Conveners
Network Security
- Adrian Alexandrescu (Gheorghe Asachi Technical University of Iasi)
Description
Network Security
-
Mr Dan Gabriel Badea (National University of Sciences and Technology Politehnica Bucharest), Mr Sabin Pocriș (National University of Sciences and Technology Politehnica Bucharest)19/09/2025, 10:00Networking in Education and ResearchPaper presentation
This paper introduces and develops Temperance, an adversary emulation framework, which can be used by the red team operators to assess the security of the target infrastructure.
To control the host during the post-exploitation phase, the operator implants an agent into the target that calls back to the C2 (Control and Command) server, from which the professionals have full remote control of...
Go to contribution page -
Doru Balan ("Ștefan cel Mare” University of Suceava)19/09/2025, 10:15Networking in Education and ResearchPaper presentation
As the challenges with cyber threats increase, prompt detection of exposed assets is needed to minimize attack surfaces and maintain resilience in networked systems. This paper outlines the design and testing of a distributed scanning engine, developed as part of a national cybersecurity initiative on actively advancing active defense capabilities. The system is constructed using simple...
Go to contribution page -
Alexandra Balan ("Ștefan cel Mare” University of Suceava)19/09/2025, 10:30Networking in Education and ResearchPaper presentation
Reconnaissance data generated from scanning engines often provide limited context for actionable decisions to improve cyber defenses. The identification of open ports and exposed services provide a baseline mapping of the digital surface but only present real value in the form of contextualized threat intelligence. This paper puts forth a repeatable process that leverages raw scan results with...
Go to contribution page -
Robert Ticu-Jianu19/09/2025, 10:45Security & Resilience in Cyber-Physical SystemsPaper presentation
The growing use of Internet of Things (IoT) devices in homes and workplaces has presented significant security issues, particularly due to the opacity with which devices function and handle personal data, especially when cloud services get introduced. Increasingly, IoT platforms rely on external cloud infrastructure to mediate even basic device operations, using remote servers as middle-men to...
Go to contribution page -
Adrian Alexandrescu (Gheorghe Asachi Technical University of Iasi)19/09/2025, 11:00Social Networking and ServicesPaper presentation
The increasing availability of real-time clinical data from medical devices and health information systems creates new opportunities to enhance diagnostic accuracy, preventive care, and patient engagement. This paper proposes a modular, AI-driven architecture for a healthcare decision support platform that integrates predictive analytics, medical image processing, real-time patient monitoring,...
Go to contribution page -
Mr Alexandru CHIS ("Transilvania" University of Brasov)19/09/2025, 11:15Paper presentation
Drones, while critical for numerous applications, are particularly susceptible to a variety of cyber threats. Traditional single-model security solutions often present inherent weaknesses, creating specific attack surfaces that can be exploited by adversaries. This paper aims to explore a multi-modal approach to drone security, addressing these vulnerabilities through system diversity. By...
Go to contribution page -
Mr Alexandru Răzvan Căciulescu (National University of Science and Technology POLITEHNICA Bucharest)19/09/2025, 11:30Paper presentation
Java Management Extensions (JMX) are essential for administrating Java applications, yet their exposure via HTTP bridges like Jolokia can create significant security risks. This paper investigates how vendor-specific modifications in downstream enterprise products can alter the attack surface of known vulnerabilities. Focusing on CVE-2023-50780, we analyze a critical misconfiguration in RedHat...
Go to contribution page