Amazon cover image
Image from Amazon.com

Secure IT systems : 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings / Aslan Askarov, René Rydhof Hansen, Willard Rafnsson (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 11875. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Cham : Springer, 2020.Description: 1 online resource (288 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783030350550
  • 303035055X
Subject(s): Genre/Form: Additional physical formats: Print version:: Secure IT Systems : 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings.DDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Intro; Preface; Organization; Contents; Privacy; Privacy Impact Assessment: Comparing Methodologies with a Focus on Practicality; 1 Introduction; 2 Data Protection Impact Assessment; 2.1 Legal Background; 2.2 LINDDUN; 2.3 CNIL; 2.4 ISO/IEC 29134:2017; 3 Related Work; 4 Comparison of DPIA Methods; 4.1 Comparison Metric; 4.2 Evaluation Questions; 5 Summary and Outlook; References; Rotten Cellar: Security and Privacy of the Browser Cache Revisited; 1 Introduction; 2 HTTP Caching Background; 3 Security and Privacy Implications of the Browser Cache; 3.1 Browser Cache Poisoning; 3.2 User Tracking
4 Browser Cache Experiments4.1 Effects on Network Performance; 4.2 Current Security and Privacy Risk Assessment; 5 User-Centred Mitigation Strategies; 5.1 How to Clear the Browser Cache; 5.2 Tool-Based Solutions; 6 Discussion; 7 Conclusion; References; Improving Privacy Through Fast Passive Wi-Fi Scanning; 1 Introduction; 2 Background; 2.1 Network Discovery; 2.2 Frequency Bands and Channels; 2.3 Threat Model; 3 Channel Switch Fingerprinting; 3.1 Channel Switch Time; 3.2 Experiments; 3.3 Countermeasures; 4 Passive Scanning Improvements; 4.1 Proposed Scanning Modifications
4.2 Metrics for Evaluation4.3 Experimental Setup; 5 Experimental Results; 5.1 Dwell Time Variation; 5.2 Incremental Scanning; 5.3 Static Priority Scanning; 5.4 Dynamic Priority Channels; 6 Advertising Neighboring Networks; 6.1 Advertising Neighboring Networks; 6.2 Experiments and Results; 7 Related Work; 8 Conclusion; References; Cronus: Everlasting Privacy with Audit and Cast; 1 Introduction; 2 Related Work; 3 Building Blocks; 3.1 Definitions; 3.2 Specifics; 4 Cronus E-Voting Scheme; 4.1 Election Flow; 5 Security Definitions and Analysis; 5.1 Ballot Privacy
5.2 Cast-as-Intended Verifiability5.3 Strong Consistency and Strong Correctness; 5.4 Everlasting Privacy; 5.5 Encryption; 6 Practical Realisation; 7 Conclusion; A Sigma protocol for consistent Abe commitments; References; Network Security; Using Partial Signatures in Intrusion Detection for Multipath TCP; 1 Introduction; 2 Background and Related Work; 3 Attack Model and Matching Algorithm; 3.1 Attack Model; 3.2 Matching Algorithm; 4 Detection Methodology; 4.1 Packet Decoder, Detection Engine, and Logger; 4.2 MPTCP Inspector; 4.3 MPTCP Reassembler; 4.4 Partial Matcher and Rules; 5 Evaluation
5.1 Datasets5.2 Snort Rules; 5.3 Results and Discussion; 6 Outlook and Concluding Remarks; References; Analysis of Topology Poisoning Attacks in Software-Defined Networking; 1 Introduction; 2 Background; 2.1 OpenFlow Controller Channel and Topology Discovery; 2.2 Related Work; 3 Topology Poisoning Attacks; 3.1 Threat Model; 3.2 Attack Principle; 3.3 Attack Variants; 3.4 Attack Implementation; 4 Attack Simulation; 5 Simulation Results; 5.1 Topology Poisoning Compared to Baseline; 5.2 Impact of Different Factors; 5.3 Many Compromised Nodes; 5.4 Finding a Relay Node; 6 Discussion
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Print version record.

