default search action
SEC 2021: Oslo, Norway
- Audun Jøsang, Lynn Futcher, Janne Merete Hagen:
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings. IFIP Advances in Information and Communication Technology 625, Springer 2021, ISBN 978-3-030-78119-4
Digital Signatures
- Paul Höller, Alexander Krumeich, Luigi Lo Iacono:
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany. 3-18 - Stefan More, Peter Grassberger, Felix Hörandner, Andreas Abraham, Lukas Daniel Klausner:
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials. 19-35 - Ali Hariri, Subhajit Bandopadhyay, Athanasios Rizos, Theo Dimitrakos, Bruno Crispo, Muttukrishnan Rajarajan:
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials. 36-50
Vulnerability Management
- Ricardo Araújo, António Pinto, Pedro Pinto:
A Performance Assessment of Free-to-Use Vulnerability Scanners - Revisited. 53-65 - Hajin Jang, Kyeongseok Yang, Geonwoo Lee, Yoonjong Na, Jeremy D. Seideman, Shoufu Luo, Heejo Lee, Sven Dietrich:
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection. 66-82 - Kai Cheng, Dongliang Fang, Chuan Qin, Huizhao Wang, Yaowen Zheng, Nan Yu, Limin Sun:
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware. 83-99
Covert Channels and Cryptography
- Isaac Meers, Mariano Di Martino, Peter Quax, Wim Lamotte:
ESQABE: Predicting Encrypted Search Queries. 103-117 - Sebastian Zillien, Steffen Wendzel:
Reconnection-Based Covert Channels in Wireless Networks. 118-133 - Sam Abrams, Brandon Keller, Kenneth Nero, Gino Placella, Daryl Johnson:
Minecraft Altered Skin Channel (MASC). 134-145 - Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei, Jiazhe Chen:
Lattice-Based Weak Curve Fault Attack on ECDSA. 146-161
Application and System Security
- Benedikt Putz, Fabian Böhm, Günther Pernul:
HyperSec: Visual Analytics for Blockchain Security Monitoring. 165-180 - Rauli Kaksonen, Tommi Järvenpää, Jukka Pajukangas, Mihai Mahalean, Juha Röning:
100 Popular Open-Source Infosec Tools. 181-195 - Ahmad Samer Wazan, David W. Chadwick, Rémi Venant, Romain Laborde, Abdelmalek Benzekri:
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators. 196-209
Privacy
- Georgios Kampanos, Siamak F. Shahandashti:
Accept All: The Landscape of Cookie Banners in Greece and the UK. 213-227 - Oleg Geier, Dominik Herrmann:
The AppChk Crowd-Sourcing Platform: Which Third Parties are iOS Apps Talking To? 228-241 - Christian Burkert, Maximilian Blochberger, Hannes Federrath:
Compiling Personal Data and Subject Categories from App Data Models. 242-255 - Sebastian Pape, David Harborth, Jacob Leon Kröger:
Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App. 256-269 - Ali Mohammad Padyab, Joakim Kävrestad:
Perceived Privacy Problems Within Digital Contact Tracing: A Study Among Swedish Citizens. 270-283
Network Security
- Junwon Lee, Heejo Lee:
Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security. 287-301 - Stanislav Spacek, Daniel Tovarnák, Pavel Celeda:
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption. 302-316 - Warren Z. Cabral, Craig Valli, Leslie F. Sikos, Samuel G. Wakeling:
Advanced Cowrie Configuration to Increase Honeypot Deceptiveness. 317-331 - Andre Büttner, Hoai Viet Nguyen, Nils Gruschka, Luigi Lo Iacono:
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems. 332-347
Machine Learning for Security
- Sangyup Lee, Shahroz Tariq, Junyaup Kim, Simon S. Woo:
TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised Learning. 351-366 - Filip Wieslaw Bartoszewski, Mike Just, Michael A. Lones, Oleksii Mandrychenko:
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles. 367-381 - Young Geun Kim, Jeong-Han Yun, Siho Han, Hyoung Chun Kim, Simon S. Woo:
Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns. 382-397
Security Management
- Ben Lenard, Alexander Rasin, Nick Scope, James Wagner:
What Is Lurking in Your Backups? 401-415 - Lydia Kraus, Mária Svidronová, Elizabeth Stobert:
How Do Users Chain Email Accounts Together? 416-429 - Stef Schinagl, Svetlana Khapova, Abbas Shahim:
Tensions that Hinder the Implementation of Digital Security Governance. 430-445
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.