TY - BOOK AU - Reiser,Hans P. AU - Kyas,Marcel TI - Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings T2 - Lecture Notes in Computer Science, SN - 9783031222955 U1 - 005.8 23 PY - 2022/// CY - Cham PB - Springer International Publishing, Imprint: Springer KW - Data protection KW - Cryptography KW - Data encryption (Computer science) KW - Computer networks-Security measures KW - Database management KW - Application software KW - Computer networks  KW - Data and Information Security KW - Cryptology KW - Mobile and Network Security KW - Database Management System KW - Computer and Information Systems Applications KW - Computer Communication Networks N1 - On the Effectiveness of Intersection Attacks in Anonymous Microblogging -- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement -- Location Privacy, 5G AKA, and Enhancements -- Local Differential Privacy for Private Construction of Classification Algorithms -- IMSI Probing: Possibilities and Limitations -- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques -- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters -- DeCrypto: Finding Cryptocurrency Miners on ISP networks -- Detection of Voice Conversion Spoofing Attacks using Voiced Speech -- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries -- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans -- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage -- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models -- How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs -- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation -- Malware Analysis with Symbolic Execution and Graph Kernel -- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices -- Maraudrone's Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data -- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response N2 - This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy UR - https://doi.org/10.1007/978-3-031-22295-5 ER -