Awards
Cyber Security Best Research Paper Award
DCSRP Awards
Since 2015, the Dutch Cyber Security Best Research Paper (DCSRP) Award has been presented annually. It has grown into a prestigious and highly visible recognition. In an open competition, all academic cybersecurity research groups at Dutch universities and knowledge institutes can nominate their best recent papers. The award features two tracks: technical and multidisciplinary. International expert committees review the submissions and select the top three in each track. Winners receive a certificate, a sponsored bonus check, a photo opportunity, and publicity on the ACCSS website and other media. A dedicated ACCSS working group organizes the event.
Awards
Informatie about the winner of the DCSRP Award in 2024.
The research paper top 3 candidates for the DCSRP Award 2024, are
Dutch Cyber Security best Research Paper (DCSRP) Award 2022/2023
Informatie about the winner of the DCSRP Award in 2022/2023.
The research paper top 3 candidates for the DCSRP Award 2021, are
Dutch Cyber Security best Research Paper (DCSRP) Award 2021
Informatie about the winner of the DCSRP Award in 2021.
The research paper top 3 candidates for the DCSRP Award 2021, are
Dutch Cyber Security best Research Paper (DCSRP) Award 2020
Informatie about the winner of the DCSRP Award in 2021.
The research paper top 3 candidates for the DCSRP Award 2021, are
- CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel presented by Dr. Stjepan Picek
- Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks presented by Lucian Cojocar
- RIDL: Rogue In-flight Data Load presented by Sebastian Österlund
- Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives presented by Carlo Meijer
Dutch Cyber Security best Research Paper (DCSRP) Award 2019
The research paper top 3 kandidaten voor DCSRP Award 2019, zijn
(in alphabetical order):
- Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU (“GLitch”) presented by Pietro Frigo
- CSIDH: An Efficient Post-Quantum Commutative Group Action presented by Lorenz Panny
- Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks presented by Ben Gras
Dutch Cyber Security best Research Paper (DCSRP) Award 2018
The research paper top 5, candidates for the DCSRP Award 2018, are
(in alphabetical order):
- Economic Factors of Vulnerability Trade and Exploitation Luca Allodi
- ASLR on the Line: Practical Cache Attacks on the MMU Ben Gras, Kaveh Razavi et al.
- Millions of targets under attack: a macroscopic characterization of the DoS ecosystem Mattijs Jonker et al.
- Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting Samaneh Tajalizadehkhoob et al.
- The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later Victor van der Veen et al.
Dutch Cyber Security best Research Paper (DCSRP) Award 2017
The research paper top 3, candidates for the DCSR best Paper Award 2017, are
(in alphabetical order):
- Flush, Gauss and Reload – a Cache Attack on the Bliss Lattice Based Signature Scheme Leon Groot Bruinderink et al. Presented by Andreas Hüsling.
- Complete addition formulas for prime order elliptic curves; Joost Renes et al.
- Drammer: Deterministic Rowhammer Attacks on Mobile Platforms Victor van der Veen et al.
Dutch Cyber Security best Research Paper (DCSRP) Award 2016
The research paper top 5, candidates for the DCSR best paper Award 2016, are
(in alphabetical order):
- A measurement study of DNSSEC misconfigurations Niels van Adrichem et al.
- Practical Context-Sensitive CFI Dennis Andriesse et al.
- Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards Carlo Meijer et al
- Protocol state fuzzing of TLS implementations Joeri de Ruiter et al.
Dutch Cyber Security best Research Paper (DCSRP) Award 2015
The research paper top 5, candidates for the DCSR best paper Award 2015, are
(in alphabetical order):
- On the Practical Exploitability of Dual EC in TLS Implementations Stephen Checkoway et al. presented by Ruben Niederhagen
- Out of Control: Overcoming Control-Flow Integrity Enes Göktas et al.
- Quantum-secure authentication of a physical unclonable key. Sebastianus Goorden et al. presented by Boris Skoríc
- System and Network Security Framing Signals – A Return to Portable Shellcode Erik Bosman et al.
- Verifying Curve25519 Software Yu-Fang Chen et al. presented by Peter Schwabe
ACCSS, Cybersecurity scientists association in the Netherlands.
Uniting Researchers Across the Netherlands for Cybersecurity Advancements.