Secure IT systems : 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings / Aslan Askarov, René Rydhof Hansen, Willard Rafnsson (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 11875. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Cham : Springer, 2020.Description: 1 online resource (288 pages)Content type: - text
- computer
- online resource
- 9783030350550
- 303035055X
- 005.8 23
- QA76.9.A25
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Print version record.
International conference proceedings.
Intro; Preface; Organization; Contents; Privacy; Privacy Impact Assessment: Comparing Methodologies with a Focus on Practicality; 1 Introduction; 2 Data Protection Impact Assessment; 2.1 Legal Background; 2.2 LINDDUN; 2.3 CNIL; 2.4 ISO/IEC 29134:2017; 3 Related Work; 4 Comparison of DPIA Methods; 4.1 Comparison Metric; 4.2 Evaluation Questions; 5 Summary and Outlook; References; Rotten Cellar: Security and Privacy of the Browser Cache Revisited; 1 Introduction; 2 HTTP Caching Background; 3 Security and Privacy Implications of the Browser Cache; 3.1 Browser Cache Poisoning; 3.2 User Tracking
4 Browser Cache Experiments4.1 Effects on Network Performance; 4.2 Current Security and Privacy Risk Assessment; 5 User-Centred Mitigation Strategies; 5.1 How to Clear the Browser Cache; 5.2 Tool-Based Solutions; 6 Discussion; 7 Conclusion; References; Improving Privacy Through Fast Passive Wi-Fi Scanning; 1 Introduction; 2 Background; 2.1 Network Discovery; 2.2 Frequency Bands and Channels; 2.3 Threat Model; 3 Channel Switch Fingerprinting; 3.1 Channel Switch Time; 3.2 Experiments; 3.3 Countermeasures; 4 Passive Scanning Improvements; 4.1 Proposed Scanning Modifications
4.2 Metrics for Evaluation4.3 Experimental Setup; 5 Experimental Results; 5.1 Dwell Time Variation; 5.2 Incremental Scanning; 5.3 Static Priority Scanning; 5.4 Dynamic Priority Channels; 6 Advertising Neighboring Networks; 6.1 Advertising Neighboring Networks; 6.2 Experiments and Results; 7 Related Work; 8 Conclusion; References; Cronus: Everlasting Privacy with Audit and Cast; 1 Introduction; 2 Related Work; 3 Building Blocks; 3.1 Definitions; 3.2 Specifics; 4 Cronus E-Voting Scheme; 4.1 Election Flow; 5 Security Definitions and Analysis; 5.1 Ballot Privacy
5.2 Cast-as-Intended Verifiability5.3 Strong Consistency and Strong Correctness; 5.4 Everlasting Privacy; 5.5 Encryption; 6 Practical Realisation; 7 Conclusion; A Sigma protocol for consistent Abe commitments; References; Network Security; Using Partial Signatures in Intrusion Detection for Multipath TCP; 1 Introduction; 2 Background and Related Work; 3 Attack Model and Matching Algorithm; 3.1 Attack Model; 3.2 Matching Algorithm; 4 Detection Methodology; 4.1 Packet Decoder, Detection Engine, and Logger; 4.2 MPTCP Inspector; 4.3 MPTCP Reassembler; 4.4 Partial Matcher and Rules; 5 Evaluation
5.1 Datasets5.2 Snort Rules; 5.3 Results and Discussion; 6 Outlook and Concluding Remarks; References; Analysis of Topology Poisoning Attacks in Software-Defined Networking; 1 Introduction; 2 Background; 2.1 OpenFlow Controller Channel and Topology Discovery; 2.2 Related Work; 3 Topology Poisoning Attacks; 3.1 Threat Model; 3.2 Attack Principle; 3.3 Attack Variants; 3.4 Attack Implementation; 4 Attack Simulation; 5 Simulation Results; 5.1 Topology Poisoning Compared to Baseline; 5.2 Impact of Different Factors; 5.3 Many Compromised Nodes; 5.4 Finding a Relay Node; 6 Discussion
6.1 Generalizing the Results
Includes author index.