Volume 12556
Lecture Notes in Computer Science Security and Cryptology
Editorial Board
Elisa Bertino
Purdue University, West Lafayette, IN, USA
Wen Gao
Peking University, Beijing, China
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Gerhard Woeginger
RWTH Aachen, Aachen, Germany
Moti Yung
Columbia University, New York, NY, USA
Founding Editors
Gerhard Goos
Karlsruhe Institute of Technology, Karlsruhe, Germany
Juris Hartmanis
Cornell University, Ithaca, NY, USA
More information about this subseries at http://www.springer.com/series/7410 The series Lecture Notes in Computer Science (LNCS), including its subseries Lecture Notes in Artificial Intelligence (LNAI) and Lecture Notes in Bioinformatics (LNBI), has established itself as a medium for the publication of new developments in computer science and information technology research and teaching.
The cornerstone of LNCS's editorial policy is its unwavering commitment to report the latest results from all areas of computer science and information technology research, development, and education. LNCS has always enjoyed close cooperation with the computer science R & D community, with numerous renowned academics, and with prestigious institutes and learned societies. Our mission is to serve this community by providing a most valuable publication service.
LNCS commenced publication in 1973 and quite rapidly attracted attention, not least because of its thus far unprecedented publication turnaround times. The 1980s and 1990s witnessed a substantial growth in the series, particularly in terms of volumes published. In the late 1990s we developed a systematic approach to providing LNCS in a full-text electronic version, in parallel to the printed books. Another new feature introduced in the late 1990s was the conceptualization of a couple of color-cover sublines. Still, original research results reported in proceedings and postproceedings remain the core of LNCS.
Editors
Mikael Asplund and Simin Nadjm-Tehrani
Secure IT Systems
25th Nordic Conference, NordSec 2020, Virtual Event, November 2324, 2020, Proceedings
1st ed. 2021
Logo of the publisher
Editors
Mikael Asplund
Linkping University, Linkping, Sweden
Simin Nadjm-Tehrani
Linkping University, Linkping, Sweden
ISSN 0302-9743 e-ISSN 1611-3349
Lecture Notes in Computer Science Security and Cryptology
ISBN 978-3-030-70851-1 e-ISBN 978-3-030-70852-8
https://doi.org/10.1007/978-3-030-70852-8
The chapters "Cyber Range Automation Overview with a Case Study of CRATE", "On the Certificate Revocation Problem in the Maritime Sector" and "Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation" are licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/). For further details see license information in the chapters.
Springer Nature Switzerland AG 2021
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
This volume contains the proceedings of the 25th Nordic Conference on Secure IT Systems (NordSec 2020) organised at Linkping University, Linkping, Sweden during 2324th November 2020. It was organised by the Department of Computer and Information Science with support from the national Research Centre on Resilient Information and Control Systems (RICS) financed by the Swedish Civil Contingencies Agency (MSB).
The conference, originally expected to be a physical gathering of researchers, practitioners, and policy makers from Nordic countries, has in the past few years become attractive to many European researchers. This year, the COVID-19 pandemic created an exceptional situation whereby it became clear that the conference had to be held virtually. This obviously impacted the ability of the attending presenters to engage in networking outside the presentation sessions. However, the conference program also reached a wider circle of presenters from across the globe who were able to attend and present.
The conference attracted 45 full paper submissions of which 15 were accepted to be presented and included in the proceedings. All papers were subject to at least 3 reviews by the 39 members of the program committee, to whom we would like to extend our warmest thanks. Altogether, participants from nine countries co-authored the papers in the conference, from as far away places as New Zealand and China.
The program for NordSec 2020 included two outstanding keynote lectures, one from academia, and one from the European Agency for Cyberecurity (ENISA). They discussed security issues and research in the context of future networks and applications, as well as policy issues of importance to society and decision makers, as follows:
Security, Privacy and Safety in the IoT, by Prof. Elisa Bertino, Samuel D. Conte Professor of Computer Science, Purdue University, USA
Cybersecurity breach reporting in the EU, by Dr. Marnix Dekker, Cybersecurity Expert, ENISA
The organisers of the conference are grateful for the time and effort allocated by the keynote speakers and their excellent talks as a contribution to the program.
The technical papers presented at the conference were organised in 5 sessions: Malware and attacks, Formal analysis, Applied cryptography, Security mechanisms and training, and Applications and privacy. One poster session with discussions around a setup created for education of students in a hacking environment was also organised. Without the timely preparations by the authors and the flexibility of presenters to make the necessary adjustments to do virtual presentations the conference would not have been the successful forum for discussions it became.
In addition to the reviewers and members of the program committee, there was a small group of local organisers essential for the conference to take place in this on-line setting. We gratefully acknowledge the help by Felipe Boeira and Lene Rosell in preparations for the conference and for being prepared to hold the conference in its original physical shape right until September when the decision to go virtual was made.