Fr. 103.00

Secure IT Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings

English · Paperback / Softback

Shipping usually within 1 to 2 weeks (title will be printed to order)

Description

Read more

This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.

List of contents

On the Effectiveness of Intersection Attacks in Anonymous Microblogging.- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement.- Location Privacy, 5G AKA, and Enhancements.- Local Differential Privacy for Private Construction of Classification Algorithms.- IMSI Probing: Possibilities and Limitations.- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques.- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters.- DeCrypto: Finding Cryptocurrency Miners on ISP networks.- Detection of Voice Conversion Spoofing Attacks using Voiced Speech.- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries.- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans.- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage.- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models.- How to Avoid Repetitions inLattice-based Deniable Zero-Knowledge Proofs.- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation.- Malware Analysis with Symbolic Execution and Graph Kernel.- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices.- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data.- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.

Product details

Assisted by Kyas (Editor), Marcel Kyas (Editor), Hans P Reiser (Editor), Hans P. Reiser (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 02.01.2023
 
EAN 9783031222948
ISBN 978-3-0-3122294-8
No. of pages 388
Dimensions 155 mm x 21 mm x 235 mm
Illustrations XIII, 388 p. 110 illus., 86 illus. in color.
Series Lecture Notes in Computer Science
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.