researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
Filter by Tag
OR
AND
NOT
1
Meta-Environment
access control
analysis
e-science
empirical
information models
mobile
operating system
protocol
rule-based
security
systematic-approach
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
Ahto Buldas
Ahto Truu
Alejandro Russo
Antonis Michalas
Arne Ansper
Benjamin Taubmann
Billy Bob Brumley
Budi Arief
Dogan Kesdogan
Frank Piessens
Hans P. Reiser
Joaquín García-Alfaro
Julio Hernandez-Castro
Markku Antikainen
N. Asokan
Peeter Laud
René Rydhof Hansen
Risto Laanoja
Tobias Pulls
Tuomas Aura
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
attacks
authentication
conference
control
cyber
data
detection
flow
information
network
nordic
nordsec
privacy
proceedings
secure
security
systems
towards
using
NordSec (nordsec)
Editions
Publications
Viewing Publication 1 - 100 from 286
2024
Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings
Lothar Fritsch
,
Ismail Hassan
,
Ebenezer Paintsil
, editors,
Volume 14324 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
2023
Legal Considerations on Gray Zone Operations - From a Norwegian Perspective
Lars Berg
,
Kirsi Helkala
,
André Årnes
.
nordsec 2024
:
162-181
[doi]
DIPSAUCE: Efficient Private Stream Aggregation Without Trusted Parties
Joakim Brorsson
,
Martin Gunnarsson
.
nordsec 2024
:
204-222
[doi]
Small Private Key Attack Against a Family of RSA-Like Cryptosystems
Paul Cotan
,
George Teseleanu
.
nordsec 2024
:
57-72
[doi]
Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU
Tianxiang Dai
,
Li Duan
,
Yufan Jiang
,
Yong Li
,
Fei Mei
,
Yulian Sun
.
nordsec 2024
:
330-349
[doi]
A Self-forming Community Approach for Intrusion Detection in Heterogeneous Networks
Philipp Eichhammer
,
Hans P. Reiser
.
nordsec 2024
:
263-280
[doi]
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM
Mordechai Guri
.
nordsec 2024
:
144-161
[doi]
Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service
Amirreza Hamidi
,
Hossein Ghodosi
.
nordsec 2024
:
73-86
[doi]
Towards Generic Malware Unpacking: A Comprehensive Study on the Unpacking Behavior of Malicious Run-Time Packers
Thorsten Jenke
,
Elmar Padilla
,
Lilli Bruckschen
.
nordsec 2024
:
245-262
[doi]
A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning
Tanveer Khan
,
Khoa Nguyen 0005
,
Antonis Michalas
.
nordsec 2024
:
307-329
[doi]
Cybersecurity Challenges and Smart Technology Adoption in Norwegian Livestock Farming
Karianne Kjønås
,
Gaute Wangen
.
nordsec 2024
:
107-125
[doi]
To Possess or Not to Possess - WhatsApp for Android Revisited with a Focus on Stickers
Samantha Klier
,
Harald Baier
.
nordsec 2024
:
281-303
[doi]
Mobile App Distribution Transparency (MADT): Design and Evaluation of a System to Mitigate Necessary Trust in Mobile App Distribution Systems
Mario Lins
,
René Mayrhofer
,
Michael Roland 0001
,
Alastair R. Beresford
.
nordsec 2024
:
185-203
[doi]
No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites
Philippe Mangeard
,
Xiufen Yu
,
Mohammad Mannan
,
Amr M. Youssef
.
nordsec 2024
:
18-36
[doi]
Analysis of a Consent Management Specification and Prototype Under the GDPR
Jonas Palm
,
Meiko Jensen
.
nordsec 2024
:
3-17
[doi]
Mean Value Analysis of Critical Attack Paths with Multiple Parameters
Rajendra Patil
,
Viktoria Fodor
,
Mathias Ekstedt
.
nordsec 2024
:
126-143
[doi]
Smart Noise Detection for Statistical Disclosure Attacks
Marc Roßberger
,
Dogan Kesdogan
.
nordsec 2024
:
87-103
[doi]
What is Your Information Worth? A Systematic Analysis of the Endowment Effect of Different Data Types
Vera Schmitt
,
Daniel Sivizaca Conde
,
Premtim Sahitaj
,
Sebastian Möller 0001
.
