Muutke küpsiste eelistusi

Secure IT Systems: 30th Nordic Conference, NordSec 2025, Tartu, Estonia, November 12-13, 2025, Proceedings [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 560 pages, kõrgus x laius: 235x155 mm, 100 Illustrations, color; 21 Illustrations, black and white
  • Sari: Lecture Notes in Computer Science
  • Ilmumisaeg: 07-Apr-2026
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3032147816
  • ISBN-13: 9783032147813
  • Pehme köide
  • Hind: 63,69 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 74,93 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 3-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 560 pages, kõrgus x laius: 235x155 mm, 100 Illustrations, color; 21 Illustrations, black and white
  • Sari: Lecture Notes in Computer Science
  • Ilmumisaeg: 07-Apr-2026
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3032147816
  • ISBN-13: 9783032147813
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.



The 29 full papers included in this book were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: Cryptography; Artificial Intelligence and Software Security; Network and Communication Security; System and Hardware Security; Threat Analysis; Access Control and Policy Management; Usable Security and Societal Resilience; and Obfuscation.
.- Cryptography.


.- DDH-Based Schemes for Multi-Party Function Secret Sharing.


.- Integrating PQC in OpenSSL via Shallow Providers for
Cryptographic Agility.


.- Attacking an RSA-like Cryptosystem Using Continued Fractions
and Lattices.


.- A Comparative Software Benchmark of Lightweight Hash Functions on 8-bit
AVR Using ChipWhisperer.


.- A New Optimized Implementation of SMAUG-T for Lightweight Devices.


.- Exploiting Quantum Point-to-Point Protocol (Q3P) for Denial-of- Service
(DoS) Attacks.


.- Artificial Intelligence and Software Security.


.- OHRA: Dynamic Multi-Protocol LLM-Based Cyber Deception.


.- Targeted AI-Based Password Guessing Leveraging Email-Derived
User Attributes.


.- On the Security and Privacy of AI-based Mobile Health Chatbots.


.- Fairness Under Noise: How Di!erential Privacy A!ects Bias
in GANs-Generated Data.


.- GadgetBuilder: An Overhaul of the Greatest Java
Deserialization Exploitation Tool.


.- Software Supply Chain Security: Can We Beat the Kill-Chain? A Case Study
on the XZ Backdoor.


.- Network and Communication Security.


.- MP-LFM: Breaking Subscriber Privacy (even more) by Exploiting Linkability
in 5G AKA.


.- Mitigating Trac Analysis Attacks While Maintaining On-Path Network
Observability.


.- Privacy and Security of DNS Resolvers used in the Nordics and Baltics.


.- System and Hardware Security.


.- WireTrust: A TrustZone-Based Non-Bypassable VPN Tunnel.


.- Timing Interference in Multi-Core RISC-V Systems: Security Risks
and Mitigations.


.- A Walk Down Memory Lane: Timing Analysis of Load and Store Instructions on
ARM Cortex-M3 Devices.


.- Threat Analysis.


.- An Empirical Evaluation of Intrusion Detection Systems Based on System
Calls.


.- Dissecting Mirai: Spatio-Sequential Analysis and Restoration
Strategies Using MITRE ATT&CK and D3FEND.


.- Graph Reduction to Attack Trees for (Unobservable) Target Analysis.


.- Access Control and Policy Management.


.- Threshold Trust Logic.


.- Mining Attribute-Based Access Control Policies via Categorisation.


.- Multi-entity Control-Based Risk Assessment: A European Digital Identity
Wallet Use Case.


.- Usable Security and Societal Resilience.


.- From Perception to Protection: A Mental Model-Based Framework
for Capturing Usable Security and Privacy Requirements.


.- Understanding APT Defense Through Expert Eyes: A Critical Exploration of
Perceived Needs and Gaps.


.- Foreign Disinformation on Swedish Facebook: A Mixed-Methods Thematic
Analysis of Manipulative Narratives and Societal Resilience.


.- Obfuscation.


.- Key-Gated Generative Obfuscation for Embedded Strings.


.- Bugfuscation.