Muutke küpsiste eelistusi

E-raamat: Secure IT Systems: 30th Nordic Conference, NordSec 2025, Tartu, Estonia, November 12-13, 2025, Proceedings

Edited by , Edited by , Edited by
  • Formaat - EPUB+DRM
  • Hind: 74,09 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.



The 29 full papers included in this book were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: Cryptography; Artificial Intelligence and Software Security; Network and Communication Security; System and Hardware Security; Threat Analysis; Access Control and Policy Management; Usable Security and Societal Resilience; and Obfuscation.
.- Cryptography.


.- DDH-Based Schemes for Multi-Party Function Secret Sharing.


.- Integrating PQC in OpenSSL via Shallow Providers for
Cryptographic Agility.


.- Attacking an RSA-like Cryptosystem Using Continued Fractions
and Lattices.


.- A Comparative Software Benchmark of Lightweight Hash Functions on 8-bit
AVR Using ChipWhisperer.


.- A New Optimized Implementation of SMAUG-T for Lightweight Devices.


.- Exploiting Quantum Point-to-Point Protocol (Q3P) for Denial-of- Service
(DoS) Attacks.


.- Artificial Intelligence and Software Security.


.- OHRA: Dynamic Multi-Protocol LLM-Based Cyber Deception.


.- Targeted AI-Based Password Guessing Leveraging Email-Derived
User Attributes.


.- On the Security and Privacy of AI-based Mobile Health Chatbots.


.- Fairness Under Noise: How Di!erential Privacy A!ects Bias
in GANs-Generated Data.


.- GadgetBuilder: An Overhaul of the Greatest Java
Deserialization Exploitation Tool.


.- Software Supply Chain Security: Can We Beat the Kill-Chain? A Case Study
on the XZ Backdoor.


.- Network and Communication Security.


.- MP-LFM: Breaking Subscriber Privacy (even more) by Exploiting Linkability
in 5G AKA.


.- Mitigating Trac Analysis Attacks While Maintaining On-Path Network
Observability.


.- Privacy and Security of DNS Resolvers used in the Nordics and Baltics.


.- System and Hardware Security.


.- WireTrust: A TrustZone-Based Non-Bypassable VPN Tunnel.


.- Timing Interference in Multi-Core RISC-V Systems: Security Risks
and Mitigations.


.- A Walk Down Memory Lane: Timing Analysis of Load and Store Instructions on
ARM Cortex-M3 Devices.


.- Threat Analysis.


.- An Empirical Evaluation of Intrusion Detection Systems Based on System
Calls.


.- Dissecting Mirai: Spatio-Sequential Analysis and Restoration
Strategies Using MITRE ATT&CK and D3FEND.


.- Graph Reduction to Attack Trees for (Unobservable) Target Analysis.


.- Access Control and Policy Management.


.- Threshold Trust Logic.


.- Mining Attribute-Based Access Control Policies via Categorisation.


.- Multi-entity Control-Based Risk Assessment: A European Digital Identity
Wallet Use Case.


.- Usable Security and Societal Resilience.


.- From Perception to Protection: A Mental Model-Based Framework
for Capturing Usable Security and Privacy Requirements.


.- Understanding APT Defense Through Expert Eyes: A Critical Exploration of
Perceived Needs and Gaps.


.- Foreign Disinformation on Swedish Facebook: A Mixed-Methods Thematic
Analysis of Manipulative Narratives and Societal Resilience.


.- Obfuscation.


.- Key-Gated Generative Obfuscation for Embedded Strings.


.- Bugfuscation.