


default search action
SEC 2020: Maribor, Slovenia
- Marko Hölbl

, Kai Rannenberg, Tatjana Welzer:
ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings. IFIP Advances in Information and Communication Technology 580, Springer 2020, ISBN 978-3-030-58200-5
Channel Attacks
- Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram

, Jan Kalbantner
:
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems. 3-16 - Thomas A. V. Sattolo

, Jason Jaskolka
:
Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels. 17-31 - Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, Guy Gogniat

:
IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction. 32-45
Connection Security
- Karel Hynek, Tomás Benes, Tomás Cejka

, Hana Kubátová:
Refined Detection of SSH Brute-Force Attackers Using Machine Learning. 49-63 - Ricardo Moura

, David R. Matos
, Miguel L. Pardal
, Miguel Correia
:
MultiTLS: Secure Communication Channels with Cipher Suite Diversity. 64-77 - Hind Bangui

, Mouzhi Ge, Barbora Buhnova
:
Improving Big Data Clustering for Jamming Detection in Smart Mobility. 78-91
Human Aspects of Security and Privacy
- Joakim Kävrestad, Marcus Nohlberg:

Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining. 95-108 - Agnieszka Kitkowska

, Yefim Shulman, Leonardo A. Martucci, Erik Wästlund:
Facilitating Privacy Attitudes and Behaviors with Affective Visual Design. 109-123 - Olha Drozd

, Sabrina Kirrane
:
Privacy CURE: Consent Comprehension Made Easy. 124-139
Detecting Malware and Software Weaknesses
- Stefan Carl Peiser, Ludwig Friborg, Riccardo Scandariato:

JavaScript Malware Detection Using Locality Sensitive Hashing. 143-154 - Can Yang

, Jian Liu, Mengxia Luo, Xiaorui Gong, Baoxu Liu:
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding. 155-170 - Johannes Feichtner, Stefan Gruber:

Code Between the Lines: Semantic Analysis of Android Applications. 171-186
System Security
- Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma

, Yunbo Wang, Feng Li:
IMShell-Dec: Pay More Attention to External Links in PowerShell. 189-202 - Michael Eckel

, Andreas Fuchs, Jürgen Repp, Markus Springer:
Secure Attestation of Virtualized Environments. 203-216
Network Security and Privacy
- Asya Mitseva, Marharyta Aleksandrova, Thomas Engel

, Andriy Panchenko:
Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor. 219-233 - Wilfried Mayer, Georg Merzdovnik, Edgar R. Weippl:

Actively Probing Routes for Tor AS-Level Adversaries with RIPE Atlas. 234-247 - Steffen Haas, Robin Sommer, Mathias Fischer:

Zeek-Osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection. 248-262
Access Control and Authentication
- Michael Carr, Siamak F. Shahandashti:

Revisiting Security Vulnerabilities in Commercial Password Managers. 265-279 - Stephan Wiefling

, Tanvi Patil
, Markus Dürmuth
, Luigi Lo Iacono
:
Evaluation of Risk-Based Re-Authentication Methods. 280-294 - Md. Morshedul Islam

, Reihaneh Safavi-Naini:
Fuzzy Vault for Behavioral Authentication System. 295-310
Crypto Currencies
- Gijs van Dam

, Rabiah Abdul Kadir
, Puteri Nor Ellyza binti Nohuddin
, Halimah Badioze Zaman
:
Improvements of the Balance Discovery Attack on Lightning Network Payment Channels. 313-323 - Weizheng Wang, Chunhua Su:

CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin. 324-337 - Dusan Klinec, Vashek Matyas:

Privacy-Friendly Monero Transaction Signing on a Hardware Wallet. 338-351
Privacy and Security Management
- Guillaume Dupont, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:

A Matter of Life and Death: Analyzing the Security of Healthcare Networks. 355-369 - Najmeh Mousavi Nejad

, Pablo Jabat, Rostislav Nedelchev, Simon Scerri, Damien Graux
:
Establishing a Strong Baseline for Privacy Policy Classification. 370-383 - Kabul Kurniawan

, Andreas Ekelhart
, Fajar J. Ekaputra
, Elmar Kiesling
:
Cross-Platform File System Activity Monitoring and Forensics - A Semantic Approach. 384-397
Machine Learning and Security
- Tanja Sarcevic

, Rudolf Mayer
:
A Correlation-Preserving Fingerprinting Technique for Categorical Data in Relational Databases. 401-415 - Hyeonseong Jeon, Youngoh Bang, Simon S. Woo:

FDFtNet: Facing Off Fake Images Using Fake Detection Fine-Tuning Network. 416-430 - Yayuan Xiong, Fengyuan Xu, Sheng Zhong, Qun Li

:
Escaping Backdoor Attack Detection of Deep Learning. 431-445

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














