The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025.
The 28 full papers and 7 workshop papers included in this book were carefully reviewed and selected from 127 submissions. They were organized in topical sections as follows: Privacy protection; Industrial and Critical Infrastructure Security; Applied Cryptography; Data and Application Security; and International Workshop on Network and Distributed Systems Security (WNDSS 2025).
The two-volume set IFIP AICT 745 + 746 constitutes the refereed proceedings of the 40th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2025, held in Maribor, Slovenia, during May 21-23, 2025.
.- Privacy protection.
.- Advanced strategies for privacy preserving data publishing to improve multi class classification.
.- COLIBRI: Optimizing Multi Party Secure Neural Network Inference Time for Transformers.
.- SAAFL: Secure Aggregation for Label Aware Federated Learning.
.- “We’ve met some problems”: Developers’ Issues With Privacy Preserving Computation Techniques on Stack Overflow.
.- Facing the Challenge of Leveraging Untrained Humans in Malware Analysis.
.- Post Processing in Local Differential Privacy: An Extensive Evaluation and Benchmark Platform.
.- Rubber Ducky Station: Advancing HID Attacks with Visual Data Exfiltration.
.- PrivTru: A Privacy by Design Data Trustee Minimizing Information Leakage.
.- Industrial and Critical Infrastructure Security.
.- Uncovering Robot Joint Level Controller Actions from Encrypted Network Traffic.
.- Artefact Provenance Graphs for Anomaly Inference in Industrial Control Systems.
.- Certified Secure Updates for IoT Devices.
.- LSAST: Enhancing Cybersecurity through LLM supported Static Application Security Testing.
.- FRAMICS: Functional Risk Assessment Methodology for Industrial Control Systems.
.- Data Transformation for IDS: Leveraging Symbolic and Temporal Aspects.
.- SAFARI: a Scalable Air gapped Framework for Automated Ransomware Investigation.
.- SAVA Deployment for Spoofed Source Attacks.
.- Lightweight and Persistent Remote Attestation: Leveraging a Continuous Chain of Trust in Software Integrity Measurements.