ICT systems security and privacy protection : 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings /: 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings. (2020)
- Record Type:
- Book
- Title:
- ICT systems security and privacy protection : 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings /: 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings. (2020)
- Main Title:
- ICT systems security and privacy protection : 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings
- Other Titles:
- SEC 2020
- Further Information:
- Note: Marko Hölbl, Kai Rannenberg, Tatjana Welzer (eds.).
- Other Names:
- Hölbl, Marko
Rannenberg, Kai
Welzer, Tatjana, 1961-
IFIP TC11 International Information Security Conference, 35th - Contents:
- Intro -- Preface -- Organization -- Contents -- Channel Attacks -- Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems -- 1 Introduction -- 2 Background -- 3 A Privileged Native Covert Channel -- 3.1 Threat Model -- 3.2 Principle -- 3.3 Design Considerations -- 4 An Unprivileged Cross-VM Covert Channel -- 4.1 Threat Model -- 4.2 Loosing Privileges and Principle -- 4.3 Design Considerations -- 5 Characterizing the Channel Capacity -- 5.1 Experimental Setup -- 5.2 Evaluation -- 6 Discussion and Related Work -- 7 Mitigation -- 8 Conclusion and Further Work IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction -- 1 Introduction -- 2 Background -- 2.1 Eviction-Based Cache Attacks -- 2.2 Prime+Probe Attack -- 3 IE-Cache -- Proposed Cache -- 3.1 IE-Cache: High Level Design -- 3.2 Suitable Indexing Function -- 3.3 Security Domain and Key Management -- 3.4 Increased Complexity of Prime+Probe -- 4 Security Evaluation -- 5 Performance Evaluation -- 6 Conclusion -- References -- Connection Security -- Refined Detection of SSH Brute-Force Attackers Using Machine Learning -- 1 Introduction -- 2 Related Work 3 Our Approach -- 3.1 Feature Extractor -- 3.2 Failed Login Detector -- 3.3 Knowledge Base -- 3.4 Threat Decision and Reaction Service -- 4 Dataset Creation -- 5 Validation and Experimental Results -- 5.1 Accuracy of Failed Login Detector -- 5.2 Accuracy of the Whole Architecture -- 6 Conclusion -- References --Intro -- Preface -- Organization -- Contents -- Channel Attacks -- Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems -- 1 Introduction -- 2 Background -- 3 A Privileged Native Covert Channel -- 3.1 Threat Model -- 3.2 Principle -- 3.3 Design Considerations -- 4 An Unprivileged Cross-VM Covert Channel -- 4.1 Threat Model -- 4.2 Loosing Privileges and Principle -- 4.3 Design Considerations -- 5 Characterizing the Channel Capacity -- 5.1 Experimental Setup -- 5.2 Evaluation -- 6 Discussion and Related Work -- 7 Mitigation -- 8 Conclusion and Further Work IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction -- 1 Introduction -- 2 Background -- 2.1 Eviction-Based Cache Attacks -- 2.2 Prime+Probe Attack -- 3 IE-Cache -- Proposed Cache -- 3.1 IE-Cache: High Level Design -- 3.2 Suitable Indexing Function -- 3.3 Security Domain and Key Management -- 3.4 Increased Complexity of Prime+Probe -- 4 Security Evaluation -- 5 Performance Evaluation -- 6 Conclusion -- References -- Connection Security -- Refined Detection of SSH Brute-Force Attackers Using Machine Learning -- 1 Introduction -- 2 Related Work 3 Our Approach -- 3.1 Feature Extractor -- 3.2 Failed Login Detector -- 3.3 Knowledge Base -- 3.4 Threat Decision and Reaction Service -- 4 Dataset Creation -- 5 Validation and Experimental Results -- 5.1 Accuracy of Failed Login Detector -- 5.2 Accuracy of the Whole Architecture -- 6 Conclusion -- References -- MULTITLS: Secure Communication Channels with Cipher Suite Diversity -- 1 Introduction -- 2 Background and Related Work -- 3 MultiTLS -- 3.1 Design -- 3.2 Combining Diverse Cipher Suites -- 3.3 Running MultiTLS -- 3.4 Implementing the Tunnels -- 4 Evaluation -- 4.1 Performance 4.2 Comparison with MultiTLS -- 4.3 Use Case -- 5 Conclusion -- References -- Improving Big Data Clustering for Jamming Detection in Smart Mobility -- 1 Introduction -- 2 Security in Smart Mobility -- 3 Clustering for Anti-jamming Detection -- 4 Coresets-Based Anti-jamming Detection -- 4.1 Coresets -- 5 Experiment Evaluation -- 5.1 Experimental Setting -- 5.2 Clustering Quality Measurement -- 5.3 Experimental Results -- 6 Conclusions -- References -- Human Aspects of Security and Privacy -- Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining -- 1 Introduction … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Internet -- Security measures -- Congresses
Computer networks -- Security measures
Computer security
Internet -- Security measures
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030582012
3030582019 - Related ISBNs:
- 3030582000
9783030582005 - Notes:
- Note: References -- Evaluation of Statistical Tests for Detecting Storage-Based Covert Channels -- 1 Introduction and Motivation -- 2 Related Work -- 3 Test Classification -- 3.1 Complexity Tests -- 3.2 Distributional Tests -- 4 Experimental Setup and Approach -- 4.1 Tests Included in the Experiments -- 4.2 Building the Dataset -- 4.3 Conducting the Experiments -- 5 Experimental Results -- 5.1 Results for Tests Used in Isolation -- 5.2 Results for Tests Used in Combination -- 5.3 Logistic Regression Detector -- 6 Discussion -- 7 Concluding Remarks -- References
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.551852
- Ingest File:
- 03_171.xml