default search action
25th NordSec 2020: Virtual Event
- Mikael Asplund, Simin Nadjm-Tehrani:
Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings. Lecture Notes in Computer Science 12556, Springer 2021, ISBN 978-3-030-70851-1
Malware and Attacks
- Calvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro:
Persistence in Linux-Based IoT Malware. 3-19 - Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro:
Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation. 20-36 - Zeeshan Afzal, Anna Brunström, Stefan Lindskog:
Using Features of Encrypted Network Traffic to Detect Malware. 37-53
Formal Analysis
- Thomas Haines, Rajeev Goré, Jack Stodart:
Machine-Checking the Universal Verifiability of ElectionGuard. 57-73 - Farzane Karami, Olaf Owe, Gerardo Schneider:
Information-Flow Control by Means of Security Wrappers for Active Object Languages with Futures. 74-91 - Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg:
Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme. 92-107
Applied Cryptography
- Alexandros Bakas, Antonis Michalas, Amjad Ullah:
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption. 111-126 - Joo Yeon Cho, Andrew Sergeev:
TLV-to-MUC Express: Post-quantum MACsec in VXLAN. 127-141 - Guillaume Bour, Karin Bernsmed, Ravishankar Borgaonkar, Per Håkon Meland:
On the Certificate Revocation Problem in the Maritime Sector. 142-157
Security Mechanisms and Training
- Canyang Shi, Huiping Sun:
HoneyHash: Honeyword Generation Based on Transformed Hashes. 161-173 - Thomas Dangl, Benjamin Taubmann, Hans P. Reiser:
Agent-Based File Extraction Using Virtual Machine Introspection. 174-191 - Tommy Gustafsson, Jonas Almroth:
Cyber Range Automation Overview with a Case Study of CRATE. 192-209
Applications and Privacy
- Samuel Wairimu, Nurul Momen:
Privacy Analysis of COVID-19 Contact Tracing Apps in the EU. 213-228 - Alexandr Railean, Delphine Reinhardt:
OnLITE: On-line Label for IoT Transparency Enhancement. 229-245 - Katie Watson, Mike Just, Tessa Berg:
An Investigation of Comic-Based Permission Requests. 246-261
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.