default search action
24th NordSec 2019: Aalborg, Denmark
- Aslan Askarov, René Rydhof Hansen, Willard Rafnsson:
Secure IT Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings. Lecture Notes in Computer Science 11875, Springer 2019, ISBN 978-3-030-35054-3
Privacy
- Tamás Bisztray, Nils Gruschka:
Privacy Impact Assessment: Comparing Methodologies with a Focus on Practicality. 3-19 - Florian Dehling, Tobias Mengel, Luigi Lo Iacono:
Rotten Cellar: Security and Privacy of the Browser Cache Revisited. 20-36 - Frederik Goovaerts, Gunes Acar, Rafael Galvez, Frank Piessens, Mathy Vanhoef:
Improving Privacy Through Fast Passive Wi-Fi Scanning. 37-52 - Thomas Haines:
Cronus: Everlasting Privacy with Audit and Cast. 53-68
Network Security
- Zeeshan Afzal, Johan Garcia, Stefan Lindskog, Anna Brunström:
Using Partial Signatures in Intrusion Detection for Multipath TCP. 71-86 - Thanh Bui, Markku Antikainen, Tuomas Aura:
Analysis of Topology Poisoning Attacks in Software-Defined Networking. 87-102 - Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura:
Client-Side Vulnerabilities in Commercial VPNs. 103-119 - Joo Yeon Cho:
Securing Optical Networks by Modern Cryptographic Techniques. 120-133
Platform Security and Malware
- Jamie Pont, Osama Abu Oun, Calvin Brierley, Budi Arief, Julio C. Hernandez-Castro:
A Roadmap for Improving the Impact of Anti-ransomware Research. 137-154 - Per Håkon Meland, Bent Heier Johansen, Guttorm Sindre:
An Experimental Analysis of Cryptojacking Attacks. 155-170 - Christian Roth, Mirja Nitschke, Christian Hutzler, Maximilian Koller, Rolf Küffner, Marc Roßberger, Dogan Kesdogan:
My Smartwatch Is Mine - Machine Learning Based Theft Detection of Smartwatches. 171-187 - Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services. 188-203 - Wenjun Xiong, Melek Gülsever, Koray Mustafa Kaya, Robert Lagerström:
A Study of Security Vulnerabilities and Software Weaknesses in Vehicles. 204-218
System and Software Security
- Jean-Max Dutertre, Timothée Riom, Olivier Potin, Jean-Baptiste Rigaud:
Experimental Analysis of the Laser-Induced Instruction Skip Fault Model. 221-237 - Gunnar Grimsdal, Patrik Lundgren, Christian Vestlund, Felipe Boeira, Mikael Asplund:
Can Microkernels Mitigate Microarchitectural Attacks? 238-253 - Antonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko:
MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX. 254-270 - Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser:
VMIGuard: Detecting and Preventing Service Integrity Violations by Malicious Insiders Using Virtual Machine Introspection. 271-282
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.