


default search action
27th NordSec 2022: Reykjavic, Iceland
- Hans P. Reiser
, Marcel Kyas
:
Secure IT Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings. Lecture Notes in Computer Science 13700, Springer 2022, ISBN 978-3-031-22294-8
Privacy
- Sarah Abdelwahab Gaballah
, Lamya Abdullah
, Minh Tung Tran
, Ephraim Zimmer
, Max Mühlhäuser
:
On the Effectiveness of Intersection Attacks in Anonymous Microblogging. 3-19 - Carsten Hesselmann, Delphine Reinhardt
, Jan Gertheiss, Jörg P. Müller:
Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement of User Awareness. 20-39 - Mohamed Taoufiq Damir, Valtteri Niemi:
Location Privacy, 5G AKA, and Enhancements. 40-57 - Mina Alishahi, Daan Gast, Sam Vermeiren:
Local Differential Privacy for Private Construction of Classification Algorithms. 58-79 - Daniel Fraunholz, Dominik Brunke, Simon Beidenhauser, Sebastian Berger, Hartmut Koenig, Daniel Reti:
IMSI Probing: Possibilities and Limitations. 80-97
Attacks and Attack Detection
- Mohamed Msaad
, Shreyas Srinivasa
, Mikkel Møller Andersen
, David Holm Audran
, Charity U. Orji
, Emmanouil Vasilomanolakis
:
Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques. 101-119 - David Lantz, Felipe Boeira
, Mikael Asplund
:
Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters. 120-138 - Richard Plný
, Karel Hynek
, Tomás Cejka
:
DeCrypto: Finding Cryptocurrency Miners on ISP Networks. 139-158 - Arun Sankar Muttathu Sivasankara Pillai, Phillip L. De Leon
, Utz Roedig:
Detection of Voice Conversion Spoofing Attacks Using Voiced Speech. 159-175 - Alexander Bjerre
, Andreas Philip Westh, Emil Villefrance, A. S. M. Farhan Al Haque
, Jonas Bukrinski Andersen, Lucas K. Helgogaard
, Marios Anagnostopoulos
:
A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries. 176-193 - Mordechai Guri
:
GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU Fans. 194-211
Secure Protocols and Systems
- Matthew Cole
, Aravind Prakash:
Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage. 215-233 - Camille Sivelle
, Lorys Debbah, Maxime Puys
, Pascal Lafourcade
, Thibault Franco-Rondisson
:
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models. 234-252 - Xavier Arnal, Abraham Cano, Tamara Finogina
, Javier Herranz
:
How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge Proofs. 253-269
Security Analysis
- Sebastian Schrittwieser
, Patrick Kochberger
, Michael Pucher
, Caroline Lawitschka, Philip König
, Edgar R. Weippl
:
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation. 273-291 - Charles-Henry Bertrand Van Ouytsel
, Axel Legay
:
Malware Analysis with Symbolic Execution and Graph Kernel. 292-310 - Bernhards Blumbergs
, Eriks Dobelis
, Peteris Paikens
, Krisjanis Nesenbergs
, Kirils Solovjovs
, Artis Rusins
:
WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices. 311-325
Forensics
- Tobias Latzo, Andreas Hellmich, Annika Knepper, Lukas Hardi, Tim Phillip Castello-Waldow, Felix C. Freiling, Andreas Attenberger:
Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data. 329-345 - Azadeh Tabiban
, Heyang Zhao, Yosr Jarraya, Makan Pourzandi
, Lingyu Wang
:
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. 346-367 - Cristoffer Leite
, Jerry den Hartog, Daniel Ricardo dos Santos, Elisa Costante:
Actionable Cyber Threat Intelligence for Automated Incident Response. 368-385

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.