default search action
21st NordSec 2016: Oulu, Finland
- Billy Bob Brumley, Juha Röning:
Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016, Proceedings. Lecture Notes in Computer Science 10014, 2016, ISBN 978-3-319-47559-2
System Security
- Jose Rubio-Hernan, Luca De Cicco, Joaquín García-Alfaro:
Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks. 3-19 - Oualid Koucham, Stéphane Mocanu, Guillaume Hiet, Jean-Marc Thiriet, Frédéric Majorczyk:
Detecting Process-Aware Attacks in Sequential Control Systems. 20-36 - Gustavo Gonzalez Granadillo, Ender Alvarez, Alexander Motzek, Matteo Merialdo, Joaquín García-Alfaro, Hervé Debar:
Towards an Automated and Dynamic Risk Management Response System. 37-53 - Min Gu, Zaruhi Aslanyan, Christian W. Probst:
Understanding How Components of Organisations Contribute to Attacks. 54-66 - Sandra König, Stefan Schauer, Stefan Rass:
A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks. 67-81
Network Security
- Bernhards Blumbergs, Mauno Pihelgas, Markus Kont, Olaf Maennel, Risto Vaarandi:
Creating and Detecting IPv6 Transition Mechanism-Based Information Exfiltration Covert Channels. 85-100 - Pierre-Edouard Fabre, Hervé Debar, Jouni Viinikka, Grégory Blanc:
ML: DDoS Damage Control with MPLS. 101-116
Software Security
- Maqsood Ahmad, Bruno Crispo, Teklay Gebremichael:
Empirical Analysis on the Use of Dynamic Code Updates in Android and Its Security Implications. 119-134 - Olga Gadyatskaya, Andra-Lidia Lezza, Yury Zhauniarovich:
Evaluation of Resource-Based App Repackaging Detection in Android. 135-151 - Sampsa Rauti, Samuel Laurén, Joni Uitto, Shohreh Hosseinzadeh, Jukka Ruohonen, Sami Hyrynsalmi, Ville Leppänen:
A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification. 152-168 - Joeri de Ruiter:
A Tale of the OpenSSL State Machine: A Large-Scale Black-Box Analysis. 169-184
Cryptography
- Shay Gueron, Fabian Schlieker:
Speeding up R-LWE Post-quantum Key Exchange. 187-198 - Rasmus Dahlberg, Tobias Pulls, Roel Peeters:
Efficient Sparse Merkle Trees - Caching Strategies and Secure (Non-)Membership Proofs. 199-215 - Peeter Laud, Martin Pettai:
Secure Multiparty Sorting Protocols with Covert Privacy. 216-231
Authentication
- Martin Potthast, Christian Forler, Eik List, Stefan Lucks:
Passphone: Outsourcing Phone-Based Web Authentication While Protecting User Privacy. 235-255 - Kimmo Halunen, Visa Antero Vallivaara:
Secure, Usable and Privacy-Friendly User Authentication from Keystroke Dynamics. 256-268
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.