3rd Workshop on Cyber-Security
Arms Race (CYSARM)

19 November, 2021

co-located with the ACM CCS 2021, South Korea
– Virtual Event –


Please register here on the main CCS website.

Programme for CYSARM 2021

19th November 2021, VIRTUAL EVENT

16:00-21:00 Korea Standard Time - GMT+9 [9:00-14:00 European Central Time]

Time Title & Authors
[16:00-16:10] Welcome Remarks by Program Chairs
First Session Chair: Daniele Sgandurra
  Keynote Talk 1
[16:10-17:00] Keynote #1: Hyperion, A Voter-Friendly, Verifiable and Coercion-Resistant Voting Scheme
Peter Y A Ryan (University of Luxembourg)
[17:00-17:10] Virtual Break
[17:10-18:10] Papers Session #1
[17:10-17:40] The More, the Better? A Study on Collaborative Machine Learning for DGA Detection
Arthur Drichel (RWTH Aachen University), Benedikt Holmes (RWTH Aachen University), Justus von Brandt (RWTH Aachen University) and Ulrike Meyer (RWTH Aachen University)
[17:40-18:10] Multi-Stage Attack Detection via Kill Chain State Machines
Florian Wilkens (Universität Hamburg), Felix Ortmann (Tenzir GmbH), Steffen Haas (Universität Hamburg), Matthias Vallentin (Tenzir GmbH) and Mathias Fischer (Universität Hamburg)
[18:10-18:20] Virtual Break
Second Session Chair: Thanassis Giannetsos
[18:20-19:20] Papers Session #2
[18:20-18:50] Your Smart Contracts Are Not Secure: Investigating Arbitrageurs and Oracle Manipulators in Ethereum
Kevin Tjiam (TU Delft), Huanhuan Chen (TU Delft), and Kaitai Liang (TU Delft)
[18:50-19:20] [Short Paper] Regulation TL;DR: Adversarial Text Summarization of Federal Register Articles
Filipo Sharevski (DePaul University), Peter Jachim (DePaul University) and Emma Pieroni (DePaul University)
[19:20-20:00] Virtual Break
[20:00-21:00] EU Project Presentations
[20:00-20:15] ASSURED
Thanassis Giannetsos
[20:15-20:30] C4IIoT
[20:30-20:45] PUZZLE
Jasna Komatovic
[20:45-21:00] RAINBOW
Demetris Trihinas
[21:00] Closing Remarks


Cybersecurity is a complex ecosystem that is based on several contradicting requirements. For this reason, it is often defined as an arms race between attackers and defenders: for example, when a new security model or algorithm is devised, it could act as a double-edged sword since it might both enhance the security posture of a system and introduce additional vulnerabilities. Similarly, many of the novel technological solutions that are used to improve the security of systems and networks are also being used by those who wish to threaten well-established algorithms and protocols. For example, it is already known that when large-scale quantum computers become available, they will be able to break almost all the public-key cryptographic algorithms currently in use. Security is also about balancing several trade-offs, e.g. security vs privacy, security vs trust, security vs usability, security vs cost, research vs standardization, academic research vs real applications, to name just a few. For example, while artificial intelligence provides the ability to efficiently analyze massive data streams to detect patterns of anomalous behaviour, it also threatens user privacy by enabling the analysis of individual behaviours, and democratic government by subverting opinions via electronic media. Likewise, the use of trustworthy computing and trusted hardware: while it fortifies systems by providing stronger security and operational assurance guarantees, it also allows attackers to perform stealthy attacks and could be used to damage user privacy.

The goal of the CYSARM workshop is to foster collaboration and discussion among cyber-security researchers and practitioners to better understand the various facets and trade-offs of cybersecurity and how new technologies and algorithms might impact existing or future security models.

Call for Papers

Important Dates

*For these papers, please contact the program chairs to provide them a copy of the CCS reviews

Topics of Interest

Topics of Interest include but are not limited to:

Submission Guidelines

We invite the following types of papers:

Submissions must be anonymous, and authors should refer to their previous work in the third-person. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions are to be made on EasyChair. You will be requested to upload the file of your paper (in PDF format only). Submissions not meeting these guidelines risk rejection without consideration of their merits. Proceedings of the workshop will be published by ACM on a CD, available to the workshop attendees. Papers will be included in the ACM Digital Library, with a specific ISBN. Each accepted paper must be presented by an author, who will have to register by the early-bird registration deadline.


General Chairs:

Program Co-Chairs:

Program Committee:


Send Contact Mail

Previous editions

CYSARM 2020 | CYSARM 2019