'Kane, Sami Saydjari, Fabio Roberto de Miranda, Rodolfo da Silva Avelino, Gregory Pluta
General Conversion Scheme of Card-based Protocols for Two-colored Cards to Updown Cards ― the number of cards for computing an arbitrary function
Takumi Sakurai, Yuichi Kaji
DeepAuthVerify - A Modular Framework for Deepfake Detection in Facial Authentication Systems
Domenico Di Palma, Alexander Lawall, Kristina Schaaff
Comparison of Password-Authenticated Key Exchange Schemes on Android
Jörn-Marc Schmidt, Alexander Lawall
Towards Automated Penetration Testing Using Inverse Soft-Q Learning
Dongfang Song, Yuhong Li, Ala Berzinji, Elias Seid
Hidden-Non-Malicious-Dummies for Evaluation of Defense Mechanisms of Industrial Control System against Steganographic Attacks
Robert Altschaffel, Stefan Kiltz, Jana Dittmann, Tom Neubert, Laura Buxhoidt, Claus Vielhauer, Matthias Lange, Rüdiger Mecke
The Balanced Chance & Cyber‑Risk Card: Extending Reichmann's Multidimensional Controlling Framework for C‑Level Steering in SMEs
Alexander Lawall, Maik Drozdzynski
Artificial Intelligence or Artificial Stupidity? The Inability of Small LLMs to Reason, Even Given the Correct Answer!
Salvatore Vella, Salah Sharieh, Alex Ferworn
Improving Crypto-Agility in Operational Technology through Exchangeable Smart Cards
Tobias Frauenschläger, Jürgen Mottok
A Modified Schnorr Sigma Protocol and Its Application to Isogeny-Based Identification
Mahdi Mahdavi, Zaira Pindado, Amineh Sakhaie, Helena Rifà-Pous
Cloud Security Misconfigurations and Compliance: An Empirical Model for DORA Readiness in Financial Environments
Ali Ferzali, Naol Mengistu, Elias Seid, Fredrik Blix