


default search action
25th NordSec 2020: Virtual Event
- Mikael Asplund

, Simin Nadjm-Tehrani
:
Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings. Lecture Notes in Computer Science 12556, Springer 2021, ISBN 978-3-030-70851-1
Malware and Attacks
- Calvin Brierley, Jamie Pont, Budi Arief

, David J. Barnes, Julio C. Hernandez-Castro:
Persistence in Linux-Based IoT Malware. 3-19 - Jennifer Bellizzi

, Mark Vella
, Christian Colombo
, Julio C. Hernandez-Castro
:
Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation. 20-36 - Zeeshan Afzal

, Anna Brunström, Stefan Lindskog:
Using Features of Encrypted Network Traffic to Detect Malware. 37-53
Formal Analysis
- Thomas Haines, Rajeev Goré, Jack Stodart:

Machine-Checking the Universal Verifiability of ElectionGuard. 57-73 - Farzane Karami, Olaf Owe

, Gerardo Schneider:
Information-Flow Control by Means of Security Wrappers for Active Object Languages with Futures. 74-91 - Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg:

Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme. 92-107
Applied Cryptography
- Alexandros Bakas, Antonis Michalas

, Amjad Ullah:
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption. 111-126 - Joo Yeon Cho, Andrew Sergeev:

TLV-to-MUC Express: Post-quantum MACsec in VXLAN. 127-141 - Guillaume Bour, Karin Bernsmed, Ravishankar Borgaonkar, Per Håkon Meland:

On the Certificate Revocation Problem in the Maritime Sector. 142-157
Security Mechanisms and Training
- Canyang Shi, Huiping Sun:

HoneyHash: Honeyword Generation Based on Transformed Hashes. 161-173 - Thomas Dangl, Benjamin Taubmann, Hans P. Reiser:

Agent-Based File Extraction Using Virtual Machine Introspection. 174-191 - Tommy Gustafsson

, Jonas Almroth
:
Cyber Range Automation Overview with a Case Study of CRATE. 192-209
Applications and Privacy
- Samuel Wairimu

, Nurul Momen
:
Privacy Analysis of COVID-19 Contact Tracing Apps in the EU. 213-228 - Alexandr Railean

, Delphine Reinhardt
:
OnLITE: On-line Label for IoT Transparency Enhancement. 229-245 - Katie Watson

, Mike Just
, Tessa Berg
:
An Investigation of Comic-Based Permission Requests. 246-261

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














