No abstract available.
Front Matter
Front Matter
On the Effectiveness of Intersection Attacks in Anonymous Microblogging
Intersection attacks, which are popular traffic analysis attacks, have been extensively studied in anonymous point-to-point communication scenarios. These attacks are also known to be challenging threats to anonymous group communication, e.g., ...
Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement of User Awareness
Individuals are frequently confronted with privacy-related decisions under uncertainty especially in online contexts. The resulting privacy concerns are a decisive factor for individuals to (not) use online services. In order to support ...
Local Differential Privacy for Private Construction of Classification Algorithms
In recent years, Local differential privacy (LDP), as a strong privacy preserving methodology, has been widely deployed in real world applications. It allows the users to perturb their data locally on their own devices before being sent out for ...
IMSI Probing: Possibilities and Limitations
Mobile networks are vital for modern societies. Recent generations of mobile communication systems have introduced increased security and privacy features to enhance their trust and reliability capabilities. Several well-known vulnerabilities, ...
Front Matter
Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques
- Mohamed Msaad,
- Shreyas Srinivasa,
- Mikkel M. Andersen,
- David H. Audran,
- Charity U. Orji,
- Emmanouil Vasilomanolakis
The increased number of data breaches and sophisticated attacks have created a need for early detection mechanisms. Reports indicate that it may take up to 200 days to identify a data breach and entail average costs of up to $4.85 million. To cope ...
Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters
Trusted execution environments like Intel SGX allow developers to protect sensitive code in so-called enclaves. These enclaves protect their code and data even in the cases of a compromised OS. However, such enclaves have also been shown to be ...
DeCrypto: Finding Cryptocurrency Miners on ISP Networks
With the rising popularity of cryptocurrencies and the increasing value of the whole industry, people are incentivized to join and earn revenues by cryptomining—using computational resources for cryptocurrency transaction verification. ...
A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries
- Alexander Bjerre,
- Andreas Philip Westh,
- Emil Villefrance,
- A S M Farhan Al Haque,
- Jonas Bukrinski Andersen,
- Lucas K. Helgogaard,
- Marios Anagnostopoulos
Distributed Reflective Denial of Service (DRDoS) attacks exploit Internet facing devices with the purpose to involve them in DoS incidents. In turn, these devices unwittingly amplify and redirect the attack traffic towards the victim. As a result, ...
GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU Fans
Modern computer networks are secured with a wide range of products, including firewalls, intrusion detection and prevention systems (IDS/IPS), and access control mechanisms. But despite the multiple layers of security, these measures can be ...
Front Matter
Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage
The last few decades have seen several hardware-level features to enhance security, but due to security, performance, and/or usability issues these features have attracted steady criticism. One such feature is the Intel Memory Protection ...
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
Attack generation from an abstract model of a protocol is not an easy task. We present BIFROST (Bifrost Implements Formally Reliable prOtocols for Security and Trust), a tool that takes an abstract model of a cryptographic protocol and outputs an ...
How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge Proofs
Interactive zero-knowledge systems are a very important cryptographic primitive, used in many applications, especially when deniability (also known as non-transferability) is desired. In the lattice-based setting, the currently most efficient ...
Front Matter
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation
- Sebastian Schrittwieser,
- Patrick Kochberger,
- Michael Pucher,
- Caroline Lawitschka,
- Philip König,
- Edgar R. Weippl
Figuring out whether a particular semantic functionality exists in a binary program is challenging. While pattern-matching-based detection is susceptible to syntactic changes of the code, formal equivalence proofs quickly hit complexity ...
Malware Analysis with Symbolic Execution and Graph Kernel
Malware analysis techniques are divided into static and dynamic analysis. Both techniques can be bypassed by circumvention techniques such as obfuscation. In a series of works, the authors have promoted the use of symbolic executions combined with ...
WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices
- Bernhards Blumbergs,
- Ēriks Dobelis,
- Pēteris Paikens,
- Krišjānis Nesenbergs,
- Kirils Solovjovs,
- Artis Rušiņš
Wearable devices are becoming more prevalent in the daily life of society, ranging from smartwatches, and fitness bracelets to accessories and headphones. These devices, both from their hardware manufacturing and wireless firmware development ...
Front Matter
Maraudrone’s Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data
- Tobias Latzo,
- Andreas Hellmich,
- Annika Knepper,
- Lukas Hardi,
- Tim Phillip Castello-Waldow,
- Felix Freiling,
- Andreas Attenberger
Unmanned Aerial Vehicles (also known as drones) are an increasingly important source of forensic evidence, especially for commercial drones offered by the market leader DJI. The forensic analysis of this type of evidence, however, is still in its ...
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack
The operational complexity and dynamicity of clouds highlight the importance of automated solutions for explaining the root cause of security incidents. Most existing works rely on human analysts to interpret provenance graphs for root causes of ...
Actionable Cyber Threat Intelligence for Automated Incident Response
Applying Cyber Threat Intelligence for active cyber defence, while potentially very beneficial, is currently limited to predominantly manual use. In this paper, we propose an automated approach for using Cyber Threat Intelligence during incident ...
Index Terms
- Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30–December 2, 2022, Proceedings