Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-031-22295-5guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30–December 2, 2022, Proceedings
2022 Proceeding
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
Nordic Conference on Secure IT SystemsReykjavic, Iceland30 November 2022
ISBN:
978-3-031-22294-8
Published:
18 January 2023

Reflects downloads up to 25 Nov 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
front-matter
Front Matter
Pages i–xiii
back-matter
Back Matter
Article
Front Matter
Page 1
Article
On the Effectiveness of Intersection Attacks in Anonymous Microblogging
Abstract

Intersection attacks, which are popular traffic analysis attacks, have been extensively studied in anonymous point-to-point communication scenarios. These attacks are also known to be challenging threats to anonymous group communication, e.g., ...

Article
Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement of User Awareness
Abstract

Individuals are frequently confronted with privacy-related decisions under uncertainty especially in online contexts. The resulting privacy concerns are a decisive factor for individuals to (not) use online services. In order to support ...

Article
Location Privacy, 5G AKA, and Enhancements
Abstract

We introduce a linkability attack variant on 5G AKA that we call the Replay In GUTI (RIG) attack. Our attack investigates the case where the temporary identifier GUTI is used for identification. Recalling that the GUTI-based identification is the ...

Article
Local Differential Privacy for Private Construction of Classification Algorithms
Abstract

In recent years, Local differential privacy (LDP), as a strong privacy preserving methodology, has been widely deployed in real world applications. It allows the users to perturb their data locally on their own devices before being sent out for ...

Article
IMSI Probing: Possibilities and Limitations
Abstract

Mobile networks are vital for modern societies. Recent generations of mobile communication systems have introduced increased security and privacy features to enhance their trust and reliability capabilities. Several well-known vulnerabilities, ...

Article
Front Matter
Page 99
Article
Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques
Abstract

The increased number of data breaches and sophisticated attacks have created a need for early detection mechanisms. Reports indicate that it may take up to 200 days to identify a data breach and entail average costs of up to $4.85 million. To cope ...

Article
Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters
Abstract

Trusted execution environments like Intel SGX allow developers to protect sensitive code in so-called enclaves. These enclaves protect their code and data even in the cases of a compromised OS. However, such enclaves have also been shown to be ...

Article
DeCrypto: Finding Cryptocurrency Miners on ISP Networks
Abstract

With the rising popularity of cryptocurrencies and the increasing value of the whole industry, people are incentivized to join and earn revenues by cryptomining—using computational resources for cryptocurrency transaction verification. ...

Article
Detection of Voice Conversion Spoofing Attacks Using Voiced Speech
Abstract

Speech consists of voiced and unvoiced segments that differ in their production process and exhibit different characteristics. In this paper, we investigate the spectral differences between bonafide and spoofed speech for voiced and unvoiced ...

Article
A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries
Abstract

Distributed Reflective Denial of Service (DRDoS) attacks exploit Internet facing devices with the purpose to involve them in DoS incidents. In turn, these devices unwittingly amplify and redirect the attack traffic towards the victim. As a result, ...

Article
GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU Fans
Abstract

Modern computer networks are secured with a wide range of products, including firewalls, intrusion detection and prevention systems (IDS/IPS), and access control mechanisms. But despite the multiple layers of security, these measures can be ...

Article
Front Matter
Page 213
Article
Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage
Abstract

The last few decades have seen several hardware-level features to enhance security, but due to security, performance, and/or usability issues these features have attracted steady criticism. One such feature is the Intel Memory Protection ...

Article
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
Abstract

Attack generation from an abstract model of a protocol is not an easy task. We present BIFROST (Bifrost Implements Formally Reliable prOtocols for Security and Trust), a tool that takes an abstract model of a cryptographic protocol and outputs an ...

Article
How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge Proofs
Abstract

Interactive zero-knowledge systems are a very important cryptographic primitive, used in many applications, especially when deniability (also known as non-transferability) is desired. In the lattice-based setting, the currently most efficient ...

Article
Front Matter
Page 271
Article
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation
Abstract

Figuring out whether a particular semantic functionality exists in a binary program is challenging. While pattern-matching-based detection is susceptible to syntactic changes of the code, formal equivalence proofs quickly hit complexity ...

Article
Malware Analysis with Symbolic Execution and Graph Kernel
Abstract

Malware analysis techniques are divided into static and dynamic analysis. Both techniques can be bypassed by circumvention techniques such as obfuscation. In a series of works, the authors have promoted the use of symbolic executions combined with ...

Article
WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices
Abstract

Wearable devices are becoming more prevalent in the daily life of society, ranging from smartwatches, and fitness bracelets to accessories and headphones. These devices, both from their hardware manufacturing and wireless firmware development ...

Article
Front Matter
Page 327
Article
Maraudrone’s Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data
Abstract

Unmanned Aerial Vehicles (also known as drones) are an increasingly important source of forensic evidence, especially for commercial drones offered by the market leader DJI. The forensic analysis of this type of evidence, however, is still in its ...

Article
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack
Abstract

The operational complexity and dynamicity of clouds highlight the importance of automated solutions for explaining the root cause of security incidents. Most existing works rely on human analysts to interpret provenance graphs for root causes of ...

Article
Actionable Cyber Threat Intelligence for Automated Incident Response
Abstract

Applying Cyber Threat Intelligence for active cyber defence, while potentially very beneficial, is currently limited to predominantly manual use. In this paper, we propose an automated approach for using Cyber Threat Intelligence during incident ...

Contributors
  • Reykjavík University
  • Reykjavík University
Index terms have been assigned to the content through auto-classification.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations