default search action
SEC 2020: Maribor, Slovenia
- Marko Hölbl, Kai Rannenberg, Tatjana Welzer:
ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings. IFIP Advances in Information and Communication Technology 580, Springer 2020, ISBN 978-3-030-58200-5
Channel Attacks
- Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner:
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems. 3-16 - Thomas A. V. Sattolo, Jason Jaskolka:
Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels. 17-31 - Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, Guy Gogniat:
IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction. 32-45
Connection Security
- Karel Hynek, Tomás Benes, Tomás Cejka, Hana Kubátová:
Refined Detection of SSH Brute-Force Attackers Using Machine Learning. 49-63 - Ricardo Moura, David R. Matos, Miguel L. Pardal, Miguel Correia:
MultiTLS: Secure Communication Channels with Cipher Suite Diversity. 64-77 - Hind Bangui, Mouzhi Ge, Barbora Buhnova:
Improving Big Data Clustering for Jamming Detection in Smart Mobility. 78-91
Human Aspects of Security and Privacy
- Joakim Kävrestad, Marcus Nohlberg:
Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining. 95-108 - Agnieszka Kitkowska, Yefim Shulman, Leonardo A. Martucci, Erik Wästlund:
Facilitating Privacy Attitudes and Behaviors with Affective Visual Design. 109-123 - Olha Drozd, Sabrina Kirrane:
Privacy CURE: Consent Comprehension Made Easy. 124-139
Detecting Malware and Software Weaknesses
- Stefan Carl Peiser, Ludwig Friborg, Riccardo Scandariato:
JavaScript Malware Detection Using Locality Sensitive Hashing. 143-154 - Can Yang, Jian Liu, Mengxia Luo, Xiaorui Gong, Baoxu Liu:
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding. 155-170 - Johannes Feichtner, Stefan Gruber:
Code Between the Lines: Semantic Analysis of Android Applications. 171-186
System Security
- Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma, Yunbo Wang, Feng Li:
IMShell-Dec: Pay More Attention to External Links in PowerShell. 189-202 - Michael Eckel, Andreas Fuchs, Jürgen Repp, Markus Springer:
Secure Attestation of Virtualized Environments. 203-216
Network Security and Privacy
- Asya Mitseva, Marharyta Aleksandrova, Thomas Engel, Andriy Panchenko:
Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor. 219-233 - Wilfried Mayer, Georg Merzdovnik, Edgar R. Weippl:
Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas. 234-247 - Steffen Haas, Robin Sommer, Mathias Fischer:
Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection. 248-262
Access Control and Authentication
- Michael Carr, Siamak F. Shahandashti:
Revisiting Security Vulnerabilities in Commercial Password Managers. 265-279 - Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo Iacono:
Evaluation of Risk-Based Re-Authentication Methods. 280-294 - Md. Morshedul Islam, Reihaneh Safavi-Naini:
Fuzzy Vault for Behavioral Authentication System. 295-310
Crypto Currencies
- Gijs van Dam, Rabiah Abdul Kadir, Puteri Nor Ellyza binti Nohuddin, Halimah Badioze Zaman:
Improvements of the Balance Discovery Attack on Lightning Network Payment Channels. 313-323 - Weizheng Wang, Chunhua Su:
CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin. 324-337 - Dusan Klinec, Vashek Matyas:
Privacy-Friendly Monero Transaction Signing on a Hardware Wallet. 338-351
Privacy and Security Management
- Guillaume Dupont, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
A Matter of Life and Death: Analyzing the Security of Healthcare Networks. 355-369 - Najmeh Mousavi Nejad, Pablo Jabat, Rostislav Nedelchev, Simon Scerri, Damien Graux:
Establishing a Strong Baseline for Privacy Policy Classification. 370-383 - Kabul Kurniawan, Andreas Ekelhart, Fajar J. Ekaputra, Elmar Kiesling:
Cross-Platform File System Activity Monitoring and Forensics - A Semantic Approach. 384-397
Machine Learning and Security
- Tanja Sarcevic, Rudolf Mayer:
A Correlation-Preserving Fingerprinting Technique for Categorical Data in Relational Databases. 401-415 - Hyeonseong Jeon, Youngoh Bang, Simon S. Woo:
FDFtNet: Facing Off Fake Images Using Fake Detection Fine-Tuning Network. 416-430 - Yayuan Xiong, Fengyuan Xu, Sheng Zhong, Qun Li:
Escaping Backdoor Attack Detection of Deep Learning. 431-445
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.