IFIP SEC 2020 - Conference Program
- Data Security and Privacy in the IoT - Prof. Elisa Bertino, Purdue University West Lafayette
- How to Fix Vulnerability Fixing - Stanka Šalamun and Mitja Kolšek, 0patch by ACROS Security
PAPER # | PAPER TITLE | AUTHORS |
1 | A Matter of Life and Death: Analyzing the Security of Healthcare | Guillaume Dupont, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog and Sandro Etalle |
2 | Actively Probing Routes for Tor AS-level Adversaries with RIPE Atlas | Wilfried Mayer, Georg Merzdovnik and Edgar Weippl |
3 | Assisting users to create stronger passwords using ContextBased MicroTraining | Joakim Kävrestad and Marcus Nohlberg |
4 | CCBRSN: A System with High Embedding Capacity for Covert Communication in Bitcoin | Weizheng Wang and Chunhua Su |
5 | Code between the Lines: Semantic Analysis of Android Applications | Johannes Feichtner and Stefan Gruber |
6 | Correlations-Preserving Fingerprinting Technique for Categorical Data in Relational Databases | Tanja Šarčević and Rudolf Mayer |
7 | Cross-Platform File System Activity Monitoring and Forensics – A Semantic Approach | Kabul Kurniawan, Andreas Ekelhart, Fajar J. Ekaputra and Elmar Kiesling |
8 | Escaping Backdoor Attack Detection of Deep Learning | Yayuan Xiong, Fengyuan Xu, Sheng Zhong and Qun Li |
9 | Establishing a Strong Baseline for Privacy Policy Classification | Najmeh Mousavi Nejad, Pablo Jabat, Rostislav Nedelchev, Simon Scerri and Damien Graux |
10 | Evaluation of Risk-based Re-Authentication Methods | Stephan Wiefling, Tanvi Patil, Markus Dürmuth and Luigi Lo Iacono |
11 | Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels | Thomas Sattolo and Jason Jaskolka |
12 | Facilitating Privacy Attitudes & Behaviors with Affective Visual Design | Agnieszka Kitkowska, Yefim Shulman, Leonardo A. Martucci and Erik Wästlund |
13 | FDFtNet: Facing Off Fake Images using Fake DetectionFine-tuning Network | Hyeonseong Jeon, Youngoh Bang and Simon Woo |
14 | Fuzzy Vault for Behavioral Authentication System | Md Morshedul Islam and Reihaneh Safavi-Naini |
15 | IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks through Indirect Eviction | Muhammad Asim Mukhtar, Muhammad Khurram Bhatti and Guy Gogniat |
16 | Improvements of the Balance Discovery Attack on Lightning Network Payment Channels | Gijs van Dam, Rabiah Abdul Kadir, Puteri NE Nohuddin and Halimah Badioze Zaman |
17 | Improving Big Data Clustering for Jamming Detection in Smart Mobility | Hind Bangui, Mouzhi Ge and Barbora Buhnova |
18 | IMShell-Dec :Pay More Attention to External Links in PowerShell | Ruidong Han, Chao Yang, Jianfeng Ma, Siqi Ma, Yunbo Wang and Feng Li |
19 | JavaScript malware detection using locality sensitive hashing | Stefan Carl Peiser, Ludwig Friborg and Riccardo Scandariato |
20 | Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems | Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, and Jan Saaltner |
21 | MultiTLS: Secure communication channel with cipher suite diversity | Ricardo Moura, Miguel Pardal and Miguel Correia |
22 | Privacy-friendly Monero transaction signing on a hardware wallet | Dusan Klinec and Vashek Matyas |
23 | Privacy CURE: Consent Comprehension Made Easy | Olha Drozd and Sabrina Kirrane |
24 | Refined detection of SSH brute-force attackers using machine learning. | Karel Hynek, Tomáš Beneš, Tomáš Čejka and Hana Kubátová |
25 | Revisiting Security Vulnerabilities in Commercial Password Managers | Michael Carr and Siamak Shahandashti |
26 | RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding | Can Yang, Mengxia Luo, Jian Liu, Xiaorui Gong and Baoxu Liu |
27 | Secure Attestation of Virtualized Environments | Michael Eckel, Markus Springer, Andreas Fuchs and Jürgen Repp |
28 | Security and Performance Implications of BGP Rerouting-resistant Guard Selection Algorithms for Tor | Asya Mitseva, Marharyta Aleksandrova, Thomas Engel and Andriy Panchenko |
29 | zeek-osquery: Host-Network Correlation for Advanced Monitoring and Intrusion Detection | Steffen Haas, Robin Sommer and Mathias Fischer |