Dutch Cyber Security Best Research Paper Award (DCSRP)

Since 2015, the Dutch Cyber ​​Security Best Research Paper (DCSRP) Award has been presented annually. This award was established by the predecessor of dcypher, the ICT Innovation platform “Veilig Verbonden” (IIP-VV). This platform has organized the best paper competition twice, in 2015 and 2016. It was obvious that the successor to the IIP-VV would continue the “tradition”. From 2017 to 2020, dcypher annually convened an international jury and presented them with a series of submitted papers. Presentations of the top-3, top-4 or top-5 and the proclamation of the winning paper took place in the years 2015 to 2019 inclusive at ICT.OPEN, the annual conference for ICT Research in the Netherlands*. Because ICT.OPEN could not take place in 2020 due to the corona crisis, the final of the 2020 DCSRP competition was given a (postponed) stage at dcypher's last (online mini) Symposium. The organization of the best paper competition will be in the hands of the ACCSS association from 1 March 2021. ACCSS continues the established tradition in 2021 in cooperation with SIG Cyber Security.

Dutch Cyber Security best Research Paper (DCSRP) Award 2020

Information about the winner of the DCSRP Award in 2020
The research paper top 4 candidates for the DCSRP Award 2020, are

Dutch Cyber Security best Research Paper (DCSRP) Award 2019
Information about the winner of the DCSRP Award in 2019

The research paper top 3 candidates for the DCSRP Award 2019, are
(in alphabetical order):

  • Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU (“GLitch”) presented by Pietro Frigo
  • CSIDH: An Efficient Post-Quantum Commutative Group Action presented by Lorenz Panny
  • Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks presented by Ben Gras 

Dutch Cyber Security best Research Paper (DCSRP) Award 2018
Information about the winner of the DCSRP Award in 2018

The research paper top 5, candidates for the DCSRP Award 2018, are
(in alphabetical order):

  • Economic Factors of Vulnerability Trade and Exploitation Luca Allodi
  • ASLR on the Line: Practical Cache Attacks on the MMU Ben Gras, Kaveh Razavi et al.
  • Millions of targets under attack: a macroscopic characterization of the DoS ecosystem Mattijs Jonker et al.
  • Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting Samaneh Tajalizadehkhoob et al.
  • The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later Victor van der Veen et al.
     

Dutch Cyber Security best Research Paper (DCSRP) Award 2017
Information about the winner of the DCSRP Award in 2017

The research paper top 3, candidates for the DCSR best Paper Award 2017, are
(in alphabetical order):

  • Flush, Gauss and Reload – a Cache Attack on the Bliss Lattice Based Signature Scheme Leon Groot Bruinderink et al. Presented by Andreas Hüsling.
  • Complete addition formulas for prime order elliptic curves
    Joost Renes et al.
  • Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
    Victor van der Veen et al.
     

Dutch Cyber Security best Research paper Award (DCSR) Award 2016
Information about the winner of the DCSR Award in 2016
The research paper top 5, candidates for the DCSR best paper Award 2016, are
(in alphabetical order):

  • A measurement study of DNSSEC misconfigurations 
    Niels van Adrichem et al.
  • Practical Context-Sensitive CFI
    Dennis Andriesse et al. 
  • Post-Mortem of a Zombie:  Conficker Cleanup After Six Years
    Hadi Asghari et al.
  • Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards
    Carlo Meijer et al.
  • Protocol state fuzzing of TLS implementations
    Joeri de Ruiter et al.


Dutch Cyber Security best Research paper Award (DCSR) Award 2015
Information about the winner of the DCSR Award in 2015
The research paper top 5, candidates for the DCSR best paper Award 2015, are
(in alphabetical order):

  • On the Practical Exploitability of Dual EC in TLS Implementations 
    Stephen Checkoway et al. presented by Ruben Niederhagen    
  • Out of Control: Overcoming Control-Flow Integrity 
    Enes Göktas et al.
  • Quantum-secure authentication of a physical unclonable key 
    Sebastianus Goorden et al. presented by Boris Skoríc
  • System and Network Security Framing Signals - A Return to Portable Shellcode 
    Erik Bosman et al.
  • Verifying Curve25519 Software 
    Yu-Fang Chen et al. presented by Peter Schwabe

 

* ICT.OPEN is organized annually by the Netherlands Organization for Scientific Research (NWO) under the auspices of ICT Research Platform Nederland (IPN).

 

View National Cybersecurity Research Agenda III
View National Cybersecurity Education Agenda