Table of Contents
|
ICT Systems Security and Privacy Protection Audun Jøsang, Lynn Futcher, Janne Hagen |
Front Matter |
Digital Signatures
|
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany Paul Höller, Alexander Krumeich, Luigi Lo Iacono |
3-18 |
Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials Stefan More, Peter Grassberger, Felix Hörandner, Andreas Abraham, Lukas Daniel Klausner |
19-35 |
SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials Ali Hariri, Subhajit Bandopadhyay, Athanasios Rizos, Theo Dimitrakos, Bruno Crispo, Muttukrishnan Rajarajan |
36-50 |
Vulnerability Management
|
A Performance Assessment of Free-to-Use Vulnerability Scanners - Revisited Ricardo Araújo, António Pinto, Pedro Pinto |
53-65 |
QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection Hajin Jang, Kyeongseok Yang, Geonwoo Lee, Yoonjong Na, Jeremy D. Seideman, Shoufu Luo, Heejo Lee, Sven Dietrich |
66-82 |
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware Kai Cheng, Dongliang Fang, Chuan Qin, Huizhao Wang, Yaowen Zheng, Nan Yu, Limin Sun |
83-99 |
Covert Channels and Cryptography
|
ESQABE: Predicting Encrypted Search Queries Isaac Meers, Mariano Di Martino, Peter Quax, Wim Lamotte |
103-117 |
Reconnection-Based Covert Channels in Wireless Networks Sebastian Zillien, Steffen Wendzel |
118-133 |
Minecraft Altered Skin Channel (MASC) Sam Abrams, Brandon Keller, Kenneth Nero, Gino Placella, Daryl Johnson |
134-145 |
Lattice-Based Weak Curve Fault Attack on ECDSA Weiqiong Cao, Hongsong Shi, Hua Chen, Wei Wei, Jiazhe Chen |
146-161 |
Application and System Security
|
HyperSec: Visual Analytics for Blockchain Security Monitoring Benedikt Putz, Fabian Böhm, Günther Pernul |
165-180 |
100 Popular Open-Source Infosec Tools Rauli Kaksonen, Tommi Järvenpää, Jukka Pajukangas, Mihai Mahalean, Juha Röning |
181-195 |
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators Ahmad Samer Wazan, David Chadwick, Remi Venant, Romain Laborde, Abdelmalek Benzekri |
196-209 |
Privacy
|
Accept All: The Landscape of Cookie Banners in Greece and the UK Georgios Kampanos, Siamak F. Shahandashti |
213-227 |
The AppChk Crowd-Sourcing Platform: Which Third Parties are iOS Apps Talking To? Oleg Geier, Dominik Herrmann |
228-241 |
Compiling Personal Data and Subject Categories from App Data Models Christian Burkert, Maximilian Blochberger, Hannes Federrath |
242-255 |
Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App Sebastian Pape, David Harborth, Jacob Leon Kröger |
256-269 |
Perceived Privacy Problems Within Digital Contact Tracing: A Study Among Swedish Citizens Ali Padyab, Joakim Kävrestad |
270-283 |
Network Security
|
Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security Junwon Lee, Heejo Lee |
287-301 |
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption Stanislav Špaček, Daniel Tovarňák, Pavel Čeleda |
302-316 |
Advanced Cowrie Configuration to Increase Honeypot Deceptiveness Warren Z. Cabral, Craig Valli, Leslie F. Sikos, Samuel G. Wakeling |
317-331 |
Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems Andre Büttner, Hoai Viet Nguyen, Nils Gruschka, Luigi Lo Iacono |
332-347 |
Machine Learning for Security
|
TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised Learning Sangyup Lee, Shahroz Tariq, Junyaup Kim, Simon S. Woo |
351-366 |
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles Filip Wieslaw Bartoszewski, Mike Just, Michael A. Lones, Oleksii Mandrychenko |
367-381 |
Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns Young Geun Kim, Jeong-Han Yun, Siho Han, Hyoung Chun Kim, Simon S. Woo |
382-397 |
Security Management
|
What Is Lurking in Your Backups? Ben Lenard, Alexander Rasin, Nick Scope, James Wagner |
401-415 |
How Do Users Chain Email Accounts Together? Lydia Kraus, Mária S̆vidron̆ová, Elizabeth Stobert |
416-429 |
Tensions that Hinder the Implementation of Digital Security Governance Stef Schinagl, Svetlana Khapova, Abbas Shahim |
430-445 |