International conference proceedings.

Intro; Preface; Organization; Contents; Privacy; Privacy Impact Assessment: Comparing Methodologies with a Focus on Practicality; 1 Introduction; 2 Data Protection Impact Assessment; 2.1 Legal Background; 2.2 LINDDUN; 2.3 CNIL; 2.4 ISO/IEC 29134:2017; 3 Related Work; 4 Comparison of DPIA Methods; 4.1 Comparison Metric; 4.2 Evaluation Questions; 5 Summary and Outlook; References; Rotten Cellar: Security and Privacy of the Browser Cache Revisited; 1 Introduction; 2 HTTP Caching Background; 3 Security and Privacy Implications of the Browser Cache; 3.1 Browser Cache Poisoning; 3.2 User Tracking

4 Browser Cache Experiments4.1 Effects on Network Performance; 4.2 Current Security and Privacy Risk Assessment; 5 User-Centred Mitigation Strategies; 5.1 How to Clear the Browser Cache; 5.2 Tool-Based Solutions; 6 Discussion; 7 Conclusion; References; Improving Privacy Through Fast Passive Wi-Fi Scanning; 1 Introduction; 2 Background; 2.1 Network Discovery; 2.2 Frequency Bands and Channels; 2.3 Threat Model; 3 Channel Switch Fingerprinting; 3.1 Channel Switch Time; 3.2 Experiments; 3.3 Countermeasures; 4 Passive Scanning Improvements; 4.1 Proposed Scanning Modifications

4.2 Metrics for Evaluation4.3 Experimental Setup; 5 Experimental Results; 5.1 Dwell Time Variation; 5.2 Incremental Scanning; 5.3 Static Priority Scanning; 5.4 Dynamic Priority Channels; 6 Advertising Neighboring Networks; 6.1 Advertising Neighboring Networks; 6.2 Experiments and Results; 7 Related Work; 8 Conclusion; References; Cronus: Everlasting Privacy with Audit and Cast; 1 Introduction; 2 Related Work; 3 Building Blocks; 3.1 Definitions; 3.2 Specifics; 4 Cronus E-Voting Scheme; 4.1 Election Flow; 5 Security Definitions and Analysis; 5.1 Ballot Privacy

5.2 Cast-as-Intended Verifiability5.3 Strong Consistency and Strong Correctness; 5.4 Everlasting Privacy; 5.5 Encryption; 6 Practical Realisation; 7 Conclusion; A Sigma protocol for consistent Abe commitments; References; Network Security; Using Partial Signatures in Intrusion Detection for Multipath TCP; 1 Introduction; 2 Background and Related Work; 3 Attack Model and Matching Algorithm; 3.1 Attack Model; 3.2 Matching Algorithm; 4 Detection Methodology; 4.1 Packet Decoder, Detection Engine, and Logger; 4.2 MPTCP Inspector; 4.3 MPTCP Reassembler; 4.4 Partial Matcher and Rules; 5 Evaluation

5.1 Datasets5.2 Snort Rules; 5.3 Results and Discussion; 6 Outlook and Concluding Remarks; References; Analysis of Topology Poisoning Attacks in Software-Defined Networking; 1 Introduction; 2 Background; 2.1 OpenFlow Controller Channel and Topology Discovery; 2.2 Related Work; 3 Topology Poisoning Attacks; 3.1 Threat Model; 3.2 Attack Principle; 3.3 Attack Variants; 3.4 Attack Implementation; 4 Attack Simulation; 5 Simulation Results; 5.1 Topology Poisoning Compared to Baseline; 5.2 Impact of Different Factors; 5.3 Many Compromised Nodes; 5.4 Finding a Relay Node; 6 Discussion

6.1 Generalizing the Results

Includes author index.

Powered by Koha