


default search action
SEC 2020: Maribor, Slovenia
- Marko Hölbl
, Kai Rannenberg, Tatjana Welzer:
ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings. IFIP Advances in Information and Communication Technology 580, Springer 2020, ISBN 978-3-030-58200-5
Channel Attacks
- Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram
, Jan Kalbantner
:
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems. 3-16 - Thomas A. V. Sattolo
, Jason Jaskolka
:
Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels. 17-31 - Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, Guy Gogniat
:
IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction. 32-45
Connection Security
- Karel Hynek, Tomás Benes, Tomás Cejka
, Hana Kubátová:
Refined Detection of SSH Brute-Force Attackers Using Machine Learning. 49-63 - Ricardo Moura
, David R. Matos
, Miguel L. Pardal
, Miguel Correia
:
MultiTLS: Secure Communication Channels with Cipher Suite Diversity. 64-77 - Hind Bangui
, Mouzhi Ge, Barbora Buhnova
:
Improving Big Data Clustering for Jamming Detection in Smart Mobility. 78-91
Human Aspects of Security and Privacy
- Joakim Kävrestad, Marcus Nohlberg:
Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining. 95-108 - Agnieszka Kitkowska
, Yefim Shulman, Leonardo A. Martucci, Erik Wästlund:
Facilitating Privacy Attitudes and Behaviors with Affective Visual Design. 109-123 - Olha Drozd
, Sabrina Kirrane
:
Privacy CURE: Consent Comprehension Made Easy. 124-139
Detecting Malware and Software Weaknesses
- Stefan Carl Peiser, Ludwig Friborg, Riccardo Scandariato:
JavaScript Malware Detection Using Locality Sensitive Hashing. 143-154 - Can Yang
, Jian Liu, Mengxia Luo, Xiaorui Gong, Baoxu Liu:
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding. 155-170 - Johannes Feichtner, Stefan Gruber:
Code Between the Lines: Semantic Analysis of Android Applications. 171-186
System Security
- Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma, Yunbo Wang, Feng Li:
IMShell-Dec: Pay More Attention to External Links in PowerShell. 189-202 - Michael Eckel, Andreas Fuchs, Jürgen Repp, Markus Springer:
Secure Attestation of Virtualized Environments. 203-216
Network Security and Privacy
- Asya Mitseva, Marharyta Aleksandrova, Thomas Engel
, Andriy Panchenko:
Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor. 219-233 - Wilfried Mayer, Georg Merzdovnik, Edgar R. Weippl:
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas. 234-247 - Steffen Haas, Robin Sommer, Mathias Fischer:
Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection. 248-262
Access Control and Authentication
- Michael Carr, Siamak F. Shahandashti:
Revisiting Security Vulnerabilities in Commercial Password Managers. 265-279 - Stephan Wiefling
, Tanvi Patil
, Markus Dürmuth
, Luigi Lo Iacono
:
Evaluation of Risk-Based Re-Authentication Methods. 280-294 - Md. Morshedul Islam
, Reihaneh Safavi-Naini:
Fuzzy Vault for Behavioral Authentication System. 295-310
Crypto Currencies
- Gijs van Dam
, Rabiah Abdul Kadir
, Puteri Nor Ellyza binti Nohuddin
, Halimah Badioze Zaman
:
Improvements of the Balance Discovery Attack on Lightning Network Payment Channels. 313-323 - Weizheng Wang, Chunhua Su:
CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin. 324-337 - Dusan Klinec, Vashek Matyas:
Privacy-Friendly Monero Transaction Signing on a Hardware Wallet. 338-351
Privacy and Security Management
- Guillaume Dupont, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
A Matter of Life and Death: Analyzing the Security of Healthcare Networks. 355-369 - Najmeh Mousavi Nejad
, Pablo Jabat, Rostislav Nedelchev, Simon Scerri, Damien Graux
:
Establishing a Strong Baseline for Privacy Policy Classification. 370-383 - Kabul Kurniawan
, Andreas Ekelhart
, Fajar J. Ekaputra
, Elmar Kiesling
:
Cross-Platform File System Activity Monitoring and Forensics - A Semantic Approach. 384-397
Machine Learning and Security
- Tanja Sarcevic
, Rudolf Mayer
:
A Correlation-Preserving Fingerprinting Technique for Categorical Data in Relational Databases. 401-415 - Hyeonseong Jeon, Youngoh Bang, Simon S. Woo:
FDFtNet: Facing Off Fake Images Using Fake Detection Fine-Tuning Network. 416-430 - Yayuan Xiong, Fengyuan Xu, Sheng Zhong, Qun Li
:
Escaping Backdoor Attack Detection of Deep Learning. 431-445

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.