


default search action
SEC 2021: Oslo, Norway
- Audun Jøsang
, Lynn Futcher
, Janne Merete Hagen
:
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings. IFIP Advances in Information and Communication Technology 625, Springer 2021, ISBN 978-3-030-78119-4
Digital Signatures
- Paul Höller
, Alexander Krumeich
, Luigi Lo Iacono
:
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany. 3-18 - Stefan More
, Peter Grassberger, Felix Hörandner
, Andreas Abraham
, Lukas Daniel Klausner
:
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials. 19-35 - Ali Hariri
, Subhajit Bandopadhyay, Athanasios Rizos, Theo Dimitrakos, Bruno Crispo, Muttukrishnan Rajarajan:
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials. 36-50
Vulnerability Management
- Ricardo Araújo, António Pinto
, Pedro Pinto
:
A Performance Assessment of Free-to-Use Vulnerability Scanners - Revisited. 53-65 - Hajin Jang, Kyeongseok Yang, Geonwoo Lee, Yoonjong Na, Jeremy D. Seideman, Shoufu Luo, Heejo Lee, Sven Dietrich:
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection. 66-82 - Kai Cheng, Dongliang Fang, Chuan Qin, Huizhao Wang, Yaowen Zheng, Nan Yu, Limin Sun:
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware. 83-99
Covert Channels and Cryptography
- Isaac Meers
, Mariano Di Martino
, Peter Quax
, Wim Lamotte
:
ESQABE: Predicting Encrypted Search Queries. 103-117 - Sebastian Zillien
, Steffen Wendzel
:
Reconnection-Based Covert Channels in Wireless Networks. 118-133 - Sam Abrams, Brandon Keller, Kenneth Nero, Gino Placella, Daryl Johnson:
Minecraft Altered Skin Channel (MASC). 134-145 - Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei, Jiazhe Chen
:
Lattice-Based Weak Curve Fault Attack on ECDSA. 146-161
Application and System Security
- Benedikt Putz
, Fabian Böhm
, Günther Pernul
:
HyperSec: Visual Analytics for Blockchain Security Monitoring. 165-180 - Rauli Kaksonen
, Tommi Järvenpää, Jukka Pajukangas, Mihai Mahalean, Juha Röning
:
100 Popular Open-Source Infosec Tools. 181-195 - Ahmad Samer Wazan, David W. Chadwick, Rémi Venant, Romain Laborde
, Abdelmalek Benzekri:
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators. 196-209
Privacy
- Georgios Kampanos, Siamak F. Shahandashti:
Accept All: The Landscape of Cookie Banners in Greece and the UK. 213-227 - Oleg Geier, Dominik Herrmann:
The AppChk Crowd-Sourcing Platform: Which Third Parties are iOS Apps Talking To? 228-241 - Christian Burkert
, Maximilian Blochberger, Hannes Federrath:
Compiling Personal Data and Subject Categories from App Data Models. 242-255 - Sebastian Pape
, David Harborth
, Jacob Leon Kröger
:
Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App. 256-269 - Ali Mohammad Padyab
, Joakim Kävrestad
:
Perceived Privacy Problems Within Digital Contact Tracing: A Study Among Swedish Citizens. 270-283
Network Security
- Junwon Lee
, Heejo Lee:
Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security. 287-301 - Stanislav Spacek, Daniel Tovarnák, Pavel Celeda
:
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption. 302-316 - Warren Z. Cabral
, Craig Valli
, Leslie F. Sikos
, Samuel G. Wakeling
:
Advanced Cowrie Configuration to Increase Honeypot Deceptiveness. 317-331 - Andre Büttner
, Hoai Viet Nguyen
, Nils Gruschka
, Luigi Lo Iacono
:
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems. 332-347
Machine Learning for Security
- Sangyup Lee, Shahroz Tariq
, Junyaup Kim, Simon S. Woo:
TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised Learning. 351-366 - Filip Wieslaw Bartoszewski, Mike Just
, Michael A. Lones
, Oleksii Mandrychenko:
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles. 367-381 - Young Geun Kim, Jeong-Han Yun, Siho Han, Hyoung Chun Kim, Simon S. Woo:
Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns. 382-397
Security Management
- Ben Lenard, Alexander Rasin, Nick Scope, James Wagner:
What Is Lurking in Your Backups? 401-415 - Lydia Kraus
, Mária Svidronová, Elizabeth Stobert:
How Do Users Chain Email Accounts Together? 416-429 - Stef Schinagl
, Svetlana Khapova
, Abbas Shahim:
Tensions that Hinder the Implementation of Digital Security Governance. 430-445

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.