nordsec 2024
:
223-242
[doi]
From Whistle to Echo: Data Leaks in Web-Based Whistleblowing Channels
Esko Vuorinen
,
Panu Puhtila
,
Sampsa Rauti
,
Ville Leppänen
.
nordsec 2024
:
37-53
[doi]
2022
Local Differential Privacy for Private Construction of Classification Algorithms
Mina Alishahi
,
Daan Gast
,
Sam Vermeiren
.
nordsec 2022
:
58-79
[doi]
How to Avoid Repetitions in Lattice-Based Deniable Zero-Knowledge Proofs
Xavier Arnal
,
Abraham Cano
,
Tamara Finogina
,
Javier Herranz
.
nordsec 2022
:
253-269
[doi]
A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries
Alexander Bjerre
,
Andreas Philip Westh
,
Emil Villefrance
,
A S. M. Farhan Al Haque
,
Jonas Bukrinski Andersen
,
Lucas K. Helgogaard
,
Marios Anagnostopoulos
.
nordsec 2022
:
176-193
[doi]
WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices
Bernhards Blumbergs
,
Eriks Dobelis
,
Peteris Paikens
,
Krisjanis Nesenbergs
,
Kirils Solovjovs
,
Artis Rusins
.
nordsec 2022
:
311-325
[doi]
Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage
Matthew Cole
,
Aravind Prakash
.
nordsec 2022
:
215-233
[doi]
Location Privacy, 5G AKA, and Enhancements
Mohamed Taoufiq Damir
,
Valtteri Niemi
.
nordsec 2022
:
40-57
[doi]
IMSI Probing: Possibilities and Limitations
Daniel Fraunholz
,
Dominik Brunke
,
Simon Beidenhauser
,
Sebastian Berger
,
Hartmut Koenig
,
Daniel Reti
.
nordsec 2022
:
80-97
[doi]
On the Effectiveness of Intersection Attacks in Anonymous Microblogging
Sarah Abdelwahab Gaballah
,
Lamya Abdullah
,
Minh Tung Tran
,
Ephraim Zimmer
,
Max Mühlhäuser
.
nordsec 2022
:
3-19
[doi]
GPU-FAN: Leaking Sensitive Data from Air-Gapped Machines via Covert Noise from GPU Fans
Mordechai Guri
.
nordsec 2022
:
194-211
[doi]
Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement of User Awareness
Carsten Hesselmann
,
Delphine Reinhardt
,
Jan Gertheiss
,
Jörg P. Müller
.
nordsec 2022
:
20-39
[doi]
Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters
David Lantz
,
Felipe Boeira
,
Mikael Asplund
.
nordsec 2022
:
120-138
[doi]
Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data
Tobias Latzo
,
Andreas Hellmich
,
Annika Knepper
,
Lukas Hardi
,
Tim Phillip Castello-Waldow
,
Felix C. Freiling
,
Andreas Attenberger
.
nordsec 2022
:
329-345
[doi]
Actionable Cyber Threat Intelligence for Automated Incident Response
Cristoffer Leite
,
Jerry den Hartog
,
Daniel Ricardo Dos Santos
,
Elisa Costante
.
nordsec 2022
:
368-385
[doi]
Honeysweeper: Towards Stealthy Honeytoken Fingerprinting Techniques
Mohamed Msaad
,
Shreyas Srinivasa
,
Mikkel Møller Andersen
,
David Holm Audran
,
Charity U. Orji
,
Emmanouil Vasilomanolakis
.
nordsec 2022
:
101-119
[doi]
Malware Analysis with Symbolic Execution and Graph Kernel
Charles-Henry Bertrand Van Ouytsel
,
Axel Legay
.
nordsec 2022
:
292-310
[doi]
Detection of Voice Conversion Spoofing Attacks Using Voiced Speech
Arun Sankar Muttathu Sivasankara Pillai
,
Phillip L. De Leon
,
Utz Roedig
.
nordsec 2022
:
159-175
[doi]
DeCrypto: Finding Cryptocurrency Miners on ISP Networks
Richard Plný
,
Karel Hynek
,
Tomás Cejka
.
nordsec 2022
:
139-158
[doi]
Secure IT Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings
Hans P. Reiser
,
Marcel Kyas
, editors,
Volume 13700 of
Lecture Notes in Computer Science
, Springer,
2022.
