default search action
27th NordSec 2022: Reykjavic, Iceland
- Hans P. Reiser, Marcel Kyas:
Secure IT Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings. Lecture Notes in Computer Science 13700, Springer 2022, ISBN 978-3-031-22294-8
Privacy
- Sarah Abdelwahab Gaballah, Lamya Abdullah, Minh Tung Tran, Ephraim Zimmer, Max Mühlhäuser:
On the Effectiveness of Intersection Attacks in Anonymous Microblogging. 3-19 - Carsten Hesselmann, Delphine Reinhardt, Jan Gertheiss, Jörg P. Müller:
Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement of User Awareness. 20-39 - Mohamed Taoufiq Damir, Valtteri Niemi:
Location Privacy, 5G AKA, and Enhancements. 40-57 - Mina Alishahi, Daan Gast, Sam Vermeiren:
Local Differential Privacy for Private Construction of Classification Algorithms. 58-79 - Daniel Fraunholz, Dominik Brunke, Simon Beidenhauser, Sebastian Berger, Hartmut Koenig, Daniel Reti:
IMSI Probing: Possibilities and Limitations. 80-97
Attacks and Attack Detection
- Mohamed Msaad, Shreyas Srinivasa, Mikkel Møller Andersen, David Holm Audran, Charity U. Orji, Emmanouil Vasilomanolakis:
Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques. 101-119 - David Lantz, Felipe Boeira, Mikael Asplund:
Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters. 120-138 - Richard Plný, Karel Hynek, Tomás Cejka:
DeCrypto: Finding Cryptocurrency Miners on ISP Networks. 139-158 - Arun Sankar Muttathu Sivasankara Pillai, Phillip L. De Leon, Utz Roedig:
Detection of Voice Conversion Spoofing Attacks Using Voiced Speech. 159-175 - Alexander Bjerre, Andreas Philip Westh, Emil Villefrance, A. S. M. Farhan Al Haque, Jonas Bukrinski Andersen, Lucas K. Helgogaard, Marios Anagnostopoulos:
A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries. 176-193 - Mordechai Guri:
GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU Fans. 194-211
Secure Protocols and Systems
- Matthew Cole, Aravind Prakash:
Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage. 215-233 - Camille Sivelle, Lorys Debbah, Maxime Puys, Pascal Lafourcade, Thibault Franco-Rondisson:
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models. 234-252 - Xavier Arnal, Abraham Cano, Tamara Finogina, Javier Herranz:
How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge Proofs. 253-269
Security Analysis
- Sebastian Schrittwieser, Patrick Kochberger, Michael Pucher, Caroline Lawitschka, Philip König, Edgar R. Weippl:
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation. 273-291 - Charles-Henry Bertrand Van Ouytsel, Axel Legay:
Malware Analysis with Symbolic Execution and Graph Kernel. 292-310 - Bernhards Blumbergs, Eriks Dobelis, Peteris Paikens, Krisjanis Nesenbergs, Kirils Solovjovs, Artis Rusins:
WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices. 311-325
Forensics
- Tobias Latzo, Andreas Hellmich, Annika Knepper, Lukas Hardi, Tim Phillip Castello-Waldow, Felix C. Freiling, Andreas Attenberger:
Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data. 329-345 - Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. 346-367 - Cristoffer Leite, Jerry den Hartog, Daniel Ricardo dos Santos, Elisa Costante:
Actionable Cyber Threat Intelligence for Automated Incident Response. 368-385
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.