SHCIS 2017 - Workshop

4th Workshop on Security in highly connected IT systems
June 19-22, 2017, Neuchâtel, Switzerland
Satellite workshop of DisCoTec 2017

Important dates

April 16, 2017 Submission of full papers (extended)
May 16, 2017 Notification of acceptance
TBD Camera-ready copies due


Modern society over the course of the past two decades developed an increasing dependency on their infrastructures in general, and on the availability and correct functionality of their IT systems in particular. Nowadays, all kinds of IT systems, from industrial control systems to nationwide sensor networks, from high-traffic business platforms to e-health applications, are connected to the Internet and thus directly connected to each other. Such highly connected IT systems exhibit their very own peculiarities and need to be studied accordingly.

In this context, SHCIS 2017 aims to bring together researchers and practitioners active in the field of highly connected IT systems, with a strong emphasis on interdisciplinary aspects. The focus of the workshop is on diffusion of early and on-going work, with large room being devoted to presentations of PhD students active in this field, as well as of large scale national and international research projects. The workshop is the 4th event after previous SHCIS workshops in 2014 (co-located with TrustBus), 2015 (co-located with ESORICS) and 2016 (Dagstuhl workshop). It is organized by the Bavarian Research Alliance FORSEC (

Suggested topics should be closely related to highly-connected IT-systems and include, but are not limited to:

  • Secure distributed architectures
  • Secure mobile architectures
  • Secure embedded systems
  • Security in sensor networks
  • Secure cloud computing
  • Code obfuscation
  • Security economics
  • Identity and access management
  • Privacy
  • Online trust in large-scale systems
  • Human factors in security and privacy
  • Digital forensics
  • Security through virtualization, security in virtualized environments
  • Security in mobile computing
  • Detection of security related anomalies

Relevant application areas include, but are not limited to:

  • Virtualization platforms
  • Smart grids, smart cities
  • Social networks
  • Big data applications
  • Cloud services
  • Business applications
  • Transport and logistics
  • E-Commerce

Submission Guidelines

Authors are invited to publish original and unpublished research that is not currently in a review process for other workshops, conferences or journals. The focus of the workshop is on diffusion of early and ongoing work of bleeding-edge ideas with the community. Large room will be devoted to presentations of PhD students active in this field and large scale national and international research projects. Papers must be in English in two-column format. Camera ready versions of the accepted papers must not exceed a length of 6 pages. At least one of the authors has to be attending the workshop to present the paper. Submission will be handled electronically through EasyChair.


Wednesday, 21 June 2017

WELCOME (16:00 - 16:10)

SESSION #1 (16:10 – 17:40): Defeating Attacks (Chair: Hans P. Reiser)

Tobias Groß and Tilo Müller
Protecting JavaScript Apps from Code Analysis

Richard Baumann, Mykola Protsenko and Tilo Müller
Anti-ProGuard: Towards Automated Deobfuscation of Android Apps

Stewart Sentanoe, Benjamin Taubmann and Hans P. Reiser
Virtual Machine Introspection Based SSH Honeypot


Thursday, 22 June 2017

SESSION #2 (9:30 - 10:30): Security and Visualization (Chair: Rolf Schillinger)

Christian Richthammer, Johannes Sänger and Günther Pernul
Interactive Visualization of Recommender Systems Data

Noëlle Rakotondravony, Johannes Köstler and Hans P. Reiser
Towards a generic architecture for interactive cost-aware visualization of monitoring data in distributed systems

COFFEE BREAK (10:30 - 11:00)

SESSION #3 (11:00 - 12:30): Optimization (Chair: Guido Schryen)

Ali Alshawish, Mohamed Amine Abid, Stefan Rass and Hermann De Meer
Playing a Multi-objective Spot-checking Game in Public Transportation Systems

Eva Weishäupl
Towards a Multi-objective Optimization-model to Support Information Security Investment Decision-making

Benjamin Taubmann and Bojan Kolosnjaji
Architecture for Resource-Aware VMI-based Cloud Malware Analysis

CLOSING (12:30 - 12:40)

LUNCH (12:40 - 14:00)

Workshop chairs

  • Hans P. Reiser (University of Passau)
  • Guido Schryen (University of Regensburg)
  • Rolf Schillinger (FH Würzburg)

Bavarian Research Alliance FORSEC – Security of highly-connected IT-Systems

Program Committee

  • Zinaida Benenson, FAU Erlangen, Germany
  • António Casimiro, Universidade de Lisboa, Portugal
  • Marijke Coetzee, University of Johannesburg, South Africa
  • Jorge Cuellar, Siemens AG, Germany
  • Steven Furnell, Plymouth University, UK
  • Danilo Gligoroski, Norwegian University of Science and Technology, Norway
  • Martin Gilje Jaatun, SINTEF, Norway
  • Thomas Kittel, Technical University Munich, Germany
  • Lambrinoudakis Kostas, University of the Aegean, Greece
  • Hanna Krasnova, University of Potsdam, Germany
  • Tilo Müller, FAU Erlangen, Germany
  • Rolf Oppliger, eSecurity Technologies, Switzerland
  • Moussa Ouedraogo, Luxembourg Institute of Science and Technology, Luxembourg
  • Heiko Roßnagel, Fraunhofer IAO, Germany
  • Thomas Schaberreiter, University of Vienna, Austria
  • Günther Pernul, University of Regensburg, Germany