[doi]
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation
Sebastian Schrittwieser
,
Patrick Kochberger
,
Michael Pucher
,
Caroline Lawitschka
,
Philip König
,
Edgar R. Weippl
.
nordsec 2022
:
273-291
[doi]
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
Camille Sivelle
,
Lorys Debbah
,
Maxime Puys
,
Pascal Lafourcade 0001
,
Thibault Franco-Rondisson
.
nordsec 2022
:
234-252
[doi]
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack
Azadeh Tabiban
,
Heyang Zhao
,
Yosr Jarraya
,
Makan Pourzandi
,
Lingyu Wang 0001
.
nordsec 2022
:
346-367
[doi]
2021
Secure Collaborative Learning for Predictive Maintenance in Optical Networks
Khouloud Abdelli
,
Joo Yeon Cho
,
Stephan Pachnicke
.
nordsec 2021
:
114-130
[doi]
Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings
Mikael Asplund
,
Simin Nadjm-Tehrani
, editors,
Volume 12556 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
X-Pro: Distributed XDP Proxies Against Botnets of Things
Syafiq Al Atiiq
,
Christian Gehrmann
.
nordsec 2021
:
51-71
[doi]
Industrialising Blackmail: Privacy Invasion Based IoT Ransomware
Calvin Brierley
,
Budi Arief
,
David J. Barnes
,
Julio Hernandez-Castro
.
nordsec 2021
:
72-92
[doi]
Adversarial Trends in Mobile Communication Systems: From Attack Patterns to Potential Defenses Strategies
Hsin-Yi Chen
,
Siddharth Prakash Rao
.
nordsec 2021
:
153-171
[doi]
Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones
Eugene Frimpong
,
Reyhaneh Rabbaninejad
,
Antonis Michalas
.
nordsec 2021
:
31-48
[doi]
Size, Speed, and Security: An Ed25519 Case Study
Cesar Pereida García
,
Sampo Sovio
.
nordsec 2021
:
16-30
[doi]
Gollector: Measuring Domain Name Dark Matter from Different Vantage Points
Kaspar Hageman
,
René Rydhof Hansen
,
Jens Myrup Pedersen
.
nordsec 2021
:
133-152
[doi]
Preliminary Security Analysis, Formalisation, and Verification of OpenTitan Secure Boot Code
Bjarke Hilmer Møller
,
Jacob Gosch Søndergaard
,
Kristoffer Skagbæk Jensen
,
Magnus Winkel Pedersen
,
Tobias Worm Bøgedal
,
Anton Christensen
,
Danny Bøgsted Poulsen
,
Kim Guldstrand Larsen
,
René Rydhof Hansen
,
Thomas Rosted Jensen
,
Heino Juvoll Madsen
,
Henrik Uhrenfeldt
.
nordsec 2021
:
192-211
[doi]
Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel Protocol
Arto Niemi
,
Vasile Adrian Bogdan Pop
,
Jan-Erik Ekberg
.
nordsec 2021
:
175-191
[doi]
Communicating Through Subliminal-Free Signatures
George Teseleanu
.
nordsec 2021
:
3-15
[doi]
Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings
Nicola Tuveri
,
Antonis Michalas
,
Billy Bob Brumley
, editors,
Volume 13115 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
SQL Injections and Reinforcement Learning: An Empirical Evaluation of the Role of Action Structure
Manuel Del Verme
,
Åvald Åslaugson Sommervoll
,
László Erdödi
,
Simone Totaro
,
Fabio Massimo Zennaro
.
nordsec 2021
:
95-113
[doi]
2020
Using Features of Encrypted Network Traffic to Detect Malware
Zeeshan Afzal
,
Anna Brunström
,
Stefan Lindskog
.
nordsec 2021
:
37-53
[doi]
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption
Alexandros Bakas
,
Antonis Michalas
,
Amjad Ullah
.
nordsec 2021
:
111-126
[doi]
Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation
Jennifer Bellizzi
,
Mark Vella
,
Christian Colombo
,
Julio Hernandez-Castro
.
nordsec 2021
:
20-36
[doi]
On the Certificate Revocation Problem in the Maritime Sector
Guillaume Bour
,
Karin Bernsmed
,
Ravishankar Borgaonkar
,
Per Håkon Meland
.
