


default search action
24th NordSec 2019: Aalborg, Denmark
- Aslan Askarov, René Rydhof Hansen
, Willard Rafnsson:
Secure IT Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings. Lecture Notes in Computer Science 11875, Springer 2019, ISBN 978-3-030-35054-3
Privacy
- Tamás Bisztray
, Nils Gruschka
:
Privacy Impact Assessment: Comparing Methodologies with a Focus on Practicality. 3-19 - Florian Dehling
, Tobias Mengel, Luigi Lo Iacono
:
Rotten Cellar: Security and Privacy of the Browser Cache Revisited. 20-36 - Frederik Goovaerts, Gunes Acar, Rafael Galvez
, Frank Piessens, Mathy Vanhoef
:
Improving Privacy Through Fast Passive Wi-Fi Scanning. 37-52 - Thomas Haines:
Cronus: Everlasting Privacy with Audit and Cast. 53-68
Network Security
- Zeeshan Afzal
, Johan Garcia, Stefan Lindskog, Anna Brunström:
Using Partial Signatures in Intrusion Detection for Multipath TCP. 71-86 - Thanh Bui
, Markku Antikainen, Tuomas Aura
:
Analysis of Topology Poisoning Attacks in Software-Defined Networking. 87-102 - Thanh Bui
, Siddharth Prakash Rao
, Markku Antikainen, Tuomas Aura
:
Client-Side Vulnerabilities in Commercial VPNs. 103-119 - Joo Yeon Cho:
Securing Optical Networks by Modern Cryptographic Techniques. 120-133
Platform Security and Malware
- Jamie Pont
, Osama Abu Oun
, Calvin Brierley
, Budi Arief
, Julio C. Hernandez-Castro
:
A Roadmap for Improving the Impact of Anti-ransomware Research. 137-154 - Per Håkon Meland
, Bent Heier Johansen
, Guttorm Sindre
:
An Experimental Analysis of Cryptojacking Attacks. 155-170 - Christian Roth, Mirja Nitschke
, Christian Hutzler, Maximilian Koller, Rolf Küffner, Marc Roßberger, Dogan Kesdogan:
My Smartwatch Is Mine - Machine Learning Based Theft Detection of Smartwatches. 171-187 - Stephan Wiefling
, Nils Gruschka
, Luigi Lo Iacono
:
Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services. 188-203 - Wenjun Xiong
, Melek Gülsever, Koray Mustafa Kaya, Robert Lagerström:
A Study of Security Vulnerabilities and Software Weaknesses in Vehicles. 204-218
System and Software Security
- Jean-Max Dutertre, Timothée Riom, Olivier Potin, Jean-Baptiste Rigaud
:
Experimental Analysis of the Laser-Induced Instruction Skip Fault Model. 221-237 - Gunnar Grimsdal, Patrik Lundgren, Christian Vestlund
, Felipe Boeira, Mikael Asplund
:
Can Microkernels Mitigate Microarchitectural Attacks? 238-253 - Antonis Michalas
, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko:
MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX. 254-270 - Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser
:
VMIGuard: Detecting and Preventing Service Integrity Violations by Malicious Insiders Using Virtual Machine Introspection. 271-282

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.