nordsec 2021
:
142-157
[doi]
Persistence in Linux-Based IoT Malware
Calvin Brierley
,
Jamie Pont
,
Budi Arief
,
David J. Barnes
,
Julio Hernandez-Castro
.
nordsec 2021
:
3-19
[doi]
TLV-to-MUC Express: Post-quantum MACsec in VXLAN
Joo Yeon Cho
,
Andrew Sergeev
.
nordsec 2021
:
127-141
[doi]
Agent-Based File Extraction Using Virtual Machine Introspection
Thomas Dangl
,
Benjamin Taubmann
,
Hans P. Reiser
.
nordsec 2021
:
174-191
[doi]
Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme
Kristian Gjøsteen
,
Thomas Haines
,
Morten Rotvold Solberg
.
nordsec 2021
:
92-107
[doi]
Cyber Range Automation Overview with a Case Study of CRATE
Tommy Gustafsson
,
Jonas Almroth
.
nordsec 2021
:
192-209
[doi]
Machine-Checking the Universal Verifiability of ElectionGuard
Thomas Haines
,
Rajeev Goré
,
Jack Stodart
.
nordsec 2021
:
57-73
[doi]
Information-Flow Control by Means of Security Wrappers for Active Object Languages with Futures
Farzane Karami
,
Olaf Owe
,
Gerardo Schneider
.
nordsec 2021
:
74-91
[doi]
OnLITE: On-line Label for IoT Transparency Enhancement
Alexandr Railean
,
Delphine Reinhardt
.
nordsec 2021
:
229-245
[doi]
HoneyHash: Honeyword Generation Based on Transformed Hashes
Canyang Shi
,
Huiping Sun
.
nordsec 2021
:
161-173
[doi]
Privacy Analysis of COVID-19 Contact Tracing Apps in the EU
Samuel Wairimu
,
Nurul Momen
.
nordsec 2021
:
213-228
[doi]
An Investigation of Comic-Based Permission Requests
Katie Watson
,
Mike Just
,
Tessa Berg
.
nordsec 2021
:
246-261
[doi]
2019
Using Partial Signatures in Intrusion Detection for Multipath TCP
Zeeshan Afzal
,
Johan Garcia
,
Stefan Lindskog
,
Anna Brunström
.
nordsec 2019
:
71-86
[doi]
Secure IT Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings
Aslan Askarov
,
René Rydhof Hansen
,
Willard Rafnsson
, editors,
Volume 11875 of
Lecture Notes in Computer Science
, Springer,
2019.
[doi]
Privacy Impact Assessment: Comparing Methodologies with a Focus on Practicality
Tamas Bisztray
,
Nils Gruschka
.
nordsec 2019
:
3-19
[doi]
Client-Side Vulnerabilities in Commercial VPNs
Thanh Bui
,
Siddharth Prakash Rao
,
Markku Antikainen
,
Tuomas Aura
.
nordsec 2019
:
103-119
[doi]
Analysis of Topology Poisoning Attacks in Software-Defined Networking
Thanh Bui
,
Markku Antikainen
,
Tuomas Aura
.
nordsec 2019
:
87-102
[doi]
Securing Optical Networks by Modern Cryptographic Techniques
Joo Yeon Cho
.
nordsec 2019
:
120-133
[doi]
Rotten Cellar: Security and Privacy of the Browser Cache Revisited
Florian Dehling
,
Tobias Mengel
,
Luigi Lo Iacono
.
nordsec 2019
:
20-36
[doi]
Experimental Analysis of the Laser-Induced Instruction Skip Fault Model
Jean-Max Dutertre
,
Timothée Riom
,
Olivier Potin
,
Jean-Baptiste Rigaud
.
nordsec 2019
:
221-237
[doi]
Improving Privacy Through Fast Passive Wi-Fi Scanning
Frederik Goovaerts
,
Gunes Acar
,
Rafael Galvez
,
Frank Piessens
,
Mathy Vanhoef
.
nordsec 2019
:
37-52
[doi]
Can Microkernels Mitigate Microarchitectural Attacks?
Gunnar Grimsdal
,
Patrik Lundgren
,
Christian Vestlund
,
Felipe Boeira
,
Mikael Asplund
.
nordsec 2019
:
238-253
[doi]
Cronus: Everlasting Privacy with Audit and Cast
Thomas Haines
.
nordsec 2019
:
53-68
[doi]
An Experimental Analysis of Cryptojacking Attacks
Per Håkon Meland
,
Bent Heier Johansen
,
Guttorm Sindre
.
nordsec 2019
:
155-170
[doi]
MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX
Antonis Michalas
,
Alexandros Bakas
,
Hai-Van Dang
,
Alexandr Zaltiko
.
nordsec 2019
:
254-270
[doi]
A Roadmap for Improving the Impact of Anti-ransomware Research
Jamie Pont
,
Osama Abu Oun
,
Calvin Brierley
,
Budi Arief
,
Julio Hernandez-Castro
.
nordsec 2019
:
137-154
[doi]
My Smartwatch Is Mine - Machine Learning Based Theft Detection of Smartwatches
Christian Roth
,
Mirja Nitschke
,
Christian Hutzler
,
Maximilian Koller
,
Rolf Küffner
,
Marc Roßberger
,
Dogan Kesdogan
.
nordsec 2019
:
171-187
[doi]
VMIGuard: Detecting and Preventing Service Integrity Violations by Malicious Insiders Using Virtual Machine Introspection
Stewart Sentanoe
,
Benjamin Taubmann
,
Hans P. Reiser
.
nordsec 2019
:
271-282
[doi]
Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services
Stephan Wiefling
,
Nils Gruschka
,
Luigi Lo Iacono
.
nordsec 2019
:
188-203
[doi]
A Study of Security Vulnerabilities and Software Weaknesses in Vehicles
Wenjun Xiong
,
Melek Gülsever
,
Koray Mustafa Kaya
,
Robert Lagerström
.
nordsec 2019
:
204-218
[doi]
2018
UpDroid: Updated Android Malware and Its Familial Classification
Kursat Aktas
,
Sevil Sen
.
nordsec 2018
:
352-368
[doi]
Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques
Alexander Bajic
,
Georg T. Becker
.
nordsec 2018
:
236-254
[doi]
A Blockchain-Assisted Hash-Based Signature Scheme
Ahto Buldas
,
Risto Laanoja
,
Ahto Truu
.
nordsec 2018
:
138-153
[doi]
Verifiable Light-Weight Monitoring for Certificate Transparency Logs
Rasmus Dahlberg
,
Tobias Pulls
.
nordsec 2018
:
171-183
[doi]
Protecting Instruction Set Randomization from Code Reuse Attacks
Roberto Guanciale
.
nordsec 2018
:
421-436
[doi]
Evaluation of Cybersecurity Management Controls and Metrics of Critical Infrastructures: A Literature Review Considering the NIST Cybersecurity Framework
Barbara Krumay
,
Edward W. N. Bernroider
,
Roman Walser
.
nordsec 2018
:
369-384
[doi]
MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix Zones
Mirja Nitschke
,
Philipp Holler
,
Lukas Hartmann
,
Dogan Kesdogan
.
nordsec 2018
:
38-53
[doi]
PESTEL Analysis of Hacktivism Campaign Motivations
Juha Nurmi
,
Mikko S. Niemelä
.
nordsec 2018
:
323-335
[doi]
Steady - A Simple End-to-End Secure Logging System
Tobias Pulls
,
Rasmus Dahlberg
.
nordsec 2018
:
88-103
[doi]
What You Can Change and What You Can't: Human Experience in Computer Network Defenses
Vivien M. Rooney
,
Simon N. Foley
.
nordsec 2018
:
219-235
[doi]
Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection
Stewart Sentanoe
,
Benjamin Taubmann
,
Hans P. Reiser
.
nordsec 2018
:
255-271
[doi]
Estimating the Risk of Fraud Against E-Services
Ahmed Seid Yesuf
,
Christian W. Probst
.
nordsec 2018
:
306-322
[doi]
Authorization Policies Specification and Consistency Management within Multi-cloud Environments
Ehtesham Zahoor
,
Asim Ikram
,
Sabina Akhtar
,
Olivier Perrin 0001
.
nordsec 2018
:
272-288
[doi]
Detection of Covert Channels in TCP Retransmissions
Sebastian Zillien
,
Steffen Wendzel
.
nordsec 2018
:
203-218
[doi]
Sign in
or
sign up
to see more results.